FIELD: information technology.
SUBSTANCE: control method of file use in user device comprises: transferring information to system by user device for authentication, which includes a user device identifier and at least one device user identifier, therefore allowing authentication of the mentioned user device, file download by the user device from the system after successful authentication by the system, by which means the mentioned downloaded file is connected with the mentioned client application with the possibility of protected access, possibility of protected access to the mentioned file by means of the mentioned client application on the user device for at least one identified user connected with the mentioned user device during the time when the mentioned user device is disconnected from the mentioned system, by which means at least one mentioned identified user is an autonomous user, while protected access comprises possibility of access to the mentioned file for the client application, when the mentioned autonomous user is authenticated with the mentioned client application, prevention of file change, file printing and file opening out of the client application by the user device, saving file comments by the user device in the local memory area separate from the file, transferring at least part of the comments to the system by the user device, and deleting the file by the user device from the user device by system command.
EFFECT: secured file distribution to one or more user devices.
20 cl, 12 dwg
Title | Year | Author | Number |
---|---|---|---|
SERVER AND METHOD (VARIANTS) FOR DETERMINING SOFTWARE SURROUNDINGS OF CLIENT NODE IN A NETWORK HAVING CLIENT/SERVER ARCHITECTURE | 1999 |
|
RU2237275C2 |
SOFTWARE INTERFACE OF APPLICATIONS FOR ADMINISTRATION OF SOFTWARE UPDATES DISTRIBUTION IN SYSTEM OF UPDATES DISTRIBUTION | 2005 |
|
RU2386218C2 |
METHOD AND SYSTEM FOR AUTHORIZING A USER TO PERFORM AN ACTION IN AN ELECTRONIC SERVICE | 2017 |
|
RU2693330C2 |
INTERFACES FOR APPLICATION PROGRAMMING FOR CONTENT MANAGEMENT | 2014 |
|
RU2666302C2 |
METHODS AND SYSTEMS FOR AUTHENTICATING A POSSIBLE USER OF THE FIRST AND SECOND ELECTRONIC SERVICES | 2022 |
|
RU2805537C2 |
DETECTABILITY AND LISTING MECHANISM IN HIERARCHICALLY PROTECTED DATA STORAGE SYSTEM | 2006 |
|
RU2408070C2 |
AUTHENTICATION AND CONNECTION INTO PAIR OF DEVICES USING MACHINE-READABLE CODE | 2015 |
|
RU2682379C2 |
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER | 2018 |
|
RU2776258C2 |
AUTOMATIC DIALOGUE TECHNOLOGIES | 2009 |
|
RU2523165C2 |
METHODS AND SYSTEMS OF USER IDENTIFICATION IN SUBAREAS OF NETWORK AREA | 2003 |
|
RU2348070C2 |
Authors
Dates
2017-08-15—Published
2012-10-10—Filed