CN108462757A - A kind of method and apparatus for sharing e-book - Google Patents

A kind of method and apparatus for sharing e-book Download PDF

Info

Publication number
CN108462757A
CN108462757A CN201810277215.6A CN201810277215A CN108462757A CN 108462757 A CN108462757 A CN 108462757A CN 201810277215 A CN201810277215 A CN 201810277215A CN 108462757 A CN108462757 A CN 108462757A
Authority
CN
China
Prior art keywords
information
book
target electronic
electronic book
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810277215.6A
Other languages
Chinese (zh)
Other versions
CN108462757B (en
Inventor
陈晓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201810277215.6A priority Critical patent/CN108462757B/en
Publication of CN108462757A publication Critical patent/CN108462757A/en
Application granted granted Critical
Publication of CN108462757B publication Critical patent/CN108462757B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The purpose of the application is to provide a kind of method and apparatus for sharing e-book, by the network equipment according to sharing share request of the user to e-book, and then generates e-book sharing information and the e-book sharing information is shared into the internet exchange space with open permission;Compared with prior art, the application shared by the supervision of the network equipment realize it is a wide range of, efficiently share, greatly facilitate transmission of knowledge, while by ensuring that the copyright of the e-book is protected to the management of e-book.

Description

A kind of method and apparatus for sharing e-book
Technical field
This application involves the communications field more particularly to a kind of technologies for sharing e-book.
Background technology
With the development of the times, collect in word, picture, sound, image etc. and be dissolved in integrated E-book reader increasingly It is welcome by everybody, the more books of purchase for keeping Ebook user more convenient with its notable advantage;With e-book A large amount of to occur, the unnecessary certain e-book of purchase of user, sharing for e-book sometimes just becomes particularly important;E-book point at present The contents such as abstract, catalogue can only be shared by enjoying, and other users, which go for the e-book shared, then to be needed to buy the account etc. of oneself Deng, therefore occur conveniently and efficiently obtaining the problems such as sharing, and then the application body of user is limited to a certain extent It tests.
Invention content
The purpose of the application is to provide a kind of method and apparatus for sharing e-book.
According to the one side of the application, a kind of method being used to share e-book at network equipment end, the party are provided Method includes:The network equipment is generated according to share request of the user about target electronic book is shared about the target electronic book E-book sharing information, wherein the e-book sharing information includes the access identities information of the target electronic book;Publication institute State e-book sharing information;It receives and accesses the access request about the target electronic book that user is sent by user equipment, Wherein, the access request includes the access identities information of the target electronic book;The target electronic book is provided to described User equipment.
According to further aspect of the application, a kind of method being used to share e-book at user equipment end is provided, it should Method includes:User equipment is generated according to the e-book sharing information about target electronic book that the network equipment is issued about described The access request of target electronic book, wherein the e-book sharing information includes the access identities information of the target electronic book, The access request includes the access identities information of the target electronic book;E-book access is sent to the network equipment to ask It asks;Receive the target electronic book that the network equipment returns.
According to the one side of the application, a kind of method for sharing e-book is provided, this method includes:Network is set Standby basis shares share request of the user about target electronic book, generates and shares letter about the e-book of the target electronic book Breath, wherein the e-book sharing information includes the access identities information of the target electronic book;The network equipment issues institute State e-book sharing information;The e-book sharing information about target electronic book that user equipment is issued according to the network equipment Generate the access request about the target electronic book, wherein the e-book sharing information includes the target electronic book Access identities information, the access request include the access identities information of the target electronic book;The user equipment is to described The network equipment sends e-book access request;The network equipment receive access user by user equipment send about described The access request of target electronic book, wherein the access request includes the access identities information of the target electronic book;The net The target electronic book is provided to the user equipment by network equipment;The user equipment receives the institute that the network equipment returns State target electronic book.
According to the one side of the application, a kind of network equipment for sharing e-book is provided, which includes place Manage device;And it is arranged to the memory of storage computer executable instructions, the executable instruction makes described when executed Processor executes:According to share request of the user about target electronic book is shared, the electronics about the target electronic book is generated Book sharing information, wherein the e-book sharing information includes the access identities information of the target electronic book;Issue the electricity Philosophical works sharing information;It receives and accesses the access request about the target electronic book that user is sent by user equipment, wherein The access request includes the access identities information of the target electronic book;The target electronic book is provided to the user to set It is standby.
According to the one side of the application, a kind of user equipment for sharing e-book is provided, which includes place Manage device;And it is arranged to the memory of storage computer executable instructions, the executable instruction makes described when executed Processor executes:User equipment is generated according to the e-book sharing information about target electronic book that the network equipment is issued about institute State the access request of target electronic book, wherein the e-book sharing information includes the access identities letter of the target electronic book Breath, the access request includes the access identities information of the target electronic book;E-book is sent to the network equipment to access Request;Receive the target electronic book that the network equipment returns.
According to the one side of the application, it includes the computer-readable medium instructed to provide a kind of, and described instruction is in quilt System is made to carry out when execution:According to share request of the user about target electronic book is shared, generate about the target electronic The e-book sharing information of book, wherein the e-book sharing information includes the access identities information of the target electronic book;Hair E-book sharing information described in cloth;Access user is received to ask by the access about the target electronic book that user equipment is sent It asks, wherein the access request includes the access identities information of the target electronic book;The target electronic book is provided to institute State user equipment.
According to further aspect of the application, it includes the computer-readable medium instructed to provide a kind of, and described instruction exists It is performed so that system carries out:The e-book sharing information about target electronic book that user equipment is issued according to the network equipment Generate the access request about the target electronic book, wherein the e-book sharing information includes the target electronic book Access identities information, the access request include the access identities information of the target electronic book;It is sent to the network equipment E-book access request;Receive the target electronic book that the network equipment returns.
Compared with prior art, the application shares request according to user is shared by the network equipment to e-book, in turn It generates e-book sharing information and the e-book sharing information is shared into the internet exchange space with open permission;Pass through net The supervision of network equipment share realize it is a wide range of, efficiently share, greatly facilitate transmission of knowledge, while by e-book Management ensure that the copyright of the e-book is protected.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method flow being used to share e-book at network equipment end according to the application one embodiment Figure;
Fig. 2 shows a kind of method streams being used to share e-book at user equipment end according to another embodiment of the application Cheng Tu;
Fig. 3 shows a kind of method flow diagram for sharing e-book according to the application one embodiment.
Same or analogous reference numeral represents same or analogous component in attached drawing.
Specific implementation mode
The application is described in further detail below in conjunction with the accompanying drawings.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, magnetic tape disk storage or other magnetic storage apparatus or Any other non-transmission medium can be used for storage and can be accessed by a computing device information.
The application meaning equipment includes but not limited to that user equipment, the network equipment or user equipment and the network equipment pass through Network is integrated constituted equipment.The user equipment, which includes but not limited to any type, to carry out human-computer interaction with user The mobile electronic product, such as smart mobile phone, tablet computer etc. of (such as human-computer interaction is carried out by touch tablet), the mobile electricity Arbitrary operating system, such as android operating systems, iOS operating systems may be used in sub- product.Wherein, the network equipment Including a kind of the electronic equipment of numerical computations and information processing can be carried out automatically according to the instruction for being previously set or storing, Hardware includes but not limited to microprocessor, application-specific integrated circuit (ASIC), programmable logic device (PLD), field programmable gate Array (FPGA), digital signal processor (DSP), embedded device etc..The network equipment includes but not limited to computer, net The cloud that network host, single network server, multiple network server collection or multiple servers are constituted;Here, cloud is by being based on cloud meter The a large amount of computers or network server for calculating (Cloud Computing) are constituted, wherein cloud computing is the one of Distributed Calculation Kind, a virtual supercomputer being made of the computer collection of a group loose couplings.The network includes but not limited to interconnect Net, wide area network, Metropolitan Area Network (MAN), LAN, VPN network, wireless self-organization network (Ad Hoc networks) etc..Preferably, the equipment Can also be run on the user equipment, the network equipment or user equipment and the network equipment, the network equipment, touch terminal or The network equipment is integrated the program in constituted equipment by network with touch terminal.
Certainly, those skilled in the art will be understood that above equipment is only for example, other are existing or are likely to occur from now on Equipment be such as applicable to the application, should also be included within the application protection domain, and be incorporated herein by reference herein.
In the description of the present application, the meaning of " plurality " is two or more, unless otherwise specifically defined.
Fig. 1 shows a kind of method flow being used to share e-book at network equipment end according to the application one embodiment Figure.The method comprising the steps of S11, step S12, step S13 and step S14.Wherein, in step s 11, according to share user close In the request of sharing of target electronic book, the e-book sharing information about the target electronic book is generated, wherein the e-book Sharing information includes the access identities information of the target electronic book;In step s 12, the network equipment issues the e-book point Enjoy information;In step s 13, the network equipment receive access user by user equipment send about the target electronic book Access request, wherein the access request is to be generated according to the e-book sharing information by the user equipment, and include The access identities information of the target electronic book;In step S14, the target electronic book is provided to the use by the network equipment Family equipment.Herein, share request include share user wish by target electronic book and other people the biography for convenience such as reads, download jointly That broadcasts knowledge progress executes request;Publication includes that the e-book of generation is shared request transmission and is presented on public affairs by the network equipment Open forum, the community etc. of permission;E-book sharing information includes point shown in the form of image or character by data encoding Information is enjoyed, such as the e-book sharing information shown in the form of sharing Quick Response Code, share link;Access identities information includes passing through Effectively, the coding information of standard obtains target electronic book, such as the access link of the International Standard Book Number, e-book of e-book Deng;Access request includes sending out to execute request comprising access information by modes such as click button, sliding screens.
For example, sharing user to network device requests about target electronic book《XXX》Share request, the network equipment according to This shares request, generates target electronic book《XXX》E-book sharing information, wherein the e-book sharing information is to share The form of Quick Response Code shows that the e-book sharing information includes the world of the access identities information such as e-book of the target electronic book International Standard Book Number is ISBN2-319-04545-7;The network equipment shares generation to share the e-book that quick response code form is shown Information publication obtains the e-book sharing information on the ABC forum website homepages with open permission, for accessing user;When User is accessed to wish to access the target electronic book by the network equipment《XXX》When, the network equipment user that accepts the interview passes through user The access request about the target electronic book that equipment is sent, wherein the access request includes the target electronic book《XXX》Visit Ask that the International Standard Book Number of identification information such as e-book is ISBN 2-319-04545-7;The network equipment is finally by the target electronic Book《XXX》It is provided to the user equipment for accessing user.In some embodiments, e-book sharing information includes to share two dimension Code, share link etc. forms show;Access identities information includes the access link of the International Standard Book Number of e-book, e-book
In some embodiments, it further includes described sharing user about the target electronic book that request is shared described in this programme Share constraint information;Wherein, the method further includes step S15 (not shown):The network equipment detects the access user Share constraint information described in no satisfaction;Wherein, the step S14 includes:If the access user shares constraint letter described in meeting The target electronic book is provided to the user equipment by breath, the network equipment.Herein, it includes by the way that item is arranged to share constraint information Part limits the claim management information carried out to target electronic book, such as accesses age of user information, access user's specialized information, visit It asks user's occupational information, access user's gender or accesses consumer taste information.
For example, about target electronic book《XXX》Share request include share user to the target electronic book《XXX》Setting Share constraint information:As accessed the target electronic book《XXX》Age of user be more than or equal to for 18 one full year of life, that is, growing up the talent can be with Access the target electronic book《XXX》;Wherein, whether network equipment test access user meets this and shares constraint information, works as access The age of user of user is when 22 one full year of life being more than for 18 one full year of life, to meet this and share constraint information, and the network equipment is by the target electronic book 《XXX》It is provided to the user equipment for accessing user.
In some embodiments, this programme step S14 includes:If the access user shares constraint letter described in not meeting Breath, the network equipment refuse the access request.
Example as above, about target electronic book《XXX》Share request include share user to the target electronic book《XXX》If That sets shares constraint information:As accessed the target electronic book《XXX》Age of user be more than or equal to 18 one full year of life, wherein network is set Whether standby test access user, which meets this, is shared constraint information, when the age of user for accessing user is 12 one full year of life to be less than for 18 one full year of life When, it is unsatisfactory for this and shares constraint information, then network equipment denied access user is to target electronic book《XXX》Access request.
In some embodiments, this programme step S12 includes:The e-book sharing information is published on institute by the network equipment State the one or more internet exchange spaces shared corresponding to constraint information.Herein, internet exchange space includes by comprehensive profit Share exchange with network carrier realization, such as including ABC forums, DEF mhkcs, the chatrooms YY or the communities ZZ.
For example, target electronic book《XXX》E-book sharing information shown in the form of link by sharing, and include sharing constraint Information:The user's occupation for accessing user is lawyer;The network equipment issues the e-book sharing information shares constraint information at this Corresponding internet exchange space, such as ABC forums, DEF mhkcs, the chatrooms YY or the communities ZZ.
Those skilled in the art will be understood that the content in above-mentioned internet exchange space is only for example, existing or from now on Other contents in the internet exchange space being likely to occur, the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
In some embodiments, this programme further include the network equipment share according to constraint information retrieval determination it is corresponding One or more internet exchange spaces, wherein share constraint letter described in the space attribute information satisfaction in the internet exchange space Breath;Wherein, the step S12 includes:The e-book sharing information is published on one or more of networks by the network equipment It is at least one in communication space.Herein, space attribute information includes but not limited to:Space name information, space type information or User's portrait information in space;Wherein, user's portrait information includes but not limited to access the use in the internet exchange space The information such as age, occupation, the hobby at family.
For example, target electronic book《XXX》E-book sharing information include share constraint information:User is accessed for animation to like Good person;The network equipment shares constraint information according to this and retrieves and determine corresponding multiple internet exchange spaces:Forum, is moved mhkc Unrestrained chatroom or animation community, wherein the space attribute information in the internet exchange space of the example above (includes user's picture in space As information), meet this and shares constraint information;Wherein, which is published on animation forum, animation by the network equipment Multiple internet exchange spaces such as mhkc, animation chatroom or animation community.
Those skilled in the art will be understood that the content of above-mentioned space attribute information is only for example, existing or from now on The other contents for the space attribute information being likely to occur, the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
In some embodiments, e-book sharing information described in this programme further includes and described to share constraint information corresponding User investigate information, the access request include it is described access user to the user investigate information feedback information;Wherein, The step S15 includes:The network equipment described shares constraint according to accessing user described in the feedback information detection and whether meet Information.Herein, it includes by such as on-site visit, telephone poll, Intercept Interview, investigation on the net, mail questionaire that user, which investigates information, Etc. forms access the survey informations such as user's relevant age, profession, occupation, gender or hobby to obtain.
For example, the e-book sharing information of target electronic book includes sharing constraint information:Access user age be more than etc. It is teacher in 18 one full year of life, occupational information, it includes the title of user, year that this, which shares the corresponding user of constraint information to investigate information, Age, occupation, date of birth etc. need the information that user fills in;When access user accesses the target electronic book, the access of transmission Request includes the feedback information for accessing user and investigating information to the user, such as user's name:King three, age:21 one full year of life, duty Industry:Physics middle rank teacher, date of birth:1960-4-19 and highest educational background:Undergraduate course etc.;Wherein, the network equipment is according to above-mentioned feedback Whether infomation detection access user, which meets this, is shared constraint information.
Those skilled in the art will be understood that above-mentioned user investigates the content of information and is only for example, existing or from now on The user being likely to occur investigates other contents of information, and the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
In some embodiments, it includes but not limited to the following terms or their group that constraint information is shared described in this programme It closes:
Access the age information of the user of the target electronic book;
Access the specialized information of the user of the target electronic book;
Access the occupational information of the user of the target electronic book;
Access the gender information of the user of the target electronic book;
Access the preference information of the user of the target electronic book.
For example, the e-book sharing information of target electronic book includes sharing constraint information, including access the target electronic book The age of user:29 one full year of life, profession:Computer, occupation:Front end engineer, gender:Man, preference information:Play online game or on It states and enumerates every combination.
Those skilled in the art will be understood that the above-mentioned content for sharing constraint information is only for example, existing or from now on What is be likely to occur shares other contents of constraint information, and the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
In some embodiments, this programme further includes that the network equipment is retrieved really according to the characteristic information of the target electronic book Fixed corresponding one or more internet exchanges space, wherein the space attribute information in the internet exchange space and the feature Information match;The network equipment by one or more of internet exchange spaces be provided to it is described share user, and described in receiving Share one or more preferred network communication spaces that user screens from one or more of internet exchange spaces;Wherein, The step S12 includes:The e-book sharing information is published on one or more of preferred network communication spaces.This Place, the characteristic information of target electronic book includes but not limited to the author information of the e-book, language message or content category message. Herein, space attribute information includes but not limited to:User's portrait information of space name information, space type information or space; Wherein, user information of drawing a portrait includes but not limited to age of the user for accessing the internet exchange space, occupation, interest love The information such as good.
For example, the characteristic information of target electronic book is culinary art electron-like book, the network equipment is according to the above-mentioned spy of the e-book Sign information retrieval determines corresponding one or more internet exchanges space, and such as respectively cuisines forum, the chatrooms cook, culinary art are high Hand chatroom, daily life of a family culinary art community;Wherein, the space attribute information in the example above internet exchange space (includes the user in space Portrait information) match with the characteristic information of the e-book;The network equipment is high by above-mentioned cuisines forum, the chatrooms cook, culinary art The internet exchanges space such as hand chatroom, which is provided to, shares user, and receives the cuisines forum for sharing user's screening, culinary art master-hand Chatroom;Wherein, which is published on cuisines forum, culinary art master-hand chatroom etc. two preferably by the network equipment Internet exchange space.
In some embodiments, step S11 described in this programme includes:The network equipment is according to sharing user about target electronic Book shares request, generate with it is described share ask in share the identical e-book sharing information of number of copies, wherein Mei Ge electricity Philosophical works sharing information includes that one of the access identities information of the target electronic book and the corresponding target electronic book shares and copies Shellfish.
For example, share obtain 3 parts of e-book when user buys the e-book share copy, share copy 1, share Copy 2 shares copy 3, and according to the request of sharing about target electronic book, 3 parts of generation is shared with this in request to divide the network equipment The identical e-book sharing information of number of copies is enjoyed, as e-book sharing information 1 is shown in the form of sharing Quick Response Code, e-book Sharing information 2 is shown as https in the form of sharing link 1://yuedu.com/ebook/07a=booklist, e-book Sharing information 3 is shown as in the form of sharing link 2https://xusu.com/book/39/3317.html, wherein it is each E-book sharing information includes that one of the access identities information of the target electronic book and the corresponding target electronic book shares copy, As e-book sharing information 1 includes the title of the e-book《ZZZ》And it is corresponding share copy 1, e-book sharing information 2 includes The International Standard Book Number of the e-book be ISBN 2-319-04545-7 and it is corresponding share copy 2, e-book sharing information 3 wraps Include the title of the e-book《YAB》And corresponding share copy 3.In some embodiments, it includes passing through basis to share copy The use statistical data (such as to the thumbing up of e-book, forward, comment on) for sharing user obtains and shares copy.
Those skilled in the art will be understood that above-mentioned acquisition is shared the mode of copy and is only for example, existing or from now on The other manner of copy is shared in the acquisition being likely to occur, and the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
In some embodiments, this programme further includes working as the corresponding copy of sharing of the e-book sharing information to be accessed, The network equipment cancels the e-book sharing information.Herein, revocation includes that accessed copy of sharing is made to lose availability.
Example as above, the e-book sharing information 3 of target electronic book include the title of the e-book《ZZZ》And corresponding share Copy 3;Share 3 accessed user's access of copy when the network equipment detects that the e-book sharing information is corresponding, then network is set It is standby to cancel the e-book sharing information 3;In some embodiments, the network equipment cancels the e-book sharing information 3 and illustrates respectively It is as follows:Browsing pages of the network equipment in internet exchange space delete e-book sharing information 3, the network equipment in internet exchange The browsing pages in space be arranged the e-book sharing information 3 lose availability (including to the e-book sharing information 3 add grey So as to access the dialog box that user cannot access or pop up " inaccessible " when accessing user and accessing the e-book sharing information 3 Deng) or the network equipment in background data base be unavailable etc. by the e-book sharing information 3 annotation.
In some embodiments, it includes that the target electronic book shares number of copies that request is shared described in this programme;Its In, the method further includes:The network equipment detects the target electronic book currently with the presence or absence of the copy that can share;Wherein, institute Stating step S14 includes:If there is currently the copy that can share, the network equipments to carry the target electronic book for the target electronic book It is supplied to the user equipment, and updates the number of copies information that the target electronic book can currently be shared;Otherwise, refuse the visit Ask request.
For example, the request of sharing for sharing user about target electronic book includes that 3 parts of the e-book share copy, and amount to Quantity is 3;Wherein, the network equipment detects the target electronic book currently with the presence or absence of the copy that can share, if the target electronic book There is currently the copies that can share, and it is 3 to amount to quantity, and the user which is provided to access user by the network equipment sets It is standby, and it is 2 to update the number of copies that the target electronic book can currently be shared;If the network equipment detects the target electronic book currently not In the presence of the copy that can share, then refuse the access request to the e-book.
In some embodiments, to include that the target electronic book is corresponding share order to e-book sharing information described in this programme Board information;Wherein, the method further includes:The network equipment, which detects in the access request, shares token information and the electronics Share whether token information matches in book sharing information;Wherein, the step S14 includes:If matching, the network equipment is by institute It states target electronic book and is provided to the user equipment;Otherwise, the network equipment refuses the access request.Herein, share token letter Breath includes being formed using lines and irregular character.
For example, the e-book sharing information of target electronic book, which includes that the e-book is corresponding, shares token information t34f;Its In, network equipment detection in the e-book access request to sharing token information for t34f, in the e-book sharing information It is t34f to share token information also, then the token information of sharing in access request shares token with the e-book sharing information Information match;And then the e-book is provided to the user equipment for accessing user by the network equipment;It visits when the network equipment detects Ask that the token information of sharing in request is mismatched with the token information of sharing in the e-book sharing information, such as 2 share token letter Breath is respectively 1235 and df45, then the access request of network equipment denied access user.
Those skilled in the art will be understood that the above-mentioned content for sharing token information is only for example, existing or from now on What is be likely to occur shares other contents of token information, and the protection domain of the application should be included in by being such as applicable to the application all It is interior, and be incorporated herein by reference herein.
Fig. 2 shows a kind of method streams being used to share e-book at user equipment end according to another embodiment of the application Cheng Tu.The method comprising the steps of S21, step S22 and step S23.Wherein, in the step s 21, user equipment is according to the network equipment The e-book sharing information about target electronic book of publication generates the access request about the target electronic book, wherein institute The access identities information that e-book sharing information includes the target electronic book is stated, the access request includes the target electronic The access identities information of book;In step S22, user equipment sends e-book access request to the network equipment;In step In S23, user equipment receives the target electronic book that the network equipment returns.
For example, when accessing the e-book sharing information of user's acquisition target electronic book, user equipment is set according to network The e-book sharing information of the target electronic book of preparation cloth generates the access request about the target electronic book, is such as pressed by clicking The mode of button sends out the execution order comprising access information;Wherein, which shares the access for newly including the target electronic book Identification information:The International Standard Book Number of e-book is ISBN 2-319-04545-7, and access request also includes the target electronic book Access identities information:The International Standard Book Number of e-book is ISBN 2-319-04545-7;User equipment is sent out to the network equipment Power transmission philosophical works access request;User equipment receives the target electronic book that the network equipment returns.
In some embodiments, this programme step S21 includes sub-step S211 and sub-step S212 (being not shown).In son In step S211, user equipment obtains the e-book sharing information about target electronic book of network equipment publication, wherein described E-book sharing information includes the access identities information of the target electronic book;In sub-step S212, user equipment is according to institute State access request of the e-book sharing information generation about the target electronic book, wherein the access request includes the mesh Mark the access identities information of e-book.
For example, user equipment obtains the e-book sharing information about target electronic book of network equipment publication, such as to divide The form for enjoying link is shown, wherein the e-book shares the access identities information such as e-book that letter includes the target electronic book It is entitled《YYY》;User equipment generates the access request about target electronic book according to the e-book sharing information, such as passes through a little The mode for hitting button sends out the execution order comprising access information, wherein access request includes the access identities letter of the e-book Cease e-book title《YYY》.
In some embodiments, e-book sharing information described in this programme further includes that user investigates information;Wherein, the son Step S212 includes:User equipment is presented the user and investigates information, and obtains the feedback that user investigates the user information Information;User equipment generates the access request about the target electronic book, wherein the access request includes the target electricity The access identities information of the philosophical works and the feedback information for accessing user and investigating information to the user.
For example, the e-book sharing information of target electronic book, which further includes user, investigates information, as access user need to fill in Title, age, occupation, date of birth etc.;Wherein, user equipment is presented the user and investigates information, and obtains user to the user Investigate the feedback information of information, such as user's name:Zhang San, age:29 one full year of life, profession:Computer, occupation:Front end engineer, property Not:Man;User equipment generates the access request of the target electronic book, wherein the access request includes the target electronic book Access identities information, such as the e-book title《YYY》, and access the feedback information of user to user investigation information:User name Claim:Zhang San, age:29 one full year of life, profession:Computer, occupation:Front end engineer, gender:Man.
In some embodiments, to include that the target electronic book is corresponding share order to e-book sharing information described in this programme Board information, the access request share token information including described.
For example, the token information of sharing that the e-book sharing information of target electronic book includes the e-book is 12ab, access The access request of user includes that this shares token information 12ab.
Fig. 3 is shown according to a kind of flow chart for sharing e-book method in the application some embodiments.The party Method includes the network equipment according to the request of sharing for sharing user about target electronic book, electricity of the generation about the target electronic book Philosophical works sharing information, wherein the e-book sharing information includes the access identities information of the target electronic book;
The network equipment issues the e-book sharing information;
User equipment according to the network equipment issue about target electronic book e-book sharing information generate about The access request of the target electronic book, wherein the e-book sharing information includes the access identities of the target electronic book Information, the access request include the access identities information of the target electronic book;
The user equipment sends e-book access request to the network equipment;
The network equipment receives access user and is asked by the access about the target electronic book that user equipment is sent It asks, wherein the access request is generated according to the e-book sharing information by the user equipment, and includes the mesh Mark the access identities information of e-book;
The target electronic book is provided to the user equipment by the network equipment;
The user equipment receives the target electronic book that the network equipment returns.
Present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has calculating Machine code, when the computer code is performed, such as preceding any one of them method is performed.
Present invention also provides a kind of computer program products, when the computer program product is executed by computer equipment When, such as preceding any one of them method is performed.
Present invention also provides a kind of computer equipment, the computer equipment includes:
One or more processors;
Memory, for storing one or more computer programs;
When one or more of computer programs are executed by one or more of processors so that it is one or Multiple processors realize such as preceding any one of them method.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed by processor to realize steps described above or function.Similarly, the application Software program (including relevant data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example Such as, coordinate to execute the circuit of each step or function as with processor.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. Those skilled in the art will be understood that the existence form of computer program instructions in computer-readable medium includes but not limited to Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but It is not limited to:The computer directly execute the instruction or the computer compile the instruction after execute program after corresponding compiling again, Either the computer reads and executes the instruction or after the computer reads and install and execute corresponding installation again after the instruction Program.Here, computer-readable medium can be the arbitrary available computer readable storage medium accessed for computer or Communication media.
Communication media includes thereby comprising such as computer-readable instruction, data structure, program module or other data Signal of communication is transmitted to the medium of another system from a system.Communication media may include having the transmission medium led (such as electric Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity Magnetic, RF, microwave and infrared.Computer-readable instruction, data structure, program module or other data can be embodied as example wireless Medium (such as carrier wave or be such as embodied as spread spectrum technique a part similar mechanism) in modulated message signal. Term " modulated message signal " refers to that one or more feature is modified or is set in a manner of coding information in the signal Fixed signal.Modulation can be simulation, digital or Hybrid Modulation Technology.
As an example, not a limit, computer readable storage medium may include such as computer-readable finger for storage Enable, the volatile and non-volatile that any method or technique of the information of data structure, program module or other data is realized, can Mobile and immovable medium.For example, computer readable storage medium includes, but are not limited to volatile memory, such as with Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only memory (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage apparatus (hard disk, Tape, CD, DVD);Or other currently known media or Future Development can store the computer used for computer system Readable information/data.
Here, including a device according to one embodiment of the application, which includes for storing computer program The memory of instruction and processor for executing program instructions, wherein when the computer program instructions are executed by the processor When, trigger method and/or technology scheme of the device operation based on aforementioned multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Profit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second equal words are used for table Show title, and does not represent any particular order.

Claims (20)

1. a kind of be used to share the method for e-book at network equipment end, wherein this method includes:
According to share request of the user about target electronic book is shared, generates and share letter about the e-book of the target electronic book Breath, wherein the e-book sharing information includes the access identities information of the target electronic book;
Issue the e-book sharing information;
It receives and accesses the access request about the target electronic book that user is sent by user equipment, wherein the access Request is generated according to the e-book sharing information by the user equipment, and includes the access mark of the target electronic book Know information;
The target electronic book is provided to the user equipment.
2. according to the method described in claim 1, wherein, described to share request further include described sharing user about the target E-book shares constraint information;
Wherein, the method further includes:
It detects the access user and whether meets and described share constraint information;
Wherein, described the target electronic book is provided to the user equipment to include:
If the access user shares constraint information described in meeting, the target electronic book is provided to the user equipment.
3. according to the method described in claim 2, wherein, if sharing constraint information described in access user satisfaction, inciting somebody to action The target electronic book is provided to the user equipment:
If the access user shares constraint information described in not meeting, refuse the access request.
4. according to the method in claim 2 or 3, wherein the publication e-book sharing information includes:
The e-book sharing information is published on the one or more internet exchange spaces shared corresponding to constraint information.
5. according to the method described in claim 4, wherein, the method further includes:
Share the determining corresponding one or more internet exchanges space of constraint information retrieval according to described, wherein the network is handed over The space attribute information of fluid space shares constraint information described in meeting;
Wherein, described that the e-book sharing information is published on the one or more networks shared corresponding to constraint information Communication space includes:
The e-book sharing information is published at least one in one or more of internet exchange spaces.
6. the method according to any one of claim 2 to 5, wherein the e-book sharing information further include with it is described Share the corresponding user of constraint information and investigate information, the access request includes that the access user investigates letter to the user The feedback information of breath;
Wherein, the detection the accesss user whether meet described in share constraint information and include:
Described share constraint information according to accessing user described in the feedback information detection and whether meeting.
7. the method according to any one of claim 2 to 6, wherein the constraint information of sharing includes following at least appointing One:
Access the age information of the user of the target electronic book;
Access the specialized information of the user of the target electronic book;
Access the occupational information of the user of the target electronic book;
Access the gender information of the user of the target electronic book;
Access the preference information of the user of the target electronic book.
8. according to the method described in claim 1, wherein, the method further includes:
Corresponding one or more internet exchanges space is determined according to the retrieval of the characteristic information of the target electronic book, wherein institute The space attribute information and the characteristic information for stating internet exchange space match;
By one or more of internet exchange spaces be provided to it is described share user, and share user from described one described in receiving The one or more preferred network communication spaces screened in a or multiple internet exchanges space;
Wherein, the publication e-book sharing information includes:
The e-book sharing information is published on one or more of preferred network communication spaces.
9. method according to any one of claim 1 to 8, wherein the basis shares user about target electronic book The e-book sharing information shared request, generate about the target electronic book, wherein the e-book sharing information includes The access identities information of the target electronic book includes:
According to share request of the user about target electronic book is shared, generate with it is described share ask in share number of copies identical E-book sharing information, wherein each e-book sharing information includes the access identities information of the target electronic book and right One of the target electronic book is answered to share copy.
10. according to the method described in claim 9, wherein, the method further includes:
When the e-book sharing information is corresponding, to share copy accessed, cancels the e-book sharing information.
11. method according to any one of claim 1 to 8, described to share point that request includes the target electronic book Enjoy number of copies;
Wherein, the method further includes:
The target electronic book is detected currently with the presence or absence of the copy that can share;
Wherein, described the target electronic book is provided to the user equipment to include:
If there is currently the copies that can share for the target electronic book, the target electronic book is provided to the user equipment, And update the number of copies information that the target electronic book can currently be shared;Otherwise, refuse the access request.
12. method according to any one of claim 1 to 11, wherein the e-book sharing information includes the mesh E-book is corresponding shares token information for mark;
Wherein, the method further includes:
It detects in the access request and shares whether token information shares token information with the e-book sharing information Match;
Wherein, described the target electronic book is provided to the user equipment to include:
If matching, the user equipment is provided to by the target electronic book;Otherwise, refuse the access request.
13. a kind of be used to share the method for e-book at user equipment end, wherein this method includes:
It is generated about the target electronic book according to the e-book sharing information about target electronic book of network equipment publication Access request, wherein the e-book sharing information includes the access identities information of the target electronic book, the access request Include the access identities information of the target electronic book;
E-book access request is sent to the network equipment;
Receive the target electronic book that the network equipment returns.
14. according to the method for claim 13, wherein the electricity about target electronic book issued according to the network equipment Philosophical works sharing information generates the access request about the target electronic book, wherein the e-book sharing information includes described The access identities information of target electronic book, the access request include that the access identities information of the target electronic book includes:
Obtain the e-book sharing information about target electronic book of network equipment publication, wherein the e-book sharing information Include the access identities information of the target electronic book;
The access request about the target electronic book is generated according to the e-book sharing information, wherein the access request Include the access identities information of the target electronic book.
15. according to the method for claim 14, wherein the e-book sharing information further includes that user investigates information;
Wherein, the access request generated according to the e-book sharing information about the target electronic book, wherein described Access request includes that the access identities information of the target electronic book includes:
The user is presented and investigates information, and obtains and accesses the feedback information that user investigates the user information;
Generate the access request about the target electronic book, wherein the access request includes the visit of the target electronic book Ask identification information and the feedback information for accessing user and investigating information to the user.
16. the method according to claim 13 or 14, wherein the e-book sharing information includes the target electronic book Corresponding to share token information, the access request shares token information including described.
17. a kind of method for sharing e-book, including:
The network equipment generates the electronics about the target electronic book according to request of sharing of the user about target electronic book is shared Book sharing information, wherein the e-book sharing information includes the access identities information of the target electronic book;
The network equipment issues the e-book sharing information;
User equipment is generated according to the e-book sharing information about target electronic book that the network equipment is issued about described The access request of target electronic book, wherein the e-book sharing information includes the access identities information of the target electronic book, The access request includes the access identities information of the target electronic book;
The user equipment sends e-book access request to the network equipment;
The network equipment, which receives, accesses the access request about the target electronic book that user is sent by user equipment, In, the access request is generated according to the e-book sharing information by the user equipment, and includes target electricity The access identities information of the philosophical works;
The target electronic book is provided to the user equipment by the network equipment;
The user equipment receives the target electronic book that the network equipment returns.
18. a kind of for sharing the network equipment of e-book, wherein the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute the operation such as any one of claim 1 to 12 the method.
19. a kind of for sharing the user equipment of e-book, wherein the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute the operation such as any one of claim 12 to 16 the method.
20. a kind of includes the computer-readable medium of instruction, described instruction makes system carry out such as claim 1 when executed To the operation of any one of 16 the methods.
CN201810277215.6A 2018-03-30 2018-03-30 Method and equipment for sharing electronic book Active CN108462757B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810277215.6A CN108462757B (en) 2018-03-30 2018-03-30 Method and equipment for sharing electronic book

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810277215.6A CN108462757B (en) 2018-03-30 2018-03-30 Method and equipment for sharing electronic book

Publications (2)

Publication Number Publication Date
CN108462757A true CN108462757A (en) 2018-08-28
CN108462757B CN108462757B (en) 2021-12-24

Family

ID=63238309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810277215.6A Active CN108462757B (en) 2018-03-30 2018-03-30 Method and equipment for sharing electronic book

Country Status (1)

Country Link
CN (1) CN108462757B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111563153A (en) * 2020-04-26 2020-08-21 掌阅科技股份有限公司 Recommendation method and terminal based on clipboard information sharing
CN111796754A (en) * 2020-06-30 2020-10-20 上海连尚网络科技有限公司 Method and device for providing electronic books

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN106776637A (en) * 2015-11-24 2017-05-31 北京奇虎科技有限公司 E-book sharing method and device
CN106815316A (en) * 2016-12-23 2017-06-09 北京奇虎科技有限公司 Method, device and mobile terminal that content of pages is shared
US20170180254A1 (en) * 2012-03-26 2017-06-22 Amazon Technologies, Inc. Adaptive throttling for shared resources
CN107070785A (en) * 2017-06-16 2017-08-18 广州阿里巴巴文学信息技术有限公司 A kind of realize reads the method shared and its device
CN107436936A (en) * 2017-07-21 2017-12-05 北京网阅文化传媒有限公司 Online reading method and platform based on Quick Response Code
CN107741981A (en) * 2017-10-16 2018-02-27 桂进林 A kind of e-book management method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170180254A1 (en) * 2012-03-26 2017-06-22 Amazon Technologies, Inc. Adaptive throttling for shared resources
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN106776637A (en) * 2015-11-24 2017-05-31 北京奇虎科技有限公司 E-book sharing method and device
CN106815316A (en) * 2016-12-23 2017-06-09 北京奇虎科技有限公司 Method, device and mobile terminal that content of pages is shared
CN107070785A (en) * 2017-06-16 2017-08-18 广州阿里巴巴文学信息技术有限公司 A kind of realize reads the method shared and its device
CN107436936A (en) * 2017-07-21 2017-12-05 北京网阅文化传媒有限公司 Online reading method and platform based on Quick Response Code
CN107741981A (en) * 2017-10-16 2018-02-27 桂进林 A kind of e-book management method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111563153A (en) * 2020-04-26 2020-08-21 掌阅科技股份有限公司 Recommendation method and terminal based on clipboard information sharing
CN111563153B (en) * 2020-04-26 2023-07-25 掌阅科技股份有限公司 Recommendation method and terminal based on clipboard information sharing implementation
CN111796754A (en) * 2020-06-30 2020-10-20 上海连尚网络科技有限公司 Method and device for providing electronic books
CN111796754B (en) * 2020-06-30 2022-03-29 上海连尚网络科技有限公司 Method and device for providing electronic books

Also Published As

Publication number Publication date
CN108462757B (en) 2021-12-24

Similar Documents

Publication Publication Date Title
Jøsang Trust and reputation systems
KR101681250B1 (en) Network-aware product rollout in online social networks
CN103814390A (en) System and method for sharing content on third-party mobile applications
CN104798094B (en) Determine the configuration of content item display environment
CN109937564A (en) The fraudulent account detected in distributed computing system uses
CN101689284B (en) Exchange collection of statistical data based on container
US20170103486A1 (en) Automatic update detection for regulation compliance
CN106992981A (en) A kind of website back door detection method, device and computing device
Puglisi et al. On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising
CN108462757A (en) A kind of method and apparatus for sharing e-book
Goecks et al. Challenges in supporting end-user privacy and security management with social navigation
Bulchand-Gidumal et al. Fighting fake reviews with blockchain-enabled consumer-generated reviews
US10996945B1 (en) Splitting programs into distributed parts
US10467423B1 (en) Static analysis-based tracking of data in access-controlled systems
Kapusta et al. Website structure improvement based on the combination of selected web structure and web usage mining methods
US20110196722A1 (en) Marketplace for captcha developers
Fan et al. Quantitative analysis for privacy leak software with privacy petri net
KR20170007159A (en) Central server and method for trading personal data
CN108777696A (en) A kind of method and apparatus for sharing e-book
US11785038B2 (en) Transfer learning platform for improved mobile enterprise security
AU2011213550A1 (en) Presentation of an information object
Saraireh Determinants of Users’ Satisfaction with Mobile Apps
Carmi et al. Functional analysis of applications for data security and for surfing privacy protection in the Internet
MORO et al. Auditing YouTube’s Recommendation Algorithm for Misinformation Filter Bubbles
Frank Consent management on the Ethereum Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant