WO2010135883A1 - 一种实现在web应用中文件上传的方法及系统 - Google Patents
一种实现在web应用中文件上传的方法及系统 Download PDFInfo
- Publication number
- WO2010135883A1 WO2010135883A1 PCT/CN2009/073938 CN2009073938W WO2010135883A1 WO 2010135883 A1 WO2010135883 A1 WO 2010135883A1 CN 2009073938 W CN2009073938 W CN 2009073938W WO 2010135883 A1 WO2010135883 A1 WO 2010135883A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- server
- uploading
- client
- related information
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Definitions
- the present invention relates to a file transfer system and method in a WEB application, and more particularly to a method and system for uploading a file from a client to a server in a WEB application.
- B/S Browser/Server
- C/S Client/Server
- WEB application B/S structure
- the WEB application is the main implementation of the B/S structure.
- the application system developed by the WEB technology has a problem of concurrent access. As long as the user can connect to the network, the server can be accessed from anywhere through the browser, so the user concurrently accesses
- the number of the same server is likely to be large, and a large number of users concurrently access, will bring a lot of processing pressure to the server, often there will be insufficient resources (CPU is occupied 100%, memory overflow, insufficient connection, etc.) .
- the concurrent access peak period WEB will have a very high pressure on the database connection.
- Each query and every operation of the client user needs a database connection, and the number of connections that the database server can provide is very limited. At this time, it is easy to see that the connection is not enough.
- ringtone file uploading is also the most important and most commonly used link in the CRBT service system.
- the method of uploading the ringtone file is usually performed by the browser client uploading the ringtone file to the WEB server through the Hyper Text Transfer Protocol (HTTP), and saving the server on the server.
- HTTP Hyper Text Transfer Protocol
- the WEB server After a file is uploaded and saved successfully, the user then submits the description information of the ring tone (including ringtone name, singer, provider, price, etc.) to the WEB server; After the handover is successful, the WEB server uploads the ringtone file from the WEB server to the configured FTP server through the File Transfer Protocol (FTP, File Transfer Protocal), and the WEB server sends the ringtone file related information to the interface machine, including the ringtone name. , the singer, the provider, the price, and the location of the ringtone file on the FTP; and then the interface machine extracts the path information of the ringtone file on the FTP server according to the received information, and downloads the ringtone file from the FTP server. After the ringtone file is placed on the media resource board (MRB) server, the ringtone file upload ends.
- MMRB media resource board
- the client uploads the file to the WEB server through the HTTP protocol
- the WEB server uploads the file to the FTP server
- the interface machine uploads the file to the MRB server through the FTP server.
- the HTTP protocol is more suitable for transmitting a small amount of information in the network, and is not suitable for transferring files, because the transmission efficiency is low; Moreover, the B/S connection is performed through the HTTP protocol, and the connection is easily broken when the time is long. From this point of view, uploading files via the HTTP protocol is a bottleneck in the entire file upload process.
- the technical problem to be solved by the present invention is to provide a method and system for implementing file uploading in a WEB application, which can well solve the bottleneck problem in the file uploading process in the WEB application.
- the present invention provides a method for implementing file uploading in a WEB application, the method comprising:
- the files that the client's user will upload are uploaded to the FTP server through a security-trusted control.
- the method further includes
- the related information of the file to be uploaded by the user is uploaded to the WEB server by the security-trusted control;
- the user inputs the file and related information of the file into the user operation interface of the securely trusted control, and the user operation interface uploads the file to the FTP server, and uploads the related information of the file to the WEB server.
- the operation interface uploads the file to the FTP server through FTP, and uploads the related information of the file to the WEB server through the hypertext transfer protocol HTTP.
- the method further includes:
- the WEB server uploads related information of the file to the interface machine, and the related information of the file includes one or more of a file name, a file provider information, and a path information uploaded to the FTP server; the interface machine is related according to the received file.
- Information upload the corresponding file obtained from the FTP server to the MRB server.
- the method further includes:
- the pre-developed security-trusted control is deployed on the WEB server, and the deployed security-trusted control is referenced on the WEB page, and is downloaded by the client.
- development steps of the securely trusted control include:
- the present invention provides a system for implementing file uploading in a WEB application, including a client and a file transfer protocol FTP server, wherein:
- a client configured to input at least a file to be uploaded by the user to a security-trusted control, and upload the input file to the FTP server through the securely trusted control;
- FTP server used to receive and save files uploaded from the client.
- system further includes a WEB server; wherein:
- the client is also used for the user to upload the file to the FTP server through the user interface through the user interface, and to upload the file information through the hypertext transfer protocol HTTP. Upload to the web server;
- the WEB server is configured to receive and save related information from files uploaded by the client. Further, an interface machine and a media resource board MRB server are further included, wherein:
- the WEB server is further configured to upload related information of the file to the interface device, where the related information of the file includes one or more of a file name, file provider information, and path information uploaded to the FTP server;
- An interface machine configured to obtain a corresponding file from an FTP server according to the related information of the received file, and upload the file to the MRB server;
- the MRB server is configured to receive and save files uploaded from the interface machine.
- the WEB server is also used to deploy pre-developed security-trusted controls, and reference the deployed security-trusted controls on the WEB page for the client to download.
- the invention also provides a WEB server, the WEB server is set to
- the present invention also provides a system for implementing file uploading in a WEB application, the system comprising the WEB server described above.
- the method and system for uploading files locally from the client to the server in the WEB application are implemented by the present invention, and the existing file uploading process is optimized, and the file is uploaded from the client to the WEB server through the HTTP protocol.
- the steps of directly uploading the file from the client to the FTP server through the FTP protocol thus solving the bottleneck problem in the process of uploading files in the past, from It reduces the burden on the WEB server, greatly improves the performance and stability of the WEB application, and thus has strong practicability.
- using the interface of the securely trusted APPLET control on the client side is also easier than ever to implement some more complex functions.
- FIG. 1 is a flow chart of one embodiment of a method for uploading a ringtone file according to the present invention
- FIG. 2 is a diagram showing an interface of an APPLET control running in a client browser by using the method of the present invention
- FIG. 3 is an interface diagram of a selection file dialog box popped up after clicking the browse file button in the interface shown in FIG. 2;
- FIG. 4 is a flow chart of the second embodiment of the method for uploading a ringtone file according to the present invention
- FIG. 5 is a schematic diagram of key steps for developing an APPLET control trusted by a WEB client in the method of the present invention
- Figure 6 is a flow chart of the method of developing the key steps shown in Figure 3.
- the invention provides a method and a system for implementing file uploading in a WEB application.
- the invention concept is to remove the bottleneck link of uploading a file from a client to a WEB server, and directly upload the file from the client to the FTP server, and then by WEB.
- the server obtains the corresponding file from the FTP server according to the file information uploaded by the client. Among them, uploading files directly from the client to the FTP server is the key.
- the difficulty is that if the ACTIVE control running on the client is not securely authenticated, it will not be able to access the locally stored resources due to the limitation of the client security model.
- the ACTIVE control used in the present invention is implemented by the APPLET control.
- an APPLET control program that satisfies the project requirements is developed, and the APPLET control file is packaged into a JAR (Java Archive) file; to prevent the JAR file from being bad when used on the client side.
- the hacker decompilation causes the business logic to be leaked, and the JAR file is code confusing; a pair of private and public keys are created by the Jarsigner tool, wherein the private key is used to encrypt (lock) the JAR file, and generate the JAR file.
- the digital signature is used by the client to decrypt (unlock) the client and get the corresponding APPLET control.
- the client downloads the securely trusted APPLET control from the WEB server, and the file can be locally uploaded to the FTP server through the APPLET control.
- FIG. 1 it is a flowchart of one embodiment of a method for uploading a ring tone file according to the present invention.
- the ring tone file is uploaded from the browser client to the WEB server by using the process, and the method includes the following steps: Step 1: Client The user inputs the file to be uploaded and related information through a securely trusted operation interface;
- the security-trusted operation interface is implemented by pre-developing the APPLET control program that is trusted by the client on the client.
- the securely trusted operator interface can also be implemented by developing a Flex control program that is trusted by the client.
- the information input box and buttons on the APPLET operation interface are shown in Figure 2.
- the relevant information that the client user can input through this interface includes: file name, ring name, artist name, supplier name, and price.
- a dialog box for selecting files will pop up, as shown in Figure 3.
- the user can view the file directory of the local storage ringtone file through the dialog box, and select a file name of the ringtone file to be uploaded from the file directory, thereby inputting the file to be uploaded.
- Step 2 The APPLET operation interface uploads the ring tone file input by the user to the FTP server;
- the APPLET control preferably uses the FTP protocol when uploading files. This protocol is specifically used to upload files, so it has more advantages than uploading files using other protocols.
- the APPLET control uploads the ringtone file input by the user using the FTP protocol.
- the FTP server should be pre-deployed, and the interactive information such as the login and file upload path of the FTP server and other servers or clients (WEB server, WEB client, etc.) is agreed. Secure access to the FTP server.
- the client After uploading the file to the FTP server, the client needs to record the file name and path information of the file saved on the FTP server, and send the path of the file save information to the WEB server when submitting the ring tone information to the WEB server.
- Step 3 The APPLET control uploads the ringtone related information input by the user to the WEB server through the HTTP protocol.
- the APPLET control uploads the ringtone file and uploads its ringtone related information to the WEB server through the HTTP protocol.
- the uploaded ringtone related information includes a file name, a ringtone name, a singer name, a supplier name, and a price, and also includes path information that the file is uploaded to the FTP server.
- the invention needs to develop a service program on the WEB server, and has no special requirements for the service code, and only needs to receive the information submitted by the client.
- Step 1 Client The user inputs the file to be uploaded and related information through a securely trusted operation interface;
- the securely trusted operator interface is implemented by pre-developing APPLET control programs or Flex control programs that are securely trusted on the client.
- Step 2 The APPLET operation interface uploads the ring tone file input by the user to the FTP server through the FTP protocol;
- the FTP server is pre-deployed, and the FTP server and other server or client (WEB server, interface machine, WEB client, etc.) login, file upload path and other interactive information are agreed to ensure secure access to the FTP server.
- WEB server interface machine
- WEB client etc.
- the APPLET operation interface After uploading the file to the FTP server, the APPLET operation interface needs to record the file name and path information of the file saved on the FTP server, and submit the ringtone message to the WEB server. At the same time, the information such as the path to save the file is sent to the WEB server.
- Step 3 The APPLET operation interface uploads ringtone related information to the WEB server through the HTTP protocol;
- the uploaded ringtone related information includes a file name, a ringtone name, a singer name, a supplier name, and a price, and also includes path information that the file is uploaded to the FTP server.
- Step 4 The WEB server uploads the related information of the ring tone file uploaded by the user to the interface machine; the file name and path information stored by the client on the FTP server are sent to the WEB server along with the ring tone information.
- This step requires the development of a service program on the WEB server. There is no special requirement for the service code. According to the business requirements, it is only necessary to receive the information submitted by the client and send the information to the interface machine through the SOCKET connection.
- Step 5 The interface machine obtains a corresponding ringtone file from the FTP server according to the information about the received ringtone file.
- Step 6 The interface machine uploads the obtained ringtone file to the MRB server.
- the invention needs to develop an interface machine program and deploy an interface machine and an MRB server. After receiving the ring tone information from the WEB server, the interface machine obtains the ring tone file from the FTP server according to the information, and uploads the ring tone file to the MRB server. At this point, the entire ring tone uploading process ends.
- the security-trusted operation interface is implemented by pre-developing a control (such as an APPLET control) program that is securely trusted by the client, and is a key step for implementing the file uploading method of the present invention.
- a control such as an APPLET control
- the pre-developed APPLET control program trusted by the client on the client is deployed on the WEB server, and the client downloads the securely trusted APPLET control program from the WEB server to the local browser, as shown in FIG. 5.
- the APPLET control is prohibited from reading and writing to the local disk.
- B. In addition to downloading the host of the APPLET control, it cannot establish a connection with any other host;
- the APPLET control is prohibited from loading a new dynamic library that directly calls the local method. From this point of view, the APPLET control developed using the usual method is difficult to implement file uploading from the local to the server side due to the prohibition of access to local resources.
- the present invention solves the above problems, and correspondingly provides a method for developing a control that is trusted by a client.
- a control that is trusted by a client.
- the flow is as shown in FIG. 6, including:
- Step 610 Develop an APPLET control program for the client upload file according to the need, and package the file into a JAR (Java Archive) file;
- JAR Java Archive
- APPLET is a Java class that inherits from JApplet and usually initializes the interface in the init method of the class.
- JFileChooser In the file selection, you need to use the control JFileChooser.
- the message processing function of the browse file button you can call the control to pop up the dialog box for selecting the file.
- the code is as follows:
- the application logic that encapsulates the business can be called in the init method and the message handler of the upload button.
- the implementation class reference file UploadRingApplet.java of the APPLET control After developing the Java file of the relevant APPLET control, use the following command to package the related class file into a JAR file (Jar package):
- Step 620 Confusing the generated JAR file with code
- JAVA code obfuscation technique can be used to confuse the JAR file, so that the hacker cannot use the JAR file. Decompilation of Java class files prevents the loss of business logic.
- the JAVA code obfuscation techniques used by the present invention include: Yguard or Proguard. By processing the Java class files according to the usage requirements of each software, you can protect your own code to a certain extent, and confuse the processed classes in the same way as ordinary Java classes.
- Step 630 Create a security key pair with a security key class tool, generate a digital signature for the JAR file that has been confusing the code, and develop a securely trusted APPLET control;
- the ACTIVE control implemented by the APPLET control must be authenticated by the certificate authority to authenticate the security of the ACTIVE control on the client side, to authenticate that the control is trusted by the client.
- the cost of certification by a certification authority is very expensive and the cycle time is very long.
- the present invention uses a mechanism to establish an APPLET control that is trusted by the client, and is allowed to operate the local file on the client, and then directly uploads the client file to the FTP server through the FTP protocol.
- a pair of private/public keys need to be created for the JAR file, wherein the private key is used to encrypt the JAR file and form a digital signature; the public key is used to provide To the client, verify and decrypt the downloaded JAR file.
- the present invention creates and manages private/public key pairs through the JDK keytool tool and generates a digital signature of the JAR file via the jarsigner tool.
- keytool is a valid security key and certificate management tool for creating and managing keystores.
- the keystore is a database of private keys and their associated X.509 certificate chains that are used to authenticate the corresponding public keys.
- Keytool enables users to manage their own private/public key pairs through digital signatures, manage certificates for self-identification, and manage data integrity and authentication services. It also enables users to cache their public keys while communicating.
- MyAppletkey is the name of the certificate.
- the certificate password and the organization type information of the unit will be prompted.
- the certificate password will be used when digitally signing the JAR package, so it is necessary to remember;
- the jarsigner is followed by the JAR package (MyApplet.jar) and the certificate name (MyAppletkey) to be signed with the certificate.
- MyApplet.jar the JAR package
- MyAppletkey the certificate name
- Step 640 Deploy the securely trusted APPLET control on the WEB server and wait for the client to download;
- the APPLET control can be deployed directly on the WEB server, and then the APPLET control can be referenced in the WEB page:
- the WEB server can provide a configuration file to configure the FTP server's IP address, user name, password, file upload path and other information. After encryption, it will be passed as a parameter to the APPLET control. Through the operation interface of the downloaded APPLET control, the client user can upload the ringtone file to the location specified by the FTP server through the FTP protocol, and then transmit the ringtone information to the WEB server through the HTTP protocol.
- Step 650 The client downloads the securely trusted APPLET control from the WEB server to the local browser;
- the APPLET control When the APPLET control is used on the client, the APPLET is downloaded to the Java Runtime Environment (JRE, Java Runtime Environment) of the local browser, as shown in Figure 5.
- JRE Java Runtime Environment
- the present invention is directed to the foregoing embodiment, and accordingly, a system for implementing file uploading in a WEB application, including a client, an FTP server, and a WEB server connected in sequence, wherein:
- the client is also connected to the WEB server, and is configured to download the securely trusted APPLET control from the WEB server, upload the local file to the FTP server through the FTP protocol through the operation interface of the APPLET control, and upload related information and files of the file.
- the path information is uploaded to the WEB server through the HTTP protocol;
- An FTP server configured to receive and save files uploaded from a client;
- the FTP server saves the files uploaded by the client according to the file name and path information provided by the client.
- the WEB server is configured to deploy a pre-developed securely trusted APPLET control, and when the client receives the download request for the APPLET control, the APPLET control is sent to the client; receiving and saving the uploaded file from the client Related Information.
- the information about the uploaded file includes the file name, the ring name, the artist name, the supplier name, and the price, as well as the path information uploaded to the FTP server.
- a configuration file can be provided in the WEB server to configure the IP address, user name, password, file upload path and other information of the FTP server, and then encrypted and passed as parameters to the APPLET control.
- the client user can upload the ringtone file to the location specified by the FTP server through the FTP protocol, and upload the ringtone information to the WEB server.
- the above system also includes: an interface machine and an MRB server, wherein:
- the WEB server is also connected to the interface machine through the SOCKET, and is configured to send the related information of the received upload file to the interface machine;
- the interface machine is respectively connected to the FTP server and the MRB server, and is configured to obtain a corresponding file from the FTP server according to the information about the uploaded file received from the WEB server, and upload the obtained file to the MRB server;
- the MRB server is used to receive files uploaded by the interface machine and save them.
- the method and system for uploading files locally from the client to the server in the WEB application are implemented by the present invention, and the existing file uploading process is optimized, and the file is uploaded from the client to the WEB server through the HTTP protocol. Steps while directly passing the file through the FTP protocol Uploading from the client to the FTP server solves the bottleneck problem in the process of uploading files in the past, thereby reducing the burden on the WEB server and greatly improving the performance and stability of the WEB application, thus having strong practicability. Moreover, using the interface of the securely trusted APPLET control on the client side is also easier than ever to implement some more complex functions.
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/257,970 US20120079069A1 (en) | 2009-05-26 | 2009-09-15 | File Uploading Realization Method and System for WEB Application |
RU2011150293/08A RU2523216C2 (ru) | 2009-05-26 | 2009-09-15 | Способ и система для загрузки файла для веб-приложения |
EP09845099.2A EP2432186A4 (en) | 2009-05-26 | 2009-09-15 | FILE HOLLOWING PROCESS AND SYSTEM FOR WEB APPLICATION |
BRPI0924459A BRPI0924459A2 (pt) | 2009-05-26 | 2009-09-15 | método para implementar o upload de arquivos em um aplicativo da web, sistema para implementar o upload de arquivos em um aplicativo da web e servidor web |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910202985.5 | 2009-05-26 | ||
CNA2009102029855A CN101567893A (zh) | 2009-05-26 | 2009-05-26 | 一种实现在web应用中文件上传的方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010135883A1 true WO2010135883A1 (zh) | 2010-12-02 |
Family
ID=41283842
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/073938 WO2010135883A1 (zh) | 2009-05-26 | 2009-09-15 | 一种实现在web应用中文件上传的方法及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20120079069A1 (zh) |
EP (1) | EP2432186A4 (zh) |
CN (1) | CN101567893A (zh) |
BR (1) | BRPI0924459A2 (zh) |
RU (1) | RU2523216C2 (zh) |
WO (1) | WO2010135883A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535909A (zh) * | 2020-04-20 | 2021-10-22 | 阿里巴巴集团控股有限公司 | 数据处理方法、装置、电子设备及存储介质 |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102065113A (zh) * | 2009-11-16 | 2011-05-18 | 北大方正集团有限公司 | 一种文件加速上传的方法及系统 |
CN102546732B (zh) * | 2010-12-31 | 2015-03-18 | 北大方正集团有限公司 | 一种网页中的文件传输方法及系统 |
US8566595B1 (en) * | 2011-03-30 | 2013-10-22 | Emc Corporation | Managing secure communications with software environments |
CN103853416B (zh) | 2012-11-29 | 2017-09-12 | 腾讯科技(深圳)有限公司 | 附件上传的方法及装置 |
CN103870490A (zh) * | 2012-12-12 | 2014-06-18 | 腾讯科技(武汉)有限公司 | 一种文件上传的方法及装置 |
CN103745162B (zh) * | 2014-01-10 | 2016-08-17 | 武汉理工大学 | 一种安全网络文件存储系统 |
CN103841113B (zh) * | 2014-03-20 | 2017-01-04 | 武汉理工大学 | 一种基于用户模式文件系统的安全网络文件系统 |
CN105227589B (zh) * | 2014-05-29 | 2019-12-06 | 北京奇虎科技有限公司 | 文件下载方法及装置 |
CN104113594A (zh) * | 2014-07-04 | 2014-10-22 | 北京思特奇信息技术股份有限公司 | 一种基于js上传组件的文件上传方法及系统 |
CN104112089B (zh) * | 2014-07-17 | 2017-02-01 | 中国人民解放军国防科学技术大学 | 基于多策略融合的强制访问控制方法 |
RU2610266C2 (ru) * | 2014-10-07 | 2017-02-08 | Общество С Ограниченной Ответственностью "Яндекс" | Способ и система предоставления доступа к файлу для веб-ресурса |
CN106330999B (zh) | 2015-06-19 | 2020-08-21 | 南京中兴软件有限责任公司 | 实现客户端与虚拟桌面数据共享的方法、客户端和系统 |
CN106156625A (zh) * | 2016-08-01 | 2016-11-23 | 乐视控股(北京)有限公司 | 一种插件签名的方法及电子设备 |
US10348799B2 (en) * | 2016-08-04 | 2019-07-09 | Ca, Inc. | Unique device authentication via a browser |
CN106899566B (zh) | 2016-08-12 | 2020-03-24 | 阿里巴巴集团控股有限公司 | 一种认证方法、设备以及认证客户端 |
CN107222541B (zh) * | 2017-06-06 | 2020-10-16 | 南京南瑞继保电气有限公司 | 一种新能源功率预测文件上送方法及系统 |
CN106993004A (zh) * | 2017-06-12 | 2017-07-28 | 深圳市永达电子信息股份有限公司 | 一种在bs架构系统中上传超大附件的方法 |
CN110650164B (zh) * | 2018-06-26 | 2021-03-05 | 马上消费金融股份有限公司 | 文件的上传方法、装置、终端以及计算机存储介质 |
CN111835852B (zh) * | 2020-07-16 | 2022-04-19 | 深圳赛安特技术服务有限公司 | Web页面与ftp服务器数据传输的方法及其相关设备 |
CN114915623B (zh) * | 2022-07-11 | 2022-11-22 | 万商云集(成都)科技股份有限公司 | 一种文件同步的方法和系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801804A (zh) * | 2005-01-31 | 2006-07-12 | 刘体元 | 批量上载文件方法及系统 |
CN101075186A (zh) * | 2006-05-18 | 2007-11-21 | 腾讯科技(深圳)有限公司 | 嵌入web浏览器的图片处理方法 |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6105145A (en) * | 1997-02-27 | 2000-08-15 | Masterpiece Software, Ltd. | System and method for generating high resolution clockticks in a computer system |
US6058399A (en) * | 1997-08-28 | 2000-05-02 | Colordesk, Ltd. | File upload synchronization |
US20120209892A1 (en) * | 2011-02-14 | 2012-08-16 | Macaskill Don | Systems and methods related to aggregation of disparate database content |
US6895557B1 (en) * | 1999-07-21 | 2005-05-17 | Ipix Corporation | Web-based media submission tool |
US6301666B1 (en) * | 1999-08-31 | 2001-10-09 | Everdream, Inc. | Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system |
US6281894B1 (en) * | 1999-08-31 | 2001-08-28 | Everdream, Inc. | Method and apparatus for configuring a hard disk and for providing support for a computer system |
US7467211B1 (en) * | 1999-10-18 | 2008-12-16 | Cisco Technology Inc. | Remote computer system management through an FTP internet connection |
US6910128B1 (en) * | 2000-11-21 | 2005-06-21 | International Business Machines Corporation | Method and computer program product for processing signed applets |
US20020156650A1 (en) * | 2001-02-17 | 2002-10-24 | Klein Michael V. | Secure distribution of digital healthcare data using an offsite internet file server |
US20020194295A1 (en) * | 2001-06-15 | 2002-12-19 | Groupe 2Mb Inc. | Scalable data-sharing architecture |
US20030074465A1 (en) * | 2001-10-15 | 2003-04-17 | Zhicheng Tang | ADSL downloading with priority transmit queue |
US7962644B1 (en) * | 2002-03-18 | 2011-06-14 | Oracle International Corporation | Systems and methods for handling a plurality of communications |
KR20030079020A (ko) * | 2002-04-01 | 2003-10-10 | (주)텔리젠 | 인터넷을 이용한 멀티미디어 원격강의 시스템 및 방법 |
US20040138912A1 (en) * | 2002-11-04 | 2004-07-15 | Loan Recapture Services, Llc | Multiple listing services (MLS) data redistribution |
US7283515B2 (en) * | 2003-02-14 | 2007-10-16 | Managed Inventions, Llc | Internet telephony network and methods for using the same |
US6999458B2 (en) * | 2003-02-14 | 2006-02-14 | Theglobe.Com | Internet telephony network and methods for using the same |
US8291309B2 (en) * | 2003-11-14 | 2012-10-16 | Rockwell Automation Technologies, Inc. | Systems and methods that utilize scalable vector graphics to provide web-based visualization of a device |
US7516331B2 (en) * | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
US7461259B2 (en) * | 2004-06-30 | 2008-12-02 | Nokia Corporation | Method and apparatus to provide secure mobile file system |
RU2315349C1 (ru) * | 2006-07-12 | 2008-01-20 | Михаил ТОПР | Способ репликации информации в распределенных базах данных и система для его осуществления |
US9729829B2 (en) * | 2006-12-05 | 2017-08-08 | Crackle, Inc. | Video sharing platform providing for posting content to other websites |
US9800550B2 (en) * | 2008-01-31 | 2017-10-24 | International Business Machines Corporation | Method and system for pervasive access to secure file transfer servers |
US8600369B2 (en) * | 2008-12-19 | 2013-12-03 | At&T Mobility Ii Llc | Remote ring tone control using USSD |
US8255820B2 (en) * | 2009-06-09 | 2012-08-28 | Skiff, Llc | Electronic paper display device event tracking |
US9596057B2 (en) * | 2011-02-24 | 2017-03-14 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Method and apparatus for physical layer link adaptation based on traffic properties |
-
2009
- 2009-05-26 CN CNA2009102029855A patent/CN101567893A/zh active Pending
- 2009-09-15 BR BRPI0924459A patent/BRPI0924459A2/pt not_active Application Discontinuation
- 2009-09-15 EP EP09845099.2A patent/EP2432186A4/en not_active Withdrawn
- 2009-09-15 US US13/257,970 patent/US20120079069A1/en not_active Abandoned
- 2009-09-15 RU RU2011150293/08A patent/RU2523216C2/ru not_active IP Right Cessation
- 2009-09-15 WO PCT/CN2009/073938 patent/WO2010135883A1/zh active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801804A (zh) * | 2005-01-31 | 2006-07-12 | 刘体元 | 批量上载文件方法及系统 |
CN101075186A (zh) * | 2006-05-18 | 2007-11-21 | 腾讯科技(深圳)有限公司 | 嵌入web浏览器的图片处理方法 |
Non-Patent Citations (3)
Title |
---|
See also references of EP2432186A4 * |
WANG HAO: "Web Picture Management Based on PHP", NEW TECHNOLOGY OF LIBRARY AND NFORMATION SERVICE, no. 5, May 2004 (2004-05-01), pages 30, XP008165334 * |
ZHOU MINGJUN: "Research and Design for Uploading of Large Files Based on PHP", FUJIAN COMPUTER, no. 4, April 2009 (2009-04-01), pages 147 - 148, XP008165348 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113535909A (zh) * | 2020-04-20 | 2021-10-22 | 阿里巴巴集团控股有限公司 | 数据处理方法、装置、电子设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
RU2523216C2 (ru) | 2014-07-20 |
US20120079069A1 (en) | 2012-03-29 |
EP2432186A4 (en) | 2016-12-28 |
BRPI0924459A2 (pt) | 2016-06-14 |
RU2011150293A (ru) | 2013-07-10 |
CN101567893A (zh) | 2009-10-28 |
EP2432186A1 (en) | 2012-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010135883A1 (zh) | 一种实现在web应用中文件上传的方法及系统 | |
JP7227919B2 (ja) | モノのインターネット(iot)デバイスの管理 | |
JP5021215B2 (ja) | Webサービス用の信頼できる第三者認証 | |
US9100403B2 (en) | Apparatus and methods for providing authorized device access | |
US10284376B2 (en) | Code signing system with machine to machine interaction | |
US7444509B2 (en) | Method and system for certification path processing | |
US8185938B2 (en) | Method and system for network single-sign-on using a public key certificate and an associated attribute certificate | |
JP4886508B2 (ja) | 既存のsslセッションを中断することなく証明書ベースの認証にステップアップするための方法及びシステム | |
US7496755B2 (en) | Method and system for a single-sign-on operation providing grid access and network access | |
US20090133113A1 (en) | Adding client authentication to networked communications | |
JP2004529561A (ja) | コンピュータ・ネットワーク内のアプリケーション・コードおよびコンテンツ・データの制御された配布 | |
US20160365981A1 (en) | Code signing system with machine to machine interaction | |
EP4222915A1 (en) | Providing cryptographically secure post-secrets-provisioning services | |
Erba et al. | Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems | |
JP5391756B2 (ja) | 画像形成装置、情報管理方法、及びプログラム | |
US8826000B2 (en) | Method and apparatus for supporting cryptographic-related activities in a public key infrastructure | |
CN114372245A (zh) | 基于区块链的物联网终端认证方法、系统、设备及介质 | |
Fongen et al. | The integration of trusted platform modules into a tactical identity management system | |
Gutmann | How to build a PKI that works | |
CN114329574B (zh) | 基于域管平台的加密分区访问控制方法、系统及计算设备 | |
Tamrakar et al. | On rehoming the electronic id to TEEs | |
US20230229752A1 (en) | Attestation of application identity for inter-app communications | |
O'Neill | The security layer | |
Bhatia et al. | Geon/telescience security infrastructure | |
WO2023240360A1 (en) | Transitioning to and from crypto-agile hybrid public key infrastructures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09845099 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13257970 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 9332/CHENP/2011 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009845099 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2011150293 Country of ref document: RU Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: PI0924459 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: PI0924459 Country of ref document: BR Kind code of ref document: A2 Effective date: 20111122 |