Document management system and document management method
First Claim
1. A document management system configured to manage an access to a file, the document management system comprising:
- at least one micro-processor, the micro-processor being programmed to control one or more of;
a selection unit configured to select a virtual security policy, which is previously provided for each device;
an acquisition unit configured to acquire access authority information for defining an authority for accessing the file based on the virtual security policy selected by the selection unit and authentication information about a user who has set the virtual security policy;
a conversion unit configured to convert, based on the access authority information acquired by the acquisition unit, the virtual security policy into a real security policy that can be commonly interpreted by the document management system, wherein the converted real security policy corresponds to the authority of the user who has set the virtual security policy;
a management unit configured to set the real security policy converted by the conversion unit on the file to manage an access to the file, anda file storage unit configured to set the virtual security policy selected by the selection unit on the file and then to store the file according to an environmental setting representing a timing of a conversion of the security policy by the conversion unit,wherein, on the timing according to the environmental setting, the conversion unit converts the virtual security policy into the real security policy and the management unit set the real security policy on the file.
1 Assignment
0 Petitions
Accused Products
Abstract
A document management system configured to manage an access to a file includes a selection unit configured to select a virtual security policy for setting on the file, which is previously provided for each device, an acquisition unit configured to acquire access authority information for defining an authority for accessing the file based on the virtual security policy selected by the selection unit and authentication information about a user who has set the virtual security policy, a conversion unit configured to convert the virtual security policy into a real security policy that can be commonly interpreted by the document management system based on the access authority information acquired by the acquisition unit, and a management unit configured to set the real security policy converted by the conversion unit on the file to manage an access to the file.
34 Citations
17 Claims
-
1. A document management system configured to manage an access to a file, the document management system comprising:
-
at least one micro-processor, the micro-processor being programmed to control one or more of; a selection unit configured to select a virtual security policy, which is previously provided for each device; an acquisition unit configured to acquire access authority information for defining an authority for accessing the file based on the virtual security policy selected by the selection unit and authentication information about a user who has set the virtual security policy; a conversion unit configured to convert, based on the access authority information acquired by the acquisition unit, the virtual security policy into a real security policy that can be commonly interpreted by the document management system, wherein the converted real security policy corresponds to the authority of the user who has set the virtual security policy; a management unit configured to set the real security policy converted by the conversion unit on the file to manage an access to the file, and a file storage unit configured to set the virtual security policy selected by the selection unit on the file and then to store the file according to an environmental setting representing a timing of a conversion of the security policy by the conversion unit, wherein, on the timing according to the environmental setting, the conversion unit converts the virtual security policy into the real security policy and the management unit set the real security policy on the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for a document management system configured to manage an access to a file stored in a memory, the method comprising:
-
selecting a virtual security policy stored in the memory, which is previously provided for each device; acquiring access authority information for defining an authority for accessing the file from the memory based on the selected virtual security policy and authentication information about a user who has set the virtual security policy; converting, by a processor of the document management system, the virtual security policy into a real security policy that can be commonly interpreted by the document management system, wherein the converted real security policy corresponds to the authority of the user who has set the virtual security policy; setting the converted real security policy on the file to manage an access to the file, and setting the virtual security policy selected by the selecting step, by a file storage unit, on the file and then storing the file according to an environmental setting representing a timing of a conversion of the security policy by the converting step, wherein, on the timing according to the environmental setting, the converting step converts the virtual security policy into the real security policy and the setting the converted real security policy step sets the real security policy on the file. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium storing instructions which, when executed by a document management system configured to manage an access to a file stored in a memory, cause the document management system to perform the method comprising:
-
selecting a virtual security policy stored in the memory, which is previously provided for each device; acquiring access authority information for defining an authority for accessing the file from the memory based on the selected virtual security policy and authentication information about a user who has set the virtual security policy; converting, by a processor of the document management system, the virtual security policy into a real security policy that can be commonly interpreted by the document management system, wherein the converted real security policy corresponds to the authority of the user who has set the virtual security policy; setting the converted real security policy on the file to manage an access to the file, and setting the virtual security policy selected by the selecting step, by a file storage unit, on the file and then storing the file according to an environmental setting representing a timing of a conversion of the security policy by the converting step, wherein, on the timing according to the environmental setting, the converting step converts the virtual security policy into the real security policy and the setting the converted real security policy step sets the real security policy on the file.
-
Specification