Document databases managed by first and second authentication methods
First Claim
1. A document management system comprising:
- a client apparatus;
a document management apparatus that manages a plurality of document databases;
an authentication apparatus capable of communicating with said document management apparatus; and
a plurality of document databases capable of being accessed by said client apparatus and said document management apparatus, wherein each of said plurality of document databases is pre-designated with either a first authentication method or a second authentication method, the first and second authentication method being used for access to said each of the document databases,wherein the first authentication method is executed in the document management apparatus, and the second authentication method is executed using the authentication apparatus,wherein the client apparatus, the document management apparatus and the authentication are apparatus are located at different locations on a network, wherein the authentication apparatus and the plurality of document databases are located at different locations on the network,wherein said document management apparatus comprises a CPU executing the following steps;
a receiving step of receiving an access request from the client apparatus, an access to one of said plurality of document databases being requested in the access request;
an access right determining step of determining whether the client apparatus having made the access request has an access right based on user information held in the document databases to be accessed;
an informing step of informing, when said access right determining step determines that the client apparatus does not have the access right, the client apparatus that the client apparatus does not have the access right;
a determining step of determining, when said access right determining step determines that the client apparatus has the access right, whether the authentication method of the document database requested in the access request is the first authentication method or the second authentication method;
a first authenticating step of executing the first authentication method for the client apparatus in the document management apparatus when said determining step determines that the authentication method of the requested document database is the first authentication method, wherein the client apparatus is always required to be authenticated by said document management apparatus regardless of whether or not the client apparatus has already been authenticated by any one of said document management apparatus and said authentication apparatus when the client apparatus requests to access one of the plurality of document databases for which the first authentication method is used; and
a second authenticating step of executing the second authentication method for the client apparatus by transmitting an authentication request to the authentication apparatus in the case where the client apparatus has not been authenticated by said authentication apparatus when said determining step determines that the authentication method of the requested document database is the second authentication method, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus,and wherein the second authenticating step is not required to execute the second authentication method again when the client apparatus requests to access another one of the plurality of document databases, for which the second authentication method is used, after the client apparatus has been authenticated by said second authenticating step, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided a document management system that eliminates the necessity of performing such a complicated operation as to input a password by the user each time he/she tries to open any of document databases, thus improving the operability or the like for the user. A plurality of document databases are provided, which are capable of being accessed by a client apparatus via a communication medium. A document management apparatus manages the plurality of document databases such that different authentication methods are used for respective ones of the plurality of document databases when one of the at least one client apparatus having made an access request so as to open any of said plurality of document databases is authenticated, and makes settings such that the one client apparatus is not required to be authenticated again when accessing another one of said plurality of document databases after the one client apparatus has been authenticated.
24 Citations
12 Claims
-
1. A document management system comprising:
-
a client apparatus; a document management apparatus that manages a plurality of document databases; an authentication apparatus capable of communicating with said document management apparatus; and a plurality of document databases capable of being accessed by said client apparatus and said document management apparatus, wherein each of said plurality of document databases is pre-designated with either a first authentication method or a second authentication method, the first and second authentication method being used for access to said each of the document databases, wherein the first authentication method is executed in the document management apparatus, and the second authentication method is executed using the authentication apparatus, wherein the client apparatus, the document management apparatus and the authentication are apparatus are located at different locations on a network, wherein the authentication apparatus and the plurality of document databases are located at different locations on the network, wherein said document management apparatus comprises a CPU executing the following steps; a receiving step of receiving an access request from the client apparatus, an access to one of said plurality of document databases being requested in the access request; an access right determining step of determining whether the client apparatus having made the access request has an access right based on user information held in the document databases to be accessed; an informing step of informing, when said access right determining step determines that the client apparatus does not have the access right, the client apparatus that the client apparatus does not have the access right; a determining step of determining, when said access right determining step determines that the client apparatus has the access right, whether the authentication method of the document database requested in the access request is the first authentication method or the second authentication method; a first authenticating step of executing the first authentication method for the client apparatus in the document management apparatus when said determining step determines that the authentication method of the requested document database is the first authentication method, wherein the client apparatus is always required to be authenticated by said document management apparatus regardless of whether or not the client apparatus has already been authenticated by any one of said document management apparatus and said authentication apparatus when the client apparatus requests to access one of the plurality of document databases for which the first authentication method is used; and a second authenticating step of executing the second authentication method for the client apparatus by transmitting an authentication request to the authentication apparatus in the case where the client apparatus has not been authenticated by said authentication apparatus when said determining step determines that the authentication method of the requested document database is the second authentication method, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus, and wherein the second authenticating step is not required to execute the second authentication method again when the client apparatus requests to access another one of the plurality of document databases, for which the second authentication method is used, after the client apparatus has been authenticated by said second authenticating step, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus. - View Dependent Claims (2, 3)
-
-
4. A document management apparatus that manages a plurality of document databases capable of being accessed by a client apparatus and that communicates with an authentication apparatus, wherein each of said plurality of document databases is pre-designated with either a first authentication method or a second authentication method, the first and second authentication method being used for access to said each of the document databases, wherein the client apparatus, the document management apparatus and the authentication apparatus are located at different locations on a network, wherein the authentication apparatus and the plurality of document databases are located at different locations on the network, the document management apparatus comprising a CPU executing the following steps:
-
a receiving step of receiving an access request from the client apparatus, an access to one of said plurality of document databases being requested in the access request; an access right determining step of determining whether the client apparatus having made the access request has an access right based on user information held in the document databases to be accessed; an informing step of informing, when said access right determining step determines that the client apparatus does not have the access right, the client apparatus that the client apparatus does not have the access right; a determining step of determining, when said access right determining step determines that the client apparatus has the access right, whether the authentication method of the document database requested in the access request is the first authentication method or the second authentication method; a first authenticating step of executing a first authentication for the client apparatus in the document management apparatus when said determining step determines that the authentication method of the requested document database is the first authentication method, wherein the client apparatus is always required to be authenticated by said document management apparatus regardless of whether or not the client apparatus has already been authenticated by any one of said document management apparatus and said authentication apparatus when the client apparatus requests to access one of the plurality of document databases for which the first authentication method is used; and a second authenticating step of executing the second authentication method for the client apparatus by transmitting an authentication request to the authentication apparatus in the case where the client apparatus has not been authenticated by said authentication apparatus when said determining step determines step that the authentication method of the requested document database is the second authentication method, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus, and wherein the second authentication step is not required to execute the second authentication method again when the client apparatus requests to access another one of the plurality of document databases, for which the second authentication method is used, after the client apparatus has been authenticated by said second authentication means step, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus. - View Dependent Claims (5, 6)
-
-
7. An authentication method executed in a document management apparatus that manages a plurality of document databases and that communicates with a client apparatus and an authentication apparatus, wherein each of said plurality of document databases is pre-designated with either a first authentication method or a second authentication method, the first and second authentication method being used for access to said each of the document databases, wherein the client apparatus, the document management apparatus and the authentication apparatus are located at different locations on a network, wherein the authentication apparatus and the plurality of document databases are located at different locations on the network, the method comprising:
-
a receiving step of receiving an access request from the client apparatus, an access to one of said plurality of document databases being requested in the access request; access right determining step for determining whether the client apparatus having made the access request has an access right based on user information held in the document databases to be accessed; informing step for informing, when said access right determining step determines that the client apparatus does not have the access right, the client apparatus that the client apparatus does not have the access right; a determining step of determining, when said access right determining step determines that the client apparatus has the access right, whether the authentication method for the document database requested in the access request is the first authentication method or the second authentication method; a first authenticating step of executing the first authentication method for the client apparatus in the document management apparatus when it is determined in said determining step that the authentication method of the requested document database is the first authentication method, wherein the client apparatus is always required to be authenticated by said document management apparatus regardless of whether or not the client apparatus has already been authenticated by any one of said document management apparatus and said authentication apparatus when the client apparatus requests to access one of the plurality of document databases for which the first authentication method is used; and a second authenticating step of executing the second authentication method for the client apparatus by transmitting an authentication request to the authentication apparatus in the case where the client apparatus has not been authenticated by said authentication apparatus when it is determined in said determining step that the authentication method of the requested document database is the second authentication method, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus, and wherein the second authenticating step is not required to execute the second authentication method again when the client apparatus requests to access another one of the plurality of document databases, for which the second authentication method is used, after the client apparatus has been authenticated by said second authentication step, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus. - View Dependent Claims (8, 9)
-
-
10. A non-transitory computer-readable storage medium storing a program for implementing an authentication method to be executed by a document management apparatus that manages a plurality of document databases and that communicates with a client apparatus and an authentication apparatus, wherein each of said plurality of document databases is pre-designated with either a first authentication method or a second authentication method, the first and second authentication method being used for access to said each of the document databases, wherein the client apparatus, the document management apparatus and the authentication apparatus are located at different locations on a network, wherein the authentication apparatus and the plurality of document databases are located a different locations on the network, the authentication method comprising:
-
a receiving step of receiving an access request from the client apparatus, an access to one of said plurality of document databases being requested in the access request; access right determining step for determining whether the client apparatus having made the access request has an access right based on user information held in the document databases to be accessed; informing step for informing, when said access right determining step determines that the client apparatus does not have the access right, the client apparatus that the client apparatus does not have the access right; a determining step of determining, when said access right determining step determines that the client apparatus has the access right, whether the authentication method for the document database requested in the access request is the first authentication method or the second authentication method; a first authenticating step of executing the first authentication method for the client apparatus in the document management apparatus when it is determined in said determining step that the authentication method of the requested document database is the first authentication method, wherein the client apparatus is always required to be authenticated by said document management apparatus regardless of whether or not the client apparatus has already been authenticated by any one of said document management apparatus and said authentication apparatus when the client apparatus requests to access one of the plurality of document databases for which the first authentication method is used; and a second authenticating step of executing the second authentication method for the client apparatus by transmitting an authentication request to the authentication apparatus in the case where the client apparatus has not been authenticated by said authentication apparatus when it is determined in said determining step that the authentication method of the requested document database is the second authentication method, regardless of whether or not the client apparatus has already been authenticated by said document management apparatus, and wherein the second authenticating step is not required to execute the second authentication method again when the client apparatus requests to access another one of the plurality of document databases, for which the second authentication method is used, after the client apparatus has been authenticated by said second authentication step regardless of whether or not the client apparatus has already been authenticated by said document management apparatus. - View Dependent Claims (11, 12)
-
Specification