WO2008119273A1 - Procédé pour libérer et télécharger un fichier, serveur de gestion, terminal et système - Google Patents

Procédé pour libérer et télécharger un fichier, serveur de gestion, terminal et système Download PDF

Info

Publication number
WO2008119273A1
WO2008119273A1 PCT/CN2008/070277 CN2008070277W WO2008119273A1 WO 2008119273 A1 WO2008119273 A1 WO 2008119273A1 CN 2008070277 W CN2008070277 W CN 2008070277W WO 2008119273 A1 WO2008119273 A1 WO 2008119273A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
user
server
file
message
Prior art date
Application number
PCT/CN2008/070277
Other languages
English (en)
Chinese (zh)
Inventor
Peng Hu
Xiangxin Yu
Original Assignee
Tencent Technology (Shenzhen) Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology (Shenzhen) Company Limited filed Critical Tencent Technology (Shenzhen) Company Limited
Publication of WO2008119273A1 publication Critical patent/WO2008119273A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Definitions

  • P2P Peer-to-Peer
  • a P2P network is a distributed network in which users share some of the resources (processing power, storage capacity, network connectivity, printers, files, etc.) owned by their computers. These shared resources can be directly accessed by other users without the need of a network.
  • the user can be either a resource provider (Server) or a resource acquirer (Client), so the user is a peer-to-peer relationship.
  • P2P technology makes full use of a large number of computer resources at the edge of the network, including distributed storage space, CPU time, information content and other resources, thereby effectively reducing the load on centralized servers and improving the availability of services.
  • Each user is abstracted as a node in the network.
  • Each node in the P2P network is logically equivalent. That is, the server and the client are no longer clearly distinguished in the system, and data can be directly transmitted between the nodes in the system without Need to pass the intermediate server.
  • the peer-to-peer weakening of the P2P model even removes the dependence of the distributed nodes on the centralized server, breaking through the bottleneck of the server and enhancing the scalability of the network.
  • the user is connected to the management server and can be a shared user and a download user.
  • the role distinction is valid only in the one-way process of sharing or downloading.
  • a shared user can also be a download user of their non-shared content.
  • Figure 1 the operation flow chart of the file sharing system shown in Figure 1:
  • Step 101 and step 102 are the publishing process of the shared file:
  • Step 101 The shared user sends the shared information to the management server, where the shared information includes: shared user network connection information of the shared file, file name, file size, and file summary (refers to a fixed length of data obtained by processing the file according to a standard algorithm)
  • the digests obtained when using the same message digest algorithm are fixed-length (for example, 128 bits), and the digests obtained by different files have the same probability of being very small, so they can be used as file identifiers.
  • Common algorithms For example, MD5, SHA, etc.
  • the function of using the file digest is to perform verification, and the obtained file is obtained by the message digest algorithm, and then compared with the published digest, it can be judged whether the downloaded file is transmitted. Error), file fragmentation information, release time of shared files, etc.
  • Step 102 The management server saves the shared information published by the shared user in an appropriate data structure.
  • Steps 103 to 106 are the download process of the shared file:
  • Step 103 The download user initiates a shared file query request to the management server, where the request includes the file name of the shared file.
  • Step 104 The management server local query obtains shared user network connection information of one or more shared files.
  • Step 105 The management server feeds back to the download user the shared user network connection information of the one or more shared files.
  • Step 106 The download user establishes a connection with one or more shared users and starts sharing file transfers.
  • the process specifically sends a download request to one or more shared users, and one or more shared users feed back a connection request to start sharing file transfers.
  • this sharing mechanism has no user management and control mechanism, so the shared file can be Query and download from any user connected to the management server.
  • users can now set up their own private non-public intra-group servers by means of some public P2P platforms. Each member of the group will have its client's
  • the P2P access server address is set to a private, non-public intra-group server address, thus establishing a specific group of P2P sharing platforms.
  • the operation process is basically the same as the process shown in FIG. 1, except that the members in the group are required to preset a private non-public intra-group server address, and the sharing and downloading process will not be described here.
  • the prior art has built a private server so that users outside the group cannot know the existence of the private server.
  • the prior art also has the following problems:
  • A only wants to share files with users B and C. This method is still not implemented. Therefore, the existing technology only realizes the controllability of file sharing in a certain sense, and does not really implement the file sharing mode controlled by the user.
  • the present invention provides a file publishing and downloading method, a file sharing system, a management server, and a terminal.
  • the main technical solutions are as follows:
  • the present invention provides a file publishing method, the method comprising the following steps: a terminal for providing a downloadable file sends a first message to a first server, the first message carrying a file name of the downloadable file and at least one allowed to be downloaded The identifier of the user; the first server acquires network connection information of the terminal;
  • the first server saves the information of the downloadable file, including: a file name, network connection information of the terminal, and an identifier of at least one user who is allowed to download.
  • the present invention also provides a file downloading method, in which the first server saves information of at least one downloadable file, including: a file name, network connection information of the first terminal providing the downloadable file, and at least one The identity of the user who is allowed to download; this method includes the following steps:
  • the first server sends a first message to the second terminal, where the user corresponding to the second terminal is allowed to download the downloadable file, and the first message carries the file name of the downloadable file and the network connection information of the corresponding first terminal;
  • the second terminal downloads the downloadable file from the first terminal according to the network connection information of the first terminal.
  • the present invention provides a system for implementing file sharing, the system comprising: at least one first terminal providing a downloadable file, configured to send a first message to a first server, the first message carrying a file name of the downloadable file And an identification of at least one user who is allowed to download;
  • a first server configured to acquire network connection information of the first terminal, and save information of the downloadable file according to the first message from the first terminal, including: a file name, network connection information of the user terminal that provides the downloadable file, at least one The identifier of the user who is allowed to download, and sends a second message carrying the file name of the downloadable file and the network connection information of the corresponding first terminal;
  • At least one second terminal requesting to download the file configured to receive the second message from the first server, and download the downloadable file from the first terminal according to the network connection information of the first terminal carried by the received second message.
  • the present invention provides a file management server, the server includes the following unit: an uploading unit, configured to receive a first message sent by a terminal that provides a downloadable file, and obtain network connection information of the terminal, where the first message carries a downloadable file a file name and an identification of at least one user who is allowed to download;
  • a policy library configured to store information of the at least one downloadable file received by the uploading unit, including: a file name, network connection information of the terminal that provides the downloadable file, and an identifier of the at least one user that is allowed to download; a downloading unit, configured to receive a second message sent by the terminal that requests the download, where the second message carries the file name of the downloadable file and the identifier of the user requesting the download, and the query policy library, if the user requesting the download is allowed to download the file name corresponding to The downloadable file sends a message carrying the file name of the downloadable file and the network connection information of the corresponding terminal to the terminal requesting the download.
  • the invention also provides a terminal, the terminal comprising the following units:
  • a policy library configured to save information of at least one downloadable file, including a file name of the downloadable file, and at least one identifier of a user who is allowed to download the downloadable file,
  • the first unit is configured to send a first message to the first server, where the first message carries the file name of the downloadable file and the identifier of the at least one user that is allowed to download.
  • FIG. 2 is a structural diagram of a system for implementing file sharing controllable according to the present invention.
  • FIG. 3 is a flowchart of a shared file distribution according to Embodiment 1 of the present invention.
  • FIG. 4 is a flow chart of issuing a shared file for adding a temporary key according to Embodiment 2 of the present invention.
  • FIG. 5 is a flowchart of implementing a sharing invitation according to Embodiment 3 of the present invention.
  • FIG. 6 is a flowchart of downloading a shared file according to Embodiment 4 of the present invention.
  • FIG. 7 is a flowchart of downloading a shared file of a temporary key according to Embodiment 5 of the present invention.
  • FIG. 8 is a schematic structural diagram of a management server for implementing file sharing control according to Embodiment 6 of the present invention.
  • FIG. 9 is a schematic structural diagram of a terminal for implementing file sharing controllable according to Embodiment 7 of the present invention.
  • Mode for Carrying Out the Invention The embodiment of the present invention provides a P2P file sharing and downloading method and system with file access control function, and implements a sharing invitation mechanism on a controllable basis.
  • the invention is achieved by the following embodiments:
  • all users in the entire system can be either a user who downloads a shared file or a user who publishes a shared file, and the role distinction is valid only in the one-way process of sharing or downloading.
  • FIG. 2 it is a network system architecture diagram of the present invention; the system includes a login server 1, a management server 2, and a user terminal 3.
  • the management server 2 is also configured with a global access control policy base (Global Access-control Policy Information Base), which is used to store the identity of all users and the information required by the corresponding user identifier in the sharing control, and has users in it.
  • the management server is assisted in effective filtering when requesting to download the shared file; the user terminal 3 is configured to download the permission of the local access controller to the shared file.
  • the network system architecture adds a login server based on the original centralized/semi-distributed structure.
  • the login server is set up by the service provider and does not need to be set up by the user himself, and the login server can be used by all users.
  • Embodiment 1 see Figure 3, for the flow chart of the shared file:
  • Step 301 The shared user terminal 1 sends the ID (identification) of the shared user 1 and the network connection information of the shared user 1 to the login server through the network.
  • Step 302 The login server verifies whether the information is correct. If it is correct, the shared user 1 passes the verification, and sends the network connection information of the management server to the shared user terminal 1; if not, the process ends.
  • Step 303 The login server will share the ID of the user 1 and the shared user 1 network connection letter.
  • the information is sent to the management server; the management server saves this information accordingly.
  • Step 304 The shared user terminal 1 sends a file-sharing request message of the shared file A to the management server, where the message includes: a shared user identifier, a file name A of the shared file, and a file capable of downloading the shared file.
  • User ID such as User 2.
  • the terminal sends the network connection information of the shared user 1 to the login server.
  • the login server forwards the network connection information to the management server.
  • the network connection information of the shared user 1 may also be directly sent by the terminal to the management server in the sharing request message.
  • Step 305 The management server receives the request, and correspondingly saves the shared file name A and the user identifier 2 capable of downloading the shared file by sharing the user identifier 1.
  • the sharing request message when the sharing request message is sent, the shared file expiration date is further included; then, when the management server receives the information, the management server can only share the file within a prescribed period of time, exceeding The specified period of time cancels the sharing status of the file. Since most of the steps are the same as the above process, it will not be repeated here.
  • a temporary key can be generated by the login server after the shared user 1 authenticates by the login server.
  • the management server adds a temporary key set (Temporary Key Set). ), it is used to save all the temporary keys and to receive the temporary key sent by the user.
  • the authentication is valid.
  • the local access control policy library configured by the user terminal can also perform the risk certificate with the downloaded user through the temporary key.
  • Embodiment 2 referring to FIG. 4 is a flow chart for issuing a temporary key:
  • Step 401 The shared user terminal 1 sends the ID (identification) of the shared user 1 and the network connection information of the shared user 1 to the login server through the network.
  • Step 402 The login server verifies whether the information is correct. If it is correct, the user is shared. 1 Pass the verification and send the network connection information of the management server to the shared user terminal 1; if it is incorrect, the process ends.
  • Step 403 The login server generates a temporary key to the shared user 1, and feeds back the temporary key to the shared user terminal 1.
  • Step 404 The login server sends the ID of the shared user 1, the shared user 1 network connection information, and the temporary key of the shared user 1 to the management server; the management server saves the information correspondingly.
  • Step 405 The shared user terminal 1 sends a shared file request message of the shared file A to the management server, where the message includes: a shared user identifier 1, a file name A of the shared file, and a user identifier 2 capable of downloading the shared file, and the shared user 1 Temporary key and shared file expiration date.
  • Step 406 The management server verifies whether the temporary key is legal. If yes, the other information is correspondingly saved by using the shared user ID, and the file is set to the shared state within the validity period of the shared file.
  • the shared user may use the temporary key to encrypt the shared file request message carrying the temporary key when the shared user 1 sends the sharing request;
  • the management server receives the shared file request sent by the shared user 1, the legality of the shared file request message carrying the temporary key is decrypted and then the risk of the temporary key is decrypted, and most steps are the same as in the above process. This is no longer exhaustive.
  • the corresponding invitation module may be extended in the sharing management module to implement the information that the shared user sends an invitation to download to the downloading user.
  • the function is implemented by creating a queue for each user ID.
  • Each element in the queue includes an inviter that provides content and sends a sharing invitation, that is, a shared user ID, and also includes a shared user network connection address of the associated shared file. .
  • This queue only saves the invitation event to be sent. Once a sharing invitation is sent to the invited user, the invitation event is removed from the queue. That is to say, if the invited user is online, the invitation will be received, and the invitation will be deleted from the queue.
  • the online management server If the online management server is not online, the invitation will be saved until the user goes online and then the invitation is distributed and deleted from the queue; Or you can set a certain time limit.
  • the management server automatically deletes the invitation from the queue when the invitation exceeds a certain limit.
  • Embodiment 3 Referring to FIG. 5, the method for implementing the sharing invitation is as follows:
  • Step 501 The shared user terminal 1 sends the ID (identification) of the shared user 1 and the network connection information of the shared user 1 to the login server through the network.
  • Step 502 The login server verifies whether the information is correct. If the user is correct, the shared user 1 passes the verification, and sends the network connection information of the management server to the shared user terminal 1; if not, the process ends.
  • Step 503 The login server generates a temporary key for the shared user 1, and feeds back the temporary key to the shared user terminal 1.
  • Step 504 The login server sends the shared user ID, the shared user 1 network connection information, and the temporary key of the shared user 1 to the management server; the management server saves the information correspondingly.
  • Step 505 The shared user terminal 1 sends a shared file request message of the shared file A to the management server, where the message includes: a shared user identifier, a file name A of the shared file, and a user identifier 2 capable of downloading the shared file, and the shared user 1 Temporary key and shared file expiration date; simultaneously send invitation download information carrying the invitation to download the user ID.
  • the user terminal 1 may also send the invitation download information when the shared file is published, and may send the file carrying the file name A of the shared file and the invited user identifier at any time within the expiration date of the shared file, inviting the user to download the share. file.
  • Step 506 The management server verifies whether the temporary key is legal; if yes, by sharing The user ID saves other information correspondingly, sets the file to be in the shared state within the expiration date of the shared file, and determines whether the invitation downloading user carried in the invitation downloading information is online, sends the invitation downloading information to the online invitation downloading user, and simultaneously sends the sharing.
  • the file name, the shared user network connection information, and the shared user identifier are deleted, and the invitation download information is deleted after being sent; the user ID is downloaded, and the shared file name, the shared user network connection information, and the shared user identifier are saved correspondingly; During the preset expiration date, when the user who invites the download is online, it is sent to the user terminal that invites the download, and the saved invitation download information is deleted.
  • Step 601 Downloading the user terminal 2 sends the ID (ID) of the downloading user 2 and the downloading user 2 network connection information to the login server through the network.
  • Step 602 The login server verifies that the information is correct, and if correct, downloads the user.
  • Step 603 The login server sends the ID of the download user 2 and the download user 2 network connection information to the management server; the management server saves the information correspondingly.
  • Step 604 The download user terminal 2 sends a file-downloading request message of the shared file A to the management server, and the message includes: downloading the user identifier 2, the file name A of the shared file, which is very common to those skilled in the art. It is easy to infer that the shared file name A in the download request message can also be any information that can identify the shared file, such as a keyword or file identifier of the file name.
  • Step 605 The management server receives the request, and finds information that is allowed to be downloaded by the user.
  • the search message is sent to the download user 2, and the message includes: a shared file name A, a user identifier 1 of the shared file A, and a network of the shared user 1. Connection information.
  • Step 606 The download user terminal 2 transmits a download request carrying the shared file name A to the shared user 1, and the shared user 1 transmits the shared file A to the download user 2 in response to the request.
  • Embodiment 5 Corresponding to Embodiment 2, the local access control policy library configured by the user terminal can further carry out further identity insurance for the user who requests the download through the temporary key, thereby enhancing security. See Figure 7 for a flowchart for adding a temporary key download:
  • Step 701 The download user terminal 2 sends the ID of the download user 2 and the download user 2 network connection information to the login server through the network.
  • Step 702 The login server verifies whether the information is correct. If it is correct, the download user 2 passes the verification and feeds back to the management server network connection information, and if not, the process ends.
  • Step 703 The login server generates a temporary key for the download user 2, and feeds back the temporary key to the shared user terminal 2.
  • Step 704 The login server sends the ID of the download user 2, the shared user 2 network connection information, and the temporary key of the shared user 2 to the management server; the management server saves the information correspondingly.
  • Step 705 The shared user terminal sends a download file request message of the shared file A to the management server, and the message includes: downloading the user identifier 2.
  • the file name A of the shared file is a download file request message of the shared file A.
  • Step 706 The management server receives the request, and finds information that is allowed to be downloaded by the user.
  • the search message is sent to the download user 2, and the message includes: a shared file name A, a user identifier of the shared file A, and a network sharing the user 1.
  • Step 707 The download user terminal sends a download request carrying the shared file name A to the shared user 1, and also includes the temporary key of the shared user 1 obtained by the download user 2.
  • Step 708 The shared user terminal 1 transmits the shared file A to the download user 2 after the temporary key certificate issued by the download user 2 is successful.
  • the user 2 After receiving the temporary key, the user 2 encrypts the temporary key; when the shared user 1 receives the download request sent by the download user 2, the temporary key is decrypted and then the validity of the temporary key is verified, since most The steps are the same and will not be repeated here.
  • Embodiment 6 corresponding to Embodiment 3, the downloading process when the downloading user receives the invitation downloading information is as follows:
  • Step 801 After the login is authenticated by the login server, it is determined whether the invitation download information is received, and the invitation download information includes: a shared user identifier 1, a shared file name A, a shared user 1 network connection information, and the like; ; If yes, go to step 803.
  • Step 802 Continue to perform regular information interaction with the management server.
  • Step 803 Ignore the request or establish a connection with the shared user terminal 1 to download the shared file. If the shared user 1 is offline or the shared user terminal 1 has not shared the file A at this time, the management server can return to the shared user 2 another user who has a copy of the shared file A and allows access thereto.
  • the establishment of the connection described in this step may be a relatively complicated process, such as decryption, description, and no further description here.
  • the management server may further feed back the management server, and the management server further adds the download user identifier 2, the download user network connection information, and the shared file name A to the shared file A.
  • User information; or in the process of downloading the shared file A by the downloading user 2, the downloading user identifier 2, the downloading user network connection information, the shared file name A, and the download progress are fed back to the management server.
  • the management server After receiving the above feedback, the management server notifies the other users who download the file A. Other downloaded users can connect to the download user 2 to download the shared file A through the network connection information saved by the management server, thereby improving the download speed of other download users. This allows the same file to have a succession in the shared control strategy.
  • the shared file can be Set to shared state for other users to download.
  • the download user can further feed back to the management server the user ID that is allowed to be accessed.
  • the downloaded file can be downloaded to the user terminal where the user 2 is located, that is, the shared file.
  • a copy of A is set to the shared state, and feedback to the management server is able to download the user ID of copy B, which further enhances the inheritance of file controllable sharing.
  • the user can also perform the unshared operation on the shared file: for example, the shared user 1 authenticates by logging in to the server, and the login server sends the user identifier and the user network connection information to the management server for saving, and then shares the user.
  • the information includes: a shared file name and a shared user identifier; after receiving the unshared message, the management server unshares the corresponding file. After the temporary key is added, the operation of canceling the sharing can be changed according to Embodiment 2, and will not be described here.
  • the user authenticates by logging in to the server. After the login server sends the user ID and the user network connection information to the management server for storage, the user sends a statistics request to the management server for the shared file.
  • the management server collects all available shared file information shared by the user ID and gives feedback to the user.
  • the available shared information includes available connection information after other users have downloaded the file. That is to say, in addition to the user identifier and network connection information that originally shared the shared file, the shared information may include other network connection information and user identifier of the user who downloaded the file.
  • the shared file When the user logs in on multiple terminals, it is possible that the shared file is placed on the terminal that is not currently logged in, causing other users to fail to download the shared file according to the network connection information when the user issues the shared file. And if similar invalid network connection information increases, Will affect the efficiency of user downloads.
  • the user can clearly understand which network connection information of the shared file is valid, and the network connection information of the shared files is invalid, but the network connection information of the copy is still valid, so that the user can take the initiative. Cancel shared files that have no valid network connection information, improving the efficiency of sharing.
  • the user can further strengthen the control and management of the shared files, such as increasing or decreasing the user ID of the downloadable shared file, or inviting other users to download the shared file.
  • the login server 1 is configured to store all user identifiers; receive the user identifier sent by the user terminal 2, verify whether the user identifier is legal, and if yes, send the user identifier and the user network connection information to the management server 2; and manage the server network connection information. Send to user terminal 2.
  • the management server 2 is configured to save the user identifier sent by the login server 1 and the user network connection information; receive and share the sharing request message sent by the user, where the message includes: a file name of the shared file and a user identifier capable of downloading the shared file; Receiving a request download message sent by the user, the message carrying the file name of the file to be downloaded and the user identifier; after receiving the request to download the message, searching for the information that the user is allowed to download, and sending the response message to the downloading user after searching
  • the message includes: a shared file name, a user ID that shares the file, and network connection information.
  • the user terminal 3 is configured to send a user identifier to the login server 1; send the sharing request message or request a download message to the management server 2; receive a download request sent by another user terminal, and transmit the shared file to other user terminals.
  • the function of the temporary key is added. Therefore, the login server 1 is further used on the basis of the above functions to correspond to the user identifier after receiving the user identifier. A temporary key is generated; and the temporary key is transmitted to the user terminal 3 and the management server 2.
  • the management server 2 further saves the temporary key on the basis of the above function; after receiving the temporary key sent by the user terminal and the sharing request message, confirming the local presence and the temporary key sent by the received user terminal.
  • the sharing request message is saved after the same temporary key; when the response message is sent to the user terminal, the method further includes: sharing the temporary key of the file user.
  • the user terminal 3 is further configured to receive the temporary key sent by the login server and save the user terminal 3 on the basis of the foregoing function; send the temporary key while transmitting the sharing request message to the management server 2; When the terminal sends the download request, the temporary key of the other user is further included; when the download request including the temporary key sent by another user is received, the shared file is transmitted to other user terminals after passing the key insurance.
  • the management server 2 adds an invitation module.
  • the user terminal 3 is further configured to: when the sharing request message is sent to the management server 2, the invitation downloading information carrying the downloaded user identifier is also sent; after the user identifier of the login server 1 is verified, it is determined whether the invitation downloading information is received.
  • the information includes the shared file name of the invitation download, the shared user network connection information, and the shared user identifier; if not received, the download user performs regular information interaction with the management server; if received, establishes a connection with the shared user to download the shared file or ignore the invitation. After downloading the information, the download user performs regular information interaction with the management server.
  • the invitation module of the management server 2 is configured to determine, when the sharing request message is saved, whether the user who invited the download is online, and send the invitation downloading information carrying the shared file name, the shared user network connection information, and the shared user identifier to the online invitation downloading user. Downloading the user ID of the offline invitation and saving it corresponding to the invitation download information; and sending the user who invites the download to the user within the preset validity period, and deleting the save The invitation to download the information.
  • the user terminal 3 is further configured to: after the management server saves the user identifier sent by the login server and the user network connection information, send a cancel sharing message to the management server, where the message includes: a shared file name and a shared user identifier.
  • the global access control policy library of the management server 2 is further configured to search for the shared file after receiving the unshared message, cancel the sharing of the file, and delete the shared information of the file. It is also possible to delete not only the shared file entry of the shared user but also the shared file entry of the other user who shared the file by default by downloading the file, that is, the shared copy of the other user is also canceled. This is also derived from the inheritance of shared messages.
  • the statistics here refer to the basic information of all the files shared by the user, including those shared and shared on other machines, and the availability of each file.
  • This article proposes the sharing of the user login mode, so it is assumed that user A has logged in on one computer and shared a file of that computer. When user A logs out and logs in on another computer, he can still view it.
  • the basic information such as the file name shared previously, but because the user terminal changes, the user A himself cannot actually read the file that was shared.
  • B is both a service consumer (downloading file usage) and a service provider (which serves to extend the availability and transit of files).
  • the management server still considers the file available and tells A.
  • the user terminal 3 is further used by the management server 2 to save the login server. After the user identifier is connected to the user network, the user is sent a request to the management server to collect the shared file identifier.
  • the management server 2 is further configured to: after receiving the statistical request, collect statistics about all available shared files shared by the user identifier, and feed back the information to the user terminal 1.
  • Embodiment 6 Referring to FIG. 8, an implementation of the present invention provides a file management server including an uploading unit 902, a downloading unit 903, and a policy library 901.
  • the uploading unit 902 is configured to receive the first message sent by the terminal that provides the downloadable file, where the first message carries network connection information of the terminal, a file name of the downloadable file, and an identifier of at least one user that is allowed to be downloaded.
  • the policy library 901 is configured to store information of the at least one downloadable file received by the uploading unit 902, including: a file name, network connection information of the terminal providing the downloadable file, and an identifier of at least one user allowed to download.
  • the download unit 903 is configured to receive the second message sent by the terminal requesting the download. The name of the file carrying the downloadable file in the second message and the identifier of the user requesting the download.
  • the downloading unit 903 queries the policy library 901, and if the user requesting the download is allowed to download the downloadable file corresponding to the file name, sends a message carrying the file name of the downloadable file and the network connection information of the corresponding terminal to the terminal requesting the download. .
  • the identifier of the user who issues the downloadable file may further be carried in the first message received by the uploading unit 902.
  • the policy library 901 may be further configured to save an identifier of a user who publishes the downloadable file; wherein, the identifier of each user who issues the downloadable file corresponds to information of the at least one downloadable file.
  • the file management server may further include an invitation unit 904.
  • the invitation unit 904 is configured to receive a third message carrying the identity of the user invited to download.
  • the third message carries the identifier of the user who is invited to download and the file name of the downloadable file.
  • the inviting unit 904 searches the policy library 901 for the information of the downloadable file corresponding to the file name of the downloadable file, and sends the file name carrying the downloadable file and the user who issues the downloadable file to the user who is invited to download when the user is online. Identify and publish downloadable files The message of the network connection information of the terminal corresponding to the user.
  • the policy library 901 is further configured to set the downloadable file corresponding to the file name carried by the first message to a shared state, and cancel the set sharing state according to the indication.
  • the management server may further include a sharing cancellation unit 905.
  • the sharing cancellation unit 905 is configured to receive the fourth message sent by the terminal.
  • the fourth message includes the file name and the identity of the user who posted the downloadable file.
  • the sharing cancel unit 905 searches the policy library 901 for a downloadable file corresponding to the file name and the identifier of the user who posted the downloadable file, instructing the policy library 901 to cancel the sharing state of the downloadable file.
  • the management server further includes a statistics unit 906.
  • the statistic unit 906 is configured to receive a statistical request for carrying the identifier of the user sent by the terminal.
  • the statistic unit 906 queries the policy library 901, and counts all downloadable files with available network connections in the downloadable file that the user corresponding to the user's identifier corresponds to, and sends the statistics to the terminal.
  • the management server also includes a password set 907.
  • the password set 907 is configured to receive the temporary key sent by the login server and the terminal, and verify whether the temporary key sent by the terminal is legal. If it is legal, the policy database 901 is saved to save the network connection information of the terminal that can download the file, and the file of the downloadable file. And the identifier of the at least one user who is allowed to download, and sends a message carrying the temporary password to the terminal requesting the download.
  • Embodiment 7 Referring to FIG. 9, an embodiment of the present invention provides a terminal.
  • the terminal includes a policy library 1001 and a first unit 1002.
  • the policy library 1001 is used to save information of at least one downloadable file. This information includes the file name of the downloadable file and the identity of at least one user who is allowed to download the downloadable file.
  • the first unit 1002 is configured to send the first message to the first server. The first message carries the network connection information of the terminal, the file name of the downloadable file, and the identifier of at least one user who is allowed to download.
  • the terminal further includes a second unit 1003.
  • the second unit 1003 is for the second The server sends a message carrying the identifier of the user corresponding to the terminal to perform identity verification, and receives a message returned by the second server that carries the network connection information of the first server.
  • the policy library 1001 is further configured to save the network connection information of the first server received by the second unit 1003.
  • the first unit 1002 is configured to send the first message to the first server according to the network connection information of the first server saved by the policy library 1001.
  • the terminal may further include a third unit 1004.
  • the third unit 1004 is configured to receive a message carrying the temporary key returned by the second server.
  • the policy library 1001 is further used to save the temporary key received by the third unit 1004.
  • the first unit 1002 is further configured to further carry the temporary key saved by the policy library 1001 in the first message sent to the first server for validity verification.
  • the terminal may further include a fourth unit 1005.
  • the fourth unit 1005 is configured to receive a message carrying a temporary key request to download the downloadable file.
  • the fourth unit 1005 downloads the downloadable file according to the temporary key verification request saved by the policy library, and if the verification passes, allows downloading the downloadable file.
  • the terminal may further include a message for sending a file name carrying the downloadable file and an identifier of the user corresponding to the terminal to the first server, and downloading and downloading according to the network connection information of the terminal that provides the downloadable file returned by the first server.
  • the unit of the file may be a message for sending a file name carrying the downloadable file and an identifier of the user corresponding to the terminal to the first server, and downloading and downloading according to the network connection information of the terminal that provides the downloadable file returned by the first server.
  • the above terminal may further include any one or any of the following units: a unit for transmitting a message carrying the identifier of the user who is invited to download and the file name of the downloadable file to the first server to invite the unit to download the downloadable file ;
  • the embodiment of the present invention adopts a login method of the user identifier, and adopts a global access control policy and a method for the local access control policy of the user terminal, that is, the user can select the rights to share files to which users, so that the management server When searching for the download request information, only the shared file information that the user is allowed to download is searched, and the file sharing mode controlled by the user is realized.
  • the login server is added, it is not required for the service provider to set up the server itself, and does not increase the hardware or system overhead of the user.
  • the temporary key is added, and the temporary key is encrypted.
  • the user needs to perform verification during the process of downloading and downloading, which enhances the security of file downloading and publishing. It also increases the time control of the shared files, which can reduce the storage pressure of the management server to a certain extent.
  • the introduction of the login server improves the security of file publishing and downloading.
  • the user does not log in to the server, if the user knows the network connection information of the management server, the user selects which users to share the file with, so that the management server only searches for the shared file information that the user is allowed to download when searching for the download request information. It is also possible to implement a file sharing method controlled by the user.
  • the embodiment of the present invention further provides an invitation mechanism, so that the user can obtain the shared information in time; the function of canceling sharing and counting the shared information further improves the file sharing and download controllable.
  • the method and system have improved user satisfaction.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

L'invention concerne un procédé pour libérer un fichier. Le procédé comporte la transmission d'un premier message d'un terminal utilisé pour fournir un fichier téléchargeable au premier serveur, le premier message portant un nom de fichier du fichier téléchargeable et des identifiants d'au moins un utilisateur autorisé à télécharger ; le premier serveur obtient des informations de connexion de réseau du terminal ; le premier serveur met en mémoire les informations des fichiers téléchargeables, comprenant un nom de fichier, des informations de connexion de réseau d'un réseau et des identifiants d'au moins un utilisateur autorisé à télécharger. L'invention concerne également un procédé pour télécharger un fichier. Le procédé comporte la transmission d'un premier message par le premier serveur au second terminal, le premier message portant un nom de fichier du fichier téléchargeable, et des informations de connexion de réseau correspondantes du premier terminal ; le second terminal télécharge le fichier téléchargeable du premier terminal en fonction d'informations de connexion de réseau du premier terminal. L'invention concerne un système, un serveur de gestion et un terminal correspondant au procédé de libération et de téléchargement. Un partage contrôlable pour des fichiers est réalisé par le schéma.
PCT/CN2008/070277 2007-03-30 2008-02-04 Procédé pour libérer et télécharger un fichier, serveur de gestion, terminal et système WO2008119273A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200710090664 CN101068245B (zh) 2007-03-30 2007-03-30 共享文件的发布、下载方法及文件共享可控***
CN200710090664.1 2007-03-30

Publications (1)

Publication Number Publication Date
WO2008119273A1 true WO2008119273A1 (fr) 2008-10-09

Family

ID=38880681

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/070277 WO2008119273A1 (fr) 2007-03-30 2008-02-04 Procédé pour libérer et télécharger un fichier, serveur de gestion, terminal et système

Country Status (2)

Country Link
CN (1) CN101068245B (fr)
WO (1) WO2008119273A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657281A (zh) * 2016-11-24 2017-05-10 腾讯科技(深圳)有限公司 文件共享方法及装置
CN113873048A (zh) * 2020-06-12 2021-12-31 腾讯科技(上海)有限公司 应用下载平台中应用包的下载方法及***

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068245B (zh) * 2007-03-30 2011-07-06 腾讯科技(深圳)有限公司 共享文件的发布、下载方法及文件共享可控***
CN101729442B (zh) 2008-10-23 2013-03-20 华为技术有限公司 一种实现内容共享的方法和装置
CN101764831B (zh) * 2008-12-24 2012-09-19 ***通信集团公司 一种流媒体数据共享方法、共享***和流媒体节点
CN101662496B (zh) * 2009-09-21 2013-04-03 中兴通讯股份有限公司 一种利用点对点技术实现文件共享的***及方法
CN101673300B (zh) * 2009-09-29 2011-06-29 金蝶软件(中国)有限公司 一种序时簿方案的共享方法、装置和erp***
US20110252371A1 (en) * 2010-04-13 2011-10-13 Sony Corporation System and method for fast boot of computer
CN101867694A (zh) * 2010-05-21 2010-10-20 中兴通讯股份有限公司 交互式网络电视iptv机顶盒的升级方法及***
CN101969462A (zh) * 2010-09-30 2011-02-09 中国科学院国家天文台 数据发布***和数据发布方法
CN102014167A (zh) * 2010-12-16 2011-04-13 国家广播电影电视总局广播科学研究院 一种基于p2p方式的数据分享***
CN102594850B (zh) * 2011-01-06 2016-06-01 友讯科技股份有限公司 档案存取及分享***及其方法
CN102098345A (zh) * 2011-02-22 2011-06-15 深圳市同洲电子股份有限公司 一种资源分享方法和业务提供***
CN102651751A (zh) * 2011-02-25 2012-08-29 国基电子(上海)有限公司 文件传送***及其文件传送方法
CN102810064A (zh) * 2011-05-30 2012-12-05 海尔集团公司 用于电器设备的用户侧信息加载方法和电器设备
KR101305062B1 (ko) * 2011-08-05 2013-09-11 (주)네오위즈게임즈 파일 다운로드 네트워크 분산 제어 방법 및 장치
CN102325172A (zh) * 2011-08-30 2012-01-18 中兴通讯股份有限公司 一种移动终端间共享数据的方法、***及控制服务器
CN103166998B (zh) * 2011-12-15 2016-03-23 中国电信股份有限公司 用户信息关联方法、***及服务器
CN102638564A (zh) * 2012-02-16 2012-08-15 深圳市同洲视讯传媒有限公司 一种文档分享装置、分享终端及分享方法
CN103297447B (zh) * 2012-02-24 2019-03-08 腾讯科技(深圳)有限公司 一种资源共享方法及其设备
CN103327469A (zh) * 2012-03-19 2013-09-25 联想(北京)有限公司 一种数据共享方法、***及移动终端
CN102857495B (zh) * 2012-07-13 2015-09-23 深圳市同洲电子股份有限公司 一种文档播放方法和设备
CN102904886A (zh) * 2012-09-26 2013-01-30 曙光信息产业(北京)有限公司 实现文件共享的方法
CN103780642B (zh) * 2012-10-19 2017-08-01 宇瞻科技股份有限公司 网络存储***的文件分享方法
CN102917070B (zh) * 2012-10-30 2016-06-08 北京奇虎科技有限公司 网页分享***
CN103002030B (zh) * 2012-11-26 2016-03-16 北京百度网讯科技有限公司 文件共享的方法和***
CN103200276B (zh) * 2013-04-23 2016-06-29 福建伊时代信息科技股份有限公司 一种文件安全控制的方法和装置
WO2015008300A2 (fr) * 2013-07-19 2015-01-22 Parag Kulkarni Système de partage de fichier/contenu spécifique à une instance, spécifique à un dispositif, spécifique à une durée, spécifique à une vue, spécifique à une estampille temporelle, spécifique à un réseau
CN104469974B (zh) * 2013-09-23 2019-10-29 联想(北京)有限公司 一种信息处理方法及电子设备
CN104519109A (zh) * 2013-09-30 2015-04-15 张永杰 一种多设备间文件共享的方法及装置
CN104639592B (zh) 2013-11-15 2018-09-28 华为技术有限公司 云存储网关间信息同步方法和***、及云存储网关
CN104660641B (zh) * 2013-11-25 2018-05-18 中国直升机设计研究所 一种企业网内部数据传递方法
CN104754012B (zh) * 2013-12-31 2019-02-15 北京新媒传信科技有限公司 一种数据传输方法和数据传输***
CN105577609B (zh) * 2014-10-09 2019-10-22 华为技术有限公司 用于对访问的内容进行控制的方法和装置
US20160173467A1 (en) * 2014-12-15 2016-06-16 Microsoft Technology Licensing, Llc Document collaboration through networking credentials
CN105791333A (zh) * 2014-12-17 2016-07-20 深圳云之家网络有限公司 一种业务处理方法以及用户端
CN106453448A (zh) * 2015-08-06 2017-02-22 北京奇虎科技有限公司 用于下载目标文件的方法及装置
US10775972B2 (en) * 2016-04-01 2020-09-15 Microsoft Technology Licensing, Llc Techniques to control notifications for content items in a collaboration platform
CN105791436A (zh) * 2016-04-28 2016-07-20 杭州亿方云网络科技有限公司 一种文件同步***及其同步方法
CN106203060A (zh) * 2016-06-27 2016-12-07 乐视控股(北京)有限公司 一种数据处理方法及装置
KR101961644B1 (ko) * 2017-05-19 2019-03-25 소프트캠프(주) 데이터 분산형 통합 관리시스템
CN107659491A (zh) * 2017-10-23 2018-02-02 林楚莲 一种基于即时通讯的群组文件共享方法及***
CN110830522A (zh) * 2018-08-07 2020-02-21 石悌君 一种共享存储***
CN110889131B (zh) * 2018-09-11 2022-04-05 北京金山办公软件股份有限公司 一种文件共享***
CN109361687A (zh) * 2018-11-16 2019-02-19 上海二三四五网络科技有限公司 一种p2p私网控制方法及控制装置
CN111324588A (zh) * 2018-12-17 2020-06-23 中兴通讯股份有限公司 一种共享文件的方法及装置
CN112187483A (zh) * 2019-07-03 2021-01-05 西安诺瓦星云科技股份有限公司 节目发布方法和节目发布***
CN112702306B (zh) * 2019-10-23 2023-05-09 ***通信有限公司研究院 智能服务共享的方法、装置、设备和存储介质
CN111212080B (zh) * 2020-01-10 2022-05-24 深圳市铭濠科技有限公司 一种安全认证方法、认证***及其应用
CN111212149A (zh) * 2020-01-15 2020-05-29 上海擎感智能科技有限公司 终端信息共享方法及***
CN111556079B (zh) * 2020-05-18 2022-03-22 曲阜师范大学 基于身份加密的可控匿名通信方法
CN113162975B (zh) * 2021-03-04 2023-04-14 西安电子科技大学 共享移动端文件离线下载***、方法、存储介质及设备
CN114189505B (zh) * 2021-10-29 2024-04-19 深圳市酷开网络科技股份有限公司 文件共享方法、计算机设备及存储介质
CN114422388B (zh) * 2022-01-24 2023-03-28 北京科软在线科技有限责任公司 一种远程数据监管***

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1517900A (zh) * 2003-01-24 2004-08-04 ������������ʽ���� 用于对等访问的方法和装置
US20070027812A1 (en) * 2005-07-29 2007-02-01 Sony Corporation Content distribution system and content distribution method
CN101068245A (zh) * 2007-03-30 2007-11-07 腾讯科技(深圳)有限公司 共享文件的发布、下载方法及文件共享可控***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1517900A (zh) * 2003-01-24 2004-08-04 ������������ʽ���� 用于对等访问的方法和装置
US20070027812A1 (en) * 2005-07-29 2007-02-01 Sony Corporation Content distribution system and content distribution method
CN101068245A (zh) * 2007-03-30 2007-11-07 腾讯科技(深圳)有限公司 共享文件的发布、下载方法及文件共享可控***

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657281A (zh) * 2016-11-24 2017-05-10 腾讯科技(深圳)有限公司 文件共享方法及装置
CN106657281B (zh) * 2016-11-24 2020-02-28 腾讯科技(深圳)有限公司 文件共享方法及装置
CN113873048A (zh) * 2020-06-12 2021-12-31 腾讯科技(上海)有限公司 应用下载平台中应用包的下载方法及***

Also Published As

Publication number Publication date
CN101068245B (zh) 2011-07-06
CN101068245A (zh) 2007-11-07

Similar Documents

Publication Publication Date Title
WO2008119273A1 (fr) Procédé pour libérer et télécharger un fichier, serveur de gestion, terminal et système
US10785037B2 (en) Managing secure content in a content delivery network
US10623272B2 (en) Authenticating connections and program identity in a messaging system
WO2019237796A1 (fr) Procédé et appareil d'acquisition de ressources, procédé et appareil de distribution de ressources, et procédé et appareil de téléchargement de ressources, ainsi que dispositif et support de stockage
KR100702427B1 (ko) 보안유지되고 액세스 제어된 피어-투-피어 자원 공유 방법및 장치
US7127613B2 (en) Secured peer-to-peer network data exchange
US10484357B1 (en) Method and apparatus for federated single sign on using authentication broker
KR100953095B1 (ko) 슈퍼 피어 기반 p2p 네트워크 시스템 및 이를 위한 피어인증 방법
US8640202B2 (en) Synchronizing user sessions in a session environment having multiple web services
US7966491B2 (en) Protection of the distribution of digital documents in a peer to peer network
WO2013131387A1 (fr) Procédé et dispositif de partage de ressources, et support de stockage
JP5239341B2 (ja) ゲートウェイ、中継方法及びプログラム
US11122122B2 (en) Restricting access to a data storage system on a local network
CN101341691A (zh) 授权与验证
CN103229161A (zh) 连续接入网关和去重数据缓存服务器
WO2012163005A1 (fr) Procédé, appareil et dispositif de passerelle pour accéder à un réseau privé virtuel
US10791119B1 (en) Methods for temporal password injection and devices thereof
KR20120102739A (ko) 비밀 디지털 콘텐츠에 액세스하는 시스템 및 방법
US20090282105A1 (en) P2p data delivery system, p2p data delivery method and p2p data delivery program
JP3731645B2 (ja) エージェント方法及びコンピュータシステム
WO2024103856A1 (fr) Procédé de traitement de données basé sur une chaîne de blocs, et dispositif et support de stockage lisible
Kurokawa et al. Study on the distributed data sharing mechanism with a mutual authentication and meta database technology
WO2024137079A1 (fr) Procédés d'établissement d'une connexion à un serveur avec un certificat mis en mémoire cache et dispositifs associés
CA2605823A1 (fr) Methode et systeme de synchronisation des seances de l'utilisateur
Murthy Design and Implementation of a Gnutella-based Reputation Management System

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08706650

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 6375/CHENP/2009

Country of ref document: IN

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 03-02-2010

122 Ep: pct application non-entry in european phase

Ref document number: 08706650

Country of ref document: EP

Kind code of ref document: A1