WO2020238971A1 - File sharing method, apparatus and system, server, terminal, and storage medium - Google Patents
File sharing method, apparatus and system, server, terminal, and storage medium Download PDFInfo
- Publication number
- WO2020238971A1 WO2020238971A1 PCT/CN2020/092665 CN2020092665W WO2020238971A1 WO 2020238971 A1 WO2020238971 A1 WO 2020238971A1 CN 2020092665 W CN2020092665 W CN 2020092665W WO 2020238971 A1 WO2020238971 A1 WO 2020238971A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- user
- file
- share
- conversation group
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Definitions
- This application relates to the field of Internet technology, and in particular to a file sharing method, device, system, server, terminal and storage medium.
- users can communicate with their friends and colleagues through terminals, and can share files with their friends and colleagues. For example, the user can send office documents to his colleagues through the terminal to share the office documents.
- the user when a user needs to share a file with multiple colleagues, the user can use a terminal to create a conversation group, and the members of the conversation group can include the user and colleagues who need to share the file.
- the user can upload the file in the conversation group to the storage space allocated by the server for the conversation group, and the server can send the file identifier of the file to other users in the conversation group.
- other users in the conversation group can use the terminal to send an access request to the server through the file identifier of the file.
- the server can then send the file to the terminal used by other users in the conversation group.
- users other than members of the conversation group may obtain the access entry of the file or the file identifier of the file through some means, for example, a malicious attacker may capture packets through the network and other means.
- the file can be obtained from the server through the access entry or the file identifier of the file, resulting in low file sharing security.
- the purpose of the embodiments of the present application is to provide a file sharing method, device, system, server, terminal, and storage medium, which can improve the security of file sharing.
- the specific technical solutions are as follows:
- an embodiment of the present application discloses a file sharing method, which is applied to a server, and the method includes: receiving an access request sent by a first terminal for accessing a target file, wherein the access request carries the first login The user ID of the first user of the terminal and the file ID of the target file; the target file is the file that the second user who logs in to the second terminal needs to share in the target conversation group, and the second user belongs to the target conversation group; according to the pre-stored
- the correspondence relationship between the file identifier and the whitelist information determines the target whitelist information corresponding to the file identifier of the target file, where the target whitelist information is used to identify members in the target conversation group who have the right to share the target file; according to the target whitelist Information and the user identification of the first user to determine whether the first user has the permission to share the target file; if the first user does not have the permission to share the target file, refuse to send the target file to the first terminal.
- an embodiment of the present application also discloses a file sharing method, which is applied to a second terminal, and the method includes: obtaining a target file that a second user logging in to the second terminal needs to share in a target conversation group, and The target whitelist information corresponding to the target file, where the target whitelist information is used to identify members in the target conversation group who have the permission to share the target file; the target file and target whitelist information are sent to the server, so that the server receives the first
- the terminal sends an access request for accessing the target file, it determines the target whitelist information corresponding to the file identifier of the target file according to the pre-stored correspondence between the file identifier and the whitelist information, and determines the target whitelist information corresponding to the file identifier of the target file according to the target whitelist information and the first
- the user ID of the user determines whether the first user has the permission to share the target file, and if the first user does not have the permission to share the target file, refuse to send the target file to the
- the embodiment of the present application also discloses a file sharing method, which is applied to a server, and the method includes: receiving an access request for accessing a target file sent by a first terminal, wherein the access request carries a login first The user ID of the first user of a terminal and the file ID of the target file; the target file is a file that the second user who logs in to the second terminal needs to share in the target conversation group, and the second user is a member of the target conversation group; The corresponding relationship between the file ID and the conversation group ID, the file ID of the target file and the user ID of the first user, determine whether the first user is a member of the target conversation group; if the first user is not a member of the target conversation group, reject Send the target file to the first terminal.
- the embodiment of the present application also discloses a file sharing device, which is applied to a server, and the device includes: a receiving module configured to receive an access request for accessing a target file sent by a first terminal, wherein the access The request carries the user ID of the first user who logs in to the first terminal and the file ID of the target file; the target file is a file that the second user who logs in to the second terminal needs to share in the target conversation group, and the second user belongs to the target conversation group Member; determination module, set to determine the target whitelist information corresponding to the file identifier of the target file according to the correspondence between the pre-stored file identifier and the whitelist information, where the target whitelist information is used to identify the target session group with sharing Member of the permission of the target file; the judgment module is set to judge whether the first user has the permission to share the target file based on the target whitelist information and the user ID of the first user; the first processing module is set to if the first user does not have If the permission of the target
- an embodiment of the present application also provides a file sharing device, which is applied to a second terminal, and the device includes: an acquisition module configured to acquire information that the second user who logs in to the second terminal needs to share in the target conversation group The target file, and target whitelist information corresponding to the target file, where the target whitelist information is used to identify members in the target conversation group who have the permission to share the target file; the sending module is set to send the target file and target whitelist information to the server , So that when the server receives the access request for accessing the target file sent by the first terminal, it determines the target whitelist information corresponding to the file identifier of the target file according to the pre-stored correspondence between the file identifier and the whitelist information, And according to the target whitelist information and the user identification of the first user, it is determined whether the first user has the permission to share the target file, and if the first user does not have the permission to share the target file, the target file is refused to be sent to the first terminal.
- the embodiment of the present application also discloses a file sharing device, which is applied to a server, and the device includes: a receiving module for receiving an access request for accessing a target file sent by a first terminal, wherein The access request carries the user ID of the first user who logs in to the first terminal and the file ID of the target file; the target file is a file that the second user who logs in to the second terminal needs to share in the target conversation group, The second user belongs to a member of the target conversation group; a judgment module is used to determine the correspondence between the file ID and the conversation group ID stored in advance, the file ID of the target file, and the user ID of the first user, Determine whether the first user is a member of the target conversation group; a first processing module, configured to refuse to send the first terminal to the first terminal if the first user is not a member of the target conversation group Target file.
- an embodiment of the present application also provides a file sharing system, which includes a server and a plurality of terminals; the second terminal of the plurality of terminals is set to obtain that the second user logging in to the second terminal needs to be in the target conversation group
- an embodiment of the present application provides a server, including: a processor, a communication interface, a memory, and a communication bus.
- the processor, the communication interface, and the memory communicate with each other through the communication bus; the memory is set to store A computer program; a processor configured to implement the steps of the file sharing method executed by the server provided in the embodiment of the present application when executing the program stored in the memory.
- an embodiment of the present application provides a terminal, including: a processor, a communication interface, a memory, and a communication bus.
- the processor, the communication interface, and the memory communicate with each other through the communication bus; the memory is set to store A computer program; a processor configured to implement the steps of the file sharing method executed by the second terminal provided in the embodiment of the present application when executing the program stored on the memory.
- an embodiment of the present application provides a computer-readable storage medium with a computer program stored in the computer-readable storage medium.
- the computer program is executed by a processor, the file sharing performed by the server provided by the embodiment of the present application is realized. Method steps.
- an embodiment of the present application provides a computer-readable storage medium with a computer program stored in the computer-readable storage medium.
- the computer program is executed by a processor
- the second terminal provided by the embodiment of the present application can be executed. The steps of the file sharing method.
- an embodiment of the application provides a computer program product containing instructions.
- the computer program product containing instructions runs on a computer, the computer executes the steps of the file sharing method performed by the server provided in the embodiments of the application. .
- an embodiment of the present application provides a computer program product containing instructions.
- the computer program product containing instructions runs on a computer, the computer executes the file sharing method performed by the second terminal provided by the embodiments of the present application. A step of.
- an embodiment of the present application provides a computer program that, when the computer program runs on a computer, causes the computer to execute the steps of the file sharing method executed by the server provided in the embodiment of the present application.
- an embodiment of the present application provides a computer program that, when running on a computer, causes the computer to execute the steps of the file sharing method executed by the second terminal provided in the embodiment of the present application.
- the server when the server receives the access request, it determines the corresponding white list information through the correspondence between the file identifier and the white list information, and then can determine whether the first user has the white list information and the user identifier of the first user.
- the permissions of the shared target file That is, for a certain file, the whitelist information is preset, and only the members with the permission to share the file identified by the whitelist information can access the file, so users other than the members identified by the whitelist have no access permissions. Therefore, even if users other than the members identified in the target whitelist obtain the file identifier of the target file, they cannot obtain the target file, thereby improving the security of file sharing.
- FIG. 1 is a structural diagram of a file sharing system provided by an embodiment of this application.
- FIG. 2 is a flowchart of a file sharing method provided by an embodiment of the application
- FIG. 3 is a flowchart of another file sharing method provided by an embodiment of the application.
- FIG. 4 is a flowchart of another file sharing method provided by an embodiment of the application.
- FIG. 5 is a flowchart of an example of a file sharing method provided by an embodiment of the application.
- FIG. 6 is a flowchart of another example of a file sharing method provided by an embodiment of the application.
- FIG. 7 is a flowchart of another example of a file sharing method provided by an embodiment of the application.
- FIG. 8 is a structural diagram of a file sharing device provided by an embodiment of the application.
- FIG. 9 is a structural diagram of another file sharing device provided by an embodiment of the application.
- FIG. 10 is a structural diagram of a server provided by an embodiment of this application.
- FIG. 11 is a structural diagram of a terminal provided by an embodiment of the application.
- users other than the members of the conversation group may also obtain the access entry of the file or the file identifier of the file through some means, and further, can use the access entry or The file identifier of the file obtains the file from the server, resulting in low file sharing security.
- Fig. 1 is a structural diagram of a file sharing system provided by an embodiment of the application, which may include a server, a first terminal, a second terminal, a third terminal, and a fourth terminal.
- user 2 can create a conversation group through the second terminal. , And invite user 1 and user 3 to join the conversation group (that is, the target conversation group). Then, the user 2 can send the target file in the target conversation group to the server through the second terminal, and the server can store the target file in the storage space allocated for the target conversation group. And send the file identifier of the target file to the terminals (that is, the first terminal and the third terminal) where other users in the target conversation group log in.
- a file ie target file
- the first terminal and the third terminal After the first terminal and the third terminal obtain the file identifier of the target file, they can send an access request for the target file to the server according to the file identifier of the target file.
- the server When the server receives the access request, the server can send the target file to the first terminal and the third terminal, so that users 1, user 2, and user 3 can share the target file. Even if the user 4 who logs in to the fourth terminal is not a member of the target conversation group, if the user 4 obtains the file identifier of the target file through the fourth terminal, the fourth terminal may also send an access request for the target file to the server.
- the server When the server receives the access request, the server can send the target file to the fourth terminal, which results in low file sharing security.
- the embodiment of the present application provides a file sharing method, which can be applied to a server.
- the server when the server receives the access request for the target file sent by the fourth terminal, the server can determine the target whitelist information corresponding to the file identifier of the target file according to the correspondence between the file identifier and the whitelist information stored in advance . And based on the target whitelist information and the user ID of the user 4, it is determined whether the user 4 has the permission to share the target file.
- the server determines that the user 4 does not have the right to share the target file, the server refuses to send the target file to the fourth terminal, thereby improving the security of file sharing.
- FIG. 2 is a flowchart of a file sharing method provided by an embodiment of the application.
- the method may be applied to a server, and the method may include the following steps:
- S201 Receive an access request for accessing a target file sent by the first terminal.
- the access request carries the user identifier of the first user who logs in to the first terminal and the file identifier of the target file.
- the user identification can be the user's UID (User Identification) or other identifications.
- the access request sent by the terminal may carry the Session (session) information of the user logging in to the terminal, and the session information may include the user's UID, UserName (user name), and the user's login IP (Internet Protocol, Internet Protocol). Address and other information.
- the target file may be a file that the second user who logs in to the second terminal needs to share in the target conversation group.
- the second user is a member of the target conversation group, and the target file may be an office document, a picture, or other files.
- the second user can share the target file with some members of the target conversation group, or can share the target file with all members of the target conversation group.
- the file identifier of the target file may be a unique identifier assigned by the server to the target file.
- the file identifier of the target file may be the URL (Uniform Resource Locator, uniform resource locator) of the target file.
- the first terminal may be a terminal logged in by a member of the target conversation group, or a terminal (may be called a third terminal) logged in by a user other than a member of the target conversation group (may be referred to as a third user).
- a member of the target conversation group may send the file identifier of the target file to the third terminal through the terminal.
- the first user when the first user needs to obtain the target file, the first user may obtain the file identification of the target file through the first terminal, and send an access request for the target file to the server according to the file identification of the target file.
- the server can receive the access request sent by the first terminal.
- S202 Determine the target whitelist information corresponding to the file identifier of the target file according to the pre-stored correspondence between the file identifier and the whitelist information.
- the target whitelist information is used to identify members in the target conversation group who have the permission to share the target file.
- the server may obtain the file identifier of the target file carried in the access request. Furthermore, the server can query the correspondence between the file identifier and the whitelist information stored in advance to determine the whitelist information corresponding to the file identifier of the target file (ie, target whitelist information). Subsequently, the server may determine whether the first user has the permission to share the target file according to the target whitelist information.
- S203 Determine whether the first user has the right to share the target file according to the target whitelist information and the user identification of the first user.
- the server may obtain the user identifier of the first user carried in the access request.
- the server can determine whether the first user has the right to share the target file according to the target whitelist information and the user identification of the first user.
- the server when the server determines that the first user does not have the right to share the target file, the server may refuse to send the target file to the first terminal.
- the server may not perform any processing, or the server may discard the access request of the first terminal.
- the target file is sent to the first terminal.
- the server when the server receives the access request, the corresponding whitelist information is determined by the correspondence between the file identifier and the whitelist information, and then the whitelist information and the user identifier of the first user can be used to determine Whether the first user has the permission to share the target file. That is, for a file, the whitelist information is preset, and only the members with the permission to share the file identified by the whitelist information can access the file, so users other than the members identified by the whitelist have no access permissions. Therefore, even if users other than the members identified in the target whitelist obtain the file identifier of the target file, they cannot obtain the target file, thereby improving the security of file sharing.
- the method may further include the following steps:
- the second user when the second user needs to share a file (ie the target file) with other members of the target conversation group, the second user can select upload in the dialog window of the target conversation group through the second terminal Target file and select the members who are allowed to share the target file.
- the second terminal may generate the target whitelist information corresponding to the target file according to the selection of the second user, and send the target file and the target whitelist information to the server.
- the server can receive the target file and target whitelist information sent by the second terminal, and save the correspondence between the file identifier of the target file and the target whitelist information for subsequent processing.
- the server may store the target file in the storage space allocated locally for the target conversation group.
- the server may also store the target file in a storage space allocated for the target conversation group in a preset file storage system.
- the preset file storage system may be a distributed object storage system or another type of storage system. The method for the server to store the target file is not limited to the above method.
- the server may record the correspondence between the file identifier and the whitelist information in the preset service storage system.
- the preset business storage system may be a key (key frame)-value (value) distributed storage system, for example, a relational database such as mysql, or it may be a storage system such as redis and mongodb.
- the server can record the file identifier as the key and the whitelist information as the corresponding value.
- the foregoing preset service storage system may also store the correspondence between the file identifier and the combined content, where the combined content is a combination of the user identifier of the user sharing the target file and the content of the corresponding whitelist information.
- the server may also send the file identifier of the target file to the terminal (may be called the fourth terminal) logged in by other users (may be called the fourth user) in the target conversation group except the second user.
- the fourth terminal may display the file identifier of the target file in the dialog window of the target conversation group.
- the fourth user may input an instruction to obtain the target file to the fourth terminal, and the fourth terminal may send an access request for the target file to the server to obtain the target file.
- the target whitelist information may include different types of data, which are described separately in combination with the following three implementation manners.
- the target whitelist information is the conversation group identifier of the target conversation group. That is, the members of the target conversation group have the permission to share the target file.
- the corresponding relationship between the file identifier and the session group identifier can be recorded, and the server can record the file identifier as the key and the session group identifier as the value.
- an embodiment of the present application provides a file sharing method, which can be applied to a server, and the method can include the following steps:
- S301 Receive an access request for accessing the target file sent by the first terminal.
- S301 is the same as the above S201, and reference may be made to the related description in the above S201, which will not be repeated here.
- S302 Determine whether the first user is a member of the target conversation group according to the pre-stored correspondence between the file identifier and the conversation group identifier, the file identifier of the target file, and the user identifier of the first user.
- the server may obtain the user identification of the first user and the file identification of the target file carried in the access request. In combination with the pre-stored correspondence between the file identifier and the conversation group identifier, it is determined whether the first user is a member of the target conversation group.
- the judging method is: determining the target whitelist information corresponding to the identifier of the target file according to the correspondence between the file identifier and the session group identifier stored in advance. Then it is determined whether the first user is a member of the target conversation group.
- the target file is sent to the first terminal; if the first user is not a member of the target conversation group, it is determined that the first user does not Have the permission to share the target file, and then execute S303.
- the server when the server determines that the first user is not a member of the target conversation group, that is, determines that the first user does not have the right to share the target file, the server may refuse to send the target file to the first terminal.
- the server when the server determines that the first user is not a member of the target conversation group, the server may not perform any processing, or the server may discard the access request of the first terminal.
- the server when the server receives the access request, it can determine whether the first user is a member of the target conversation group through the correspondence between the file ID and the conversation group ID, the file ID of the target file, and the user ID of the first user. Determine whether the first user can access the target file. Since users other than the members of the target conversation group are not members of the target conversation group, they have no access rights, so that users other than the members of the target conversation group cannot obtain the target file even if they obtain the file identifier of the target file. In turn, the security of file sharing can be improved.
- the server may receive the target file and the session identifier of the target conversation group sent by the second terminal, save the correspondence between the file identifier of the target file and the conversation group identifier of the target conversation group, and convert the target file
- the file identifier of is sent to the terminal logged in by users other than the second user in the target conversation group.
- the second user when the second user needs to share a file (ie target file) with other users, the second user can create a conversation group (ie target conversation group) through the second terminal, and the members of the target conversation group may include the second Users and other users who need to share target files.
- a file ie target file
- the members of the target conversation group may include the second Users and other users who need to share target files.
- the second user can select to upload the target file in the dialog window of the target conversation group through the second terminal, and the second terminal can send the target file and the conversation group identifier of the target conversation group to the server.
- the server may receive the target file and the conversation group identifier of the target conversation group sent by the second terminal, and save the correspondence between the file identifier of the target file and the conversation group identifier of the target conversation group for subsequent processing.
- S302 may include the following steps:
- Step S1 in the pre-stored correspondence between the file identifier and the session group identifier, determine the session group identifier corresponding to the file identifier of the target file to obtain the target session group identifier.
- the conversation group identified by the target conversation group identifier is the target conversation group.
- Step S2 Determine whether the user ID of the first user exists among the user IDs of the members in the conversation group identified by the target conversation group ID. If so, determine that the first user is a member of the target conversation group; if not, determine the first user ID. The user is not a member of the target conversation group.
- the server may determine that the user corresponds to the conversation group, and record the correspondence between the user ID of the user and the conversation ID of the conversation group.
- the server may extract the file identifier of the target file from the access request. Then, the server can determine whether the first user is a member of the target conversation group through the foregoing steps S1 and S2.
- the server sends a reminder message to the first terminal to notify the first terminal that the first user has no right to share the target file.
- the server can record the corresponding relationship between a certain user and the target conversation group when the user joins the target conversation group. Therefore, a new user who joins the target conversation group after the second user sends the target file will also automatically obtain the permission to access the target file.
- the target file can be obtained from the server, thereby reducing the operation of the second user to send the target file to the new user again. The users who exit the target conversation group will automatically lose the permission to access the target file.
- users other than the members of the target conversation group obtain the file identifier of the target file, they cannot obtain the target file, thereby ensuring the security of the target file.
- the target whitelist information may include the conversation group identifier and preset parameters of the target conversation group.
- the preset parameter is used to indicate whether all members in the target conversation group have the permission to share the target file.
- Step 1 In the case where the value of the preset parameter is used to indicate that all members in the target conversation group have the right to share the target file, query the user IDs of all members in the target conversation group.
- the server can query the correspondence between the conversation group ID of the conversation group and the user ID of the members in the conversation group to determine the user ID of the member corresponding to the conversation group ID of the target conversation group (that is, the user ID of all members in the target conversation group). User ID).
- Step 2 Determine whether there is a user ID of the first user among the user IDs of all members in the target conversation group. If the user ID of the first user exists among the user IDs of all members in the target conversation group, determine that the first user has the right to share the target file; if the user ID of all members in the target conversation group does not exist in the user ID of the first user Identifies that the first user does not have the right to share the target file.
- the preset parameters can be set by technicians based on experience.
- the preset parameter is A. If A is the first value, it means that all members of the target conversation group have the permission to share the target file; if A is the second value, it means that all members of the target conversation group are not Have permission to share target files.
- the server can determine that the user is a member of the conversation group, and record the correspondence between the user ID of the user and the conversation group ID of the conversation group.
- the server After the server receives the target file and target whitelist information, if the target whitelist information includes preset parameters, and the server determines that the current value of the preset parameter indicates that all members in the target conversation group have the right to share the target file, the server It can be determined that the second user can share the target file with all members in the target conversation group.
- the server After the server receives the access request for the target file sent by the first terminal, it can determine whether the first user has the right to share the target file through the above steps 1 and 2. That is, if the first user belongs to the target conversation group, it is determined that the first user has the right to share the target file, and if the first user does not belong to the target conversation group, it is determined that the first user does not have the right to share the target file.
- the target whitelist information may also include user identifications of members in the target conversation group who have the right to share the target file.
- the server receives the target file and target whitelist information, if the target whitelist information includes preset parameters, and the server determines that the current value of the preset parameter indicates that all members in the target conversation group do not have the permission to share the target file, then The server may determine that the second user shares the target file with some members of the target conversation group.
- S203 can also be implemented as:
- the value of the preset parameter is used to indicate that all members in the target conversation group do not have the permission to share the target file
- the target whitelist information may also only include the user identifiers of members in the target conversation group who have the permission to share the target file, without including preset parameters.
- the above S203 can be implemented as:
- the server can determine that the first user has the permission to share the target file; if the target whitelist information Among the included user IDs, the user ID of the first user does not exist, indicating that the second user does not allow the first user to share the target file, and the server can determine that the first user does not have the right to share the target file.
- the server may also send the target file to the terminal logged in by the member who has the permission to share the target file, and the method may further include the following steps:
- the target file is sent to the first terminal.
- the server when the server determines that the first user has the right to share the target file, the server may send the target file to the first terminal.
- the server can determine whether the first user has the permission to share the target file according to the target whitelist information.
- the server may refuse to send the target file to the first terminal.
- users other than the members identified in the target whitelist have no access rights, so that even if users other than the members identified in the target whitelist obtain the file identification of the target file, the server will not log in to the terminal of the user. Sending the corresponding target file can improve the security of file sharing.
- the second user does not need to create a new conversation group, and can only share the target file with some members of the target conversation group, thereby facilitating user operations and improving the efficiency of file sharing.
- the server may also send a reminder message to the terminal, and the method may further include the following steps:
- a reminder message is sent to the first terminal to notify the first terminal that the first user has no right to share the target file.
- the server when the server determines that the first user does not have the right to share the target file, the server may not only refuse to send the target file to the first terminal, but also may send a reminder message to the first terminal.
- the first terminal may receive the reminder message and determine that the first user currently logged in does not have the right to share the target file. For example, the first terminal may display a message "No right to share the target file" in the dialog window of the target conversation group.
- FIG. 4 is a flowchart of a file sharing method provided by an embodiment of this application.
- the method may be applied to a second terminal.
- the method may include the following steps:
- S401 Acquire target files that need to be shared in the target conversation group by the second user who logs in to the second terminal, and target whitelist information corresponding to the target files.
- the target whitelist information is used to identify members in the target conversation group who have the permission to share the target file.
- the target file can be office documents, pictures, or other files.
- the member with the permission to share the target file in the target conversation group may be a member of the target conversation group, may also be a plurality of partial members in the target conversation group, or may be all members of the target conversation group.
- the second user when the second user needs to share a file (ie, target file) with members of the target conversation group, the second user can select the need to share in the dialog window of the target conversation group through the second terminal Target file and determine other members of the target conversation group that are allowed to share the target file.
- the second terminal can obtain the target file and the corresponding target whitelist information.
- S402 Send the target file and target whitelist information to the server, so that when the server receives the access request for accessing the target file sent by the first terminal, it determines the corresponding relationship based on the pre-stored file identifier and the whitelist information.
- Target whitelist information corresponding to the file identifier of the target file. And based on the target whitelist information and the user identification of the first user, it is determined whether the first user has the permission to share the target file, and if the first user does not have the permission to share the target file, the target file is refused to be sent to the first terminal.
- the second terminal may send the target file and target whitelist information to the server.
- the server can receive the target file and target whitelist information sent by the second terminal, and save the correspondence between the target file identifier and the target whitelist information.
- the server when the server receives an access request for the target file sent by another terminal (ie, the first terminal) according to the file identifier of the target file, the server can determine whether the first user who logs in to the first terminal has sharing based on the target whitelist information The permissions of the target file. When the server determines that the first user does not have the right to share the target file, the server may refuse to send the target file to the first terminal.
- the server when the second user shares the target file, the corresponding target whitelist information can be sent to the server through the second terminal.
- the server receives the access request sent by the first user through the first terminal, it can determine the first user through the correspondence between the file identifier and the whitelist information, the file identifier of the target file, and the user identifier of the first user. Whether the user has the right to share the target file to determine whether the first user can access the target file.
- users other than the members identified by the target whitelist do not have access rights, so that even if users other than the members identified by the target whitelist obtain the file identifier of the target file, they cannot obtain the target file, thereby improving the file sharing performance. safety.
- the second terminal may obtain target whitelist information according to the user's operation.
- obtaining target whitelist information may include the following steps:
- the predetermined area is located in the file access permission setting interface displayed by the second terminal, and the signal includes target whitelist information corresponding to the target file.
- the second terminal may display a file access permission setting interface for the target file. Furthermore, the second user can perform operations in a predetermined area in the interface displayed by the second terminal to select members in the target conversation group that are allowed to share the target file. Accordingly, the second terminal can determine which members of the target conversation group can share the target file. Members, get target whitelist information.
- the second terminal may display a selection dialog box in the conversation window of the target conversation group.
- the selection dialog box can display the option of "Share the target file among all members in the current conversation group".
- the second user can check this option through the second terminal, and the second terminal can determine that all members in the target conversation group have the permission to share the target file, and obtain the target whitelist information.
- the second terminal may display a multi-selection dialog box in the conversation window of the target conversation group.
- the multiple selection dialog box can display the user names of all members in the target conversation group.
- the second user can check the user names of the members who are allowed to share the target file through the second terminal, and the second terminal can determine the members of the target conversation group who can share the target file according to the user names checked by the second user to obtain the target whitelist information.
- the target whitelist information is the session identifier of the target session group.
- the target whitelist information may include the session group identifier of the target session group and preset parameters, and the preset parameters are used to indicate whether all members of the target session group have the right to share the target file.
- the preset parameters can be set by technicians based on experience.
- the preset parameter is A
- A is the first value, which can indicate that all members in the target conversation group have the permission to share the target file
- A is the second value, which can indicate that all members in the target conversation group do not have sharing The permissions of the target file.
- the second terminal may display a selection dialog box in the conversation window of the target conversation group, and the selection dialog box may display "in the current conversation group "Share target files among members” option. The second user can check this option through the second terminal.
- the second terminal may determine that the preset parameter is the aforementioned first value, and further, the second terminal may send the target file and the target whitelist information including the preset parameter to the server.
- the second terminal may display a multi-selection dialog box in the conversation window of the target conversation group, and the multi-selection dialog box may display all members in the target conversation group User name.
- the second user can check the user names of the members who are allowed to share the target file through the second terminal.
- the second terminal may determine that the preset parameter is the aforementioned second value, and the second terminal may also obtain the user identification of the member selected by the second user who is allowed to share the target file. Furthermore, the second terminal may send the target file and the target whitelist information including the determined preset parameters and the acquired user identification to the server.
- the target whitelist information may include user identifications of members in the target conversation group who have the right to share the target file.
- the second terminal may obtain the user ID of the member who is allowed to share the target file selected by the second user, and further, the second terminal may transfer the target file , Send the target whitelist information containing the obtained user ID to the server.
- the server can combine the user ID of the first user according to whether the target whitelist information contains preset parameters and the current value of the preset parameters, It is determined whether the first user has the authority to share the target file, and the access request is processed according to the determination result.
- the processing method of the server reference may be made to the detailed introduction in the foregoing embodiment, which is not repeated here.
- FIG. 5 is a flowchart of an example of a file sharing method provided by an embodiment of the application. The method may include the following steps:
- S501 The second terminal obtains the target file that the second user who logs in to the second terminal needs to share in the target conversation group.
- the second terminal sends the target file and the conversation group identifier of the target conversation group to the server.
- S503 The server saves the correspondence between the file identifier of the target file and the conversation group identifier of the target conversation group, and sends the file identifier of the target file to the terminal logged in by users other than the second user in the target conversation group.
- S504 The first terminal sends a first access request for the target file to the server.
- the first access request carries the user ID of the first user who logs in to the first terminal and the file ID of the target file.
- S505 The third terminal sends a second access request for the target file to the server.
- the second access request carries the user identification of the third user who logs in to the third terminal and the file identification of the target file.
- S506 The server determines, according to the first access request, that the first user who logs in to the first terminal is not a member of the target conversation group.
- S507 The server determines, according to the second access request, that the third user who logs in to the third terminal is a member of the target conversation group.
- S508 The server sends a reminder message to the first terminal to notify the first terminal that the first user has no right to share the target file.
- S509 The server sends the target file to the third terminal.
- S510 The first terminal displays a message of "No right to share the target file".
- FIG. 6 is a flowchart of an example of a file sharing method provided by an embodiment of the application. The method may include the following steps:
- the second terminal obtains the target file that the second user who logs in to the second terminal needs to share in the target conversation group, and the corresponding target whitelist information.
- the target whitelist information includes preset parameters, and the current value of the preset parameters indicates that all members in the target conversation group have the right to share the target file.
- S602 The second terminal sends the target file and target whitelist information to the server.
- the server saves the correspondence between the file identifier of the target file and the target whitelist information, and sends the file identifier of the target file to the terminal logged in by users other than the second user in the target conversation group.
- S604 The first terminal sends a first access request for the target file to the server.
- S605 The third terminal sends a second access request for the target file to the server.
- the server determines that among the user IDs of all members in the target conversation group, there is no user ID of the first user who logs in to the first terminal.
- the server determines that among the user IDs of all members in the target conversation group, there is the user ID of the third user who logs in to the third terminal.
- S608 The server sends a reminder message to the first terminal to notify the first terminal that the first user has no right to share the target file.
- S609 The server sends the target file to the third terminal.
- FIG. 7 is a flowchart of an example of a file sharing method provided by an embodiment of the application.
- the method may include: S701 to S710.
- S701-S705 are the same as S601-S605
- S708-S710 are the same as S608-S610.
- the target whitelist information acquired by the second terminal includes: user identifiers of members in the target conversation group who have the permission to share target files, and the target whitelist information does not include preset parameters.
- S706 to S707 may be executed.
- S706 The server determines, according to the first access request, that the user identifier of the first user who logs in to the first terminal does not exist among the user identifiers included in the target whitelist information.
- the server determines that among the user identifiers included in the target whitelist information, there is the user identifier of the third user who logs in to the third terminal.
- S708 can be continued, and the server sends a reminder message to the first terminal to notify the first terminal that the first user has no right to share the target file.
- FIG. 8 is a structural diagram of a file sharing device provided by an embodiment of the application.
- the device is applied to a server, and the device may include:
- the receiving module 801 is configured to receive an access request for accessing a target file sent by the first terminal, wherein the access request carries the user ID of the first user who logs in to the first terminal and the file ID of the target file; the target file is the login first 2. Files that the second user of the terminal needs to share in the target conversation group, and the second user is a member of the target conversation group;
- the determining module 802 is configured to determine the target whitelist information corresponding to the file identifier of the target file according to the correspondence between the file identifier and the whitelist information stored in advance, wherein the target whitelist information is used to identify the shared target in the target conversation group Member of the authority of the file;
- the judgment module 803 is configured to judge whether the first user has the right to share the target file according to the target whitelist information and the user identification of the first user;
- the first processing module 804 is configured to refuse to send the target file to the first terminal if the first user does not have the permission to share the target file.
- the target whitelist information is the session group identifier of the target session group.
- the receiving module 801 is configured to receive an access request for accessing a target file sent by the first terminal, wherein the access request carries the user ID of the first user who logs in to the first terminal and the file ID of the target file; the target file is the login first 2. Files that the second user of the terminal needs to share in the target conversation group, and the second user is a member of the target conversation group;
- the judging module 803 is configured to judge whether the first user is a member of the target conversation group based on the pre-stored correspondence between the file ID and the conversation group ID, the file ID of the target file, and the user ID of the first user;
- the first processing module 804 is configured to refuse to send the target file to the first terminal if the first user is not a member of the target conversation group.
- the judgment module 803 can be specifically set as:
- the first user is a member of the target conversation group, it is determined that the first user has the right to share the target file;
- the first user is not a member of the target conversation group, it is determined that the first user does not have the right to share the target file.
- the judgment module 803 can be specifically set as:
- the user ID of the first user exists, it is determined that the first user is a member of the target conversation group;
- the user identity of the first user does not exist, it is determined that the first user does not belong to a member of the target conversation group.
- the target whitelist information includes the session group identifier of the target session group and preset parameters, and the preset parameters are used to indicate whether all members in the target session group have the right to share the target file;
- the judging module 803 is specifically set to query the user IDs of all members in the target conversation group when the value of the preset parameter is used to indicate that all members in the target conversation group have the right to share the target file;
- the user ID of the first user exists among the user IDs of all members in the target conversation group, it is determined that the first user has the right to share the target file;
- the target whitelist information further includes user identifications of members in the target conversation group who have the right to share the target file;
- the judging module 803 is also set to judge whether there is a first among the user identifiers contained in the target whitelist information when the value of the preset parameter is used to indicate that all members in the target conversation group do not have the permission to share the target file.
- User ID of the user is also set to judge whether there is a first among the user identifiers contained in the target whitelist information when the value of the preset parameter is used to indicate that all members in the target conversation group do not have the permission to share the target file.
- the user ID of the first user exists in the user ID included in the target whitelist information, it is determined that the first user has the right to share the target file;
- the user identification of the first user does not exist in the user identification included in the target whitelist information, it is determined that the first user does not have the right to share the target file.
- the target whitelist information includes user identifications of members in the target conversation group who have the right to share the target file;
- the determining module 803 is specifically configured to determine whether the user identifier of the first user exists among the user identifiers included in the target whitelist information;
- the user ID of the first user exists in the user ID included in the target whitelist information, it is determined that the first user has the right to share the target file;
- the user identification of the first user does not exist in the user identification included in the target whitelist information, it is determined that the first user does not have the right to share the target file.
- the device further includes:
- the second processing module is set to:
- the file identifier of the target file is sent to the terminal logged in by users other than the second user in the target conversation group.
- the second processing module is specifically set to:
- the file identifier of the target file is sent to the terminal logged in by users other than the second user in the target conversation group.
- the device further includes:
- the first sending module is configured to send a reminder message to the first terminal if the first user does not have the right to share the target file to notify the first terminal that the first user has no right to share the target file.
- the first sending module is specifically configured to send a reminder message to the first terminal if the first user is not a member of the target conversation group to notify the first terminal that the first user has no right to share the target file.
- the device further includes:
- the second sending module is configured to send the target file to the first terminal if the first user has the permission to share the target file.
- the second sending module is specifically configured to send the target file to the first terminal if the first user is a member of the target conversation group.
- FIG. 9 is a structural diagram of a file sharing device provided by an embodiment of the application.
- the device is applied to a second terminal, and the device includes:
- the obtaining module 901 is configured to obtain the target file that the second user who logs in the second terminal needs to share in the target conversation group, and the target whitelist information corresponding to the target file, where the target whitelist information is used to identify the target conversation group with Members with permission to share target files;
- the sending module 902 is configured to send the target file and target whitelist information to the server, so that when the server receives the access request for accessing the target file sent by the first terminal, it will be based on the correspondence between the pre-stored file identifier and the whitelist information Relationship, determine the target whitelist information corresponding to the file ID of the target file, and determine whether the first user has the permission to share the target file based on the target whitelist information and the user ID of the first user, if the first user does not have the shared target The permission of the file, the target file is refused to be sent to the first terminal.
- the acquiring module 901 is specifically configured to receive a signal triggered by an operation in a predetermined area, where the predetermined area is located in the file access permission setting interface displayed by the second terminal, and the signal includes the target corresponding to the target file.
- Whitelist information is specifically configured to receive a signal triggered by an operation in a predetermined area, where the predetermined area is located in the file access permission setting interface displayed by the second terminal, and the signal includes the target corresponding to the target file.
- the target whitelist information is the session identifier of the target session group.
- the target whitelist information includes the conversation group identifier of the target conversation group and preset parameters, and the preset parameters are used to indicate whether all members in the target conversation group have the right to share the target file.
- the target whitelist information includes user identifications of members in the target conversation group who have the right to share the target file.
- the embodiment of the present application also provides a file sharing system, which includes a server and multiple terminals;
- the second terminal of the plurality of terminals is configured to obtain the target file that the second user who logs in to the second terminal needs to share in the target conversation group, and the target whitelist information corresponding to the target file, where the target whitelist information is used to identify Members of the target conversation group who have the right to share target files; send target files and target whitelist information to the server;
- the server is configured to receive an access request for accessing the target file sent by the first terminal of the plurality of terminals; and determine the target whitelist corresponding to the file identifier of the target file according to the correspondence relationship between the pre-stored file identifier and the whitelist information Information; According to the target whitelist information and the user ID of the first user, determine whether the first user has the permission to share the target file; if the first user does not have the permission to share the target file, refuse to send the target file to the first terminal.
- the first terminal of the plurality of terminals is configured to send an access request for accessing the target file to the server, wherein the access request carries the user identification of the first user who logs in to the first terminal and the target file
- the target file is a file that needs to be shared in the target conversation group by the second user who logs in to the second terminal of the multiple terminals, and the second user belongs to a member of the target conversation group;
- the server is configured to receive the access request, and determine whether the first user is a member of the target conversation group according to the pre-stored correspondence between the file ID and the conversation group ID, the file ID of the target file, and the user ID of the first user; If the user is not a member of the target conversation group, it refuses to send the target file to the first terminal.
- the embodiment of the present application also provides a server, as shown in FIG. 10, including a processor 1001, a communication interface 1002, a memory 1003, and a communication bus 1004, where the processor 1001, the communication interface 1002, and the memory 1003 are implemented through the communication bus 1004 Mutual communication,
- the memory 1003 is set to store computer programs
- the processor 1001 is configured to implement the file sharing method executed by the server provided in the embodiment of the present application when executing the program stored in the memory 1003.
- the above-mentioned file sharing method executed by the server is partly the same as the above-mentioned method embodiment, and will not be repeated here.
- the communication bus mentioned by the above server may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus.
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the communication bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.
- the communication interface is used for communication between the aforementioned server and other devices.
- the memory may include random access memory (Random Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage.
- RAM Random Access Memory
- NVM Non-Volatile Memory
- the memory may also be at least one storage device located far away from the foregoing processor.
- the above-mentioned processor can be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal Processing, DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
- CPU central processing unit
- NP Network Processor
- DSP Digital Signal Processing
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- the embodiment of the present application also provides a terminal, as shown in FIG. 11, including a processor 1101, a communication interface 1102, a memory 1103, and a communication bus 1104, where the processor 1101, the communication interface 1102, and the memory 1103 are completed through the communication bus 1104 Mutual communication,
- the memory 1103 is set to store computer programs
- the processor 1101 is configured to implement the file sharing method executed by the second terminal provided in the embodiment of the present application when executing the program stored in the memory 1103.
- the file sharing method executed by the second terminal is partially the same as that of the foregoing method embodiment, and will not be repeated here.
- the communication bus mentioned by the above terminal may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus.
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the communication bus can be divided into address bus, data bus, control bus, etc. For ease of representation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.
- the communication interface is used for communication between the aforementioned terminal and other devices.
- the memory may include random access memory (Random Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage.
- RAM Random Access Memory
- NVM Non-Volatile Memory
- the memory may also be at least one storage device located far away from the foregoing processor.
- the above-mentioned processor can be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal Processing, DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
- CPU central processing unit
- NP Network Processor
- DSP Digital Signal Processing
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- a computer-readable storage medium stores a computer program.
- the computer program is executed by a processor, the The steps of the file sharing method executed by the server.
- a computer-readable storage medium stores a computer program.
- the computer program is executed by a processor, the Steps of the file sharing method executed by the second terminal.
- a computer program product containing instructions is also provided.
- the computer program product containing instructions runs on a computer, the computer executes the steps of the file sharing method executed by the server.
- a computer program product containing instructions is also provided.
- the computer program product containing instructions runs on a computer, the computer can execute the execution provided by the second terminal provided in the embodiments of this application. The steps of the file sharing method.
- a computer program which when running on a computer, causes the computer to execute the steps of the file sharing method executed by the server provided in the embodiment of this application.
- a computer program which when running on a computer, causes the computer to execute the steps of the file sharing method performed by the second terminal provided in the embodiment of this application.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
- the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
- the corresponding relationship between file identification and whitelist information can be stored in the server, so that users other than the members identified by the target whitelist cannot Obtaining the target file prevents the target file from being obtained by a malicious attacker and can improve the security of file sharing.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (31)
- 一种文件共享方法,所述方法应用于服务器,所述方法包括:A file sharing method, the method is applied to a server, and the method includes:接收第一终端发送的用于访问目标文件的访问请求,其中,所述访问请求中携带登录所述第一终端的第一用户的用户标识和所述目标文件的文件标识;所述目标文件为登录第二终端的第二用户需要在目标会话组中共享的文件,所述第二用户属于所述目标会话组的成员;Receiving an access request for accessing a target file sent by a first terminal, wherein the access request carries the user ID of the first user logging in the first terminal and the file ID of the target file; the target file is A file that a second user who logs in to the second terminal needs to share in a target conversation group, and the second user is a member of the target conversation group;根据预先存储的文件标识与白名单信息的对应关系,确定与所述目标文件的文件标识对应的目标白名单信息,其中,所述目标白名单信息用于标识所述目标会话组中具有共享所述目标文件的权限的成员;Determine the target whitelist information corresponding to the file identifier of the target file according to the pre-stored correspondence between the file identifier and the whitelist information, wherein the target whitelist information is used to identify the shared place in the target conversation group. The member who stated the authority of the target file;根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限;Judging whether the first user has the permission to share the target file according to the target whitelist information and the user identifier of the first user;如果所述第一用户不具有共享所述目标文件的权限,则拒绝向所述第一终端发送所述目标文件。If the first user does not have the right to share the target file, refuse to send the target file to the first terminal.
- 根据权利要求1所述的方法,其中,所述目标白名单信息为所述目标会话组的会话组标识;The method according to claim 1, wherein the target whitelist information is a conversation group identifier of the target conversation group;所述根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限,包括:The determining whether the first user has the permission to share the target file according to the target whitelist information and the user identifier of the first user includes:判断所述第一用户是否属于所述目标会话组的成员;Determining whether the first user is a member of the target conversation group;如果所述第一用户属于所述目标会话组的成员,则确定所述第一用户具有共享所述目标文件的权限;If the first user is a member of the target conversation group, determining that the first user has the right to share the target file;如果所述第一用户不属于所述目标会话组的成员,则确定所述第一用户不具有共享所述目标文件的权限。If the first user is not a member of the target conversation group, it is determined that the first user does not have the right to share the target file.
- 根据权利要求1所述的方法,其中,所述目标白名单信息包括所述目标会话组的会话组标识和预设参数,所述预设参数用于表示所述目标会话组中的所有成员是否均具有共享所述目标文件的权限;The method according to claim 1, wherein the target whitelist information includes a conversation group identifier of the target conversation group and preset parameters, and the preset parameters are used to indicate whether all members of the target conversation group All have the permission to share the target file;所述根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限,包括:The determining whether the first user has the permission to share the target file according to the target whitelist information and the user identifier of the first user includes:在所述预设参数的值用于表示所述目标会话组中的所有成员均具有共享所述目标文件的权限的情况下,查询所述目标会话组中所有成员的用户标识;In the case where the value of the preset parameter is used to indicate that all members in the target conversation group have the right to share the target file, query the user IDs of all members in the target conversation group;判断所述目标会话组中的所有成员的用户标识中,是否存在所述第一用户的用户标识;Determining whether the user identifier of the first user exists among the user identifiers of all members in the target conversation group;如果所述目标会话组中所有成员的用户标识中,存在所述第一用户的用户标识,确定 所述第一用户具有共享所述目标文件的权限;If the user ID of the first user exists among the user IDs of all members in the target conversation group, determining that the first user has the right to share the target file;如果所述目标会话组中所有成员的用户标识中,不存在所述第一用户的用户标识,确定所述第一用户不具有共享所述目标文件的权限。If the user identification of the first user does not exist among the user identifications of all members in the target conversation group, it is determined that the first user does not have the right to share the target file.
- 根据权利要求3所述的方法,其中,所述目标白名单信息还包括所述目标会话组中具有共享所述目标文件的权限的成员的用户标识;The method according to claim 3, wherein the target whitelist information further includes user identifications of members in the target conversation group who have the right to share the target file;所述根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限,包括:The determining whether the first user has the permission to share the target file according to the target whitelist information and the user identifier of the first user includes:在所述预设参数的值用于表示所述目标会话组中的所有成员不都具有共享所述目标文件的权限的情况下,判断所述目标白名单信息包含的用户标识中,是否存在所述第一用户的用户标识;In the case where the value of the preset parameter is used to indicate that all members in the target conversation group do not have the right to share the target file, it is determined whether all the user identifiers included in the target whitelist information exist The user ID of the first user;如果所述目标白名单信息包含的用户标识中,存在所述第一用户的用户标识,确定所述第一用户具有共享所述目标文件的权限;If the user identification of the first user exists in the user identification included in the target whitelist information, determining that the first user has the right to share the target file;如果所述目标白名单信息包含的用户标识中,不存在所述第一用户的用户标识,确定所述第一用户不具有共享所述目标文件的权限。If the user identification of the first user does not exist in the user identification included in the target whitelist information, it is determined that the first user does not have the right to share the target file.
- 根据权利要求1所述的方法,其中,所述目标白名单信息包括所述目标会话组中具有共享所述目标文件的权限的成员的用户标识;The method according to claim 1, wherein the target whitelist information includes user identifications of members in the target conversation group who have the right to share the target file;所述根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限,包括:The determining whether the first user has the permission to share the target file according to the target whitelist information and the user identifier of the first user includes:判断所述目标白名单信息包含的用户标识中,是否存在所述第一用户的用户标识;Determining whether the user identifier of the first user exists among the user identifiers included in the target whitelist information;如果所述目标白名单信息包含的用户标识中,存在所述第一用户的用户标识,确定所述第一用户具有共享所述目标文件的权限;If the user identification of the first user exists in the user identification included in the target whitelist information, determining that the first user has the right to share the target file;如果所述目标白名单信息包含的用户标识中,不存在所述第一用户的用户标识,确定所述第一用户不具有共享所述目标文件的权限。If the user identification of the first user does not exist among the user identifications included in the target whitelist information, it is determined that the first user does not have the right to share the target file.
- 根据权利要求1-5任一项所述的方法,其中,在所述接收第一终端发送的用于访问目标文件的访问请求之前,所述方法还包括:The method according to any one of claims 1 to 5, wherein before the receiving the access request for accessing the target file sent by the first terminal, the method further comprises:接收所述第二终端发送的目标文件和所述目标文件对应的目标白名单信息;Receiving the target file sent by the second terminal and the target whitelist information corresponding to the target file;保存所述目标文件的文件标识与所述目标白名单信息的对应关系;Save the correspondence between the file identifier of the target file and the target whitelist information;将所述目标文件的文件标识发送至所述目标会话组中除所述第二用户以外的其他用户登录的终端。The file identifier of the target file is sent to the terminal logged in by users other than the second user in the target conversation group.
- 根据权利要求1所述的方法,其中,所述方法还包括:The method according to claim 1, wherein the method further comprises:如果所述第一用户不具有共享所述目标文件的权限,向所述第一终端发送提醒消息, 以通告所述第一终端所述第一用户无权共享所述目标文件。If the first user does not have the right to share the target file, sending a reminder message to the first terminal to notify the first terminal that the first user has no right to share the target file.
- 根据权利要求1所述的方法,其中,所述方法还包括:The method according to claim 1, wherein the method further comprises:如果所述第一用户具有共享所述目标文件的权限,向所述第一终端发送所述目标文件。If the first user has the right to share the target file, sending the target file to the first terminal.
- 一种文件共享方法,所述方法应用于第二终端,所述方法包括:A file sharing method, the method is applied to a second terminal, and the method includes:获取登录所述第二终端的第二用户需要在目标会话组中共享的目标文件,以及所述目标文件对应的目标白名单信息,其中,所述目标白名单信息用于标识所述目标会话组中具有共享所述目标文件的权限的成员;Acquire the target file that the second user who logs in to the second terminal needs to share in the target conversation group and the target whitelist information corresponding to the target file, where the target whitelist information is used to identify the target conversation group Members who have the right to share the target file;向服务器发送所述目标文件和所述目标白名单信息,以使所述服务器在接收到第一终端发送的用于访问所述目标文件的访问请求时,根据预先存储的文件标识与白名单信息的对应关系,确定与所述目标文件的文件标识对应的目标白名单信息,并根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限,如果所述第一用户不具有共享所述目标文件的权限,则拒绝向所述第一终端发送所述目标文件。Send the target file and the target whitelist information to the server, so that when the server receives the access request for accessing the target file sent by the first terminal, it will be based on the pre-stored file identification and whitelist information To determine the target whitelist information corresponding to the file identifier of the target file, and determine whether the first user has shared the target according to the target whitelist information and the user identifier of the first user File permission, if the first user does not have the permission to share the target file, refuse to send the target file to the first terminal.
- 根据权利要求9所述的方法,其中,获取所述目标文件对应的目标白名单信息包括:The method according to claim 9, wherein obtaining the target whitelist information corresponding to the target file comprises:接收针对预定区域的操作所触发的信号,其中,所述预定区域位于所述第二终端展示的文件访问权限设置界面中,所述信号中包括所述目标文件对应的目标白名单信息。Receive a signal triggered by an operation in a predetermined area, where the predetermined area is located in a file access permission setting interface displayed by the second terminal, and the signal includes target whitelist information corresponding to the target file.
- 根据权利要求9所述的方法,其中,所述目标白名单信息为所述目标会话组的会话标识。The method according to claim 9, wherein the target whitelist information is a session identifier of the target conversation group.
- 根据权利要求9所述的方法,其中,所述目标白名单信息包括所述目标会话组的会话组标识和预设参数,所述预设参数用于表示所述目标会话组中的所有成员是否均具有共享所述目标文件的权限。The method according to claim 9, wherein the target whitelist information includes a conversation group identifier of the target conversation group and preset parameters, and the preset parameters are used to indicate whether all members of the target conversation group Both have the permission to share the target file.
- 根据权利要求9所述的方法,其中,所述目标白名单信息包括所述目标会话组中具有共享所述目标文件的权限的成员的用户标识。8. The method according to claim 9, wherein the target whitelist information includes user identifications of members in the target conversation group who have the right to share the target file.
- 一种文件共享方法,所述方法应用于服务器,所述方法包括:A file sharing method, the method is applied to a server, and the method includes:接收第一终端发送的用于访问目标文件的访问请求,其中,所述访问请求中携带登录所述第一终端的第一用户的用户标识和所述目标文件的文件标识;所述目标文件为登录第二终端的第二用户需要在目标会话组中共享的文件,所述第二用户属于所述目标会话组的成员;Receiving an access request for accessing a target file sent by a first terminal, wherein the access request carries the user ID of the first user logging in the first terminal and the file ID of the target file; the target file is A file that a second user who logs in to the second terminal needs to share in a target conversation group, and the second user is a member of the target conversation group;根据预先存储的文件标识与会话组标识的对应关系、所述目标文件的文件标识和所述第一用户的用户标识,判断所述第一用户是否属于所述目标会话组的成员;Judging whether the first user is a member of the target conversation group according to the pre-stored correspondence between the file identifier and the conversation group identifier, the file identifier of the target file, and the user identifier of the first user;如果所述第一用户不属于所述目标会话组的成员,则拒绝向所述第一终端发送所述目标文件。If the first user is not a member of the target conversation group, refuse to send the target file to the first terminal.
- 一种文件共享装置,所述装置应用于服务器,所述装置包括:A file sharing device, the device is applied to a server, and the device includes:接收模块,设置为接收第一终端发送的用于访问目标文件的访问请求,其中,所述访问请求中携带登录所述第一终端的第一用户的用户标识和所述目标文件的文件标识;所述目标文件为登录第二终端的第二用户需要在目标会话组中共享的文件,所述第二用户属于所述目标会话组的成员;A receiving module, configured to receive an access request for accessing a target file sent by the first terminal, wherein the access request carries the user ID of the first user logging in the first terminal and the file ID of the target file; The target file is a file that a second user who logs in to the second terminal needs to share in a target conversation group, and the second user is a member of the target conversation group;确定模块,设置为根据预先存储的文件标识与白名单信息的对应关系,确定与所述目标文件的文件标识对应的目标白名单信息,其中,所述目标白名单信息用于标识所述目标会话组中具有共享所述目标文件的权限的成员;The determining module is configured to determine the target whitelist information corresponding to the file identifier of the target file according to the correspondence between the file identifier and the whitelist information stored in advance, wherein the target whitelist information is used to identify the target session Members in the group who have the right to share the target file;判断模块,设置为根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限;A judging module, configured to judge whether the first user has the right to share the target file according to the target whitelist information and the user identification of the first user;第一处理模块,设置为如果所述第一用户不具有共享所述目标文件的权限,则拒绝向所述第一终端发送所述目标文件。The first processing module is configured to refuse to send the target file to the first terminal if the first user does not have the right to share the target file.
- 根据权利要求15所述的装置,其中,所述目标白名单信息为所述目标会话组的会话组标识;The apparatus according to claim 15, wherein the target whitelist information is a conversation group identifier of the target conversation group;所述判断模块,具体设置为:The judgment module is specifically set as:判断所述第一用户是否属于所述目标会话组的成员;Determining whether the first user is a member of the target conversation group;如果所述第一用户属于所述目标会话组的成员,则确定所述第一用户具有共享所述目标文件的权限;If the first user is a member of the target conversation group, determining that the first user has the right to share the target file;如果所述第一用户不属于所述目标会话组的成员,则确定所述第一用户不具有共享所述目标文件的权限。If the first user is not a member of the target conversation group, it is determined that the first user does not have the right to share the target file.
- 根据权利要求15所述的装置,其中,所述目标白名单信息包括所述目标会话组的会话组标识和预设参数,所述预设参数用于表示所述目标会话组中的所有成员是否均具有共享所述目标文件的权限;The device according to claim 15, wherein the target whitelist information includes a conversation group identifier of the target conversation group and preset parameters, and the preset parameters are used to indicate whether all members of the target conversation group All have the permission to share the target file;所述判断模块,具体设置为:The judgment module is specifically set as:在所述预设参数的值用于表示所述目标会话组中的所有成员均具有共享所述目标文件的权限的情况下,查询所述目标会话组中所有成员的用户标识;In the case where the value of the preset parameter is used to indicate that all members in the target conversation group have the right to share the target file, query the user IDs of all members in the target conversation group;判断所述目标会话组中的所有成员的用户标识中,是否存在所述第一用户的用户标识;Determining whether the user identifier of the first user exists among the user identifiers of all members in the target conversation group;如果所述目标会话组中所有成员的用户标识中,存在所述第一用户的用户标识,确定所述第一用户具有共享所述目标文件的权限;If the user ID of the first user exists among the user IDs of all members in the target conversation group, determining that the first user has the right to share the target file;如果所述目标会话组中所有成员的用户标识中,不存在所述第一用户的用户标识,确定所述第一用户不具有共享所述目标文件的权限。If the user identification of the first user does not exist among the user identifications of all members in the target conversation group, it is determined that the first user does not have the right to share the target file.
- 根据权利要求17所述的装置,其中,所述目标白名单信息还包括所述目标会话组中具有共享所述目标文件的权限的成员的用户标识;The apparatus according to claim 17, wherein the target whitelist information further comprises user identifications of members in the target conversation group who have the right to share the target file;所述判断模块,具体设置为:The judgment module is specifically set as:在所述预设参数的值用于表示所述目标会话组中的所有成员不都具有共享所述目标文件的权限的情况下,判断所述目标白名单信息包含的用户标识中,是否存在所述第一用户的用户标识;In the case where the value of the preset parameter is used to indicate that all members in the target conversation group do not have the permission to share the target file, it is determined whether there are all user identifiers included in the target whitelist information. The user ID of the first user;如果所述目标白名单信息包含的用户标识中,存在所述第一用户的用户标识,确定所述第一用户具有共享所述目标文件的权限;If the user identification of the first user exists in the user identification included in the target whitelist information, determining that the first user has the right to share the target file;如果所述目标白名单信息包含的用户标识中,不存在所述第一用户的用户标识,确定所述第一用户不具有共享所述目标文件的权限。If the user identification of the first user does not exist in the user identification included in the target whitelist information, it is determined that the first user does not have the right to share the target file.
- 根据权利要求15所述的装置,其中,所述目标白名单信息包括所述目标会话组中具有共享所述目标文件的权限的成员的用户标识;The apparatus according to claim 15, wherein the target whitelist information includes user identifications of members in the target conversation group who have the right to share the target file;所述判断模块,具体设置为判断所述目标白名单信息包含的用户标识中,是否存在所述第一用户的用户标识;The determining module is specifically configured to determine whether the user identifier of the first user exists among the user identifiers included in the target whitelist information;如果所述目标白名单信息包含的用户标识中,存在所述第一用户的用户标识,确定所述第一用户具有共享所述目标文件的权限;If the user identification of the first user exists in the user identification included in the target whitelist information, determining that the first user has the right to share the target file;如果所述目标白名单信息包含的用户标识中,不存在所述第一用户的用户标识,确定所述第一用户不具有共享所述目标文件的权限。If the user identification of the first user does not exist in the user identification included in the target whitelist information, it is determined that the first user does not have the right to share the target file.
- 一种文件共享装置,所述装置应用于第二终端,所述装置包括:A file sharing device, which is applied to a second terminal, and includes:获取模块,设置为获取登录所述第二终端的第二用户需要在目标会话组中共享的目标文件,以及所述目标文件对应的目标白名单信息,其中,所述目标白名单信息用于标识所述目标会话组中具有共享所述目标文件的权限的成员;The acquiring module is configured to acquire the target file that the second user logging in the second terminal needs to share in the target conversation group, and the target whitelist information corresponding to the target file, wherein the target whitelist information is used to identify Members of the target conversation group who have the right to share the target file;发送模块,设置为向服务器发送所述目标文件和所述目标白名单信息,以使所述服务器在接收到第一终端发送的用于访问所述目标文件的访问请求时,根据预先存储的文件标识与白名单信息的对应关系,确定与所述目标文件的文件标识对应的目标白名单信息,并根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限,如果所述第一用户不具有共享所述目标文件的权限,则拒绝向所述第一终端发送所述目标文件。The sending module is configured to send the target file and the target whitelist information to the server, so that when the server receives the access request for accessing the target file sent by the first terminal, it will be based on the pre-stored file Identify the correspondence between the identifier and the whitelist information, determine the target whitelist information corresponding to the file identifier of the target file, and determine whether the first user is the first user based on the target whitelist information and the user identifier of the first user Having the right to share the target file, and if the first user does not have the right to share the target file, refuse to send the target file to the first terminal.
- 根据权利要求20所述的装置,其中,所述获取模块,具体设置为接收针对预定区 域的操作所触发的信号,其中,所述预定区域位于所述第二终端展示的文件访问权限设置界面中,所述信号中包括所述目标文件对应的目标白名单信息。The device according to claim 20, wherein the acquisition module is specifically configured to receive a signal triggered by an operation in a predetermined area, wherein the predetermined area is located in a file access authority setting interface displayed by the second terminal , The signal includes target whitelist information corresponding to the target file.
- 一种文件共享装置,所述装置应用于服务器,所述装置包括:A file sharing device, the device is applied to a server, and the device includes:接收模块,用于接收第一终端发送的用于访问目标文件的访问请求,其中,所述访问请求中携带登录所述第一终端的第一用户的用户标识和所述目标文件的文件标识;所述目标文件为登录第二终端的第二用户需要在目标会话组中共享的文件,所述第二用户属于所述目标会话组的成员;A receiving module, configured to receive an access request for accessing a target file sent by a first terminal, wherein the access request carries the user ID of the first user logging in the first terminal and the file ID of the target file; The target file is a file that a second user who logs in to the second terminal needs to share in a target conversation group, and the second user is a member of the target conversation group;判断模块,用于根据预先存储的文件标识与会话组标识的对应关系、所述目标文件的文件标识和所述第一用户的用户标识,判断所述第一用户是否属于所述目标会话组的成员;The judgment module is configured to judge whether the first user belongs to the target conversation group based on the pre-stored correspondence between the file ID and the conversation group ID, the file ID of the target file, and the user ID of the first user member;第一处理模块,用于如果所述第一用户不属于所述目标会话组的成员,则拒绝向所述第一终端发送所述目标文件。The first processing module is configured to refuse to send the target file to the first terminal if the first user is not a member of the target conversation group.
- 一种文件共享系统,所述系统包括服务器和多个终端;A file sharing system, the system including a server and multiple terminals;所述多个终端中的第二终端,设置为获取登录所述第二终端的第二用户需要在目标会话组中共享的目标文件,以及所述目标文件对应的目标白名单信息,其中,所述目标白名单信息用于标识所述目标会话组中具有共享所述目标文件的权限的成员;向所述服务器发送所述目标文件和所述目标白名单信息;The second terminal of the plurality of terminals is configured to obtain the target file that the second user logging in the second terminal needs to share in the target conversation group, and the target whitelist information corresponding to the target file, where The target whitelist information is used to identify members in the target conversation group who have the right to share the target file; sending the target file and the target whitelist information to the server;所述服务器,设置为接收所述多个终端中的第一终端发送的用于访问所述目标文件的访问请求;根据预先存储的文件标识与白名单信息的对应关系,确定与所述目标文件的文件标识对应的目标白名单信息;根据所述目标白名单信息和所述第一用户的用户标识,判断所述第一用户是否具有共享所述目标文件的权限;如果所述第一用户不具有共享所述目标文件的权限,则拒绝向所述第一终端发送所述目标文件。The server is configured to receive an access request for accessing the target file sent by a first terminal of the plurality of terminals; and determine a connection with the target file according to the correspondence relationship between the file identifier and whitelist information stored in advance The target whitelist information corresponding to the file identifier of the file ID; according to the target whitelist information and the user ID of the first user, determine whether the first user has the right to share the target file; if the first user does not Having the right to share the target file, refuse to send the target file to the first terminal.
- 一种服务器,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;A server includes a processor, a communication interface, a memory, and a communication bus. The processor, the communication interface, and the memory communicate with each other through the communication bus;存储器,设置为存放计算机程序;Memory, set to store computer programs;处理器,设置为执行存储器上所存放的程序时,实现权利要求1-8或14任一所述的方法步骤。The processor is configured to implement the method steps of any one of claims 1-8 or 14 when it is configured to execute the program stored in the memory.
- 一种终端,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;A terminal includes a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete mutual communication through the communication bus;存储器,设置为存放计算机程序;Memory, set to store computer programs;处理器,设置为执行存储器上所存放的程序时,实现权利要求9-13任一所述的方法步 骤。The processor is configured to implement the method steps of any one of claims 9-13 when it is configured to execute the program stored in the memory.
- 一种计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-8或14任一所述的方法步骤。A computer-readable storage medium in which a computer program is stored, and when the computer program is executed by a processor, the method steps of any one of claims 1-8 or 14 are realized.
- 一种计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求9-13任一所述的方法步骤。A computer-readable storage medium in which a computer program is stored, and when the computer program is executed by a processor, the method steps of any one of claims 9-13 are realized.
- 一种包含指令的计算机程序产品,所述包含指令的计算机程序产品在计算机上运行时,使得计算机执行权利要求1-8或14任一所述的方法步骤。A computer program product containing instructions, which when running on a computer, causes the computer to execute the method steps of any one of claims 1-8 or 14.
- 一种包含指令的计算机程序产品,所述包含指令的计算机程序产品在计算机上运行时,使得计算机执行权利要求9-13任一所述的方法步骤。A computer program product containing instructions, when the computer program product containing instructions runs on a computer, the computer executes the method steps of any one of claims 9-13.
- 一种计算机程序,所述计算机程序在计算机上运行时,使得计算机执行权利要求1-8或14任一所述的方法步骤。A computer program, which when running on a computer, causes the computer to execute the method steps of any one of claims 1-8 or 14.
- 一种计算机程序,所述计算机程序在计算机上运行时,使得计算机执行权利要求9-13任一所述的方法步骤。A computer program that, when running on a computer, causes the computer to execute the method steps of any one of claims 9-13.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910473086.2A CN110191131A (en) | 2019-05-31 | 2019-05-31 | A kind of file sharing method, device, system, server and storage medium |
CN201910472070.X | 2019-05-31 | ||
CN201910473086.2 | 2019-05-31 | ||
CN201910472070.XA CN110138801A (en) | 2019-05-31 | 2019-05-31 | File sharing method, device, system, server, terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020238971A1 true WO2020238971A1 (en) | 2020-12-03 |
Family
ID=73552462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/092665 WO2020238971A1 (en) | 2019-05-31 | 2020-05-27 | File sharing method, apparatus and system, server, terminal, and storage medium |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020238971A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116226499A (en) * | 2023-03-22 | 2023-06-06 | 北京字跳网络技术有限公司 | Information query method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118418A (en) * | 2009-12-30 | 2011-07-06 | 比亚迪股份有限公司 | Mobile terminal data sharing system and method |
CN103595760A (en) * | 2013-10-15 | 2014-02-19 | 北京航空航天大学 | File picture sharing method based on cloud |
CN106060017A (en) * | 2016-05-19 | 2016-10-26 | 上海承蓝科技股份有限公司 | Cloud platform and method of data management and control |
JP6092057B2 (en) * | 2013-09-13 | 2017-03-08 | 株式会社日立ソリューションズ | File access control device, file access control program, and file access control method |
CN110138801A (en) * | 2019-05-31 | 2019-08-16 | 北京金山云网络技术有限公司 | File sharing method, device, system, server, terminal and storage medium |
CN110191131A (en) * | 2019-05-31 | 2019-08-30 | 北京金山云网络技术有限公司 | A kind of file sharing method, device, system, server and storage medium |
-
2020
- 2020-05-27 WO PCT/CN2020/092665 patent/WO2020238971A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118418A (en) * | 2009-12-30 | 2011-07-06 | 比亚迪股份有限公司 | Mobile terminal data sharing system and method |
JP6092057B2 (en) * | 2013-09-13 | 2017-03-08 | 株式会社日立ソリューションズ | File access control device, file access control program, and file access control method |
CN103595760A (en) * | 2013-10-15 | 2014-02-19 | 北京航空航天大学 | File picture sharing method based on cloud |
CN106060017A (en) * | 2016-05-19 | 2016-10-26 | 上海承蓝科技股份有限公司 | Cloud platform and method of data management and control |
CN110138801A (en) * | 2019-05-31 | 2019-08-16 | 北京金山云网络技术有限公司 | File sharing method, device, system, server, terminal and storage medium |
CN110191131A (en) * | 2019-05-31 | 2019-08-30 | 北京金山云网络技术有限公司 | A kind of file sharing method, device, system, server and storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116226499A (en) * | 2023-03-22 | 2023-06-06 | 北京字跳网络技术有限公司 | Information query method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11218460B2 (en) | Secure authentication for accessing remote resources | |
US10616278B1 (en) | Secure virtual meetings | |
EP3164793B1 (en) | Dual channel identity authentication | |
US10021098B2 (en) | Account login method, device, and system | |
US9979715B2 (en) | Aggregator technology without usernames and passwords | |
US8869258B2 (en) | Facilitating token request troubleshooting | |
KR20180081113A (en) | Message management method, device and storage medium | |
US20090019517A1 (en) | Method and System for Restricting Access of One or More Users to a Service | |
US11770385B2 (en) | Systems and methods for malicious client detection through property analysis | |
US20150373026A1 (en) | Permission management method, device and system for cloud platform service | |
WO2022143174A1 (en) | Data transmission method and apparatus, device, storage medium, and computer program product | |
US11706224B2 (en) | Entity authentication for pre-authenticated links | |
EP3975522A1 (en) | Registration in communication networks | |
US20230254146A1 (en) | Cybersecurity guard for core network elements | |
WO2020238971A1 (en) | File sharing method, apparatus and system, server, terminal, and storage medium | |
WO2023202214A1 (en) | Communication method, apparatus and system, terminal, and server | |
US9742776B2 (en) | Contact identification validation via social invitation | |
WO2018010256A1 (en) | Method and device for wi-fi sharing | |
WO2022247525A1 (en) | Method for handling internet of things device, and method for setting device resource in internet of things device | |
CN110048864B (en) | Method and apparatus for authenticating an administrator of a device-specific message group | |
US11184162B1 (en) | Privacy preserving secure task automation | |
US9571478B2 (en) | Conditional request processing | |
WO2017080232A1 (en) | Method, device and system for logging in to microblog on television | |
US12034713B2 (en) | Secure authentication for accessing remote resources | |
US9094439B2 (en) | End network decider |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20812988 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20812988 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/03/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20812988 Country of ref document: EP Kind code of ref document: A1 |