Browse Prior Art Database

The program to avoid re-destribution of documentation using with provate infomation as a documentation password.

IP.com Disclosure Number: IPCOM000201715D
Publication Date: 2010-Nov-19
Document File: 1 page(s) / 35K

Publishing Venue

The IP.com Prior Art Database

Abstract

Content Management Systems(CMS) are used to share files like documents and materials between people. Some of them require user authentication and authorization to download files. But once downloads are done, CMS cannot control redistribution of them.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 72% of the total text.

Page 01 of 1

The program to avoid re-destribution of documentation using with provate infomation as a documentation password.

A person is registered to a CMS as a user with personally identifiable information like email address, name, ID number and/or something .

A contents holder and/or an administrator set how embedding is done to files.

The following are done at the actual access.

1. A person logs into a CMS server with pre-registered ID.
2. The server confirm his/her authentication is correct and get his/her personally identifiable information which were registered beforehand.
3. He/She search files and/or documents as needed and request for download of them.
4. The server confirm his/her authorisation for download.
5. If download is authorized, the server duplicate files and/or documents and embeds the following into them.
-Download ID for this time operation.
-His/Her personally identifiable information like email address, name, ID number and/or something as document header , document footer and/or some places of file/document..
6. The server sets a file password to duplicated files and/or documents. Personally identifiable information is used as the password.
7. The server logs download operation with User ID. Download ID, target files/documents and embedded personally identifiable information.
8. The server send files/documents with personally identifiable information to the requested person.
into downloading files/document.

Read-Only setting is better for files.

For example,...