[go: up one dir, main page]

TWI339345B - Controlling module for communication programs and method for the same - Google Patents

Controlling module for communication programs and method for the same Download PDF

Info

Publication number
TWI339345B
TWI339345B TW96100735A TW96100735A TWI339345B TW I339345 B TWI339345 B TW I339345B TW 96100735 A TW96100735 A TW 96100735A TW 96100735 A TW96100735 A TW 96100735A TW I339345 B TWI339345 B TW I339345B
Authority
TW
Taiwan
Prior art keywords
control module
communication program
permission
message
client
Prior art date
Application number
TW96100735A
Other languages
Chinese (zh)
Other versions
TW200830142A (en
Inventor
Horng Ching Tzeng
Original Assignee
Fineart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fineart Technology Co Ltd filed Critical Fineart Technology Co Ltd
Priority to TW96100735A priority Critical patent/TWI339345B/en
Publication of TW200830142A publication Critical patent/TW200830142A/en
Application granted granted Critical
Publication of TWI339345B publication Critical patent/TWI339345B/en

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Description

1339345 因此卽、針對傳輸内容加以控制,預防使用者規避, ° X上述輪組,解決上述關於通訊軟體操作上所 遭遇之問題。 【發明内容】 盥方、t發Γ揭露一種關於控制客戶端通訊程式操作之模組 t S至J包含一輸人端、ϋ服器端與-客戶 其中輸入端之功能為輸入控管指令;客戶 哭端=申請訊息、送出權限申請訊息予飼服 訊息審核結果與藉以控管通訊程式操 定端主之功能則包含··根據所儲存之權限資料自動決 準否,或通知管理者該權限申請訊息,與 申請訊息相關資料’管控端則可通知 吕理者泫榷限申請訊息存在 回傳給飼服器端上述訊息之審”::之相關㈣ 結果。糟由上述模組與方 ^本^即可達到限制客戶端通訊程 【實施方式】 本發明將配合其較佳實施例與隨附之圖示詳述於下, 應理解者為本發明中所有之較佳實施例僅為例示之用,因 此=說明書中所述之較佳實施例與參相科,本發 可廣泛地應用在其他實施例中。 一 才 實施例,應以隨附之申請專财鬥::月亚不受限於任何 g寻利軏圍及其同等領域而定。 第一圖為顯示關於本發明之一具體實施例,該控制模 組包= 入端,一客戶端2〇〇與一飼 一管控端400。 ” 1339345 其中輸入端100功能為輸入關於操作受 指令、客戶端謂則可於使用者操作客戶端2二= 弋夺產生權限申請訊息予伺服器300 ;伺服器端300 接收上述資料後、依照控管模組之設定,可自動依照預設 推限,審核該權限申請訊息並將審核結果回傳至客戶端 2〇〇或將上述訊息傳遞至管控端4〇〇,由管理者審核可否允 -午"亥操作,之後將上述權限巾請訊息之審核結果由管控端 _傳送回客戶# 2〇〇’以使客戶# 2〇〇根據上述審核結果 |限制客戶端上應用程式之操作權限。關於本發明之控制模 T可應用於任何有控制客戶端通訊程式操作需要之網路環 ' 境’例如辦公室環境。 • 關於上述實施例中控制模組之功能可以更詳述如下。 上述控制模組中輸入端100,功能為接收與輸出使用者所 輸:之字元訊息或任何形式指令,用以產生權限資料,上 述權限資料儲存於伺服器300,並派送至存於客戶端200 •之控管程式’以建立權限控制模組。於另—具體實施例中, 上述權限資料則僅儲存於客戶端200。於另一具體實施例 中,上述權限資料僅儲存於伺服器端300,於使用者登入 時,方自伺服器端300下載該使用者權限資料與客戶端控 -官模組,以便於保持權限資料之更新狀態與適用於客戶端 200為屬行動裝置,例如公司訪客之筆記電腦的場合。 關於本發明之另一具體實施例中,上述輸入端1〇〇包 含一使用者介面用以輸入權限設定指令,其功能包含是否 允迕使用通訊軟體,例如電子郵件、檔案傳輸軟體 1339345 自動發出訊息’令客戶端自動發送之選項。使用者完成輸 入後,客戶端200尚會附加其他資訊,除可供管理者作: 審核該操作申請之參考,並可有防止偽造權限資料之功 能。於-關於本發明之具體實施例中,客戶端權限控 元依據輸入# 100冑入之預設i,自冑將上述電子郵件附 加檔案之其他資訊例如檔案機密等級、版本、最 存取權限、發佈部門,以及其他客戶端上關於此槽案存取、、 使用相關之歷史資料加以掏取;則動#|取資料血上 用者所輸入之文字說明訊息或選取功能資訊予以組合並加 密或加入認證資訊,即可建立一權限申請訊息。於另 於本發明之具體實施例中,權限控管單元2〇2尚可依據^ 加槽案大小設定所傳輸之權限中請訊息内$,例如, 加擋案小於該設定值,該檔案會附加於上述權 :1339345 Therefore, the transmission content is controlled to prevent users from evading, and the above-mentioned wheel sets solve the above-mentioned problems encountered in the operation of the communication software. [Description of the Invention] 盥方, t发Γ exposes a module for controlling the operation of the client communication program t S to J including an input terminal, a server end and a client, wherein the input function is an input control command; Customer crying = application message, send permission application message to feed service message review result and control function of the communication program terminal include: · automatically decide according to the stored permission data, or notify the administrator of the permission Application information, and information related to the application message 'The management terminal can inform the Lv Lier that the application message is returned to the feeding machine for the above information review":: Relevant (4) Results. The above module and party ^ The present invention will be described in detail with reference to the preferred embodiments and the accompanying drawings. It is understood that all preferred embodiments of the present invention are merely illustrative. For use, therefore, the preferred embodiment described in the specification and the reference section, the present invention can be widely applied to other embodiments. The first embodiment should be applied for the exclusive financial operation:: Yue Ya does not limited by The first figure shows a specific embodiment of the present invention. The control module package includes an input terminal, a client terminal 2 and a feed controller terminal 400. 1339345, wherein the input terminal 100 functions as input for the operation is commanded, the client terminal can be used by the user to operate the client 2 2 = the application request message is sent to the server 300; the server terminal 300 receives the above information, according to the control The setting of the management module can automatically review the permission application message and return the audit result to the client 2〇〇 or transfer the above message to the control terminal 4〇〇, and the manager can review whether it can be approved- After the afternoon operation, the audit result of the above-mentioned authority towel request message is transmitted from the control terminal _ to the customer # 2〇〇' so that the customer #2〇〇 limits the operation authority of the application on the client according to the above-mentioned audit result. The control module T of the present invention can be applied to any network environment, such as an office environment, that controls the operation of the client communication program. • The function of the control module in the above embodiment can be described in more detail below. The input terminal 100 of the control module is configured to receive and output a character message or any form instruction output by the user for generating permission data, and the permission data is stored in the server 300 and sent to the client. 200 • Control program 'to establish permission control module. In another embodiment, the permission data is stored only in the client 200. In another embodiment, the permission data is stored only on the server terminal 300, and when the user logs in, the user authority data and the client control module are downloaded from the server terminal 300, so as to maintain the authority. The update status of the data is applicable to the case where the client 200 is a mobile device, such as a company visitor's notebook computer. In another embodiment of the present invention, the input terminal 1 includes a user interface for inputting a permission setting command, and the function includes whether to allow the use of a communication software, such as an email, file transfer software 1339345 to automatically send a message. 'Options that the client will automatically send. After the user completes the input, the client 200 will add additional information, in addition to being available to the administrator: reviewing the reference for the operation request, and having the function of preventing forgery of the permission data. In a specific embodiment of the present invention, the client permission control element automatically adds other information such as file confidentiality level, version, and most access rights to the email according to the preset i entered by the input #100. The publishing department and other clients use the relevant historical data to access and use the relevant historical data; then move #| to take the text description message or select the function information input by the user on the blood to combine and encrypt or By adding certification information, you can create a permission application message. In another embodiment of the present invention, the privilege control unit 2 〇 2 can still set the message in the message transmitted according to the size of the sizing case. For example, if the file is smaller than the set value, the file will be Attached to the above rights:

之令’-併傳送至管…00,若大於該設定值,則僅; ^案相關資訊。於另本發明之具體實施财該加 达方法為利用碎映函式方式產生碎映稽f。於另—關於本 毛明,具體實施例中,該認證資訊包含由客戶端尚會於權 2申請訊息巾加入-電腦朗f訊,該f賴射訊 戶端之獨有資訊例如網路卡號碼與硬體編號之組合,供 :]服器端辨識’避免惡意程式之干擾或偽造權限申請吨 :二於關於本發明之另一具體實施例中,會儲存-包含附 4案之隸Μ訊息複本於客戶端 案作為比對傳輸權案内容是否符合審杳έ士果’以;果才田 息傳輸之用。 付口審查、、”果’以及限制訊 服為端與資料座卜卜料 、_μ —、一 轉至管控端,a二:::禁止或准許, 許、拒锅式伙々〃 &理者於管控端決定該操作應允 回客戶端二Μ審查結果指令後’經由伺服器端傳 後,即可依審使用者於接到客戶端發出之通知 依審查結果,進行傳輸操作。 發明==:r:r然其並非一定本 中請專利範圍及其=。二專= ==本專利精神或範圍内’所作之更動二麵 【圖式簡單說明】 第-圖為顯示關於本發明之傳輸程式控管模组。 圖 第二圖為顯示關於本發明之控管傳輸程式的方法流程 主要元件符號說明 輸入端100 客戶端200 輸入端201 權限管理單元202 伺服器端300 資料接收與傳遞單元3〇1 處理單元302 資料庫單元303The order '- is transmitted to the tube ... 00, if it is greater than the set value, then only; ^ case related information. In another embodiment of the present invention, the method of adding is to use a fragmentation function to generate a fragmentation. In another example, in the specific embodiment, the authentication information includes that the client will still join the application towel in the right 2, and the computer information is unique. For example, the network card is unique. Combination of number and hardware number for:] server end identification 'to avoid malicious program interference or forgery permission application tons: two in another specific embodiment of the present invention, will store - including the attached case of the case The copy of the message is used in the client case as a comparison of whether the content of the transmission right is in compliance with the judge's effect; Pay for review, "fruit" and restrictions on the service and information, and _μ -, one to the control, a two::: prohibited or permitted, Xu, refused to cook and & After the control terminal decides that the operation should be returned to the client's second review result command, after passing through the server end, the user can perform the transfer operation according to the result of the review according to the notification sent by the user to the client. Invention == :r:r However, it is not necessarily the scope of the patent and its =. Second special = == the spirit of the patent or the scope of the 'action' two sides [schematic description] Figure - Figure shows the transmission of the present invention The second figure shows the method flow for displaying the control transfer program of the present invention. Main components Symbol description Input terminal 100 Client 200 Input terminal 201 Rights management unit 202 Server terminal 300 Data receiving and transmitting unit 3 〇1 processing unit 302 database unit 303

13 133934513 1339345

管控端400 操作通訊軟體1201 產生權限申請訊息1202 逕予禁止或准許通訊程式操作或轉送至管控端1203 管理者於管控端決定一審查結果1204 依審查結果操作通訊程式1205 14The control terminal 400 operates the communication software 1201 to generate the permission application message 1202 to prohibit or permit the communication program to operate or transfer to the control terminal 1203. The manager determines the result of the review on the control terminal 1204. The communication program 1205 is operated according to the review result.

Claims (1)

1339345 、申請專利範圍: 種通訊裎式控管模組,至少包含: 一輸入端’用以輸入權限資料或操作通訊程式; 客戶知至^包含一權限控管單元,用以產生一權限 月成息’亚接收該權限巾請訊息之—審核結果,用以 官控使用者於該客戶端上使用該通訊程式之權限;其中 4榷限中請訊息至少包含該權限f料、使 =:管單元所自動操取之資訊,且該權限申請: 心會於客戶端儲存_權限申請訊息複本; 伺服為端,至少包含—資料庫與一輸出入單元, 該:料庫用以儲存與操作權限相關資訊,輪出入單:用 以接收與傳遞該權限資料; 一管控端’至少包含—佔田土人 限申請訊幸、,二 者介面’供管理者審核該權 端; 。μ δ亥審核結果經由該伺服器端至客戶 該伺服器端可以定時或以可變期間發送 該管控端審核該權限申 。α通知 該權限資料。 “一更可更新該客戶端上之 US?圍第1項之通訊程式控管模組,其中該 工^匕含電子郵件、即時通訊軟體、伊荦值/、 體、網頁瀏覽器。 仏案傳輸軟 3.如申請專利範圍第i項之 限資料至少包含林+ # m s杈、,且,其中該權 “止使㈣操作料訊程式特定功 能 ,或要求先經審核 I =請專利範圍第Μ之通訊程式控 5 ^ c έ使用者資料、字元訊息、訊息發送對袠 y如申請鼻紊丨f m 。知、对象。 &圍苐1項之通訊程式控管模組,其令# 入資料更包切加㈣。 匕亥輸 _ 利範圍第5項之通訊程式控管模組,其中該權 g早元所自動擷取之資訊至少包含該附加檔案之 评取、使用資料。 一 •如申請專利範圍第6項之通訊程式控管模組 加檔牵之左诉> „ ’、T々附 田茶之存取、使用資料至少包含該附加檔案存取權限 ’及機达、專級與存取歷史。 • 8·如巾請專利範圍第1項之通訊程式控管模組,其中該權 2控官單元更可於該權限申請訊息中加入一電腦識別 身訊’用以供該伺服器端辨識該權限申請訊息來源。 9 . . ^ 。月專利範圍第8項之通訊程式控管模組,其中該電 恥識別資訊至少包含網路卡號碼或主機板編號或硬體 編號之組合。 1()·如申請專利範圍第 1項之通訊程式控管模組,其中該管 16 1339345 控端可傳回—電腦識別資訊,用以供客戶端辨識該審核 結果之來源。 11‘如申請專利範圍第10項之通訊程式控管模組,其中該 電腦識別資訊至少包含網路卡號碼或主機板編號或硬 體編號之組合。 12 ·如申請專利範圍第5項之通訊程式控管模組,其中該權 限申請訊息複本包含該附加檔案。 13·如申請專利範圍g 12工員之通訊程式控管模組,其中該 權限申請訊息複本與該審核結果,可互相比對,用以確 認送出檔案與審核結果一致。 14.-種以控管模組限料訊程式操作觀之方法,至少包 含: 於一輸入端,輸入權限資料或操作通訊程式; 於一客戶端,至少包含一權限控管單元. 使用該權限控管單元,用以產生―權限中請訊息,並接 收該杻限申請訊息之一審核結果,用以管控 該通訊程式;其令該權限申請訊息至少包含該權:資 科、使用者所輸人貧料與該權限控管單元所 資訊,且該權限申請訊息會於客戶端儲存一複本 該權限申請訊息由該客戶端傳送至 17 1339345 決”物限申請或將該權限申請訊息送 二亚可以疋時或以可變期間發送通知,以通知 该官控端審核該權限申請訊息; ::控端接收該權限申請訊息,用以供 限申請訊息,並傳遞審核結果,並可更新該客 該權限資料; 客戶端接收該審核結果’並據以管控該通訊裎式操作, 15·:3Γ範圍第14項所述以控管模組限制通訊程式 。榷限之方法,其中該通訊程式至少包含電子郵件、 ρ時通讯軟體、檔案傳輸軟體、網頁瀏覽器。 m第14項料以控管模組㈣通訊程式 】作=之方法’其中該權限資料至少包含禁止使用者 h作㈣訊裎式特定功能,或要求先經審核。 17=申請專利範圍第14項所述以控管模組限制通訊程式 =限,方法’其中該輸入資料至少包含使用者資 ’、、字元訊息、訊息發送對象。 18. =申請專利範圍第17項所述以控管模組限制通訊程式 呆作權限之方法,其中該輸入資料更包含附加樓案。 19. 如申凊專利範圍帛14賴述以控營模組限制通訊程式 1339345 操作權限之方法’其中該權限控管單元所自動擷取之資 訊至少包含該附加檔案之存取、使用資料。 2〇·如申請專利範圍第19項所述以控管模組限制通訊程式 操作權限之方法,其中該附加槽案之存取、使用資料至 少包含該附加檔案存取權限等級、機密等級與存取歷 史。 t .如申請專利範圍第14項所述以控管模組限制通訊程式 — 操作權限之方法,其中該權限控管單元更可於該權限申 - 請訊息中加入一電腦識別資訊,用以供該伺服器端辨識 ' 該權限申請訊息來源。 22·^申請專利範圍第21項所述以控管模組限制通訊程式 操作權限之方法,其中該電腦識別資訊至少包含網路卡 • 號碼或主機板編號或硬體編號之組合。 23.,申請專利範圍帛14項所述以控管模組限制通訊程式 #作榷限之方法,其中該管控端可傳回一電腦識別資 .訊,用以供客戶端辨識該審核結果之來源。 ^申明專和範圍第23項所述以控管模組限制通訊程式 f、餐F之方法’其中該電腦識別資訊至少包含網路卡 5虎碼或主機板蝙號或硬體編號之組合。 19 1339345 糾請專利範圍第18項所述以控管模組限制通訊程式 操作權限之方法,其中該權限巾請訊息複本包含該附加 2“:申請專利範圍第25項所述以控管模組限制通訊程式 钿作權限之方法,其中該權限申請訊息複本與該審核結 果,可互相比對’用以確認送出檔案與審核結果一致。1339345, the scope of application for patents: a type of communication control module, comprising at least: an input terminal for inputting authority data or operating communication program; the customer knows that ^ includes an authority control unit for generating a permission month The information 'receives the permission towel's message--the result of the audit is used to control the user's permission to use the communication program on the client; in the 4th limit, the message contains at least the permission f, so =: The information automatically processed by the unit, and the permission application: the heart will store a copy of the _ permission application message on the client; the server is at the end, at least includes a database and an input and output unit, and the material library is used for storing and operating rights. Related information, round-in order: to receive and transfer the authority data; a control terminal 'at least contains - the occupation of the field of the land, the application interface for the manager to review the right; The result of the μ δ hai audit is sent to the client via the server end. The server can send the management terminal to review the privilege request periodically or in a variable period. α informs the permission data. "One more can update the US version of the communication program control module of the first item on the client, including the e-mail, instant messaging software, I/O, body, web browser. Transmission soft 3. If the scope of the patent application scope i is limited to at least Lin + # ms杈, and, where the right "stops (4) the operation of the program specific function, or requires the first review I = please patent scope通讯 通讯 程式 程式 ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ έ έ έ έ έ έ έ έ έ έ έ έ Know, object. & a communication program control module for the 1st, which makes the #entry data more inclusive (4).匕 输 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 1. If the communication program control module of the sixth application area of the patent application is filed, the left voucher > „ ', access to and use of T々 附田茶 contains at least the access rights of the additional file' and Specialization and access history. • 8. Please contact the communication program control module of the patent scope in item 1, where the power control unit can add a computer identification message to the permission application message. The server side can identify the source of the permission application message. 9 . . ^ . The communication program control module of the eighth patent scope, wherein the shame identification information includes at least a network card number or a motherboard number or a hardware Combination of numbers 1 () · For example, the communication program control module of claim 1 of the patent scope, wherein the tube 16 1339345 console can transmit back - computer identification information for the client to identify the source of the audit result. 11' The communication program control module of claim 10, wherein the computer identification information includes at least a network card number or a combination of a motherboard number or a hardware number. 12 · Communication as claimed in item 5 of the patent application The control module, wherein the copy of the permission application message includes the additional file. 13· If the patent application scope is 12, the communication program control module of the worker, wherein the copy of the permission application message and the result of the review can be compared with each other. It is used to confirm that the sent file is consistent with the audit result. 14.- The method for controlling the operating mode of the control module includes at least: inputting the permission data or operating the communication program at one input; at least one client, at least one client Include a privilege control unit. The privilege control unit is used to generate a privilege request message and receive an audit result of the privilege request message for controlling the communication program; The right: the information of the undergraduate and the user, and the information of the authority control unit, and the permission application message will be stored in the client. The permission application message is transmitted by the client to the 17 1339345 decision limit. To apply for or send the permission application message to Erya, you may send a notice at a time or in a variable period to notify the official terminal to review the permission application message; The control terminal receives the permission application message for limiting the application message, and passes the audit result, and can update the user's permission data; the client receives the audit result' and manages the communication operation according to the control, 15· : The range of the control module is limited to the communication module described in item 14. The method of limitation, wherein the communication program at least includes an email, a communication software, a file transmission software, and a web browser. m Item 14 is to control the module (4) communication program 】============================================================================= 17 = The control module limits the communication program as described in item 14 of the patent application scope, and the method includes the user information, the character message, and the message transmission object. 18. = The method of controlling the control module to limit the communication program as described in Item 17 of the patent application scope, wherein the input data further includes an additional building case. 19. If the scope of the patent application is 赖14, the method of restricting the operation of the communication module 1339345 by the control module is mentioned. The information automatically retrieved by the authority control unit includes at least the access and usage information of the additional file. 2. The method for restricting the operation authority of the communication program by the control module as described in claim 19, wherein the access and usage data of the additional slot includes at least the access level, confidentiality level and storage of the additional file. Take history. t. The method for restricting the communication program-operating authority by the control module as described in claim 14 of the patent application scope, wherein the authority control unit may further add a computer identification information to the permission application message for providing The server side recognizes the source of the permission application message. 22·^ The method for restricting the operation authority of the communication program by the control module described in claim 21, wherein the computer identification information includes at least a network card number or a combination of a motherboard number or a hardware number. 23. The method of claiming patents is as described in item 14 of the control module limiting communication program #, wherein the control terminal can transmit back a computer identification information for the client to identify the audit result. source. ^Declaration of the scope and scope of the control module to limit the communication program f, meal F method 'where the computer identification information contains at least the network card 5 tiger code or motherboard bat number or hardware number combination. 19 1339345 Requires the method of restricting the operation authority of the communication program by the control module in the 18th item of the patent scope, wherein the copy of the permission towel message includes the additional 2": the control module described in claim 25 A method for restricting the permission of the communication program, wherein the copy of the permission application message and the result of the review can be compared with each other to confirm that the file is sent and the result of the review is consistent. 2020
TW96100735A 2007-01-08 2007-01-08 Controlling module for communication programs and method for the same TWI339345B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96100735A TWI339345B (en) 2007-01-08 2007-01-08 Controlling module for communication programs and method for the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96100735A TWI339345B (en) 2007-01-08 2007-01-08 Controlling module for communication programs and method for the same

Publications (2)

Publication Number Publication Date
TW200830142A TW200830142A (en) 2008-07-16
TWI339345B true TWI339345B (en) 2011-03-21

Family

ID=44818219

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96100735A TWI339345B (en) 2007-01-08 2007-01-08 Controlling module for communication programs and method for the same

Country Status (1)

Country Link
TW (1) TWI339345B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI464582B (en) * 2012-05-31 2014-12-11 Univ Far East Scan the computer to monitor the program in the program

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI464615B (en) * 2009-09-14 2014-12-11 Hon Hai Prec Ind Co Ltd System and Method for Controlling File Transfer

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI464582B (en) * 2012-05-31 2014-12-11 Univ Far East Scan the computer to monitor the program in the program

Also Published As

Publication number Publication date
TW200830142A (en) 2008-07-16

Similar Documents

Publication Publication Date Title
US8561172B2 (en) System and method for virtual information cards
US9059988B2 (en) Printing device capable of authorizing printing limitedly according to user level, printing system using the same and printing method thereof
JP5264776B2 (en) Provisioning digital identity representation
JP5264775B2 (en) Provisioning digital identity representation
US9473505B1 (en) Management of third party access privileges to web services
US8856919B2 (en) Authorization of server operations
US20090178112A1 (en) Level of service descriptors
US20090077627A1 (en) Information card federation point tracking and management
US20130018984A1 (en) Information card federation point tracking and management
CN100555158C (en) Security system and method for controlling access to encrypted information by multiple users
CN1575578B (en) Method and apparatus for personal information access control
US20210029093A1 (en) System for Sending Verifiable E-Mail
JP7180221B2 (en) Information processing device, information processing system and program
EP2112613A1 (en) Restricted use information cards
JP4555322B2 (en) Image communication system and image communication apparatus
US8353053B1 (en) Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption
KR20050053292A (en) The supplying way of security chatting system by messenger encoded program
US9716693B2 (en) Digital rights management for emails and attachments
TWI339345B (en) Controlling module for communication programs and method for the same
US10949504B2 (en) Systems and methods of transforming electronic content
KR102038664B1 (en) Method for loading external data based on api and system using the same
US10380568B1 (en) Accessing rights-managed content from constrained connectivity devices
JP2003281089A (en) Data processing method, information communication terminal device, server and software program
US10931670B1 (en) Uniform resource locator (URL) transformation and redirection with access control
CN101601022B (en) The supply of digital identity representations