摘要 |
<p><P>PROBLEM TO BE SOLVED: To provide a file management method for monitoring the operation of a file taken out of company. <P>SOLUTION: A management server 1 receives from a mobile PC 6 a log-in ID and a temporary password necessary for opening an encrypted file inside the mobile PC 6, and holds them as a monitor file list. When the mobile PC 6 detects operation for opening the encrypted file, it transmits a use application including a file identifier of the encrypted file and a user's log-in ID. When the management server 1 receives the use application, it refers to a list of files which can be taken out where file identifiers of encrypted files which can be taken out of an internal network are associated with log-in ID of users who are accessible to the encrypted files and, when it is determined that these are not associated, the management server 1 transmits a response to the mobile PC 6 to the effect that the encrypted file whose use has been applied is not allowed to use. <P>COPYRIGHT: (C)2010,JPO&INPIT</p> |