Method and system for sharing network disk data

A data and network disk technology, applied in the Internet field, can solve problems such as user inconvenience, and achieve the effect of reducing the difficulty of operation

Active Publication Date: 2013-08-14
XIAOMI INC
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of this method is that the shareee must already have the registration ID of the network disk provider, and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for sharing network disk data
  • Method and system for sharing network disk data
  • Method and system for sharing network disk data

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0079] Example 1

[0080] figure 1 The flow chart of the sending method for sharing network disk data. like figure 1 As shown, when the sharer needs to share the shared network disk data to the shared person, the sending method of the shared network disk data includes:

[0081] S1, receive the data sharing instruction of the sharer; the data sharing instruction at least includes the data information of the shared network disk;

[0082] The shared network disk data information includes at least the network address of the network disk data. In addition, the shared online disk data information may also include: online disk data name, creator information, etc., so that the shared person can know the related information of the shared online disk data.

[0083] S2, according to the data sharing instruction, generate the authorization link of the network disk data; the authorization link is used to verify the authorization about the network disk data;

[0084] Here, the authoriz...

Example Embodiment

[0087] Embodiment 2

[0088] Based on the aforementioned design of setting the access permission list for network disk data, we can assign different access permissions to different users in the access permission list. For example, a read-only user can only read the network disk data but cannot modify the network disk data; a read-write user can read and modify the network disk data; In addition to the user function, it can also manage additions and deletions of users in the access permission list, etc. Based on this, the sharer can also set the access authority of the shared person while sharing the network disk data.

[0089] In the step of receiving the data sharing instruction from the sharer, the data sharing instruction further includes: authorization authority information; the authorization authority information is the authorized access authority of the shared person.

[0090] In step S2, a corresponding authorization link is generated according to the authorization au...

Example Embodiment

[0093] Embodiment 3

[0094] In this embodiment, we further provide the sharing person with a solution for managing the timeliness of the generated authorization link.

[0095] In the step of receiving the data sharing instruction from the sharer, the data sharing instruction further includes: authorization link time limit information; the authorization link time limit information is used to limit the time limit of the generated authorization link.

[0096] The authorization link validity period information may define the validity period of the generated authorization link. The shared person who clicks the authorization link within the validity period can obtain the corresponding access authorization, and is no longer authorized after the validity period.

[0097] The authorization link aging information may also limit the authorization times of the generated authorization link. The generated authorization link can only be used to authorize the shareee for a limited number o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for sharing network disk data. The method comprises the following steps: receiving the data sharing instruction of a sharing person, which includes to-be-shared information of the network disk data; generating an authorization link of the network disk data according to the data sharing instruction; receiving the sharing message including the authorization link and sent by the sharing person; verifying the authorization link; and granting a to-be-shared person the authorization of the network disk data corresponding to the related authorization link. The method and the system are used for generating the corresponding authorization link which is used for verifying the authorization according to the to-be-shared network disk data and sending the sharing message including the authorization link to the to-be-shared person. The method and the system actively realize the sharing of the network disk dada under the condition that the sharing person does not need to consider whether the to-be-shared person has a registered ID (Identification) or registers an ID at all, reduce the operation difficulty, and provide convenience for a user.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and system for sharing network disk data. Background technique [0002] Network disk, also known as network U disk, network hard disk, is an online storage service launched by network companies, providing users with Internet-based file storage, access, backup, sharing and other file management functions. No matter where the user is, as long as they are connected to the Internet, they can manage and edit the file data stored in the network disk. The traditional network disk technology has not been well developed due to bottlenecks such as slow transmission speed, low disaster backup and recovery capabilities, poor security, and high operating costs. However, with the application of cloud computing storage technology, it has brought a new revolution to the network disk industry, making the network disk industry an important direction for the development of the Intern...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08
CPCH04L67/10
Inventor 金凡范典李创奇
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products