Information processing device, information management method, and information processing system
First Claim
1. An information processing device that is connected to another information processing device, comprising:
- a first memory that stores a first program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device; and
a first processor that is configured to perform the first program so as to execute a method including the steps of;
receiving an acquisition request that is sent from a client device according to the first authentication information,transmitting a list including files or folders that are stored in the another information processing device and are accessible according to the second authentication information that is stored in the first memory in association with the first authentication information of the received acquisition request;
receiving an execution request to execute a file or a folder that is included in the list, andexecuting a process according to the execution request by using the second authentication information when the file or the folder according to the execution request is stored in the another information processing device.
1 Assignment
0 Petitions
Accused Products
Abstract
An information processing device that is connected to another information processing device includes a memory storing a program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device; and a processor that performs the program so as to execute a method including the steps of receiving an acquisition request that is sent from a client device according to the first authentication information, transmitting a list including files that are accessible according to the second authentication information in association with the first authentication information of the received acquisition request, receiving an execution request to execute at least one of the files and the folders that are included in the list, and executing a process according to the execution request by using the second authentication information.
-
Citations
13 Claims
-
1. An information processing device that is connected to another information processing device, comprising:
-
a first memory that stores a first program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device; and a first processor that is configured to perform the first program so as to execute a method including the steps of; receiving an acquisition request that is sent from a client device according to the first authentication information, transmitting a list including files or folders that are stored in the another information processing device and are accessible according to the second authentication information that is stored in the first memory in association with the first authentication information of the received acquisition request; receiving an execution request to execute a file or a folder that is included in the list, and executing a process according to the execution request by using the second authentication information when the file or the folder according to the execution request is stored in the another information processing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method performed by an information processing device that is connected to another information processing device, said information processing device including a first memory that stores a first program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device;
- and a first processor that is configured to perform the first program, said method including the steps of;
receiving an acquisition request that is sent from a client device according to the first authentication information, transmitting a list including files or folders that are stored in the another information processing device and are accessible according to the second authentication information that is stored in the first memory in association with the first authentication information of the received acquisition request; receiving an execution request to execute a file or a folder that is included in the list, and executing a process according to the execution request by using the second authentication information when the file or the folder according to the execution request is stored in the another information processing device.
- and a first processor that is configured to perform the first program, said method including the steps of;
-
13. A non-transitory computer readable medium that contains a program to cause a processor to execute a method performed by an information processing device that is connected to another information processing device, said information processing device including a first memory that stores a first program, a first authentication information for each user to access the information processing device and a second authentication information in association with the first authentication information for the each user to access the another information processing device;
- and a first processor that is configured to perform the first program, said method including the steps of;
receiving an acquisition request that is sent from a client device according to the first authentication information, transmitting a list including files or folders that are stored in the another information processing device and are accessible according to the second authentication information that is stored in the first memory in association with the first authentication information of the received acquisition request; receiving an execution request to execute a file or a folder that is included in the list, and executing a process according to the execution request by using the second authentication information when the file or the folder according to the execution request is stored in the another information processing device.
- and a first processor that is configured to perform the first program, said method including the steps of;
Specification