Method and system for sharing network disk data
A data and network disk technology, applied in the Internet field, can solve problems such as user inconvenience, and achieve the effect of reducing the difficulty of operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0079] Example 1
[0080] figure 1 The flow chart of the sending method for sharing network disk data. like figure 1 As shown, when the sharer needs to share the shared network disk data to the shared person, the sending method of the shared network disk data includes:
[0081] S1, receive the data sharing instruction of the sharer; the data sharing instruction at least includes the data information of the shared network disk;
[0082] The shared network disk data information includes at least the network address of the network disk data. In addition, the shared online disk data information may also include: online disk data name, creator information, etc., so that the shared person can know the related information of the shared online disk data.
[0083] S2, according to the data sharing instruction, generate the authorization link of the network disk data; the authorization link is used to verify the authorization about the network disk data;
[0084] Here, the authoriz...
Example Embodiment
[0087] Embodiment 2
[0088] Based on the aforementioned design of setting the access permission list for network disk data, we can assign different access permissions to different users in the access permission list. For example, a read-only user can only read the network disk data but cannot modify the network disk data; a read-write user can read and modify the network disk data; In addition to the user function, it can also manage additions and deletions of users in the access permission list, etc. Based on this, the sharer can also set the access authority of the shared person while sharing the network disk data.
[0089] In the step of receiving the data sharing instruction from the sharer, the data sharing instruction further includes: authorization authority information; the authorization authority information is the authorized access authority of the shared person.
[0090] In step S2, a corresponding authorization link is generated according to the authorization au...
Example Embodiment
[0093] Embodiment 3
[0094] In this embodiment, we further provide the sharing person with a solution for managing the timeliness of the generated authorization link.
[0095] In the step of receiving the data sharing instruction from the sharer, the data sharing instruction further includes: authorization link time limit information; the authorization link time limit information is used to limit the time limit of the generated authorization link.
[0096] The authorization link validity period information may define the validity period of the generated authorization link. The shared person who clicks the authorization link within the validity period can obtain the corresponding access authorization, and is no longer authorized after the validity period.
[0097] The authorization link aging information may also limit the authorization times of the generated authorization link. The generated authorization link can only be used to authorize the shareee for a limited number o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap