(19)
(11)EP 2 898 656 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
04.11.2020 Bulletin 2020/45

(21)Application number: 13839789.8

(22)Date of filing:  18.09.2013
(51)International Patent Classification (IPC): 
H04L 29/08(2006.01)
(86)International application number:
PCT/CN2013/083735
(87)International publication number:
WO 2014/044183 (27.03.2014 Gazette  2014/13)

(54)

METHOD AND DEVICE FOR RESOURCE SHARING

VERFAHREN UND VORRICHTUNG FÜR GEMEINSAME RESSOURCENNUTZUNG

PROCÉDÉ ET DISPOSITIF DE PARTAGE DE RESSOURCE


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 19.09.2012 CN 201210349210

(43)Date of publication of application:
29.07.2015 Bulletin 2015/31

(73)Proprietor: Tencent Technology (Shenzhen) Company Limited
Guangdong 518000 (CN)

(72)Inventors:
  • SUN, Haoran
    Shenzhen Guangdong 518000 (CN)
  • ZENG, Liang
    Shenzhen Guangdong 518000 (CN)
  • HUANG, Jiangquan
    Shenzhen Guangdong 518000 (CN)
  • CHEN, Lei
    Shenzhen Guangdong 518000 (CN)

(74)Representative: Epping - Hermann - Fischer 
Patentanwaltsgesellschaft mbH Schloßschmidstraße 5
80639 München
80639 München (DE)


(56)References cited: : 
CN-A- 1 867 142
CN-A- 102 663 601
US-A1- 2011 016 413
CN-A- 1 905 701
CN-A- 102 833 353
US-A1- 2012 054 589
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    FIELD OF THE DISCLOSURE



    [0001] The present disclosure relates to the field of Internet technology and, more particularly, relates to methods and devices for resource sharing.

    BACKGROUND



    [0002] Currently, some Internet applications (e.g., the Tencent browser) provide users with a function to share a network resource (e.g., a web page and a network video) with other users. In a conventional network resource sharing mechanism, a user directly shares, via a network, a corresponding URL (Uniform/Universal Resource Locator) of a network resource on a specific Internet platform (e.g., QQ space and micro-blog). Researches and practices indicate that there are still more room to improve in the areas of security, privacy and operational convenience for the conventional network resource sharing mechanism.

    [0003] In document US2011/0016413A1, a method and mobile computing device for sharing a calendar database stored at a second computing device are provided. The mobile computing device comprises a processor and, interconnected thereto, a memory and a photo acquisition module. An image of a graphical indicator of the calendar database is acquired at the mobile computing device. The image of the graphical indicator is processed, at the processor, to extract an identifier of the calendar database to access the calendar database and store at least a portion of the calendar database in the memory.

    [0004] In document US2012/0054589A1, a system and method are described for an online memories and greeting service. The system comprises at least one memory for storing program code at least one processor for processing the program code to perform the operations of: receiving new photos, audio recordings, video, photo stories, and/or messages; automatically arranging the new photos, audio recordings, video, photo, stories, and/or messages into a new compilation on behalf of the user based on the metadata; and transmitting an electronic communication to notify the user and/or a friend of the user of the new compilation, the electronic communication including a preview of the compilation.

    BRIEF SUMMARY OF THE DISCLOSURE



    [0005] The present invention defines methods according to claims 1 and 3, and devices according to claims 4 and 6. Further embodiments are set forth in the dependent claims 2 and 5.

    [0006] According to one aspect, there is provided a resource sharing method. Address information of a resource to be shared can be acquired by a user device in response to a sharing request. A two-dimensional barcode corresponding to the address information of the resource can be generated by the user device according to a command from a user via the user device. The generated two-dimensional barcode can be encrypted by the user device and the encrypted two-dimensional barcode can be published by the user device to one or more of an Internet platform and a specified Internet communication application client via a network according to a sharing command from the user. The user device can inform a target of resource sharing of an encryption password of the encrypted two-dimensional barcode, the target of resource sharing can interpret the encrypted two-dimensional barcode by using the encryption password.

    [0007] According to another aspect, there is also provided a resource sharing method. An encrypted two-dimensional barcode that is published to one or more of an Internet platform and an Internet communication application client via a network can be acquired by a user device. An encryption password of the encrypted two-dimensional barcode that is informed to the user device can be acquired by the user device, and the encrypted two-dimensional barcode can be decrypted by the user device by using the encryption password, and the decrypted two-dimensional barcode can be interpreted by the user device to acquire address information of a resource corresponding to the two-dimensional barcode according to a command from a user via the user device. The resource can be accessed by the user device based on the address information.

    [0008] According to another aspect, there is further provided a user device. The user device can include a first acquisition module, a generating module, and a publishing module. The first acquisition module can be configured to acquire address information of a resource to be shared in response to a sharing request. The generating module can be configured to generate a two-dimensional barcode corresponding to the address information, based on the address information acquired by the first acquisition module according to a command from a user via the user device. The publishing module can be configured to encrypt the two-dimensional barcode generated by the generating module and publish, via a network, the encrypted two-dimensional barcode to one or more of an Internet platform and an Internet communication application client according to a sharing command from the user. The user device is further configured to inform, a target of resource sharing, of an encryption password of the encrypted two-dimensional barcode, the target of resource sharing can interpret the encrypted two-dimensional barcode by using the encryption password.

    [0009] According to another aspect, there is further provided a user device. The user device can include a second acquisition module, an interpreting module, and an accessing module. The second acquisition module can be configured to acquire an encrypted two-dimensional barcode that is published to one or more of an Internet platform and an Internet communication application client via a network. The interpreting module can be configured to acquire an encryption password of the encrypted two-dimensional barcode that is informed to the user device, and decrypt the encrypted two-dimensional barcode by using the encryption password, and interpret the decrypted two-dimensional barcode to acquire address information of a resource according to a command from a user via the user device. The accessing module can be configured to access the resource based on the address information acquired by the interpreting module.

    [0010] Other aspects or embodiments of the present disclosure can be understood by those skilled in the art in light of the description, the claims, and the drawings of the present disclosure.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0011] The following drawings are merely examples for illustrative purposes according to various disclosed embodiments and are not intended to limit the scope of the present disclosure.

    FIG. 1 depicts an exemplary method for resource sharing in accordance with various disclosed embodiments;

    FIG. 2 depicts another exemplary method for resource sharing in accordance with various disclosed embodiments;

    FIGS. 3A-3C depict exemplary methods for resource sharing in accordance with various disclosed embodiments;

    FIG. 4 depicts an exemplary user device for implementing a method for resource sharing in accordance with various disclosed embodiments;

    FIG. 5 depicts an exemplary publishing module in a user device in according with various disclosed embodiments;

    FIG. 6 depicts another exemplary user device for implementing a method for resource sharing in accordance with various disclosed embodiments;

    FIG. 7 depicts an exemplary communication system in accordance with various disclosed embodiments;

    FIG. 8 depicts another exemplary communication system in accordance with various disclosed embodiments; and

    FIG. 9 depicts an exemplary user device consistent with the disclosed embodiments.


    DETAILED DESCRIPTION



    [0012] Reference will now be made in detail to exemplary embodiments of the disclosure, which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.

    [0013] Various embodiments provide methods and devices for resource sharing in order to improve security and privacy of the resource sharing. For example, a resource sharing method can include: acquiring, in response to a sharing request, address information of a resource to be shared; generating a two-dimensional barcode corresponding to the address information; and publishing the generated two-dimensional barcode to an Internet platform via a network and/or publishing the generated two-dimensional barcode to a specified Internet communication application client via a network.

    [0014] As used herein, the device can be a user device including, such as, for example, a personal computer (PC), a work station computer, a notebook computer, a car computer (e.g., carrying in a car or other vehicles), a server computer, a hand-held computing device (e.g., a tablet computer), a mobile terminal (e.g., a mobile phone, a smart phone, an iPad, or an aPad), a POS (i.e., point of sale) device, or any other user-side computing device.

    [0015] FIG. 1 is a schematic flow diagram illustrating an exemplary method for resource sharing in accordance with various disclosed embodiments.

    [0016] In Step 101,in response to a sharing request, address information of a resource to be shared can be acquired.

    [0017] As disclosed herein, the term "resource" refers to various Internet resources to be shared including, for example, a web page, an image, a video, an audio, and/or any other suitable Internet resource that can be accessed by a corresponding client. Corresponding address information of a resource to be shared can be used to describe an access address of the resource to be shared. The corresponding address information of a resource to be shared can be, for example, URL information of the resource to be shared and/or other suitable address information.

    [0018] According to different application scenarios, the way to acquire corresponding address information of a resource to be shared may be different. One way can be to acquire corresponding address information of a resource to be shared according to a user command (e.g., a sharing request). For example, corresponding address information of a resource to be shared that a user is currently accessing can be acquired. Or, corresponding address information of a resource to be shared that is input by a user can be acquired. Or, corresponding address information of a resource to be shared that is specified by a user via a command can be acquired. Or, corresponding address information of a resource to be shared that is found via a search on a network can be acquired. Or, corresponding address information of a resource to be shared can be acquired from a configuration file (e.g., the configuration file can be, for example, locally stored).

    [0019] In Step 102, a two-dimensional barcode (e.g., QR code or quick response code)corresponding to the acquired corresponding address information of the resource to be shared can be generated.

    [0020] In some embodiments, a corresponding two-dimensional barcode of the acquired address information can be generated automatically (e.g., when triggered by a specific event) or according to a user command. An algorithm used to generate the two-dimensional barcode can be arbitrary and randomly selected (for example, randomly selected from a plurality of alternative algorithms), set to a default setting, or specified by a user via a command.

    [0021] In Step 103,the generated two-dimensional barcode can be published to an Internet platform and/or to a specified Internet communication application client using a network.

    [0022] In some embodiments, the generated two-dimensional barcode can be encrypted and then published via a network to an Internet platform, and/or the generated two-dimensional barcode can be encrypted and then published via a network to a specified Internet communication application client. In this manner, targets of resource sharing can be controlled via an encryption password. For example, targets of resource sharing can be controlled via an agreement or notification of an encryption password. When a target is not informed of an encryption password, the target cannot interpret a corresponding two-dimensional barcode of corresponding address information of a resource to be shared and thus cannot access the sharing resource.

    [0023] As used herein, the term "Internet platform" refers to, for example, an Internet social platform (e.g., QQ space, micro-blog, and FaceBook) that can be accessed by a corresponding client (e.g., a browser) and/or an Internet website platform (e.g., portals such as Tencent, Netease, Youku, and Tudou, audio and video service web sites and other types of web sites). As used herein, the term "Internet communication application client" refers to, for example, an Internet mail client, an Internet instant messaging client (e.g., QQ instant messaging) and/or other suitable Internet communication application clients.

    [0024] The above-described method can be specifically implemented on a user device, for example, can be specifically implemented in a software and/or hardware module arranged in the user device. In one embodiment, the above-described method can be specifically implemented in a browser installed on the user device. The user device can be, for example, a mobile phone, a tablet computer, a personal computer, or other user device with network access capability.

    [0025] As disclosed herein, an operation performed by any one module in the user device can be described as an operation performed by the user device and can also be described as an operation performed by a module in the user device, and so on.

    [0026] Therefore, in the exemplary resource sharing method, a user device can acquire address information of a resource to be shared, generate a two-dimensional barcode corresponding to the address information of the resource to be shared, and publish via a network the two-dimensional barcode to an Internet platform and/or to an Internet communication application client. The resource sharing can be performed by publishing a two-dimensional barcode. Therefore, this method can help improve security, privacy, and operational convenience for sharing resources via network.

    [0027] Further, by encrypting the published two-dimensional barcode corresponding to the address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy of the network resource sharing.

    [0028] Various embodiments can also include a resource sharing method by acquiring a two-dimensional barcode that is published via a network to an Internet platform and/or an Internet communication application client; interpreting the two-dimensional barcode to acquire corresponding address information of a resource to be shared; and accessing the resource based on the address information.

    [0029] FIG. 2 is a schematic flow diagram illustrating another exemplarymethod for resource sharing in accordance with various disclosed embodiments.

    [0030] In Step 201, a two-dimensional barcode that is published via a network to an Internet platform and/or an Internet communication application client can be acquired.

    [0031] In some embodiments, there can be various ways for a two-dimensional barcode publishing side to publish a two-dimensional barcode via a network. For example, a two-dimensional barcode can be published via a network to an Internet platform and/or to a specified Internet communication application client. The Internet platform mentioned in various embodiments of the present disclosure refers to, for example, an Internet social platform (e.g., QQ space, micro-blog, and FaceBook) that can be accessed by a corresponding client (e.g., a browser) and/or an Internet website platform (e.g., portals including Tencent, Netease, Youku, and Tudou, and/or audio and video service web sites). The Internet communication application client disclosed herein refers to, for example, an Internet mail client, an Internet instant messaging client (e.g., QQ), or other Internet communication application clients.

    [0032] Therefore, depending onhow a two-dimensional barcode publishing side publishes, via a network, a two-dimensional barcode, a two-dimensional barcode acquiring side can acquire the two-dimensional barcode that is published via the network in a different manner. For example, when a two-dimensional barcode publishing side publishes, via the network, a two-dimensional barcode to an Internet platform, a two-dimensional barcode acquiring side can acquire, from the Internet platform, the two-dimensional barcode published via the network. When a two-dimensional barcode publishing side publishes, via the network, a two-dimensional barcode to a specified Internet communication application client, a two-dimensional barcode acquiring side can acquire, via the Internet communication application client, the two-dimensional barcode that is published via the network.

    [0033] In Step 202, the acquired two-dimensional barcode can be interpreted to acquire corresponding address information of a resource to be shared.

    [0034] In some embodiments, after acquiring a two-dimensional barcode that is published via a network, for example, the acquired two-dimensional barcode can be interpret automatically (e.g., when triggered by a specific event) or according to a user command to acquire corresponding address information of a resource to be shared.

    [0035] In some embodiments, when the acquired two-dimensional barcode is encrypted, an encryption password can be acquired to decrypt the acquired two-dimensional barcode, or the acquired two-dimensional barcode can be decrypted according to an agreed encryption password. After decrypting the acquired two-dimensional barcode, the decrypted two-dimensional barcode can be interpreted to acquire corresponding address information of a resource to be shared. In this way, targets of resource sharing can be controlled via an encryption password. For example, targets of resource sharing can be controlled via an agreement or notification of an encryption password. When a target is not informed of an encryption password, the target cannot interpret a corresponding two-dimensional barcode of corresponding address information of a resource to be shared and thus cannot access the sharing resource.

    [0036] In Step 203, the resource can be accessed based on the corresponding address information of the resource that is acquired by interpreting.

    [0037] In some embodiments, the resource to be shared can be accessed automatically (e.g., when triggered by a specific event) or according to a user command, based on the corresponding address information of the resource to be shared that is acquired by the analysis.

    [0038] The above-described method of the present embodiment can be specifically implemented on a user device, for example, can be specifically implemented in a software and/or hardware module arranged in a user device (for example, can be specifically implemented in a browser installed on a user device). The user device can be, for example, a mobile phone, a tablet computer, a personal computer, or other user device with network access capability.

    [0039] As used herein, an operation performed by any one module in the user device can be described as an operation performed by the user device and/or described as an operation performed by a module in the user device, and so on.

    [0040] Therefore, in the exemplary resource sharing method, a user device can acquire a two-dimensional barcode that is published via a network to an Internet platform and/or to an Internet communication application client; interpret the two-dimensional barcode to acquire corresponding address information of a resource to be shared; and access the resource based on the address information. The resource sharing is performed by publishing a two-dimensional barcode. Therefore, this method can help improve security, privacy and operational convenience for sharing resources via network.

    [0041] Further, by encrypting the published two-dimensional barcode corresponding to the address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy of the network resource sharing.

    [0042] FIGS. 3A-3C depict exemplary application scenarios for better understanding exemplary methods for resource sharing in accordance with various disclosed embodiments.

    [0043] In Step A301 of FIG. 3A, user A1 accesses a web page P1 via a browser A2 that is arranged in a mobile phone M1. When the browser A2 that is arranged in the mobile phone M1 accesses the web page P1, the browser A2 can acquire address information of the web page P1 in response to a sharing request.

    [0044] In Step A302, according to a command for generating a two-dimensional barcode issued by the user A1, the browser A2 generates a two-dimensional barcode m1 corresponding to the address information of the web page P1.

    [0045] In Step A303, according to a sharing command issued by the user A1, the browser A2 publishes, via a network, the generated two-dimensional barcode m1 to a corresponding QQ space of the user A1.

    [0046] In Step A304, a user B1 accesses the corresponding QQ space of the user A1 via a browser B2 that is arranged in a mobile phone M2.

    [0047] In Step A305, according to a command issued by the user B1, the browser B2 acquires the two-dimensional barcode m1 of the corresponding QQ space of the user A1.

    [0048] In Step A306, according to a command issued by the user B1, the browser B2 interprets the acquired two-dimensional barcode to acquire the corresponding address information of the web page P1.

    [0049] In Step A307, according to a command issued by the user B1, the browser B2 accesses the web page P1 based on the address information that is acquired by the interpreting.

    [0050] FIG. 3B depicts another exemplary resource sharing method in accordance with various disclosed embodiments.

    [0051] In Step B301, a user A1 accesses a network video P2 via a browser A2 that is arranged in a mobile phone M1. When the browser A2 arranged in the mobile phone M1 accesses the network video P2, the browser A2 can acquire address information of the network video P2 in response to a sharing request.

    [0052] In Step B302, according to a command for generating a two-dimensional barcode issued by the user A1, the browser A2 generates a two-dimensional barcode m2 corresponding to the address information of the network video P2.

    [0053] In Step B303, according to a sharing command issued by the user A1, the browser A2 publishes, via a network, the generated two-dimensional barcode m2 to a corresponding Tencent micro-blogging space of the user A1.

    [0054] In Step B304,a user B1 accesses the corresponding Tencent micro-blogging space of the user A1 via a browser B2 that is arranged in a mobile phone M2.

    [0055] In Step B305, according to a command issued by the user B1, the browser B2 acquires the two-dimensional barcode m2 that is published to the corresponding Tencent micro-blogging space of the user A1.

    [0056] In Step B306, according to a command issued by the user B1, the browser B2 interprets the acquired two-dimensional barcode to acquire the corresponding address information of the network video P2.

    [0057] In Step B307, according to a command issued by the user B1, the browser B2 accesses the network video P2 based on the address information that is acquired by interpreting.

    [0058] FIG. 3C depicts another exemplary resource sharing method in accordance with various disclosed embodiments.

    [0059] In Step C301,a user A1 accesses a network image P3 via a browser A2 that is arranged in a mobile phone M1. When the browser A2 that is arranged in the mobile phone M1 accesses the network image P3, the browser A2 can acquire address information of the network image P3 in response to a sharing request.

    [0060] In Step C302,according to acommand for generating a two-dimensional barcode issued by the user A1, the browser A2 generates a two-dimensional barcode m3 corresponding to the address information of the network image P3.

    [0061] In Step C303,according to a sharing command issued by the user A1, the browser A2 publishes, via a network, the generated two-dimensional barcode m3 to mailbox K1 that is specified by the user A1.

    [0062] In Step C304, a user B1 accesses the mailbox K1 via a browser B2 that is arranged in a personal computer C1.

    [0063] In Step C305,according to a command issued by the user B1, the browser B2 acquires the two-dimensional barcode m3 that is published to the mailbox K1.

    [0064] In Step C306, according to a command issued by the user B1, the browser B2 interprets the acquired two-dimensional barcode tm3 to acquire the corresponding address information of the network image P3.

    [0065] In Step C307, according to a command issued by the user B1, the browser B2 accesses the network image P3 based on the address information that is acquired by the interpreting.

    [0066] It should be noted that implementations depicted in FIGS. 3A-3C are examples for illustration purposes, suitable implementations in other application scenarios can be similarly performed. In addition, suitable devices can be used to implement the methods for resource sharing as disclosed herein.

    [0067] FIG. 4 depicts an exemplary user device for implementing a method for resource sharing. For example, a user device 400 can include a first acquisition module 410, a generating module 420, and a publishing module 430.

    [0068] The first acquisition module 410 can be used to acquire corresponding address information of a resource to be shared, in response to a sharing request.

    [0069] The generating module 420 can be used to generate a two-dimensional barcode corresponding to the address information of the resource to be shared, based on the address information that is acquired by the first acquisition module 410.

    [0070] The publishing module 430 can be used to publish, via a network, the two-dimensional barcode that is generated by the generating module 420 to an Internet platform and/or publish, via a network, the two-dimensional barcode that is generated by the generating module 420 to an Internet communication application client.

    [0071] The first acquisition module 410 can acquire the corresponding address information of the resource to be shared in a manner according to specific application scenarios.

    [0072] In some embodiments, the first acquisition module 410 can be specifically used to, in response to a sharing request, acquire corresponding address information of the resource to be shared that a user is currently accessing; or, in response to a sharing request, acquire corresponding address information of a resource to be shared that a user inputs; or, in response to a sharing request, acquire corresponding address information of a resource to be shared that is specified by a user command; or, in response to a sharing request, acquire corresponding address information of a resource to be shared that is found via a search on a network; or, in response to a sharing request, acquire corresponding address information of a resource to be shared from a configuration file.

    [0073] In some embodiments, the generating module 420 can generate, automatically (e.g., when triggered by a specific event) or according to a user command, a two-dimensional barcode corresponding to the address information that is acquired by the first acquisition module 410. An algorithm that is used by the generating module 420 to generate the two-dimensional barcode can be arbitrary and randomly selected (for example, randomly selected from a plurality of alternative algorithms), set to a default setting, or specified by a user via a command.

    [0074] In some embodiments, there can be various manners for the publishing module 430 to publish, via a network, the two-dimensional barcode.

    [0075] In some embodiments, the publishing module 430 can encrypt the two-dimensional barcode that is generated by the generating module 420 and then publish, via a network, the encrypted two-dimensional barcode to an Internet platform, and/or encrypt the two-dimensional barcode that is generated by the generating module 420 and then publish, via a network, the encrypted two-dimensional barcode to a specified Internet communication application client. In this manner, targets of resource sharing can be controlled via an encryption password. For example, targets of resource sharing can be controlled via an agreement or notification of an encryption password. When a target is not informed of an encryption password, the target cannot interpret a corresponding two-dimensional barcode of corresponding address information of the resource to be shared and thus cannot access the sharing resource.

    [0076] FIG. 5 depicts an exemplary publishing module in a user device in according with various disclosed embodiments. The exemplary publishing module can be configured in the device depicted in FIG. 4. The exemplary publishing module 430includes a first publishing sub-module 431 and/or a second publishing sub-module 432.

    [0077] The first publishing sub-module 431 can be used to publish, via a network, the two-dimensional barcode that is generated by the generating module 420 to an Internet platform.

    [0078] The second publishing sub-module 432 can be used to publish, via a network, the two-dimensional barcode that is generated by the generating module 420 to a specified Internet communication application client.

    [0079] In some embodiments, the first publishing sub-module 431 can be specifically used to publish, automatically or according to a command issued by a user, via a network, the two-dimensional barcode that is generated by the generating module 420 to a specified Internet social platform and/or to an Internet website platform.

    [0080] In some embodiments, the first publishing sub-module 431 can be specifically used to encrypt, automatically or according to a command issued by a user, the two-dimensional barcode that is generated by the generating module 420 and then publish, via a network, the encrypted two-dimensional barcode to a specified Internet social platform and/or to an Internet website platform.

    [0081] In some embodiments, the second publishing sub-module 432 can be specifically used to encrypt, automatically or according to a command issued by a user, the two-dimensional barcode that is generated by the generating module 420 and thereafter publish, via a network, the encrypted two-dimensional barcode to a specified Internet communication application client.

    [0082] The user device 400 depicted in FIG. 4 (and/or having the exemplary publishing module as depicted in FIG. 5)can be, for example, a mobile phone, a tablet computer, a personal computer, or any other suitable user device with network access capability. The function of each functional module/module of the user device 400 can be specifically realized.

    [0083] As disclosed herein, the user device 400 can acquire address information of a resource to be shared, generate a two-dimensional barcode corresponding to the address information of the resource to be shared, and publish, via a network, the two-dimensional barcode to an Internet platform and/or to an Internet communication application client. The resource sharing is performed by publishing a two-dimensional barcode. Therefore, this can help improve security, privacy, and operational convenience for sharing network resources.

    [0084] Further, by encrypting the published two-dimensional barcode corresponding to the address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy of the network resource sharing.

    [0085] FIG. 6 depicts another exemplary user device 600 in accordance with various disclosed embodiments. For example, the exemplary user device 600 includes a second acquisition module 610, an interpretingmodule 620, and/or an accessing module 630.

    [0086] The second acquisition module 610 can be used to acquire a two-dimensional barcode that is published, via a network, to an Internet platform and/or an Internet communication application client.

    [0087] In some embodiments, there can be various manners for a two-dimensional barcode publishing side to publish, via a network, a two-dimensional barcode. For example, a two-dimensional barcode can be published, via a network, to an Internet platform and/or to a specified Internet communication application client. The Internet platform disclosed herein refers to, for example, an Internet social platform (e.g., QQ space, micro-blog, and/orFaceBook) that can be accessed by a corresponding client (e.g., a browser) and/or an Internet website platform (e.g., portals including Tencent, Netease, Youku, and Tudou, and/or audio and video service web sites). The Internet communication application client disclosed herein refers to, for example, an Internet mail client, an Internet instant messaging client (such as QQ), or other Internet communication application clients.

    [0088] Therefore, the second acquisition module 610 can acquire the two-dimensional barcode that is published via the network in a manner, depending on how a two-dimensional barcode publishing side publishes a two-dimensional barcode via a network. For example, when a two-dimensional barcode publishing side publishes a two-dimensional barcode via a network to an Internet platform, the second acquisition module 610 can acquire from the Internet platform the two-dimensional barcode that is published via the network. When a two-dimensional barcode publishing side publishes a two-dimensional barcode via a network to a specified Internet communication application client, the second acquisition module 610 can acquire, via the Internet communication application client, the two-dimensional barcode that is published via the network; and so on.

    [0089] The interpretingmodule 620 can be used to interpret the two-dimensional barcode that is acquired by the second acquisition module 610 to acquire corresponding address information of the resource to be shared.

    [0090] In some embodiments, after the second acquisition module 610 acquires a two-dimensional barcode that is published via a network, the interpretingmodule 620 can interpret, automatically (e.g., when triggered by a specific event) or according to a user command, the acquired two-dimensional barcode to acquire the corresponding address information of the resource to be shared.

    [0091] In some embodiments, when the two-dimensional barcode that is acquired by the second acquisition module 610 is encrypted, the interpretingmodule 620 can acquire an encryption password to decrypt the acquired two-dimensional barcode, or the interpretingmodule 620 can decrypt the acquired two-dimensional barcode according to an agreed encryption password. After the interpretingmodule 620 has decrypted the acquired two-dimensional barcode, the interpretingmodule 620 can interpret the decrypted two-dimensional barcode to acquire corresponding address information of the resource to be shared.

    [0092] The accessing module 630 can be used to access the resource to be shared based on the address information acquired by the interpretingmodule 620.

    [0093] In some embodiments, the accessing module 630 can access, automatically (e.g., when triggered by a specific event) or according to a user command, the resource to be shared, based on the corresponding address information of the resource to be shared that is acquired by the interpreting.

    [0094] The exemplary user device 600 can be, for example, a mobile phone, a tablet computer, a personal computer, or any other suitable user device with network access capability. The function of each functional module of the user device 600 can be specifically realized according to methods described herein.

    [0095] The user device 600, as disclosed herein, can acquire a two-dimensional barcode that is published via a network to an Internet platform and/or to an Internet communication application client; interpret the two-dimensional barcode to acquire corresponding address information of a resource to be shared; and access the resource based on the address information. The resource sharing is performed by publishing a two-dimensional barcode. Therefore, this method can help improve security, privacy, and operational convenience of network resource sharing.

    [0096] Further, by encrypting the published two-dimensional barcode corresponding to address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy of the network resource sharing.

    [0097] FIG. 7 depicts an exemplary communication system including a user device 710 and/or an Internet platform 720 in accordance with various disclosed embodiments. The user device 710 and the Internet platform 720 can be communicably connected. The user device 710 can be used to acquire corresponding address information of a resource to be shared in response to a sharing request; generate a corresponding two-dimensional barcode of the address information; and publish, via a network, the generated two-dimensional barcode to the Internet platform 720.

    [0098] The Internet platform 720 disclosed herein refers to, for example, an Internet social platform (e.g., QQ space, micro-blog, and/orFaceBook) that can be accessed by a corresponding client (e.g., a browser) and/or an Internet website platform (e.g., portals including Tencent, Netease, Youku, and Tudou, and/or audio and video service web sites or other types of web sites).

    [0099] According to different application scenarios, the user device 710 can acquire corresponding address information of the resource to be shared in a different manner.

    [0100] For example, the user device 710 can, in response to a sharing request, acquire corresponding address information of a resource to be shared that a user is currently accessing; or, in response to a sharing request, acquire corresponding address information of a resource to be shared that a user inputs; or, in response to a sharing request, acquire corresponding address information of a resource to be shared that is specified by a user via a command; or, in response to a sharing request, acquire corresponding address information of a resource to be shared that is found via a search on a network; or, in response to a sharing request, acquire corresponding address information of a resource to be shared from a configuration file. For example, the configuration file can be stored locally on the user device 710.

    [0101] In some embodiments, the user device 710 can generate, automatically (e.g., when triggered by a specific event) or according to a user command, a corresponding two-dimensional barcode of the acquired address information. An algorithm that is used to generate the two-dimensional barcode can be arbitrary and randomly selected (e.g., randomly selected from a plurality of alternative algorithms), set to a default setting, or specified by a user via a command.

    [0102] In some embodiments, the user device 710 can encrypt the generated two-dimensional barcode and then publish via a network the encrypted two-dimensional barcode to the Internet platform 720. In this manner, targets of resource sharing can be controlled via an encryption password. For example, targets of resource sharing can be controlled via an agreement or notification of an encryption password. When a target is not informed of an encryption password, the target cannot interpret a corresponding two-dimensional barcode of corresponding address information of a resource to be shared and thus cannot access the sharing resource.

    [0103] The user device 710 as disclosed herein can be, for example, a mobile phone, a tablet computer, a personal computer, or any other suitable user device with network access capability. The function of each functional module of the user device 710 can be specifically realized according to the method described herein.

    [0104] The user device 710 as disclosed herein can acquire corresponding address information of the resource to be shared, generate a corresponding two-dimensional barcode of the corresponding address information of the resource to be shared, and publish via a network the two-dimensional barcode to an Internet platform. The resource sharing is performed by publishing a two-dimensional barcode. Therefore, this can help improve security, privacy, and operational convenience of network resource sharing.

    [0105] Further, by encrypting the published corresponding two-dimensional barcode of the corresponding address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy of the network resource sharing.

    [0106] FIG. 8 depicts another exemplary communication system including a user device 810 and/or an Internet platform 820 as disclosed herein. The user device 810 and the Internet platform 820 can be communicably connected. The user device 810 can be used to acquire from the Internet platform 820 a two-dimensional barcode that is published via a network; interpret the two-dimensional barcode to acquire corresponding address information of a resource to be shared; and access the resource based on the address information.

    [0107] The Internet platform 820 as disclosed herein refers to, for example, an Internet social platform (e.g.,QQ space, micro-blog, and/orFaceBook) that can be accessed by a corresponding client (e.g., a browser) and/or an Internet website platform (e.g., portals including Tencent, Netease, Youku, and Tudou, and/or audio and video service web sites or other types of web sites).

    [0108] In some embodiments, after acquiring the two-dimensional barcode that is published via a network from the Internet platform 820, the user device 810 can interpret, for example, automatically (e.g., when triggered by a specific event) or according to a user command, the acquired two-dimensional barcode to acquire corresponding address information of the resource to be shared.

    [0109] In some embodiments, when the acquired two-dimensional barcode is encrypted, the user device 810 can acquire an encryption password to decrypt the acquired two-dimensional barcode, or the user device 810 can decrypt the acquired two-dimensional barcode according to an agreed encryption password. After decrypting the acquired two-dimensional barcode, the user device 810 can interpret the decrypted two-dimensional barcode to acquire corresponding address information of the resource to be shared. In this manner, targets of resource sharing can be controlled via an encryption password. For example, targets of resource sharing can be controlled via an agreement or notification of an encryption password. When a target is not informed of an encryption password, the target cannot interpret a corresponding two-dimensional barcode of corresponding address information of the resource to be shared and thus cannot access the sharing resource.

    [0110] In some embodiments, the user device 810 can access, automatically (e.g., when triggered by a specific event) or according to a user command, the resource to be shared, based on the corresponding address information of the resource to be shared that is acquired by the analysis.

    [0111] The user device 810 as disclosed herein can be, for example, a mobile phone, a tablet computer, a personal computer, or any other suitable user device with network access capability. The function of each functional module of the user device 810 can be specifically realized according to the method described herein.

    [0112] Therefore, in the present embodiment, the user device 810 can acquire a two-dimensional barcode that is published via a network to an Internet platform; interpret the two-dimensional barcode to acquire corresponding address information of a resource to be shared; and access the resource based on the address information. The resource sharing is performed by publishing a two-dimensional barcode. Therefore, this method can help improve security, privacy, and operational convenience of network resource sharing.

    [0113] Further, by encrypting the published corresponding two-dimensional barcode of the corresponding address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy of the network resource sharing.

    [0114] An embodiment of the present disclosure provides a computer memory medium. The computer memory medium can store computer programs. When executed, the computer program can include some or all of the steps of the resource sharing methods described in the above method embodiments.

    [0115] The user device may be implemented on any appropriate computing platform. FIG. 7 shows a block diagram of an exemplary computing system 900 capable of implementing the server 604 and/or the terminal 606. As shown in FIG. 9, the exemplary computer system 900 may include a processor 902, a storage medium 904, a monitor 906, a communication module 908, a database 910, peripherals 912, and one or more bus 914 to couple the devices together. Certain devices may be omitted and other devices may be included.

    [0116] The processor 902 can include any appropriate processor or processors. Further, the processor 902 can include multiple cores for multi-thread or parallel processing. The storage medium 904 may include memory modules, for example, ROM, RAM, and flash memory modules, and mass storages, for example, CD-ROM, U-disk, removable hard disk, etc. The storage medium 904 may store computer programs for implementing various processes, when executed by the processor 902.

    [0117] Further, the peripherals 912 may include I/O devices, for example, keyboard and mouse, and the communication module 908 may include network devices for establishing connections via a network. The database 910 may include one or more databases for storing certain data and for performing certain operations on the stored data, for example, webpage browsing, database searching, etc.

    [0118] In various embodiments, the disclosed modules can be configured in one device or configured in multiple apparatus as desired. The modules disclosed herein can be integrated in one module or in multiple modules. Each of the modules disclosed herein can be divided into one or more sub-modules, which can be recombined in any manner.

    [0119] One of ordinary skill in the art would appreciate that suitable software and/or hardware (e.g., a universal hardware platform) can be included and used in the disclosed methods and systems. For example, the disclosed embodiments can be implemented by hardware only, which alternatively can be implemented by software products only. The software products can be stored in a computer-readable storage (e.g., memory) medium including, e.g., ROM/RAM, magnetic disk, optical disk, etc. The software products can include suitable commands to enableuser devices (e.g., including a mobile phone, a personal computer, a server, or a network device, etc.) to implement the disclosed embodiments.

    INDUSTRIAL APPLICABILITY AND ADVANTAGEOUS EFFECTS



    [0120] Without limiting the scope of any claim and/or the specification, examples of industrial applicability and certain advantageous effects of the disclosed embodiments are listed for illustrative purposes.

    [0121] Various embodiments provide methods and devices for resource sharing in order to improve security and privacy of the resource sharing. The methods and device (e.g., a user device) disclosed herein can acquire corresponding address information of the resource to be shared, generate a corresponding two-dimensional barcode of the corresponding address information of the resource to be shared, and publish via a network the two-dimensional barcode to an Internet platform. The resource sharing is performed by publishing a two-dimensional barcode. Therefore, this can help improve security, privacy, and operational convenience of network resource sharing.

    [0122] Further, by encrypting the published corresponding two-dimensional barcode of the corresponding address information of the resource to be shared, targets of the resource sharing can also be controlled. This can help further improve the security and privacy for sharing the network resource.

    REFERENCE SIGN LIST



    [0123] 

    User device 400

    First acquisition module 410

    Generating module 420

    Publishing module 430

    First publishing sub-module 431

    Second publishing sub-module 432

    User device 600

    Second acquisition module 610

    Interpreting module 620

    Accessing module 630

    User device 710

    Internet platform 720

    User device 810

    Internet platform 820

    Processor 902

    Storage medium 904

    Monitor 906

    Communications 908

    Database 910

    Peripherals 912




    Claims

    1. A resource sharing method comprising:

    acquiring (101), by a user device, address information of a resource to be shared in response to a sharing request;

    generating (102), by the user device, a two-dimensional barcode corresponding to the address information of the resource according to a command from a user via the user device;

    according to a sharing command from the user, encrypting, by the user device, the generated two-dimensional barcode and publishing (103), by the user device, the encrypted two-dimensional barcode to one or more of an Internet platform and an Internet communication application client via a network; and

    informing, by the user device, a target of resource sharing of an encryption password of the encrypted two-dimensional barcode, wherein the target of resource sharing interprets the encrypted two-dimensional barcode by using the encryption password.


     
    2. The method of claim 1, wherein the acquiring of the address information of the resource comprises:

    acquiring the address information of the resource to be shared that a user is currently accessing; or

    acquiring the address information of the resource to be shared input by a user; or

    acquiring the address information of the resource to be shared specified by a user command; or

    acquiring the address information of the resource to be shared that is found via a search on the network; or

    acquiring the address information of the resource to be shared from a configuration file.


     
    3. A resource sharing method comprising:

    acquiring (201), by a user device, an encrypted two-dimensional barcode that is published to one or more of an Internet platform and an Internet communication application client via a network;

    acquiring, by the user device, an encryption password of the encrypted two-dimensional barcode that is informed to the user device, and decrypting, by the user device, the encrypted two-dimensional barcode by using the encryption password, and interpreting (202), by the user device, the decrypted two-dimensional barcode to acquire address information of a resource corresponding to the two-dimensional barcode according to a command from a user via the user device; and

    accessing (203), by the user device, the resource based on the address information.


     
    4. A user device comprising:

    a first acquisition module (410), configured to acquire address information of a resource to be shared in response to a sharing request;

    a generating module (420), configured to generate a two-dimensional barcode corresponding to the address information, based on the address information acquired by the first acquisition module according to a command from a user via the user device; and

    a publishing module (430), configured to encrypt the two-dimensional barcode generated by the generating module and publish, via a network, the encrypted two-dimensional barcode to one or more of an Internet platform and an Internet communication application client according to a sharing command from the user, wherein

    the user device is further configured to inform, a target of resource sharing, of an encryption password of the encrypted two-dimensional barcode, wherein the target of resource sharing interprets the encrypted two-dimensional barcode by using the encryption password.


     
    5. The device of claim 4, wherein the first acquisition module is configure to:

    in response to the sharing request, acquire the address information of the resource to be shared that a user is currently accessing; or

    in response to the sharing request, acquire the address information of the resource to be shared that a user inputs; or

    in response to the sharing request, acquire the address information of the resource to be shared that is specified by a user command; or

    in response to the sharing request, acquire the address information of the resource to be shared that is found via a search on the network; or

    in response to the sharing request, acquire the address information of the resource to be shared from a configuration file.


     
    6. A user device comprising:

    a second acquisition module (610), configured to acquire an encrypted two-dimensional barcode that is published to one or more of an Internet platform and an Internet communication application client via a network;

    an interpreting module (620), configured to acquire an encryption password of the encrypted two-dimensional barcode that is informed to the user device, and decrypt the encrypted two-dimensional barcode by using the encryption password, and interpret the decrypted two-dimensional barcode to acquire address information of a resource according to a command from a user via the user device; and

    an accessing module, configured to access the resource based on the address information acquired by the interpreting module.


     


    Ansprüche

    1. Verfahren für gemeinsame Ressourcennutzung, umfassend:

    Erfassen (101), durch eine Benutzervorrichtung, einer Adresseninformation einer gemeinsam zu nutzenden Ressource als Antwort auf eine Mitbenutzungsanfrage;

    Erzeugen (102), durch die Benutzervorrichtung, eines zweidimensionalen Barcodes entsprechend der Adresseninformation der Ressource gemäß einer Anweisung von einem Benutzer über die Benutzervorrichtung;

    gemäß einer Mitbenutzungsanweisung vom Benutzer, Verschlüsseln des erzeugten zweidimensionalen Barcodes durch die Benutzervorrichtung und Herausgeben (103) des verschlüsselten zweidimensionalen Barcodes durch die Benutzervorrichtung an eine oder mehrere aus einer Internet-Plattform und einem Internetkommunikations-Anwendungsklienten über ein Netzwerk; und

    Informieren, durch die Benutzervorrichtung, eines Zielobjekts der gemeinsamen Ressourcennutzung über ein Verschlüsselungspasswort des verschlüsselten zweidimensionalen Barcodes, wobei das Zielobjekt der gemeinsamen Ressourcennutzung den verschlüsselten zweidimensionalen Barcode unter Verwendung des Verschlüsselungspassworts interpretiert.


     
    2. Verfahren nach Anspruch 1, wobei das Erfassen der Adresseninformation der Ressource umfasst:

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, auf die ein Benutzer aktuell zugreift; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, die durch einen Benutzer eingegeben wird; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, die durch eine Benutzeranweisung genau benannt wird; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, die über eine Suche im Netzwerk gefunden wird; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource aus einer Konfigurationsdatei.


     
    3. Verfahren für gemeinsame Ressourcennutzung, umfassend:

    Erfassen (201), durch eine Benutzervorrichtung, eines verschlüsselten zweidimensionalen Barcodes, der über ein Netzwerk an eines oder mehrere aus einer Internet-Plattform und einem Internetkommunikations-Anwendungsklienten herausgegeben wird;

    Erfassen, durch die Benutzervorrichtung, eines Verschlüsselungspassworts des verschlüsselten zweidimensionalen Barcodes, der an die Benutzervorrichtung übermittelt wurde, und Entschlüsseln, durch die Benutzervorrichtung, des verschlüsselten zweidimensionalen Barcodes unter Verwendung des Verschlüsselungspassworts, und Interpretieren (202), durch die Benutzervorrichtung, des entschlüsselten zweidimensionalen Barcodes zum Erfassen einer Adresseninformation einer Ressource entsprechend dem zweidimensionalen Barcode gemäß einer Anweisung von einem Benutzer über die Benutzervorrichtung; und

    Zugreifen (203), durch die Benutzervorrichtung, auf die Ressource beruhend auf der Adresseninformation.


     
    4. Benutzervorrichtung, aufweisend:

    ein erstes Erfassungsmodul (410), das dazu ausgelegt ist, eine Adresseninformation einer gemeinsam zu nutzenden Ressource als Antwort auf eine Mitbenutzungsanfrage zu erfassen;

    ein Erzeugungsmodul (420), das dazu ausgelegt ist, einen zweidimensionalen Barcode entsprechend der Adresseninformation zu erzeugen, und zwar beruhend auf der Adresseninformation, die durch das erste Erfassungsmodul gemäß einer Anweisung von einem Benutzer über die Benutzervorrichtung erfasst wird; und

    ein Veröffentlichungsmodul (430), das dazu ausgelegt ist, den durch das Erzeugungsmodul erzeugten zweidimensionalen Barcode zu verschlüsseln und über ein Netzwerk den verschlüsselten zweidimensionalen Barcode an eines oder mehrere aus einer Internet-Plattform und einem Internetkommunikations-Anwendungsklienten gemäß einer Mitbenutzungsanweisung vom Benutzer herauszugeben, wobei

    die Benutzervorrichtung darüber hinaus dazu ausgelegt ist, einem Zielobjekt der gemeinsamen Ressourcennutzung ein Verschlüsselungspasswort des verschlüsselten zweidimensionalen Barcodes zu übermitteln, wobei das Zielobjekt der gemeinsamen Ressourcennutzung den verschlüsselten zweidimensionalen Barcode unter Verwendung des Verschlüsselungspassworts interpretiert.


     
    5. Vorrichtung nach Anspruch 4, wobei das erste Erfassungsmodul ausgelegt ist zum:

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, auf die ein Benutzer aktuell zugreift, als Antwort auf die Mitbenutzungsanfrage; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, die ein Benutzer eingibt, als Antwort auf die Mitbenutzungsanfrage; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, die durch eine Benutzeranweisung genau benannt wird, als Antwort auf die Mitbenutzungsanfrage; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource, die über eine Suche im Netzwerk gefunden wird, als Antwort auf die Mitbenutzungsanfrage; oder

    Erfassen der Adresseninformation der gemeinsam zu nutzenden Ressource aus einer Konfigurationsdatei als Antwort auf die Mitbenutzungsanfrage.


     
    6. Benutzervorrichtung, aufweisend:

    ein zweites Erfassungsmodul (610), das dazu ausgelegt ist, einen verschlüsselten zweidimensionalen Barcode zu erfassen, der über ein Netzwerk an eines oder mehrere aus einer Internet-Plattform und einem Internetkommunikations-Anwendungsklienten herausgegeben wird;

    ein Interpretierungsmodul (620), das dazu ausgelegt ist, ein Verschlüsselungspasswort des verschlüsselten zweidimensionalen Barcodes zu erfassen, der an die Benutzervorrichtung übermittelt wurde, und den verschlüsselten zweidimensionalen Barcode unter Verwendung des Verschlüsselungspassworts zu entschlüsseln, und den entschlüsselten zweidimensionalen Barcode zum Erfassen einer Adresseninformation einer Ressource gemäß einer Anweisung von einem Benutzer über die Benutzervorrichtung zu interpretieren; und

    ein Zugriffsmodul, das dazu ausgelegt ist, beruhend auf der durch das Interpretierungsmodul erfassten Adresseninformation auf die Ressource zuzugreifen.


     


    Revendications

    1. Procédé de partage de ressource comprenant :

    l'acquisition (101), par un dispositif d'utilisateur, d'informations d'adresse d'une ressource à partager en réponse à une demande de partage ;

    la génération (102), par le dispositif d'utilisateur, d'un code barres bidimensionnel correspondant aux informations d'adresse de la ressource conformément à une consigne provenant d'un utilisateur via le dispositif d'utilisateur ;

    conformément à une consigne de partage provenant de l'utilisateur, le cryptage, par le dispositif d'utilisateur, du code barres bidimensionnel généré et la publication (103), par le dispositif d'utilisateur, du code barres bidimensionnel crypté sur l'une ou plusieurs d'une plateforme Internet et d'un client d'application de communication Internet via un réseau ; et

    le fait d'informer, par le dispositif d'utilisateur, une cible de partage de ressource d'un mot de passe de cryptage du code barres bidimensionnel crypté, sachant que la cible de partage de ressource interprète le code barres bidimensionnel crypté au moyen du mot de passe de cryptage.


     
    2. Le procédé de la revendication 1, sachant que l'acquisition des informations d'adresse de la ressource comprend :

    l'acquisition des informations d'adresse de la ressource à partager auxquelles un utilisateur est en train d'accéder ; ou

    l'acquisition des informations d'adresse de la ressource à partager qui sont entrées par un utilisateur ; ou

    l'acquisition des informations d'adresse de la ressource à partager qui sont spécifiées par une consigne d'utilisateur ; ou

    l'acquisition des informations d'adresse de la ressource à partager qui sont trouvées via une recherche sur le réseau ; ou

    l'acquisition des informations d'adresse de la ressource à partager à partir d'un fichier de configuration.


     
    3. Procédé de partage de ressource comprenant :

    l'acquisition (201), par un dispositif d'utilisateur, d'un code barres bidimensionnel crypté qui est publié sur l'une ou plusieurs d'une plateforme Internet et d'un client d'application de communication Internet via un réseau ;

    l'acquisition, par le dispositif d'utilisateur, d'un mot de passe de cryptage du code barres bidimensionnel crypté dont est informé le dispositif d'utilisateur, et le décryptage, par le dispositif d'utilisateur, du code barres bidimensionnel crypté au moyen du mot de passe de cryptage, et l'interprétation (202), par le dispositif d'utilisateur, du code barres bidimensionnel décrypté pour acquérir des informations d'adresse d'une ressource correspondant au code barres bidimensionnel conformément à une consigne provenant d'un utilisateur via le dispositif d'utilisateur ; et

    le fait d'accéder (203), par le dispositif d'utilisateur, à la ressource sur la base des informations d'adresse.


     
    4. Dispositif d'utilisateur comprenant :

    un premier module d'acquisition (410), configuré pour acquérir des informations d'adresse d'une ressource à partager en réponse à une demande de partage ;

    un module de génération (420), configuré pour générer un code barres bidimensionnel correspondant aux informations d'adresse, sur la base des informations d'adresse acquises par le premier module d'acquisition conformément à une consigne provenant d'un utilisateur via le dispositif d'utilisateur ; et

    un module de publication (430), configuré pour crypter le code barres bidimensionnel généré par le module de génération et publier, via un réseau, le code barres bidimensionnel crypté sur l'une ou plusieurs d'une plateforme Internet et d'un client d'application de communication Internet conformément à une consigne de partage provenant de l'utilisateur, sachant que

    le dispositif d'utilisateur est en outre configuré pour informer une cible de partage de ressource d'un mot de passe de cryptage du code barres bidimensionnel crypté, sachant que la cible de partage de ressource interprète le code barres bidimensionnel crypté au moyen du mot de passe de cryptage.


     
    5. Le dispositif de la revendication 4, sachant que le premier module d'acquisition est configuré pour :

    en réponse à la demande de partage, acquérir les informations d'adresse de la ressource à partager auxquelles un utilisateur est en train d'accéder ; ou

    en réponse à la demande de partage, acquérir les informations d'adresse de la ressource à partager qu'un utilisateur entre ; ou

    en réponse à la demande de partage, acquérir les informations d'adresse de la ressource à partager qui sont spécifiées par une consigne d'utilisateur ; ou

    en réponse à la demande de partage, acquérir les informations d'adresse de la ressource à partager qui sont trouvées via une recherche sur le réseau ; ou

    en réponse à la demande de partage, acquérir les informations d'adresse de la ressource à partager à partir d'un fichier de configuration.


     
    6. Dispositif d'utilisateur comprenant :

    un deuxième module d'acquisition (610), configuré pour acquérir un code barres bidimensionnel crypté qui est publié sur l'une ou plusieurs d'une plateforme Internet et d'un client d'application de communication Internet via un réseau ;

    un module d'interprétation (620), configuré pour acquérir un mot de passe de cryptage du code barres bidimensionnel crypté dont est informé le dispositif d'utilisateur, et décrypter le code barres bidimensionnel crypté au moyen du mot de passe de cryptage, et interpréter le code barres bidimensionnel décrypté pour acquérir des informations d'adresse d'une ressource conformément à une consigne provenant d'un utilisateur via le dispositif d'utilisateur ; et

    un module d'accès, configuré pour accéder à la ressource sur la base des informations d'adresse acquises par le module d'interprétation.


     




    Drawing























    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description