WO2010135883A1 - 一种实现在web应用中文件上传的方法及系统 - Google Patents

一种实现在web应用中文件上传的方法及系统 Download PDF

Info

Publication number
WO2010135883A1
WO2010135883A1 PCT/CN2009/073938 CN2009073938W WO2010135883A1 WO 2010135883 A1 WO2010135883 A1 WO 2010135883A1 CN 2009073938 W CN2009073938 W CN 2009073938W WO 2010135883 A1 WO2010135883 A1 WO 2010135883A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
server
uploading
client
related information
Prior art date
Application number
PCT/CN2009/073938
Other languages
English (en)
French (fr)
Inventor
田冠伟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/257,970 priority Critical patent/US20120079069A1/en
Priority to RU2011150293/08A priority patent/RU2523216C2/ru
Priority to EP09845099.2A priority patent/EP2432186A4/en
Priority to BRPI0924459A priority patent/BRPI0924459A2/pt
Publication of WO2010135883A1 publication Critical patent/WO2010135883A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Definitions

  • the present invention relates to a file transfer system and method in a WEB application, and more particularly to a method and system for uploading a file from a client to a server in a WEB application.
  • B/S Browser/Server
  • C/S Client/Server
  • WEB application B/S structure
  • the WEB application is the main implementation of the B/S structure.
  • the application system developed by the WEB technology has a problem of concurrent access. As long as the user can connect to the network, the server can be accessed from anywhere through the browser, so the user concurrently accesses
  • the number of the same server is likely to be large, and a large number of users concurrently access, will bring a lot of processing pressure to the server, often there will be insufficient resources (CPU is occupied 100%, memory overflow, insufficient connection, etc.) .
  • the concurrent access peak period WEB will have a very high pressure on the database connection.
  • Each query and every operation of the client user needs a database connection, and the number of connections that the database server can provide is very limited. At this time, it is easy to see that the connection is not enough.
  • ringtone file uploading is also the most important and most commonly used link in the CRBT service system.
  • the method of uploading the ringtone file is usually performed by the browser client uploading the ringtone file to the WEB server through the Hyper Text Transfer Protocol (HTTP), and saving the server on the server.
  • HTTP Hyper Text Transfer Protocol
  • the WEB server After a file is uploaded and saved successfully, the user then submits the description information of the ring tone (including ringtone name, singer, provider, price, etc.) to the WEB server; After the handover is successful, the WEB server uploads the ringtone file from the WEB server to the configured FTP server through the File Transfer Protocol (FTP, File Transfer Protocal), and the WEB server sends the ringtone file related information to the interface machine, including the ringtone name. , the singer, the provider, the price, and the location of the ringtone file on the FTP; and then the interface machine extracts the path information of the ringtone file on the FTP server according to the received information, and downloads the ringtone file from the FTP server. After the ringtone file is placed on the media resource board (MRB) server, the ringtone file upload ends.
  • MMRB media resource board
  • the client uploads the file to the WEB server through the HTTP protocol
  • the WEB server uploads the file to the FTP server
  • the interface machine uploads the file to the MRB server through the FTP server.
  • the HTTP protocol is more suitable for transmitting a small amount of information in the network, and is not suitable for transferring files, because the transmission efficiency is low; Moreover, the B/S connection is performed through the HTTP protocol, and the connection is easily broken when the time is long. From this point of view, uploading files via the HTTP protocol is a bottleneck in the entire file upload process.
  • the technical problem to be solved by the present invention is to provide a method and system for implementing file uploading in a WEB application, which can well solve the bottleneck problem in the file uploading process in the WEB application.
  • the present invention provides a method for implementing file uploading in a WEB application, the method comprising:
  • the files that the client's user will upload are uploaded to the FTP server through a security-trusted control.
  • the method further includes
  • the related information of the file to be uploaded by the user is uploaded to the WEB server by the security-trusted control;
  • the user inputs the file and related information of the file into the user operation interface of the securely trusted control, and the user operation interface uploads the file to the FTP server, and uploads the related information of the file to the WEB server.
  • the operation interface uploads the file to the FTP server through FTP, and uploads the related information of the file to the WEB server through the hypertext transfer protocol HTTP.
  • the method further includes:
  • the WEB server uploads related information of the file to the interface machine, and the related information of the file includes one or more of a file name, a file provider information, and a path information uploaded to the FTP server; the interface machine is related according to the received file.
  • Information upload the corresponding file obtained from the FTP server to the MRB server.
  • the method further includes:
  • the pre-developed security-trusted control is deployed on the WEB server, and the deployed security-trusted control is referenced on the WEB page, and is downloaded by the client.
  • development steps of the securely trusted control include:
  • the present invention provides a system for implementing file uploading in a WEB application, including a client and a file transfer protocol FTP server, wherein:
  • a client configured to input at least a file to be uploaded by the user to a security-trusted control, and upload the input file to the FTP server through the securely trusted control;
  • FTP server used to receive and save files uploaded from the client.
  • system further includes a WEB server; wherein:
  • the client is also used for the user to upload the file to the FTP server through the user interface through the user interface, and to upload the file information through the hypertext transfer protocol HTTP. Upload to the web server;
  • the WEB server is configured to receive and save related information from files uploaded by the client. Further, an interface machine and a media resource board MRB server are further included, wherein:
  • the WEB server is further configured to upload related information of the file to the interface device, where the related information of the file includes one or more of a file name, file provider information, and path information uploaded to the FTP server;
  • An interface machine configured to obtain a corresponding file from an FTP server according to the related information of the received file, and upload the file to the MRB server;
  • the MRB server is configured to receive and save files uploaded from the interface machine.
  • the WEB server is also used to deploy pre-developed security-trusted controls, and reference the deployed security-trusted controls on the WEB page for the client to download.
  • the invention also provides a WEB server, the WEB server is set to
  • the present invention also provides a system for implementing file uploading in a WEB application, the system comprising the WEB server described above.
  • the method and system for uploading files locally from the client to the server in the WEB application are implemented by the present invention, and the existing file uploading process is optimized, and the file is uploaded from the client to the WEB server through the HTTP protocol.
  • the steps of directly uploading the file from the client to the FTP server through the FTP protocol thus solving the bottleneck problem in the process of uploading files in the past, from It reduces the burden on the WEB server, greatly improves the performance and stability of the WEB application, and thus has strong practicability.
  • using the interface of the securely trusted APPLET control on the client side is also easier than ever to implement some more complex functions.
  • FIG. 1 is a flow chart of one embodiment of a method for uploading a ringtone file according to the present invention
  • FIG. 2 is a diagram showing an interface of an APPLET control running in a client browser by using the method of the present invention
  • FIG. 3 is an interface diagram of a selection file dialog box popped up after clicking the browse file button in the interface shown in FIG. 2;
  • FIG. 4 is a flow chart of the second embodiment of the method for uploading a ringtone file according to the present invention
  • FIG. 5 is a schematic diagram of key steps for developing an APPLET control trusted by a WEB client in the method of the present invention
  • Figure 6 is a flow chart of the method of developing the key steps shown in Figure 3.
  • the invention provides a method and a system for implementing file uploading in a WEB application.
  • the invention concept is to remove the bottleneck link of uploading a file from a client to a WEB server, and directly upload the file from the client to the FTP server, and then by WEB.
  • the server obtains the corresponding file from the FTP server according to the file information uploaded by the client. Among them, uploading files directly from the client to the FTP server is the key.
  • the difficulty is that if the ACTIVE control running on the client is not securely authenticated, it will not be able to access the locally stored resources due to the limitation of the client security model.
  • the ACTIVE control used in the present invention is implemented by the APPLET control.
  • an APPLET control program that satisfies the project requirements is developed, and the APPLET control file is packaged into a JAR (Java Archive) file; to prevent the JAR file from being bad when used on the client side.
  • the hacker decompilation causes the business logic to be leaked, and the JAR file is code confusing; a pair of private and public keys are created by the Jarsigner tool, wherein the private key is used to encrypt (lock) the JAR file, and generate the JAR file.
  • the digital signature is used by the client to decrypt (unlock) the client and get the corresponding APPLET control.
  • the client downloads the securely trusted APPLET control from the WEB server, and the file can be locally uploaded to the FTP server through the APPLET control.
  • FIG. 1 it is a flowchart of one embodiment of a method for uploading a ring tone file according to the present invention.
  • the ring tone file is uploaded from the browser client to the WEB server by using the process, and the method includes the following steps: Step 1: Client The user inputs the file to be uploaded and related information through a securely trusted operation interface;
  • the security-trusted operation interface is implemented by pre-developing the APPLET control program that is trusted by the client on the client.
  • the securely trusted operator interface can also be implemented by developing a Flex control program that is trusted by the client.
  • the information input box and buttons on the APPLET operation interface are shown in Figure 2.
  • the relevant information that the client user can input through this interface includes: file name, ring name, artist name, supplier name, and price.
  • a dialog box for selecting files will pop up, as shown in Figure 3.
  • the user can view the file directory of the local storage ringtone file through the dialog box, and select a file name of the ringtone file to be uploaded from the file directory, thereby inputting the file to be uploaded.
  • Step 2 The APPLET operation interface uploads the ring tone file input by the user to the FTP server;
  • the APPLET control preferably uses the FTP protocol when uploading files. This protocol is specifically used to upload files, so it has more advantages than uploading files using other protocols.
  • the APPLET control uploads the ringtone file input by the user using the FTP protocol.
  • the FTP server should be pre-deployed, and the interactive information such as the login and file upload path of the FTP server and other servers or clients (WEB server, WEB client, etc.) is agreed. Secure access to the FTP server.
  • the client After uploading the file to the FTP server, the client needs to record the file name and path information of the file saved on the FTP server, and send the path of the file save information to the WEB server when submitting the ring tone information to the WEB server.
  • Step 3 The APPLET control uploads the ringtone related information input by the user to the WEB server through the HTTP protocol.
  • the APPLET control uploads the ringtone file and uploads its ringtone related information to the WEB server through the HTTP protocol.
  • the uploaded ringtone related information includes a file name, a ringtone name, a singer name, a supplier name, and a price, and also includes path information that the file is uploaded to the FTP server.
  • the invention needs to develop a service program on the WEB server, and has no special requirements for the service code, and only needs to receive the information submitted by the client.
  • Step 1 Client The user inputs the file to be uploaded and related information through a securely trusted operation interface;
  • the securely trusted operator interface is implemented by pre-developing APPLET control programs or Flex control programs that are securely trusted on the client.
  • Step 2 The APPLET operation interface uploads the ring tone file input by the user to the FTP server through the FTP protocol;
  • the FTP server is pre-deployed, and the FTP server and other server or client (WEB server, interface machine, WEB client, etc.) login, file upload path and other interactive information are agreed to ensure secure access to the FTP server.
  • WEB server interface machine
  • WEB client etc.
  • the APPLET operation interface After uploading the file to the FTP server, the APPLET operation interface needs to record the file name and path information of the file saved on the FTP server, and submit the ringtone message to the WEB server. At the same time, the information such as the path to save the file is sent to the WEB server.
  • Step 3 The APPLET operation interface uploads ringtone related information to the WEB server through the HTTP protocol;
  • the uploaded ringtone related information includes a file name, a ringtone name, a singer name, a supplier name, and a price, and also includes path information that the file is uploaded to the FTP server.
  • Step 4 The WEB server uploads the related information of the ring tone file uploaded by the user to the interface machine; the file name and path information stored by the client on the FTP server are sent to the WEB server along with the ring tone information.
  • This step requires the development of a service program on the WEB server. There is no special requirement for the service code. According to the business requirements, it is only necessary to receive the information submitted by the client and send the information to the interface machine through the SOCKET connection.
  • Step 5 The interface machine obtains a corresponding ringtone file from the FTP server according to the information about the received ringtone file.
  • Step 6 The interface machine uploads the obtained ringtone file to the MRB server.
  • the invention needs to develop an interface machine program and deploy an interface machine and an MRB server. After receiving the ring tone information from the WEB server, the interface machine obtains the ring tone file from the FTP server according to the information, and uploads the ring tone file to the MRB server. At this point, the entire ring tone uploading process ends.
  • the security-trusted operation interface is implemented by pre-developing a control (such as an APPLET control) program that is securely trusted by the client, and is a key step for implementing the file uploading method of the present invention.
  • a control such as an APPLET control
  • the pre-developed APPLET control program trusted by the client on the client is deployed on the WEB server, and the client downloads the securely trusted APPLET control program from the WEB server to the local browser, as shown in FIG. 5.
  • the APPLET control is prohibited from reading and writing to the local disk.
  • B. In addition to downloading the host of the APPLET control, it cannot establish a connection with any other host;
  • the APPLET control is prohibited from loading a new dynamic library that directly calls the local method. From this point of view, the APPLET control developed using the usual method is difficult to implement file uploading from the local to the server side due to the prohibition of access to local resources.
  • the present invention solves the above problems, and correspondingly provides a method for developing a control that is trusted by a client.
  • a control that is trusted by a client.
  • the flow is as shown in FIG. 6, including:
  • Step 610 Develop an APPLET control program for the client upload file according to the need, and package the file into a JAR (Java Archive) file;
  • JAR Java Archive
  • APPLET is a Java class that inherits from JApplet and usually initializes the interface in the init method of the class.
  • JFileChooser In the file selection, you need to use the control JFileChooser.
  • the message processing function of the browse file button you can call the control to pop up the dialog box for selecting the file.
  • the code is as follows:
  • the application logic that encapsulates the business can be called in the init method and the message handler of the upload button.
  • the implementation class reference file UploadRingApplet.java of the APPLET control After developing the Java file of the relevant APPLET control, use the following command to package the related class file into a JAR file (Jar package):
  • Step 620 Confusing the generated JAR file with code
  • JAVA code obfuscation technique can be used to confuse the JAR file, so that the hacker cannot use the JAR file. Decompilation of Java class files prevents the loss of business logic.
  • the JAVA code obfuscation techniques used by the present invention include: Yguard or Proguard. By processing the Java class files according to the usage requirements of each software, you can protect your own code to a certain extent, and confuse the processed classes in the same way as ordinary Java classes.
  • Step 630 Create a security key pair with a security key class tool, generate a digital signature for the JAR file that has been confusing the code, and develop a securely trusted APPLET control;
  • the ACTIVE control implemented by the APPLET control must be authenticated by the certificate authority to authenticate the security of the ACTIVE control on the client side, to authenticate that the control is trusted by the client.
  • the cost of certification by a certification authority is very expensive and the cycle time is very long.
  • the present invention uses a mechanism to establish an APPLET control that is trusted by the client, and is allowed to operate the local file on the client, and then directly uploads the client file to the FTP server through the FTP protocol.
  • a pair of private/public keys need to be created for the JAR file, wherein the private key is used to encrypt the JAR file and form a digital signature; the public key is used to provide To the client, verify and decrypt the downloaded JAR file.
  • the present invention creates and manages private/public key pairs through the JDK keytool tool and generates a digital signature of the JAR file via the jarsigner tool.
  • keytool is a valid security key and certificate management tool for creating and managing keystores.
  • the keystore is a database of private keys and their associated X.509 certificate chains that are used to authenticate the corresponding public keys.
  • Keytool enables users to manage their own private/public key pairs through digital signatures, manage certificates for self-identification, and manage data integrity and authentication services. It also enables users to cache their public keys while communicating.
  • MyAppletkey is the name of the certificate.
  • the certificate password and the organization type information of the unit will be prompted.
  • the certificate password will be used when digitally signing the JAR package, so it is necessary to remember;
  • the jarsigner is followed by the JAR package (MyApplet.jar) and the certificate name (MyAppletkey) to be signed with the certificate.
  • MyApplet.jar the JAR package
  • MyAppletkey the certificate name
  • Step 640 Deploy the securely trusted APPLET control on the WEB server and wait for the client to download;
  • the APPLET control can be deployed directly on the WEB server, and then the APPLET control can be referenced in the WEB page:
  • the WEB server can provide a configuration file to configure the FTP server's IP address, user name, password, file upload path and other information. After encryption, it will be passed as a parameter to the APPLET control. Through the operation interface of the downloaded APPLET control, the client user can upload the ringtone file to the location specified by the FTP server through the FTP protocol, and then transmit the ringtone information to the WEB server through the HTTP protocol.
  • Step 650 The client downloads the securely trusted APPLET control from the WEB server to the local browser;
  • the APPLET control When the APPLET control is used on the client, the APPLET is downloaded to the Java Runtime Environment (JRE, Java Runtime Environment) of the local browser, as shown in Figure 5.
  • JRE Java Runtime Environment
  • the present invention is directed to the foregoing embodiment, and accordingly, a system for implementing file uploading in a WEB application, including a client, an FTP server, and a WEB server connected in sequence, wherein:
  • the client is also connected to the WEB server, and is configured to download the securely trusted APPLET control from the WEB server, upload the local file to the FTP server through the FTP protocol through the operation interface of the APPLET control, and upload related information and files of the file.
  • the path information is uploaded to the WEB server through the HTTP protocol;
  • An FTP server configured to receive and save files uploaded from a client;
  • the FTP server saves the files uploaded by the client according to the file name and path information provided by the client.
  • the WEB server is configured to deploy a pre-developed securely trusted APPLET control, and when the client receives the download request for the APPLET control, the APPLET control is sent to the client; receiving and saving the uploaded file from the client Related Information.
  • the information about the uploaded file includes the file name, the ring name, the artist name, the supplier name, and the price, as well as the path information uploaded to the FTP server.
  • a configuration file can be provided in the WEB server to configure the IP address, user name, password, file upload path and other information of the FTP server, and then encrypted and passed as parameters to the APPLET control.
  • the client user can upload the ringtone file to the location specified by the FTP server through the FTP protocol, and upload the ringtone information to the WEB server.
  • the above system also includes: an interface machine and an MRB server, wherein:
  • the WEB server is also connected to the interface machine through the SOCKET, and is configured to send the related information of the received upload file to the interface machine;
  • the interface machine is respectively connected to the FTP server and the MRB server, and is configured to obtain a corresponding file from the FTP server according to the information about the uploaded file received from the WEB server, and upload the obtained file to the MRB server;
  • the MRB server is used to receive files uploaded by the interface machine and save them.
  • the method and system for uploading files locally from the client to the server in the WEB application are implemented by the present invention, and the existing file uploading process is optimized, and the file is uploaded from the client to the WEB server through the HTTP protocol. Steps while directly passing the file through the FTP protocol Uploading from the client to the FTP server solves the bottleneck problem in the process of uploading files in the past, thereby reducing the burden on the WEB server and greatly improving the performance and stability of the WEB application, thus having strong practicability. Moreover, using the interface of the securely trusted APPLET control on the client side is also easier than ever to implement some more complex functions.

Description

一种实现在 WEB应用中文件上传的方法及系统 技术领域
本发明涉及 WEB应用中文件传输系统及方法,尤其涉及在 WEB应用中 实现从客户端上传文件到服务器端的方法及系统。
背景技术
随着通信技术的发展, 由于浏览器 /服务器(B/S, Browser/Server )结构 相对于客户端 /服务器( C/S, Client/Server )结构的优越性,基于 B/S结构( WEB 应用)开发的业务越来越多, 所涉及到范围也越来越广泛, 例如, 电信增值 类业务、 消息类业务以及各种业务应用或企业应用中的信息管理系统等。
WEB应用是 B/S结构的主要实现方式, 通过 WEB技术开发的应用系统 存在着一个并发访问的问题, 用户只要能连接网络, 便可通过浏览器在任何 地点都可以访问服务器, 因此用户并发访问同一个服务器的数目有可能会很 大, 大量的用户并发访问, 会给服务器带来很大处理压力, 经常会出现资源 不够用的情况(CPU被占据 100 % , 内存溢出, 连接不够用等) 。 比如, 并 发访问高峰期时, WEB对数据库连接的压力会非常大, 客户端用户每一个查 询, 每一个操作, 都需要一个数据库连接, 而数据库服务器所能提供的连接 数又是非常的有限, 这时就很容易出现连接不够用的情况。
当 WEB客户端有一定数量的用户并发进行文件上传操作时, 系统资源 也很容易被占满,文件上传是 WEB应用中一种很常见的环节,在很多系统的 应用中都是一个瓶颈问题。
彩铃业务系统中最重要的资源是铃音文件, 因此, 铃音文件上传也是彩 铃业务系统中最重要和最常用的一个环节。 例如, 在彩铃系统中, 将铃音文 件上传釆用的方法通常是由浏览器客户端通过超文本传输协议(HTTP, Hyper Text Transfer Protocol )把铃音文件上传到 WEB服务器, 并保存在该服务器 一临时目录下; 文件上传并保存成功后, 用户再由客户端提交铃音的相关描 述信息(包括铃音名称、 歌手、 提供商以及价格等信息)到 WEB服务器; 提 交成功后, WEB服务器再通过文件传输协议(FTP, File Transfer Protocal ) 把铃音文件由 WEB服务器上传到配置好的 FTP服务器, WEB服务器再向接 口机发送铃音文件相关信息, 包括铃音名称、 歌手、 提供商、 价格以及铃音 文件在 FTP上的位置等信息; 然后接口机再根据收到的信息, 提取出铃音文 件在 FTP服务器上的路径信息, 从 FTP服务器下载铃音文件, 并把铃音文件 置入媒体资源板(MRB, Media Resource Board )服务器后, 铃音文件上传结 束。
从上面的铃音文件上传流程可以看出, 在网络中上传一个文件大致需要 三步:
第一步, 客户端通过 HTTP协议将文件上传到 WEB服务器;
第二步, WEB服务器将文件上传到 FTP服务器上;
第三步, 接口机通过 FTP服务器把文件上传到 MRB服务器。
众所周知, HTTP协议比较适用于在网络中传递少量的信息, 而不适合 传输文件, 因为传输效率较低; 而且, 通过 HTTP协议进行 B/S连接, 时间 长时连接很容易断。 由此看来, 通过 HTTP协议上传文件是整个文件上传流 程中的一个瓶颈。
发明内容
本发明所要解决的技术问题是提供一种实现在 WEB应用中文件上传的 方法及系统, 能够很好地解决 WEB应用中文件上传流程中的瓶颈问题。
为了解决上述技术问题, 本发明提供了一种实现在 WEB应用中文件上 传的方法, 该方法包括:
客户端的用户将要上传的文件通过受安全信任的控件上传到 FTP服务 器。
进一步地, 该方法还包括
用户将要上传的文件的相关信息通过所述受安全信任的控件上传到 WEB服务器; 用户将文件以及文件的相关信息输入到该受安全信任的控件的用户操作 界面, 由该用户操作界面将文件上传到 FTP服务器, 并将文件的相关信息上 传到 WEB服务器。
进一步地, 该操作界面通过 FTP将文件上传到 FTP服务器, 并通过超文 本传输协议 HTTP将文件的相关信息上传到 WEB服务器。
进一步地, 该方法还包括:
WEB服务器将文件的相关信息上传到接口机,文件的相关信息包括文件 名称、文件提供者信息以及上传到 FTP服务器上的路径信息中的一种或多种; 接口机根据接收到的文件的相关信息, 将从 FTP服务器获取的相应的文 件上传给 MRB服务器。
进一步地, 在用户输入要上传的文件步骤之前, 还包括:
将预先开发的受安全信任的控件部署在 WEB服务器上, 并在 WEB页面 上引用部署的该受安全信任的控件, 待客户端下载。
进一步地, 该受安全信任的控件的开发步骤包括:
根据需要开发用于客户端上传文件的控件程序, 并将其打包成文件包; 将该文件包进行代码混淆; 以及
为进行过代码混淆的文件包创建安全密匙对, 并生成数字签名, 从而完 成受安全信任的控件的开发。
为了解决上述技术问题, 本发明提供了一种实现在 WEB应用中文件上 传的系统, 包括客户端和文件传输协议 FTP服务器, 其中:
客户端, 用于供用户至少将要上传的文件输入到受安全信任的控件上, 并通过该受安全信任的控件将输入的文件上传到 FTP服务器;
FTP服务器, 用于接收并保存来自客户端上传的文件。
进一步地, 该系统还包括 WEB服务器; 其中:
客户端还用于供用户由该受安全信任的控件通过用户操作界面通过 FTP 将文件上传到 FTP服务器, 并通过超文本传输协议 HTTP将文件的相关信息 上传到 WEB服务器;
WEB服务器, 用于接收并保存来自所述客户端上传的文件的相关信息。 进一步地, 还包括接口机和媒体资源板 MRB服务器, 其中:
WEB服务器, 还用于将所述文件的相关信息上传到所述接口机, 文件的 相关信息包括文件名称、 文件提供者信息以及上传到 FTP服务器上的路径信 息中的一种或多种;
接口机, 用于根据接收的文件的相关信息, 从 FTP服务器获取相应的文 件, 并上传给 MRB服务器;
MRB服务器, 用于接收并保存来自所述接口机上传的文件。
进一步地,
WEB服务器, 还用于部署预先开发的受安全信任的控件, 并在 WEB页 面上引用部署的该受安全信任的控件, 待客户端下载。
本发明还提供了一种 WEB服务器, 所述 WEB服务器设置为
部署有预先开发的受安全信任的控件, 供客户端下载;
接收并保存由客户端通过所述受安全信任的控件的用户操作界面上传 的文件的相关信息, 其中, 所述文件由客户端通过所述受安全信任的控件的 用户操作界面上传到 FTP服务器, 以供接口机下载; 以及
将所述文件的相关信息上传到所述接口机,以供所述接口机根据所述文 件的相关信息从所述 FTP服务器下载所述文件并上传给媒体资源板 MRB服 务器;
从而能够实现 WEB应用中文件的有效上传。
本发明还提供了一种实现在 WEB应用中文件上传的系统, 所述系统包 括上述的 WEB服务器。
釆用本发明提供的实现在 WEB应用中由客户端本地向服务器端上传文 件的方法及系统, 对现有的文件上传流程进行了优化, 去掉了将文件通过 HTTP协议从客户端上传到 WEB服务器的步骤,而直接将文件通过 FTP协议 从客户端上传到 FTP服务器, 故解决了以往上传文件流程中的瓶颈问题, 从 而减轻了 WEB服务器的负担, 大大提高了 WEB应用的性能和稳定性, 因而 具备较强的实用性。 而且,在客户端使用受安全信任的 APPLET控件的界面, 也比以往更容易实现一些较为复杂的功能。
附图概述
图 1是本发明实现将铃音文件上传的方法实施例之一的流程图; 图 2是用本发明的方法开发出运行在客户端浏览器 APPLET控件的界面 图示;
图 3是点击图 2所示界面中的浏览文件按钮后弹出的选择文件对话框图 界面图示;
图 4是本发明实现将铃音文件上传的方法实施例之二的流程图; 图 5是本发明的方法中开发在 WEB客户端受安全信任 APPLET控件的 关键步骤示意图;
图 6是对图 3所示的关键步骤展开的方法流程图。
本发明的较佳实施方式
本发明提供的实现在 WEB应用中文件上传的方法及系统, 其发明构思 是,去掉将文件由客户端上传到 WEB服务器这个瓶颈环节, 而直接将文件由 客户端上传到 FTP服务器, 再由 WEB服务器根据客户端上传的文件信息从 FTP服务器获取到相应的文件。 其中, 将文件直接由客户端上传到 FTP服务 器是关键, 其难点在于运行在客户端的 ACTIVE控件若未经过安全认证, 会 由于受客户端安全模型的限制, 而无法访问本地存储的资源。 本发明釆用的 ACTIVE控件通过 APPLET控件实现, 首先开发出满足项目要求的 APPLET 控件程序, 并将该 APPLET控件文件打包成 JAR ( Java Archive )文件; 为防 止该 JAR文件在客户端使用时被不良黑客反编译造成业务逻辑的泄密, 对该 JAR文件进行代码混淆; 通过 Jarsigner工具创建一对私有和公共密匙, 其中 私钥用于对该 JAR文件进行加密 (上锁) , 生成对该 JAR文件的数字签名, 公钥用于供客户端对其进行解密(开锁), 得到相应的 APPLET控件。 由此, 开发出在客户端受安全信任的该 APPLET控件, 并将其部署在 WEB服务器 上。 客户端从 WEB服务器上将该受安全信任的 APPLET控件下载, 通过该 APPLET控件便可将文件从本地上传到 FTP服务器。
以下结合附图和优选实施例详细阐述本发明的技术方案。 以下虽是以铃 音文件的上传为实施例, 这仅仅用于解释本发明, 并不构成对本发明的限制。 亦即本发明的技术方案适用于任何从客户端到服务器端的文件上传。
实施例 1
如图 1所示, 为本发明的实现将铃音文件上传的方法实施例之一的流程 图, 通过该流程将铃音文件由浏览器客户端上传到 WEB服务器, 包括: 步骤 1 : 客户端用户通过受安全信任的操作界面, 输入要上传的文件及 其相关信息;
其中, 受安全信任的操作界面通过预先开发在客户端受安全信任的 APPLET控件程序实现。 当然, 这并不是唯一的实现方式。 譬如, 该受安全 信任的操作界面也可以通过开发在客户端受安全信任的 Flex控件程序实现。
APPLET操作界面上的信息输入框和各按钮如图 2所示。 客户端用户通 过该界面可以输入的相关信息包括: 文件名称、 铃音名称、 歌手姓名、 供应 商名称以及价格等。
当点击上述操作界面上 "浏览文件"按钮时, 会弹出选择文件的对话框, 如图 3所示。 用户通过该对话框查看本地存储铃音文件的文件目录, 并从文 件目录中选择一个要上传的铃音文件的文件名,由此实现输入要上传的文件。
步骤 2:该 APPLET操作界面将用户输入的铃音文件上传到 FTP服务器;
APPLET控件上传文件时优选釆用 FTP协议, 该协议是专门用来上传文 件的, 故其比起使用其它协议上传文件具有更多的优势。
当点击上述 APPLET操作界面上 "上传" 按钮时, 该 APPLET控件便釆 用 FTP协议将用户输入的铃音文件上传。
该 FTP服务器要预先部署, 并约定 FTP服务器和其它服务器或客户端 ( WEB服务器、 WEB客户端等) 的登陆、 文件上传路径等交互信息, 以保 证对 FTP服务器的安全访问。
客户端把文件上传到 FTP服务器后, 需要把文件在 FTP服务器上保存文 件的文件名和路径信息记录下来,并在向 WEB服务器提交铃音信息时一起把 文件保存的路径等信息发给 WEB服务器。
步骤 3: 该 APPLET控件通过 HTTP协议将用户输入的铃音相关信息上 传到 WEB服务器。
当点击上述 APPLET操作界面上 "上传" 按钮时, APPLET控件在将铃 音文件上传的同时,还将其铃音相关信息通过 HTTP协议上传到 WEB服务器。
上传的铃音相关信息包括文件名称、 铃音名称、 歌手姓名、 供应商名称 以及价格等, 还包括文件上传到 FTP服务器上的路径信息等。
本发明需要开发 WEB服务器上的服务程序, 对服务代码没有特殊要求, 只需要能接收客户端提交的信息。
实施例 2
如图 4所示, 为本发明的实现将铃音文件上传的方法实施例之二的流程 图, 通过该流程将铃音文件由浏览器客户端上传到 MRB服务器, 包括: 步骤 1 : 客户端用户通过受安全信任的操作界面输入要上传的文件及其 相关信息;
受安全信任的操作界面通过预先开发在客户端受安全信任的 APPLET控 件程序或 Flex控件程序实现。
步骤 2: 该 APPLET操作界面通过 FTP协议将用户输入的铃音文件上传 到 FTP服务器;
该 FTP服务器要预先部署, 并约定 FTP服务器和其它服务器或客户端 ( WEB服务器、 接口机、 WEB客户端等) 的登陆、 文件上传路径等交互信 息, 以保证对 FTP服务器的安全访问。
APPLET操作界面把文件上传到 FTP服务器后, 需要把文件在 FTP服务 器上保存文件的文件名和路径信息记录下来,并在向 WEB服务器提交铃音信 息时一起把文件保存的路径等信息发给 WEB服务器。
步骤 3:该 APPLET操作界面通过 HTTP协议将铃音相关信息上传到 WEB 服务器;
其中, APPLET操作界面上的信息输入框和各按钮仍如图 2所示, 前已 述及, 故在此不再赘述。
上传的铃音相关信息包括文件名称、 铃音名称、 歌手姓名、 供应商名称 以及价格等, 还包括文件上传到 FTP服务器上的路径信息等。
步骤 4: WEB服务器将用户上传的铃音文件其相关信息上传到接口机; 客户端将文件保存在 FTP服务器上的文件名和路径信息, 随铃音信息一 起发给 WEB服务器。 这一步需要开发 WEB服务器上的服务程序, 对服务 代码没有特殊要求, 根据业务需求进行相应的实现, 只需要能接收客户端提 交的信息, 并把信息通过 SOCKET连接发送给接口机。
步骤 5: 接口机根据接收到的铃音文件的相关信息, 从 FTP服务器获取 相应的铃音文件;
步骤 6: 接口机将获取到的铃音文件上传给 MRB服务器。
本发明需要开发接口机程序, 并部署好接口机和 MRB服务器。 接口机 接收到来自 WEB服务器的铃音信息后, 根据该信息从 FTP服务器获取到铃 音文件, 并上传到 MRB服务器上, 至此, 整个铃音上传流程结束。
本发明例举的以上两个实施例, 其中, 受安全信任的操作界面通过预先 开发在客户端受安全信任的控件(譬如 APPLET控件)程序实现, 是实现本 发明的文件上传方法关键的一步, 亦即将预先开发的在客户端受安全信任的 APPLET控件程序部署在 WEB服务器上, 由客户端从 WEB服务器将该受安 全信任的 APPLET控件程序下载到本地浏览器上, 如图 5所示。
通常开发的 APPLET控件 (或 Flex控件) , 在服务器上使用是没有问题 的, 但它在客户端应用时, 由于是运行在 Java 开发工具包 (JDK, Java Development Kit ) 的沙箱 ( Sand Box )模型中, 其操作会受到如下一些限制:
A、 禁止该 APPLET控件对本地磁盘的读写; B、 除了下载此 APPLET控件的主机本身外, 不能与任何其它的主机建 立连接;
C、 禁止该 APPLET控件载入一个直接调用本地方法的新的动态库。 由此看来, 使用通常的方法开发出的 APPLET控件, 由于被禁止对本地 资源的访问等, 故难以实现文件从本地到服务器端的上传。
本发明为解决上述问题, 相应地提供出开发在客户端受安全信任的控件 的方法, 以 APPLET控件为例 , 其流程如图 6所示, 包括:
步骤 610: 根据需要开发客户端上传文件的 APPLET控件程序, 并将其 打包成 JAR ( Java Archive )文件;
APPLET是一个继承 JApplet的 Java类,通常在该类的 init方法中初始化 界面。 其中选择文件时需要用到控件 JFileChooser, 在浏览文件按钮的消息处 理函数中调用该控件就可以弹出选择文件的对话框, 代码如下:
public void actionPerformed(ActionEvent e)
Figure imgf000011_0001
封装好业务的应用逻辑, 可以在 init方法、 上传按钮的消息处理函数中 进行调用。 APPLET控件的实现类参考文件 UploadRingApplet.java。 开发好相 关的 APPLET控件的 Java文件后, 用下面的命令方式把相关的类文件打包成 JAR文件(Jar包)形式:
jar cvf 包名 类文件路径;
步骤 620: 将生成的 JAR文件进行代码混淆;
为防止生成的 JAR文件在客户端使用时被不良黑客反编译代码而泄漏业 务逻辑内部实现, 可以釆用任何一种 JAVA代码混淆技术将该 JAR文件进行 代码混淆, 这样黑客就无法对该 JAR文件反编译出 Java类文件, 从而防止了 业务逻辑的泄密。 本发明使用的 JAVA代码混淆技术包括: Yguard或 Proguard。 按照每款 软件要求的使用方法处理一下 Java类文件, 就可以在一定程度上保护自己的 代码, 混淆处理后的类使用方式和普通的 Java类一样。
步骤 630: 釆用安全密匙类工具创建安全密匙对, 为进行过代码混淆的 JAR文件生成数字签名, 开发出受安全信任的 APPLET控件;
通过 APPLET控件实现的 ACTIVE控件, 要在客户端能够正常使用, 须 经过证书颁发机构对该 ACTIVE控件的安全性进行认证, 以认证该控件是在 客户端受安全信任的。 而通过证书颁发机构认证的费用非常昂贵, 周期时间 也非常长。 本发明釆用一种机制建立在客户端受安全信任的 APPLET控件, 就可以在客户端被允许操作本地文件, 然后通过 FTP协议直接把客户端文件 上传到 FTP服务器。
实现在客户端可以安全访问本地资源的 APPLET控件, 需要对 JAR文件 创建一对私钥 /公钥, 其中, 私钥用于对 JAR文件进行加密, 并对其形成数字 签名; 公钥用于提供给客户端, 对下载的 JAR文件进行验证及解密。 本发明 通过 JDK的 keytool工具来创建和管理私有 /公共密匙对, 并通过 jarsigner工 具来生成 JAR文件的数字签名。
其中, keytool是一个有效的安全密匙和证书的管理工具, 用于创建和管 理密钥仓库。 该密钥仓库是私钥及其相关的 X.509证书链(用于鉴别相应的 公钥 )的数据库。 keytool能够使用户通过数字签名来管理其自己的私有 /公共 钥匙对, 并管理用来作自我鉴定相关的证书, 以及管理数据完整性和鉴定服 务。 它还能使用户在通信时緩存它们的公共钥匙。
( 1 )釆用 keytool工具生成密匙证书, 即用下列语句生成有效期为 365 天的密匙证书:
keytool -genkey -alias MyAppletkey -validity 365;
其中, MyAppletkey是证书的名字, 在生成证书的过程中会提示输入证 书密码和本单位组织类的信息, 该证书密码在对 JAR包数字签名时会用到, 故要记住;
( 2 )通过 JDK的 jarsigner工具, 并根据生成的证书为 APPLET控件进 行数字签名, 其语句为:
jarsigner MyApplet.jar MyAppletkey;
其中 jarsigner后面跟的是要用证书签名的 JAR包( MyApplet.jar )和证书 名字(MyAppletkey ) , 在命令执行的过程中会提示输入证书密码, 输入生成 证书时设置的密码就可以生成正确的数字签名了。
步骤 640: 将受安全信任的 APPLET控件部署在 WEB服务器中,待客户 端下载;
APPLET控件可以直接部署在 WEB服务器中, 然后可以在 WEB页面中 引用该 APPLET控件:
<applet code="TestApplet.class" archive="MyApplet.j ar" width="xxx" height="xxx" codebase="xxx" > </applet>;
WEB服务器中可以提供一个配置文件,用来配置 FTP服务器的 IP地址、 用户名、 密码、 文件上传路径等信息, 加密后将作为参数传递给 APPLET控 件。 客户端用户通过下载的 APPLET控件的操作界面, 可以将铃音文件通过 FTP协议上传到 FTP服务器指定的位置, 然后将铃音信息通过 HTTP协议上 传到 WEB服务器上。
步骤 650:客户端将受安全信任的 APPLET控件从 WEB服务器下载到本 地浏览器;
在客户端使用 APPLET控件时, 会把 APPLET下载到本地浏览器的 Java 运行时间环境 ( JRE , Java Runtime Environment ) 中执行, 如图 5所示。
本发明针对上述实施例, 相应地提出实现在 WEB应用中文件上传的系 统, 包括依次连接的客户端、 FTP服务器以及 WEB服务器, 其中:
客户端, 还与 WEB服务器连接, 用于从 WEB服务器下载受安全信任的 APPLET控件, 通过该 APPLET控件的操作界面, 将本地文件通过 FTP协议 上传到 FTP服务器,并将文件的相关信息和文件上传的路径信息等通过 HTTP 协议上传到 WEB服务器;
FTP服务器, 用于接收并保存来自客户端上传的文件; FTP服务器按客户端提供的文件名和路径信息保存客户端上传的文件。
WEB服务器, 用于部署预先开发的受安全信任的 APPLET控件, 在收到 客户端对该 APPLET控件的下载请求时,将该 APPLET控件下发给该客户端; 接收并保存来自客户端上传文件的相关信息。
上传文件的相关信息包括文件名称、 铃音名称、 歌手姓名、 供应商名称 以及价格等, 还包括文件上传到 FTP服务器上的路径信息等。
WEB服务器中可以提供一个配置文件,用来配置 FTP服务器的 IP地址、 用户名、 密码、 文件上传路径等信息, 对其加密后作为参数传递给 APPLET 控件。 客户端用户通过下载的 APPLET控件的操作界面, 可以将铃音文件通 过 FTP协议上传到 FTP服务器指定的位置, 并将铃音信息上传到 WEB服务 器。
上述系统还包括: 接口机和 MRB服务器, 其中:
WEB服务器, 还与接口机通过 SOCKET连接, 用于将接收的上传文件 的相关信息发送给接口机;
接口机,分别与 FTP服务器和 MRB服务器连接, 用于根据从 WEB服务 器接收到的上传文件的相关信息, 从 FTP服务器获取相应的文件, 并将获取 的文件上传给 MRB服务器;
MRB服务器, 用于接收接口机上传的文件并保存。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。
工业实用性
釆用本发明提供的实现在 WEB应用中由客户端本地向服务器端上传文 件的方法及系统, 对现有的文件上传流程进行了优化, 去掉了将文件通过 HTTP协议从客户端上传到 WEB服务器的步骤,而直接将文件通过 FTP协议 从客户端上传到 FTP服务器, 故解决了以往上传文件流程中的瓶颈问题, 从 而减轻了 WEB服务器的负担, 大大提高了 WEB应用的性能和稳定性, 因而 具备较强的实用性。 而且,在客户端使用受安全信任的 APPLET控件的界面, 也比以往更容易实现一些较为复杂的功能。

Claims

权 利 要 求 书
1、 一种实现在 WEB应用中文件上传的方法, 所述方法包括: 客户端的用户将要上传的文件通过受安全信任的控件上传到文件传输 协议 FTP服务器。
2、 按照权利要求 1所述的方法, 所述方法还包括:
所述用户将所述文件的相关信息通过所述受安全信任的控件上传到 WEB服务器;
其中,
所述用户将所述文件通过所述受安全信任的控件上传到所述 FTP服务 器, 将所述文件的相关信息通过所述受安全信任的控件上传到 WEB服务的 所述步骤包括:所述用户将所述文件以及所述文件的相关信息输入到所述受 安全信任的控件的用户操作界面,由所述用户操作界面将所述文件上传到所 述 FTP服务器, 并将所述文件的相关信息上传到所述 WEB服务器。
3、 按照权利要求 2所述的方法, 其中,
由所述用户操作界面将所述文件上传到所述 FTP服务器,并将所述文件 的相关信息上传到所述 WEB服务器的所述步骤通过以下方式实现: 由所述 用户操作界面通过 FTP将所述文件上传到所述 FTP服务器, 并通过超文本 传输协议 HTTP将所述文件的相关信息上传到所述 WEB服务器。
4、 按照权利要求 2所述的方法, 在由所述用户操作界面将所述文件上 传到所述 FTP服务器, 并将所述文件的相关信息上传到所述 WEB服务器的 所述步骤之后, 所述方法还包括:
所述 WEB服务器将所述文件的相关信息上传到接口机; 以及 所述接口机根据接收到的所述文件的相关信息,从所述 FTP服务器获取 所述文件, 并将所述文件上传给媒体资源板 MRB服务器;
其中, 所述文件的相关信息包括文件名称、 文件提供者信息以及上传到 所述 FTP服务器上的所述文件的路径信息中的一种或多种。
5、 按照权利要求 1至 4中任一项所述的方法, 在所述用户将要上传的 文件上传到所述 FTP服务器, 将要上传的文件的相关信息上传到所述 WEB 服务器的所述步骤之前, 所述方法还包括:
开发所述受安全信任的控件, 将所述受安全信任的控件部署在所述 WEB服务器上,并在 WEB页面上引用部署的所述受安全信任的控件, 以供 所述客户端下载。
6、 按照权利要求 5所述的方法, 其中, 开发所述受安全信任的控件的 所述步骤包括:
根据需要开发用于客户端上传文件的控件程序 ,并将开发的所述控件程 序打包成文件包;
将所述文件包进行代码混淆; 以及
为进行过代码混淆的文件包创建安全密匙对, 并生成数字签名; 从而完成所述受安全信任的控件的开发。
7、 一种实现在 WEB应用中文件上传的系统, 包括客户端和文件传输 协议 FTP服务器, 其中:
所述客户端设置为供用户将要上传的文件输入到受安全信任的控件上, 并通过所述受安全信任的控件将输入的所述文件上传到所述 FTP服务器; 所述 FTP服务器设置为接收并保存来自所述客户端上传的所述文件。
8、 按照权利要求 7所述的系统, 所述系统还包括 WEB服务器; 其中: 所述客户端还设置为供所述用户由所述受安全信任的控件的用户操作 界面通过 FTP将所述文件上传到所述 FTP服务器, 并通过超文本传输协议 HTTP将所述文件的相关信息上传到所述 WEB服务器;
所述 WEB服务器设置为接收并保存来自所述客户端上传的所述文件的 相关信息。
9、按照权利要求 8所述系统,所述系统还包括接口机和媒体资源板 MRB 服务器, 其中:
所述 WEB服务器还设置为将所述文件的相关信息上传到所述接口机; 所述接口机设置为根据接收的所述文件的相关信息,从所述 FTP服务器 获取所述文件, 并上传给所述 MRB服务器;
所述 MRB服务器设置为接收并保存来自所述接口机上传的所述文件; 所述文件的相关信息包括文件名称、 文件提供者信息以及上传到所述 FTP服务器上的所述文件的路径信息中的一种或多种。
10、 按照权利要求 7至 9中任一项所述的系统, 其中,
所述 WEB服务器还设置为部署预先开发的所述受安全信任的控件, 并 在 WEB页面上引用部署的所述受安全信任的控件, 以供所述客户端下载。
11、 一种 WEB服务器, 所述 WEB服务器设置为:
部署有预先开发的受安全信任的控件, 供客户端下载;
接收并保存由客户端通过所述受安全信任的控件的用户操作界面上传 的文件的相关信息, 其中, 所述文件由客户端通过所述受安全信任的控件的 用户操作界面上传到 FTP服务器, 以供接口机下载; 以及
将所述文件的相关信息上传到所述接口机,以供所述接口机根据所述文 件的相关信息从所述 FTP服务器下载所述文件并上传给媒体资源板 MRB服 务器;
从而能够实现 WEB应用中文件的有效上传。
12、 一种实现在 WEB应用中文件上传的系统, 所述系统包括如权利要 求 11所述的 WEB服务器。
PCT/CN2009/073938 2009-05-26 2009-09-15 一种实现在web应用中文件上传的方法及系统 WO2010135883A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US13/257,970 US20120079069A1 (en) 2009-05-26 2009-09-15 File Uploading Realization Method and System for WEB Application
RU2011150293/08A RU2523216C2 (ru) 2009-05-26 2009-09-15 Способ и система для загрузки файла для веб-приложения
EP09845099.2A EP2432186A4 (en) 2009-05-26 2009-09-15 FILE HOLLOWING PROCESS AND SYSTEM FOR WEB APPLICATION
BRPI0924459A BRPI0924459A2 (pt) 2009-05-26 2009-09-15 método para implementar o upload de arquivos em um aplicativo da web, sistema para implementar o upload de arquivos em um aplicativo da web e servidor web

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910202985.5 2009-05-26
CNA2009102029855A CN101567893A (zh) 2009-05-26 2009-05-26 一种实现在web应用中文件上传的方法及系统

Publications (1)

Publication Number Publication Date
WO2010135883A1 true WO2010135883A1 (zh) 2010-12-02

Family

ID=41283842

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/073938 WO2010135883A1 (zh) 2009-05-26 2009-09-15 一种实现在web应用中文件上传的方法及系统

Country Status (6)

Country Link
US (1) US20120079069A1 (zh)
EP (1) EP2432186A4 (zh)
CN (1) CN101567893A (zh)
BR (1) BRPI0924459A2 (zh)
RU (1) RU2523216C2 (zh)
WO (1) WO2010135883A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535909A (zh) * 2020-04-20 2021-10-22 阿里巴巴集团控股有限公司 数据处理方法、装置、电子设备及存储介质

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065113A (zh) * 2009-11-16 2011-05-18 北大方正集团有限公司 一种文件加速上传的方法及系统
CN102546732B (zh) * 2010-12-31 2015-03-18 北大方正集团有限公司 一种网页中的文件传输方法及系统
US8566595B1 (en) * 2011-03-30 2013-10-22 Emc Corporation Managing secure communications with software environments
CN103853416B (zh) 2012-11-29 2017-09-12 腾讯科技(深圳)有限公司 附件上传的方法及装置
CN103870490A (zh) * 2012-12-12 2014-06-18 腾讯科技(武汉)有限公司 一种文件上传的方法及装置
CN103745162B (zh) * 2014-01-10 2016-08-17 武汉理工大学 一种安全网络文件存储系统
CN103841113B (zh) * 2014-03-20 2017-01-04 武汉理工大学 一种基于用户模式文件系统的安全网络文件系统
CN105227589B (zh) * 2014-05-29 2019-12-06 北京奇虎科技有限公司 文件下载方法及装置
CN104113594A (zh) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 一种基于js上传组件的文件上传方法及系统
CN104112089B (zh) * 2014-07-17 2017-02-01 中国人民解放军国防科学技术大学 基于多策略融合的强制访问控制方法
RU2610266C2 (ru) * 2014-10-07 2017-02-08 Общество С Ограниченной Ответственностью "Яндекс" Способ и система предоставления доступа к файлу для веб-ресурса
CN106330999B (zh) 2015-06-19 2020-08-21 南京中兴软件有限责任公司 实现客户端与虚拟桌面数据共享的方法、客户端和系统
CN106156625A (zh) * 2016-08-01 2016-11-23 乐视控股(北京)有限公司 一种插件签名的方法及电子设备
US10348799B2 (en) * 2016-08-04 2019-07-09 Ca, Inc. Unique device authentication via a browser
CN106899566B (zh) 2016-08-12 2020-03-24 阿里巴巴集团控股有限公司 一种认证方法、设备以及认证客户端
CN107222541B (zh) * 2017-06-06 2020-10-16 南京南瑞继保电气有限公司 一种新能源功率预测文件上送方法及系统
CN106993004A (zh) * 2017-06-12 2017-07-28 深圳市永达电子信息股份有限公司 一种在bs架构系统中上传超大附件的方法
CN110650164B (zh) * 2018-06-26 2021-03-05 马上消费金融股份有限公司 文件的上传方法、装置、终端以及计算机存储介质
CN111835852B (zh) * 2020-07-16 2022-04-19 深圳赛安特技术服务有限公司 Web页面与ftp服务器数据传输的方法及其相关设备
CN114915623B (zh) * 2022-07-11 2022-11-22 万商云集(成都)科技股份有限公司 一种文件同步的方法和系统

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801804A (zh) * 2005-01-31 2006-07-12 刘体元 批量上载文件方法及系统
CN101075186A (zh) * 2006-05-18 2007-11-21 腾讯科技(深圳)有限公司 嵌入web浏览器的图片处理方法

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105145A (en) * 1997-02-27 2000-08-15 Masterpiece Software, Ltd. System and method for generating high resolution clockticks in a computer system
US6058399A (en) * 1997-08-28 2000-05-02 Colordesk, Ltd. File upload synchronization
US20120209892A1 (en) * 2011-02-14 2012-08-16 Macaskill Don Systems and methods related to aggregation of disparate database content
US6895557B1 (en) * 1999-07-21 2005-05-17 Ipix Corporation Web-based media submission tool
US6301666B1 (en) * 1999-08-31 2001-10-09 Everdream, Inc. Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system
US6281894B1 (en) * 1999-08-31 2001-08-28 Everdream, Inc. Method and apparatus for configuring a hard disk and for providing support for a computer system
US7467211B1 (en) * 1999-10-18 2008-12-16 Cisco Technology Inc. Remote computer system management through an FTP internet connection
US6910128B1 (en) * 2000-11-21 2005-06-21 International Business Machines Corporation Method and computer program product for processing signed applets
US20020156650A1 (en) * 2001-02-17 2002-10-24 Klein Michael V. Secure distribution of digital healthcare data using an offsite internet file server
US20020194295A1 (en) * 2001-06-15 2002-12-19 Groupe 2Mb Inc. Scalable data-sharing architecture
US20030074465A1 (en) * 2001-10-15 2003-04-17 Zhicheng Tang ADSL downloading with priority transmit queue
US7962644B1 (en) * 2002-03-18 2011-06-14 Oracle International Corporation Systems and methods for handling a plurality of communications
KR20030079020A (ko) * 2002-04-01 2003-10-10 (주)텔리젠 인터넷을 이용한 멀티미디어 원격강의 시스템 및 방법
US20040138912A1 (en) * 2002-11-04 2004-07-15 Loan Recapture Services, Llc Multiple listing services (MLS) data redistribution
US7283515B2 (en) * 2003-02-14 2007-10-16 Managed Inventions, Llc Internet telephony network and methods for using the same
US6999458B2 (en) * 2003-02-14 2006-02-14 Theglobe.Com Internet telephony network and methods for using the same
US8291309B2 (en) * 2003-11-14 2012-10-16 Rockwell Automation Technologies, Inc. Systems and methods that utilize scalable vector graphics to provide web-based visualization of a device
US7516331B2 (en) * 2003-11-26 2009-04-07 International Business Machines Corporation Tamper-resistant trusted java virtual machine and method of using the same
US7461259B2 (en) * 2004-06-30 2008-12-02 Nokia Corporation Method and apparatus to provide secure mobile file system
RU2315349C1 (ru) * 2006-07-12 2008-01-20 Михаил ТОПР Способ репликации информации в распределенных базах данных и система для его осуществления
US9729829B2 (en) * 2006-12-05 2017-08-08 Crackle, Inc. Video sharing platform providing for posting content to other websites
US9800550B2 (en) * 2008-01-31 2017-10-24 International Business Machines Corporation Method and system for pervasive access to secure file transfer servers
US8600369B2 (en) * 2008-12-19 2013-12-03 At&T Mobility Ii Llc Remote ring tone control using USSD
US8255820B2 (en) * 2009-06-09 2012-08-28 Skiff, Llc Electronic paper display device event tracking
US9596057B2 (en) * 2011-02-24 2017-03-14 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and apparatus for physical layer link adaptation based on traffic properties

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801804A (zh) * 2005-01-31 2006-07-12 刘体元 批量上载文件方法及系统
CN101075186A (zh) * 2006-05-18 2007-11-21 腾讯科技(深圳)有限公司 嵌入web浏览器的图片处理方法

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
See also references of EP2432186A4 *
WANG HAO: "Web Picture Management Based on PHP", NEW TECHNOLOGY OF LIBRARY AND NFORMATION SERVICE, no. 5, May 2004 (2004-05-01), pages 30, XP008165334 *
ZHOU MINGJUN: "Research and Design for Uploading of Large Files Based on PHP", FUJIAN COMPUTER, no. 4, April 2009 (2009-04-01), pages 147 - 148, XP008165348 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535909A (zh) * 2020-04-20 2021-10-22 阿里巴巴集团控股有限公司 数据处理方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
RU2523216C2 (ru) 2014-07-20
US20120079069A1 (en) 2012-03-29
EP2432186A4 (en) 2016-12-28
BRPI0924459A2 (pt) 2016-06-14
RU2011150293A (ru) 2013-07-10
CN101567893A (zh) 2009-10-28
EP2432186A1 (en) 2012-03-21

Similar Documents

Publication Publication Date Title
WO2010135883A1 (zh) 一种实现在web应用中文件上传的方法及系统
JP7227919B2 (ja) モノのインターネット(iot)デバイスの管理
JP5021215B2 (ja) Webサービス用の信頼できる第三者認証
US9100403B2 (en) Apparatus and methods for providing authorized device access
US10284376B2 (en) Code signing system with machine to machine interaction
US7444509B2 (en) Method and system for certification path processing
US8185938B2 (en) Method and system for network single-sign-on using a public key certificate and an associated attribute certificate
JP4886508B2 (ja) 既存のsslセッションを中断することなく証明書ベースの認証にステップアップするための方法及びシステム
US7496755B2 (en) Method and system for a single-sign-on operation providing grid access and network access
US20090133113A1 (en) Adding client authentication to networked communications
JP2004529561A (ja) コンピュータ・ネットワーク内のアプリケーション・コードおよびコンテンツ・データの制御された配布
US20160365981A1 (en) Code signing system with machine to machine interaction
EP4222915A1 (en) Providing cryptographically secure post-secrets-provisioning services
Erba et al. Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems
JP5391756B2 (ja) 画像形成装置、情報管理方法、及びプログラム
US8826000B2 (en) Method and apparatus for supporting cryptographic-related activities in a public key infrastructure
CN114372245A (zh) 基于区块链的物联网终端认证方法、系统、设备及介质
Fongen et al. The integration of trusted platform modules into a tactical identity management system
Gutmann How to build a PKI that works
CN114329574B (zh) 基于域管平台的加密分区访问控制方法、系统及计算设备
Tamrakar et al. On rehoming the electronic id to TEEs
US20230229752A1 (en) Attestation of application identity for inter-app communications
O'Neill The security layer
Bhatia et al. Geon/telescience security infrastructure
WO2023240360A1 (en) Transitioning to and from crypto-agile hybrid public key infrastructures

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09845099

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 13257970

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 9332/CHENP/2011

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009845099

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2011150293

Country of ref document: RU

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: PI0924459

Country of ref document: BR

ENP Entry into the national phase

Ref document number: PI0924459

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20111122