TWI339342B - Method for sharing data - Google Patents

Method for sharing data Download PDF

Info

Publication number
TWI339342B
TWI339342B TW96124873A TW96124873A TWI339342B TW I339342 B TWI339342 B TW I339342B TW 96124873 A TW96124873 A TW 96124873A TW 96124873 A TW96124873 A TW 96124873A TW I339342 B TWI339342 B TW I339342B
Authority
TW
Taiwan
Prior art keywords
sharing
data
computer system
community
function
Prior art date
Application number
TW96124873A
Other languages
Chinese (zh)
Other versions
TW200903269A (en
Inventor
Tzu Sheng Weng
Jiun Liang Wu
Original Assignee
Asustek Comp Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asustek Comp Inc filed Critical Asustek Comp Inc
Priority to TW96124873A priority Critical patent/TWI339342B/en
Publication of TW200903269A publication Critical patent/TW200903269A/en
Application granted granted Critical
Publication of TWI339342B publication Critical patent/TWI339342B/en

Links

Landscapes

  • Storage Device Security (AREA)

Description

1339342 0960164 24521twf.doc/p 九、發明說明: 【發明所屬之技術領域】 本發明是有關於—種資料分享的機 種可自動完成資料分享之各項設㈣方i制疋有關 【先前技術】 隨著貧訊科技的日新月異,電腦系 ==的方式,尤,== 介而楚〜 _,USB)介面或是IEEE1394 則例如是網路芳鄰等。透過網路介面 貝料傳輸的方法雖綠定繁雜,但相較於硬體傳輸介 ’此方法則較為方便,並且傳輸距離亦不受限制。 f統職傳輸的作法,使用者必須先自行設定網路來 t建立錢者帳號、建立分享·失、及設定倾夹的 2杻限給建立雜號之後’才能開始做槽案傳輸。這樣 的=法’對:般使用者而言是非常麻煩的。例如:對大部 刀走用者而吕,網路位置(IP)與網路遮罩⑽加 是:鎌大的問題。此外’如果分享龄的動作在 ^用元之後沒有酬,麟露在網路芳鄰的環境下二 易艳到病毒感染或是其他駭客的入侵。 、令 【發明内容】 本發明提供-種資料分享的方法,當 動時’便隨即自較成資料分享的各式奴,:當g啟 本發明提出-種資料分享的方法,適用於電腦系統中 5 1339342 0960164 24521 twfdoc/p 之多個資料目錄。此方法首先偵測分享功能是否被啟動。 當分享功能被啟動時,則提供資料分享介面,並建立資料 傳輸協定’以登人㈣分享社群。接著,提供個者帳號 和虛擬位址給電腦系統,以在資料分享社群中建立子社 群。並且,在電腦系統中,搜尋被標記為可共用狀態之資 料目錄。最後,將被標記為可共用狀態之資料目錄連結至 資料分享介面,使在子社群中之使用者透過資料分享介面 對被標記為可共用狀態之資料目錄下的檔案進行存取。 本發明提出-種資料分享的方法,適用於電腦系統中 之多,資料目錄。此方法首先偵測分享功能是否被啟動。 當分享功能被啟動時,則提供一資料分享介面。接著,提 供使用者帳號和虛擬位址給電腦系統。並且,在電腦系統 中,搜尋被標記為可共綠態之㈣目錄。然後,將被標 記為可共用狀態之資料目錄連結至資料分享介面。最後, 偵測分享魏是碰_。當分享魏被關料,則刪除 使用者帳號。 “ 從另一觀點來看,本發明提出—種資料分享的方法, 適用於一電私系統存取網路中之多個資料目錄。此方法首 先伯測分享功能是碰啟動。#分享功能被啟動時,則提 供資料分享介面’並建立資料傳輪協定,以登入資料分享 社群。接著,提供使用者帳號和虛擬位址給電腦系統,以 在資料分享社群愤立子社群。然後,在子社群中、,搜尋 被標記為可共綠態之㈣目錄。最後,當搜尋到有被標 記為可共用狀態之㈣目料,則連結至被標記為可共用 6 1339342 0960164 2452 ltwf.doc/p 狀態之資料目錄,以使電腦系純透過資料 被標記為可共用狀態之資料目錄下的檔案。 本,明在電腦系統的分享功能被啟動時,可自動完成 貧料分旱的各項設定,因此,在 Hχ _ 在使用上更加輕鬆、方便。 功能被關閉時,隨即將所有使用權限收 回’提尚了使用上的安全性。1339342 0960164 24521twf.doc/p IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a device for sharing information that can automatically complete data sharing (four) side-by-side system [previous technique] With the rapid changes of the technology, the computer system == way, especially, == 介楚~ _, USB) interface or IEEE1394 is for example, network neighbors. The method of transmitting the material through the network interface is quite complicated, but it is more convenient than the hardware transmission method, and the transmission distance is not limited. f The practice of unified transmission, the user must first set up the network to establish the money account, establish sharing, loss, and set the folder limit 2 to create a hash number before you can start the slot transmission. Such a method is very troublesome for a general user. For example, for the majority of the knife users, the network location (IP) and the network mask (10) plus is: a big problem. In addition, if the action of sharing age is not paid after the use of yuan, Lin Lu is exposed to virus infection or other hackers in the environment of the Internet. [Description of the Invention] The present invention provides a method for sharing data, and when it is moved, it will immediately share all kinds of slaves from the data, and when the invention is proposed, the method for sharing data is applicable to the computer system. Medium 5 1339342 0960164 24521 twfdoc/p Multiple data directories. This method first detects if the sharing function is activated. When the sharing function is activated, a data sharing interface is provided, and a data transfer agreement is established to board the people (4) to share the community. Next, provide a personal account and a virtual address to the computer system to create a sub-community in the data sharing community. Also, in the computer system, the search is marked as a catalog of materials that can be shared. Finally, the data directory marked as shareable is linked to the data sharing interface, so that users in the sub-community can access the files in the data directory marked as shareable through the data sharing interface. The invention proposes a method for data sharing, which is applicable to many data files in a computer system. This method first detects if the sharing function is activated. When the sharing function is activated, a data sharing interface is provided. Next, provide the user account and virtual address to the computer system. Also, in the computer system, the search is marked as a (four) directory that can be eutectic. Then, link the data directory marked as shareable to the data sharing interface. Finally, the detection of sharing Wei is a touch. When sharing Wei is turned off, the user account is deleted. From another point of view, the present invention proposes a method for data sharing, which is applicable to multiple data directories in an electrical private system access network. This method firstly detects the sharing function is a touch start. #分享功能At startup, the data sharing interface is provided and a data transfer agreement is established to log in to the data sharing community. Next, a user account and a virtual address are provided to the computer system to share the community in the community. In the sub-community, the search is marked as a (four) directory that can be eutectic. Finally, when a (four) object that is marked as shareable is found, the link is marked as shareable 6 1339342 0960164 2452 ltwf. The directory of the doc/p status, so that the computer is marked as a file in the data directory of the shareable state through the data. This, when the sharing function of the computer system is started, can automatically complete the poor and dry Item setting, therefore, it is easier and more convenient to use in Hχ _. When the function is turned off, all the usage rights are reclaimed', and the security of use is raised.

為讓本發明之上述特徵和優點能更明顯易懂,下文特 舉較佳實施例,並配合所關式,作詳細說明 【實施方式】 而言 般在設㈣路芳料’對於不料腦系統的使用者 .,,…一步—步進行手動設定的方式是相當困擾的一件 事。因此’本發明提出-種資料分享的方法及系統,以自 動設定各項參數,提供使用者輕易分享資料之途徑。為了 使本發明之内容更為明瞭’以下特舉實_作為本發明確 實能夠據以實施的範例。In order to make the above features and advantages of the present invention more comprehensible, the preferred embodiments are described below, and the detailed description is given in conjunction with the closed type. [Embodiment] The user.,,... One step - the way to manually set is a very troublesome thing. Therefore, the present invention proposes a method and system for sharing data to automatically set various parameters and provide a means for users to easily share data. In order to clarify the content of the present invention, the following detailed description is made as an example in which the present invention can be implemented.

圖1是依照本發明一實施例所繪示之資料分享的系統 方塊圖。請參照圖1 ’此系統包括電腦系統110與12〇。'在 這個實施例中,電腦系統110用以提供資料目錄以進行資 料分享’即為欲設定分享之一方;另外,電腦系統了ϋ 是用以存取電腦系統110提供之資料目錄下的擋案,即是 欲連線到他人電腦以存取他人分享之一方。在其他實施例 中,電腦系統110及120亦可同時為設定分享之—二以及 欲存取他人分享之一方,並且亦不侷限於兩部電腦系統之 間的傳輪,在此僅為方便說明,本實施例並不限制實際應 7 1339342 0960164 24521 twf.doc/p • 用之範圍。 • 電腦系統110與120分別具有-分享功能,例如是以 5 = f,能撰寫成應用軟體,並安裝於電腦系統 ' 中來執行貧料分享。在本實施例中,電腦系統 110與120例如裝設有上述應用軟體。當電腦系統㈣中 的應用軟體被啟動時,應用軟體便提供一資料分享介面 111’以把在電腦系統110中搜尋到之被標記為可共用 •連結至此資料分享介面η十而供電腦“ 日進仃存取之用。並且,在電腦系統11〇中的應用軟體 亦提供一個使用者帳號以及一組虛擬位址。 接著,應用軟體便可藉由此使用者帳號在資料分享社 =中建立子社群,也就是說’只有使用上述之具有分享功 3應用軟體’才能進人此子社群,以藉此來限制使用者。 U,應用軟體在電腦系統12〇中亦具有上 =體被啟動時,提供資料分享介面121,以透過資;^ • 子"面121登入電腦系統11〇分享的資料目錄中。 >咨^^,搭配上述之資料分享的系統,詳細說明本發明 H.·4分ί的方法之各步驟。圖2是依照本發明一實施例 电=不^資料分享的方法流程圖。請參照圖1及圖2,本 例疋以電腦系統110為例來說明欲設定分享之—方。 •否漏i步驟s2ig中’電腦祕uG會偵測分享功能是 項气定4 7腦系統110將透過此分享功能來自動完成各 反之疋^右分旱功能並未被啟動,則結束資料分享的流裎; 右偵測到分享功能被啟動,也就是說,當使用者執 8 0960164 24521twf.doc/p 行電腦系統1 l〇中所安裝之分享功能的應用軟體時,則執 行步驟S220。 在步驟S220中,當分享功能被啟動時,則電腦系統 Π0提供資料分享介面11〗,並建立資料傳輸協定,以進入 資料分旱社群。就目前資料分享的技術而言,資料分享社 群例如是網路芳鄰,資料分享介面U1例如是電腦系統11〇 中呈現網路芳鄰的介面,而資料傳輸協定則例如是傳輸控 制協疋/網際網路協定(TransmiSsi〇n Control pr〇t〇c〇i / Internet Protocol,TCP/IP)。藉由此資料傳輪協定使得電腦 系統110能夠連線至資料分享社群。 接著,在步驟S230中,透過此分享功能,提供一使 用者帳號和一組虛擬位址給電腦系統11〇,以在資料分享 社群中建立子社群。另外,透過此分享功能,更可設定此 使用者帳號對應的密碼,以進一步規範使用的權限。而上 述使用者帳號可以是分享功能所預定之帳號,亦可以是由 使用者所訂定之帳號。 χ而=子社群僅供具有此使用者帳號的電腦系統進 〜πa之,在同樣具有上述之分享功能的電腦系統(例 系、’4 12〇)巾’此電腦系統才能藉由分享功能提供 二的使用者帳號來進人子社群。因此,當不具有上述 二的電腦系統欲進入子社群時’此電腦系統的使 在此僅2入ί確的使用者帳號及密碼後,方能進入。然 ',、、更况,,並不以此限定實際應用的範圍。 外,§分旱功能被啟動時,電腦系統將先完成 1339342 0960164 24521twf.doc/p 網路連線的設定,以·進行通訊。詳 、 統no中具分享功能的應用軟體被啟動時,此庙畜電腦系 债測電腦系統1 ίο衫具舒_路卡。若a 軟體將 具有多張網路卡時,則此應用軟體會解糸統」10 =試’以判斷是否可以連線至資料分;::進 例中,資料分雜群可以是網路^ 在本心FIG. 1 is a block diagram of a system for sharing data according to an embodiment of the invention. Please refer to FIG. 1 ' This system includes computer systems 110 and 12 〇. In this embodiment, the computer system 110 is used to provide a data directory for data sharing, that is, one of the parties to set up sharing; in addition, the computer system is used to access the file directory provided by the computer system 110. That is, you want to connect to someone else's computer to access others to share. In other embodiments, the computer systems 110 and 120 can also share the sharing of the two at the same time, and one of the two computers, and is not limited to the transfer between the two computer systems. This embodiment does not limit the actual range of 7 1339342 0960164 24521 twf.doc/p •. • Computer systems 110 and 120 have a sharing function, for example, 5 = f, which can be written into application software and installed in the computer system to perform poor material sharing. In the present embodiment, the computer systems 110 and 120 are provided, for example, with the above-described application software. When the application software in the computer system (4) is activated, the application software provides a data sharing interface 111' to mark the searched in the computer system 110 as being shareable and connected to the data sharing interface η10 for the computer. For example, the application software in the computer system 11 also provides a user account and a set of virtual addresses. Then, the application software can use the user account to create a child in the data sharing agency. The community, that is to say, 'only use the sharing software application software described above' can enter this sub-community to restrict users. U, the application software also has the upper body in the computer system 12〇 At the time of startup, the data sharing interface 121 is provided to enable the user to log in to the computer system 11 to share the data directory. > Consultation ^^, with the above-mentioned data sharing system, detailing the present invention H The steps of the method of 4 minutes are shown in Figure 2. Figure 2 is a flow chart of the method of data sharing according to an embodiment of the present invention. Referring to Figure 1 and Figure 2, the computer system 110 is taken as an example for illustration. Set the sharing - side. • No leak i step s2ig 'computer secret uG will detect sharing function is a gas set 4 7 brain system 110 will automatically complete each other through this sharing function 疋 ^ right drought function has not been Start, the end of the data sharing rogue; right detection of the sharing function is activated, that is, when the user is in the 8 0960164 24521twf.doc / p computer system 1 l〇 installed in the sharing function of the application software Step S220 is performed. In step S220, when the sharing function is activated, the computer system Π0 provides a data sharing interface 11 and establishes a data transfer protocol to enter the data sharing community. In other words, the data sharing community is, for example, a network neighbor. The data sharing interface U1 is, for example, a network node in the computer system, and the data transmission protocol is, for example, a transmission control protocol/internet protocol (TransmiSsi〇n). Control pr〇t〇c〇i / Internet Protocol, TCP/IP). By means of the data transfer protocol, the computer system 110 can be connected to the data sharing community. Next, in step S230, Through this sharing function, a user account and a set of virtual addresses are provided to the computer system to establish a sub-community in the data sharing community. In addition, through this sharing function, the corresponding corresponding to the user account can be set. The password is used to further standardize the usage rights. The user account can be the account booked by the sharing function or the account set by the user. χ而=Sub-community is only for the computer system with this user account. Into the πa, in the computer system (the system, '4 12〇) towel that also has the above sharing function, the computer system can enter the user community by providing the user account of the sharing function. Therefore, when the computer system that does not have the above two wants to enter the sub-community, the computer system can only enter the user account and password after entering the user account and password. However, ',, and more, it does not limit the scope of actual application. In addition, when the § drought function is activated, the computer system will first complete the setting of 1339342 0960164 24521twf.doc/p network connection to communicate. When the application software with the sharing function is activated, the temple computer system is a debt measuring computer system. If a software will have multiple network cards, then the application software will solve the problem "10 = try" to determine whether it can be connected to the data points;:: In the example, the data group can be network ^ In my heart

^體判斷被測試之網路卡可以連線至網路芳 =虛擬位膽此網路卡。反之,當·m之網心 線至網料_,職用倾便對另—财卡;則連 另外’為了確保電腦系統110所使用之網際網路協定 (Internet Protocol,IP)位址不會與他人所使用的正位址 有所衝突’因而在本實施射’具備分享舰的應用軟體 則提供虛擬位址給電腦系統丨10。若電腦系統丨1〇原本即 設定一組ip位址,當設定一組虛擬位址給電腦系統ιι〇 時’等同於再增設—組可使用W 11>位址,此虛擬位址將不 影響電腦系統110原本的設定。^ Body judgment The tested network card can be connected to the network Fang = virtual bit this network card. On the other hand, when the network of the m-network is connected to the net material, the job will be used for another money card; then the other 'in order to ensure that the Internet Protocol (IP) address used by the computer system 110 will not It conflicts with the positive address used by others. Therefore, in this implementation, the application software with the share ship provides a virtual address to the computer system. If the computer system is set to set a set of ip addresses, when a set of virtual addresses is set to the computer system ιι〇, it is equivalent to the additional set. The group can use the W 11> address, and the virtual address will not be affected. The original setting of the computer system 110.

然後,如步驟S240所示,在電腦系統110中,搜尋 破標記為可共用狀態之資料目錄。在實際應用上,以程式 碼將上述之分享功能撰寫成應用軟體為例,當此應用軟體 安裝至電腦系統110時,將新增一空白的資料目錄以將其 標記為可共用狀態之資料目錄,當然’使用者亦可視其需 求來設定其他資料目錄,在此並不限制。 最後’在步驟S250中’電腦系統110將被標記為可 共用狀態之資料目錄連結至資料分享介面m,使在子社 0960164 24521twf.doc/p 群中之使用者能夠對被標記為可共用狀態之資料目錄下的 樓案進行存取。並且,電腦系統110則將使用者帳號加入 被標記為可共用狀態之資料目錄的使用權限十,如此一 來’此一資料目錄即會出現在資料分享介面〗1 1中,而且 需透過確認使用者帳號後,方能被存取。之後,電腦系統 11 〇與電腦系統120之間便可開始進行資料分享。 上述實施例是以電腦系統110為例來說明欲設定分享 之一方,以下便以電腦系統120為例,詳加說明欲連線到 他人電腦之一方的各步驟。圖3是依照本發明另一實施例 所繪示之資料分享的方法流程圖。請同時參照圖丨及圖3, 本實施例之步驟S310〜S330與上述之步驟S21〇〜S23〇相 似。首先,在步驟S310中,電腦系統12〇偵測分享功能 是否被啟動H則結束資料分享的流程;反之,若债 測到分享功能被啟動,則執行步驟S32〇。 當使用者執行電腦系、统12〇中所安裝之分享功能的應 ,軟體時’在步驟S32G中,電腦系統⑽提供資料分享 ’I面並建立資料傳輸協定,以進人資料分享社群。 田二二土步驟S33〇 * ’透過此分享功能’提供一使 钍群組虛擬位址給電㈣統12G,以在資料分享 社群。而電腦系統12G之使用者帳號與上述 ^ 電腦系統UG所提供之使用者帳號是相同 電腦統二此—使用者帳號,而登入 統_分享功能時,電腦;===: 1339342 0960164 24521twf.doc/p • 相同之一使用者帳號。 當分旱功能被啟動時,如同上述之電腦系統11〇,電 腦系統亦將先完成網路連線的設定,以順利進行通 訊。而本實例之網路連線的設定與上述實施例之設定步驟 ’相同或相似,故在此則不再贅述。 然後,在步驟S340中,應用軟體便在子社群中,搜 尋被標記為可共用狀態之資料目錄。利用此應用軟體之電 腦系統I10及12〇會在資料分享社群中建立一個子社群, 而電腦系統110及120便是這個子社群的使用者。因此, 電腦系統120便會在子社群中,搜尋被標記為可共用狀態 之資料目錄’也就是搜尋電腦系統11〇所分享之資料目錄。 接下來,在步驟S350中,電腦系統12〇偵測是否搜 尋到被標記為可共用狀態之資料目錄。若否,則結束資料 分享的流程;反之,若搜尋到被標記為可共用狀態之資料 目錄,則執行步驟S360。 最後’在步驟S360中’電腦系統12〇連結至被標記 # 為可共用狀悲之資料目錄,以>透過資料分享介面121,存 取被4示5己為可共用狀態之貝料目絲丁的谈安。抬十-Jr,舍 使用者在電腦系統中將分享:能啟動; 成上述各項设疋,之後,使用者便可透過資料分享介面121 來進入被分享的資料目錄中。 另外’為了在分旱結束後,電腦系統11〇及12〇能夠 輕鬆地將使用權限收回,以下印以電腦系、统11〇為例,再 舉一實施例詳加說明關閉資料分享的各步驟。圖4是依照 12 1339342 0960164 24521twf.doc/p 本發明一實施例所繪示之關閉資料分享的方法流程圖。請 同時參照圖1及圖4,首先,在步驟S410中,電腦系統 110在分享功能被啟動後’將自動完成資料分享的各^吸 定。當分享結束後’如步驟S420所示,電腦系統i丨〇便 偵測分享功能是否被關閉。若分享功能被關閉,則執行步 驟 S430。 在步驟S430中,當分享功能被關閉時,電腦系統11〇 將刪除使用者帳號,並且取消被標記為可共用狀態之資料 目錄與資料分享介面111之連結。這個時候,由於使用者 帳號被刪除,因此其他使用者便無權限來登入電腦系統 110中,以存取其分享之資料目錄。並且,被標記為可共 用狀態之資料目錄將不會出現在資料分享介面U1中,如 此一來’其他使用者,例如電腦系統120,便無法透過資 料分享介面121而存取此資料目錄。若以具備上述之分享 功能的應用軟體而言,當此應用軟體被關閉時,電腦系統 110便會將資料分享的各項設定取消,以結束分享而將所 有使用權限收回。當然’電腦系統120在分享功能被關閉 “-J _ 0J、同樣如同上述步驟’將所有使罔權限收回。 回到步驟S420,若分享功能未被關閉,則執行步驟 S440,電腦系統11〇在完成各項設定之後,便開始進行資 料分享。 綜上所述,本發明之資料分享的方法及系統至少具有 下列優點: 1.當分享功能被啟動時,將自動完成資料分享的各項 設定,提供使用者一種輕鬆、方便的方法來進行資料分享。 13 1339342 0960164 24521twf.doc/p 2.在分享功能被關閉時, 避免資料目縣時間暴露在網 高使用上的安全性。 限定:發、ί發:實施例揭露如上,然其並非用以 脫離本發明之精神j =領=通常知識者,在不 因此本發明之仵替/可作些許之更動與潤飾, 為準。^之保4關當視後附之巾請專利範圍所界定者Then, as shown in step S240, in the computer system 110, the directory of the data that is marked as shareable is searched for. In practical applications, the above-mentioned sharing function is written as an application software by using a code. When the application software is installed to the computer system 110, a blank data directory is added to mark it as a data directory of a shareable state. Of course, 'users can also set other data directories according to their needs, which is not limited here. Finally, in step S250, the computer system 110 links the data directory marked as shareable to the data sharing interface m, so that the user in the subsidiary 0960164 24521twf.doc/p can be marked as shareable. Access to the building under the data directory. Moreover, the computer system 110 adds the user account to the usage right ten of the data directory marked as shareable, so that the data directory will appear in the data sharing interface 11 and needs to be confirmed. After the account is activated, it can be accessed. After that, data sharing can be started between the computer system 11 and the computer system 120. The above embodiment uses the computer system 110 as an example to illustrate one of the ways to set up sharing. The computer system 120 is taken as an example to describe in detail the steps to be connected to one of the other computers. FIG. 3 is a flow chart of a method for sharing data according to another embodiment of the present invention. Referring to FIG. 3 and FIG. 3 simultaneously, steps S310 to S330 of this embodiment are similar to steps S21〇 to S23〇 described above. First, in step S310, the computer system 12 detects whether the sharing function is activated to end the flow of data sharing; otherwise, if the debt sharing function is activated, step S32 is performed. When the user executes the sharing function installed in the computer system, the software is in the step S32G, the computer system (10) provides the data sharing side and establishes a data transmission agreement to enter the data sharing community. Tian Er Er Tu Step S33〇 * ‘Through this sharing function’ provides a 钍 group virtual address to the electricity (4) unified 12G to share in the data sharing community. The user account of the computer system 12G and the user account provided by the above computer system UG are the same computer system - the user account, and the login system _ sharing function, the computer; ===: 1339342 0960164 24521twf.doc /p • One of the same user accounts. When the drought-shaping function is activated, as in the computer system described above, the computer system will also complete the network connection settings for smooth communication. The setting of the network connection in this example is the same as or similar to the setting step of the above embodiment, and therefore will not be described herein. Then, in step S340, the application software searches for the data directory marked as shareable in the sub-community. The computer systems I10 and 12 using this application software will create a sub-community in the data sharing community, and the computer systems 110 and 120 are users of this sub-community. Therefore, the computer system 120 searches the sub-community for a directory of data that is marked as shareable, that is, a directory of information that is shared by the search computer system. Next, in step S350, the computer system 12 detects whether or not the material directory marked as shareable state is found. If not, the process of data sharing is ended; otherwise, if a data directory marked as shareable is found, step S360 is performed. Finally, in step S360, the computer system 12 is connected to the data directory that is marked as being shareable, and is accessed through the data sharing interface 121, and accesses the bedding wire which is 4 in a shareable state. Ding’s talk. Lifting the 10-Jr, the user will share in the computer system: it can be activated; after the above settings, the user can access the shared data directory through the data sharing interface 121. In addition, in order to ease the use of the computer system after the end of the drought, the following is a case of the computer department and the system. The following is an example to explain the steps of closing the data sharing. . 4 is a flow chart of a method for closing data sharing according to an embodiment of the present invention in accordance with an embodiment of the present invention. Referring to FIG. 1 and FIG. 4 simultaneously, first, in step S410, the computer system 110 will automatically perform the data sharing after the sharing function is activated. When the sharing is completed, as shown in step S420, the computer system i detects whether the sharing function is turned off. If the sharing function is turned off, step S430 is performed. In step S430, when the sharing function is turned off, the computer system 11 删除 deletes the user account and cancels the link between the data directory marked as shareable and the material sharing interface 111. At this time, since the user account is deleted, other users have no right to log in to the computer system 110 to access the shared data directory. Also, the directory of data that is marked as shareable will not appear in the data sharing interface U1. As a result, other users, such as the computer system 120, cannot access the data directory through the material sharing interface 121. In the case of the application software having the sharing function described above, when the application software is closed, the computer system 110 cancels the settings of the data sharing to end the sharing and reclaim all the usage rights. Of course, the computer system 120 retracts all the permissions when the sharing function is turned off "-J_0J, as in the above steps." Returning to step S420, if the sharing function is not turned off, step S440 is executed, and the computer system 11 is present. After the settings are completed, data sharing is started. In summary, the data sharing method and system of the present invention have at least the following advantages: 1. When the sharing function is activated, the data sharing settings are automatically completed. Provide users with an easy and convenient way to share data. 13 1339342 0960164 24521twf.doc/p 2. When the sharing function is turned off, avoid the security of the data source time exposed to the use of the network height. The invention is disclosed above, but it is not intended to depart from the spirit of the present invention. The scope of the patent is defined by the scope of the patent.

【圖式簡單說明】 圖1是依照本發明 方塊圖。 流程^是依照本發明—實施顺繪示之㈣分享的方法 圖3是依照本發明另一實施例所繪示之資料分享的方 法流程圖。BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a block diagram in accordance with the present invention. The process is a method for sharing data according to the present invention. FIG. 3 is a flow chart of a method for sharing data according to another embodiment of the present invention.

隨即將所有使用權限收回, 路攻擊的威脅下,進—步提 一實施例所繪示之資料分享的系統 圖4是依照本發明一實施例所繪示之關閉資料分享的 方法流程圖。 【主要元件符號說明】 110 ' 120 I電腦系統 S210〜S250 :本發明一實施例之資料分享的方法各步 驟 S310〜S360 :本發明另一實施例之資料分享的方法各 步驟 S410〜S440 :本發明一實施例之關閉資料分享的方法 各步驟Now, all the usage rights are reclaimed, and the system of the data sharing is shown in the following. [Description of main component symbols] 110 '120 I computer system S210 to S250: Method for data sharing according to an embodiment of the present invention, steps S310 to S360: methods for data sharing according to another embodiment of the present invention, steps S410 to S440: Method for closing data sharing method according to an embodiment of the invention

Claims (1)

1339342 0960164 24521twf.doc/p 十、申請專利範圍: 資料分享的方法,適用於1腦系統中之多個 貝枓目錄,而該方法包括下列步驟: 偵測—分享功能是否被啟動; 當該分享功能被啟動時,則提供— 古入 建立一資料傳輸協定,以登人-資料分享社f丨’、’ 該腦純,以在 錄;t電腦系財,搜尋被標記為可共用狀態之資料目 將被標記為可共用狀態之資料目 =二;=,之使用者透過‘二 if 之㈣目錄下_麵行存取。 包括)·如申請專利範圍第i項所述之資料分享的方法,更 偵測該電腦系統是否具備多個網路卡· 中之-當 矸寸則私疋該虛擬位址給該網路卡;以及 當被測試之該網路卡無法 時,則對該些網路卡另—進行測試。貝I子社群 中範圍第1項所述之資料分享的方法,其 中該使用者帳銳括該分享功能_狀帳號或—使用者 15 0900164 24521twfdoc/p 自訂之帳號。 4.如申請專利範圍第1項所述之資料分享的方法,其 中提供該使用者帳號的步驟,更包括: 提供一密碼。 5·如申請專利範圍第1項所述之資料分享的方法,更 包括: 將該使用者帳號加入被標記為可共用狀態之資料目 錄的使用權限中。 6. 如申請專利範圍第1項所述之資料分享的方法,更 包括: 偵測該分享功能是否被關閉;以及 當該分享功能被關閉時,則刪除該使用者帳號,並取 消被標記為可共用狀態之資料目錄與該資料分享介面之連 結。 7. —種資料分享的方法,適用於一電腦系統中之多個 資料目錄,而該方法包括下列步驟: 偵測一分享功能是否被啟動; 當該分享功能被啟動時’則提供一資料分享介面; 提供一使用者帳號和一虛擬位址給該電腦系統; 在該電腦系統中,搜尋被標記為可共用狀態之資料目 錄; ' 將被標έ己為可共用狀悲之資料目錄連結至該資料分 予介面; 偵測該分享功能是否被關閉;以及 1339342 0960164 24521twf.doc/p 當該分享功能被關閉時,則刪除該使用 8·如申請專觸圍第7項所述之資料分享的;法, 中當該分享功能被啟動時,更包括. 建立-資料傳輸協定,以登入i資料分享社群。 9.如申請專利範圍第8項所述之資料分享的方法, 包括: 依據該使用者帳號,在該資料分享社群中建立—子社1339342 0960164 24521twf.doc/p X. Patent application scope: The method of data sharing applies to multiple shellfish catalogues in a brain system, and the method includes the following steps: detecting whether the sharing function is activated; When the function is activated, it is provided - Gujin establishes a data transmission agreement to board the person-data sharing agency f丨', 'the brain pure, to record; t computer system, search for information marked as shareable status The item will be marked as a shareable data item = two; =, the user accesses through the 'two if' (four) directory. Including, for example, the method of sharing data as described in item i of the patent application, and detecting whether the computer system has multiple network cards, etc. - when the inch is private, the virtual address is given to the network card And when the network card being tested is not available, the network card is tested separately. The method of data sharing described in item 1 of the Bay I sub-community, wherein the user account includes the sharing function _ account or user 15 0900164 24521twfdoc/p custom account. 4. The method for sharing information according to claim 1 of the patent application, wherein the step of providing the user account further comprises: providing a password. 5. The method of material sharing as described in claim 1 of the patent scope further includes: adding the user account to the usage rights of the data directory marked as shareable. 6. The method for sharing information as described in claim 1 of the patent scope further includes: detecting whether the sharing function is turned off; and when the sharing function is turned off, deleting the user account and canceling being marked as A link to the data sharing interface of the shareable status data directory. 7. A method of data sharing, which is applicable to a plurality of data directories in a computer system, and the method comprises the steps of: detecting whether a sharing function is activated; when the sharing function is activated, providing a data sharing Interface; providing a user account and a virtual address to the computer system; in the computer system, searching for a directory of information that is marked as shareable; 'will be linked to a directory of information that can be shared The information is distributed to the interface; it is detected whether the sharing function is turned off; and 1393342 0960164 24521twf.doc/p When the sharing function is turned off, the usage is deleted. 8. If the sharing is as described in item 7 of the application The law, when the sharing function is activated, includes the .--data transfer protocol to log in to the i data sharing community. 9. The method for sharing information as described in claim 8 of the patent application, comprising: establishing a subsidiary in the material sharing community based on the user account 群。 10. 如申請專利範圍第7項所述之資料分享的方法,其 中該使用者帳號包括該分享功能内預設之帳號或一使用者 自訂之帳號。 11. 如申請專利範圍第7項所述之資料分享的方法,其 中提供該使用者帳號的步驟,更包括: 提供一密碼。 12·如申請專利範圍第7項所述之資料分享的方法,更 包括:group. 10. The method of material sharing as described in claim 7 wherein the user account includes an account number preset in the sharing function or a user-defined account number. 11. The method for sharing information according to claim 7 of the patent application, wherein the step of providing the user account further comprises: providing a password. 12. The method of sharing information as described in item 7 of the patent application scope includes: 其 更 價測該電腦系統是否具備多個網路卡; 當該電腦系統具有該些網路卡時,則對該些網路卡其 中之一進行測試,以判斷是否可以連線至該資料分享社群; 當判斷被測試之該網路卡可以連線至該資料分享社 群^ ’則指定該虛擬位址給該網路卡;以及 ±當被測試之該網路卡無法連線至該資料分享社群 枯,則對該些網路卡另一進行測試。 13.如申請專利範圍第7項所述之資料分享的方法,更 17 1339342 0960164 2452 J twf.doc/p 包括 將该使用者帳號加入被標記為可共 錄的使用權限中。 ^ Κ-種請分享的方法,_於 路中之多個資料目錄,而該方法包括下統存取一網 偵測一分旱功能是否被啟動; 〃It further tests whether the computer system has multiple network cards; when the computer system has the network cards, one of the network cards is tested to determine whether the data can be connected to the data sharing. Community; when it is determined that the network card being tested can be connected to the data sharing community ^ ', the virtual address is assigned to the network card; and ± when the network card being tested cannot be connected to the network card If the data sharing community is dry, the other network cards will be tested. 13. The method of sharing data as described in claim 7 of the patent application, further includes adding the user account to the usage rights marked as shareable. ^ Κ - kind of sharing method, _ in the multiple data directory in the road, and the method includes accessing a network to detect whether a drought function is activated; 當該分享功能被啟動時,則提供—八古 建立一資料傳輸協定,以登入-資料分享社面,亚 供Γ使用者帳號和—虛擬位址給該電《統,以在 °亥貝枓刀旱社群中建立一子社群; 錄;2子社群中,搜尋被標記為可共用狀態之資料目 當搜尋到有被標記為可共用狀態之資料 為可共用狀態之資料目錄,以使該二= …亥貪料分享介面,存取被標記為可共用狀態之資料目錄 下的槽案。When the sharing function is activated, it provides a data transfer agreement to create a data transfer protocol for the login-data sharing community, the sub-supply user account and the virtual address to the electricity system. The establishment of a sub-community in the Knife-Community community; recorded; 2 sub-community, searching for information marked as shareable status, and searching for a data directory with information that is marked as shareable status as a shareable state, The second = ... phishing interface is accessed, accessing the slot in the data directory marked as shareable. 用狀態之資料目 15.如申請專利範圍第14項所述之資料分享的方法, 更包括: ' ’ 偵測該電腦系統是否具備多個網路卡; 當該電腦系統具有該些網路卡時,則對該些網路卡其 中之一進行測試,以列斷是否可以連線至該資料分享社群、; 當判斷被測試夂該網路卡可以連線至該資料^享社 群時’則指定該虛擬位址給該網路卡;以及 當被測試之該網路卡無法連線至該資料分享社群 1339342 0960164 24521twf. doc/p 時,則對該些網路卡另一進行測試。 16. 如申請專利範圍第14項所述之資料分享的方法, 更包括: 偵測該分享功能是否被關閉;以及 當該分享功能被關閉時,則刪除該使用者帳號。 17. 如申請專利範圍第14項所述之資料分享的方法, 其中該使用者帳號包括該分享功能内預設之帳號或一使用 者自訂之帳號。The data sharing method described in claim 14 includes: ' ' detecting whether the computer system has multiple network cards; when the computer system has the network cards At the time, one of the network cards is tested to determine whether it is possible to connect to the data sharing community; when it is determined that the network card can be connected to the data sharing community 'Specify the virtual address to the network card; and when the network card being tested cannot be connected to the data sharing community 1393342 0960164 24521twf. doc/p, then the other network cards are test. 16. The method for sharing data as described in claim 14 further includes: detecting whether the sharing function is turned off; and deleting the user account when the sharing function is turned off. 17. The method for material sharing as described in claim 14 wherein the user account includes an account number preset in the sharing function or a user-defined account number. 1919
TW96124873A 2007-07-09 2007-07-09 Method for sharing data TWI339342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96124873A TWI339342B (en) 2007-07-09 2007-07-09 Method for sharing data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96124873A TWI339342B (en) 2007-07-09 2007-07-09 Method for sharing data

Publications (2)

Publication Number Publication Date
TW200903269A TW200903269A (en) 2009-01-16
TWI339342B true TWI339342B (en) 2011-03-21

Family

ID=44722083

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96124873A TWI339342B (en) 2007-07-09 2007-07-09 Method for sharing data

Country Status (1)

Country Link
TW (1) TWI339342B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI512660B (en) * 2014-03-19 2015-12-11 Univ Yuan Ze A method of sharing information sources across a lot of social networking services

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI512660B (en) * 2014-03-19 2015-12-11 Univ Yuan Ze A method of sharing information sources across a lot of social networking services

Also Published As

Publication number Publication date
TW200903269A (en) 2009-01-16

Similar Documents

Publication Publication Date Title
JP5698539B2 (en) System and method for delegating access to an online account
US8346952B2 (en) De-centralization of group administration authority within a network storage architecture
JP5396051B2 (en) Method and system for creating and updating a database of authorized files and trusted domains
JP5704518B2 (en) Confidential information leakage prevention system, confidential information leakage prevention method, and confidential information leakage prevention program
JP6096376B2 (en) Access control method, apparatus, program, and recording medium
JP2009501397A (en) A single view of data in a networked computer system with distributed storage
JP2004234378A (en) Security management device and security management method
JP2010026662A (en) Information leakage prevention system
JP2006251856A (en) Method for restricting use of file, information processor and program
EP1794662B1 (en) A method and apparatus for assigning access control levels in providing access to networked content files
JP2008522292A (en) Method for controlling access between multiple network endpoints based on trust score calculated from information system component analysis
CN111988292B (en) Method, device and system for accessing Internet by intranet terminal
MXPA04002415A (en) Network zones.
US20150032793A1 (en) Information processing apparatus
US20100146070A1 (en) Filtering transferred data
TWI339342B (en) Method for sharing data
JP2009080561A (en) External device management system
JP4598707B2 (en) RECORDING DEVICE WITH INFORMATION PROTECTION FUNCTION, INFORMATION PROTECTION SYSTEM USING THE SAME, AND METHOD THEREOF
JP4728871B2 (en) Device quarantine method, quarantine device, aggregate client management device, aggregate client management program, network connection device, and user terminal
JP2019125347A (en) Storage device, data sharing system, and data sharing method
TW201206138A (en) Network device and log-on method thereof
JP2009059158A (en) External device management system
TWI438643B (en) Electronic key system
US20080104239A1 (en) Method and system of managing accounts by a network server
TWI230865B (en) Method for users to access records