Systems and methods for controlling access to content distributed over a network
First Claim
Patent Images
1. A computer-implemented method for controlling use of a file on a user device, the method comprising:
- transmitting, by the user device, authentication information to a system, wherein the authentication information includes an identifier of the user device and at least one identification of a user associated with the user device;
downloading, by the user device, the file from the system upon successful authentication by the system;
limiting, by the user device, access of the file to a client application of the user device independent of a connection between the user device and the system;
preventing, by the user device, altering of the file, printing of the file and opening of the file outside of the client application;
storing, by the user device, notes corresponding to the file in a local storage area separate from the file;
transmitting, by the user device, at least a portion of the notes to the system;
permitting, by the user device, the user to designate the file for sharing with a second user to the system at least one of i) an identification of the second user or ii) an identification of a predefined group to which both the user and the second user belong, such that the system is enabled to send the file to the second user; and
removing, by the user device, the file from the user device as instructed by the system.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method is provided for controlling use of a file on a user device. The method includes transmitting authentication information to a system and downloading the file from the system over the network upon successful authentication by the system. The method also includes limiting access of the file to a client application of the user device and preventing altering of the file, printing of the file and opening of the file outside of the client application. Notes corresponding to the file can be stored in a local storage area.
26 Citations
19 Claims
-
1. A computer-implemented method for controlling use of a file on a user device, the method comprising:
-
transmitting, by the user device, authentication information to a system, wherein the authentication information includes an identifier of the user device and at least one identification of a user associated with the user device; downloading, by the user device, the file from the system upon successful authentication by the system; limiting, by the user device, access of the file to a client application of the user device independent of a connection between the user device and the system; preventing, by the user device, altering of the file, printing of the file and opening of the file outside of the client application; storing, by the user device, notes corresponding to the file in a local storage area separate from the file; transmitting, by the user device, at least a portion of the notes to the system; permitting, by the user device, the user to designate the file for sharing with a second user to the system at least one of i) an identification of the second user or ii) an identification of a predefined group to which both the user and the second user belong, such that the system is enabled to send the file to the second user; and removing, by the user device, the file from the user device as instructed by the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for controlling use of a file on a user device, the system comprising:
-
a services module, in communication with the user device, for performing; i) authenticating the user device and one or more user credentials of a user associated with the user device, ii) sending a file to the user device for downloading by the user device upon successful authentication, iii) receiving at least a portion of notes from the user device corresponding to the file, iv) removing the file from the user device upon expiration of a time period associated with the file or when access privilege of the user in relation to the file is revoked by an administrator, and v) sharing the file with a second user by receiving a designation from the user via the user device, the designation comprising at least one of i) an identification of the second user or ii) an identification of a predefined group to which both the user and the second user belong, wherein the user device is adapted to i) limit access of the file to a client application of the user device independent of a connection with the system and ii) prevent altering of the file, printing of the file and opening of the file outside of the client application; and an application module for managing the file and an account of the user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product, tangibly embodied in a non-transitory computer readable medium, for controlling use of a file on a user device, the computer program product including instructions being operable to cause data processing apparatus to:
-
transmit authentication information to a system, wherein the authentication information includes an identifier of the user device and at least one identification of a user associated with the user device; download the file from the system upon successful authentication by the system; limit access of the file to a client application of the user device independent of a connection between the user device and the system; prevent altering of the file, printing of the file and opening of the file outside of the client application; permit the user to designate the file for sharing with a second user by transmitting to the system at least one of i) an identification of the second user or ii) an identification of a predefined group to which both the user and the second user belong; and store notes corresponding to the file in a local storage area separate from the file.
-
-
19. A user device for controlling use of a file disposed on the user device, the user device including a client application and comprising:
-
an authentication module for transmitting authentication information to a system, the authentication information including an identifier of the user device and at least one identification of a user associated with the user device, wherein the authentication module is adapted to download the file from the system upon successful authentication by the system; a reader module for limiting access of the file to the client application independent of a connection between the user device and the system, the reader module preventing altering of the file, printing of the file and opening of the file outside of the client application; a notes module for storing notes corresponding to the file in a local storage area; and a sharing module for permitting the user to designate the file for sharing with a second user and transmitting to the system at least one of i) an identification of the second user or ii) an identification of a group defined by the system to which both the user and the second user belongs, the file has not been previously assigned to the second user, and the user has a sharing role.
-
Specification