0% found this document useful (0 votes)
34 views18 pages

SamsungSDI User Manual Eng

This document provides instructions for using a technical document encryption solution (DRM). It discusses: 1. Installing and executing the DRM agent program which runs automatically and logs the user into the encryption system when they login to the company website. 2. How individual encrypted documents can be decrypted through simple right clicking or how an entire encrypted document folder can be decrypted in the same way. 3. That only documents created while logged into the encryption system can be decrypted locally and any documents downloaded from the website must be accessed through the website.

Uploaded by

Tóth Arnold
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views18 pages

SamsungSDI User Manual Eng

This document provides instructions for using a technical document encryption solution (DRM). It discusses: 1. Installing and executing the DRM agent program which runs automatically and logs the user into the encryption system when they login to the company website. 2. How individual encrypted documents can be decrypted through simple right clicking or how an entire encrypted document folder can be decrypted in the same way. 3. That only documents created while logged into the encryption system can be decrypted locally and any documents downloaded from the website must be accessed through the website.

Uploaded by

Tóth Arnold
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Creative Energy & Materials Solution Leader

SAMSUNG SDI Technical Software license agreement


Document Encryption (DRM)
Solution User Manual Installation of DRM User Agent Program

User DRM Agent Execution and Functionality

Introduction of DRM functions

Technical support guide


Ⅰ Software license agreement

1. Software license agreement------------------- <003>

간지
1. Software license agreement
Document SAFER NX Software license agreement
Document SAFER NX software (hereinafter referred to as "software") is a product supplied by MarkAny Inc.
If you intend to install and use the software, this means that your company, institution, organization, etc. (hereinafter referred to as “Organization") has signed a pre-use
agreement (hereinafter referred to as "license agreement") with MarkAny or MarkAny Sales Delegation Company (hereinafter referred to as “Supplier”) and the organization
has allowed you to install and use the software through official procedures. 

1. Software license
You may use the software during the license agreement period of your organization. Therefore, you must use the software only in a way that complies with the license
agreement concluded between the supplier and the affiliated organization.
2. Protection of intellectual property rights
Intellectual property rights related to software are held by MarkAny Co., Ltd. and are protected by relevant laws and international treaties. You shall not replicate, edit, engineer
conversion, reverse assemble, attempt to obtain source code, decrypt, change, or create derivatives, nor damage any trademark or label set by the supplier. Also, should not
assist in doing these above things by third parties.
The ownership of encrypted documents and usage logs generated through the software belongs to the user, and the supplier cannot replicate, modify, or edit the data without
the user's permission.
3. Technical support
The software may be restricted from using some functions depending on the terms of the individual license agreement. The scope of technical support and service level for
the software are subject to the license agreement. In the event of a software error or bug, you must, in principle, be taken action through the person in charge of your
organization. If you directly request technical support without going through the person in charge of your organization, the supplier may refuse to support.
4. Termination of the contract
When the license agreement of your organization is terminated, your software license will also be automatically terminated, so you must stop using the software and the
contract will be terminated.
5. Other information
11) Supplier homepage information: http://www..markany.com
2) Matters not stipulated in this Agreement shall be in accordance with the License Agreement, and if there is a conflict in interpretation between the above
Agreement and the License Agreement, the License Agreement shall prevail.

-3-
II Installation of DRM User Agent Program

1. Install and execute DRM Agent------------------- <005>

간지
1. Install and execute DRM Agent
01 Run Agent Installation File
①0 Double-click the DocSAFER_NX.exe file to automatically install the DRM component.

Double Click
Install Document SAFER.
PC reboot may be required.
[!Cautions] Please exit the document
you are working on.

02 Reboot after agent installation is complete


①0 Once the installation is complete, a PC reboot is required for additional settings.

Cautions For normal use of software, must reboot your computer

-5-
III User DRM Agent Execution and Functionality

1. How to execute DRM Agent---------------------- <007>

간지
2. How to decrypt a user-generated document---- <008>

3. How to folder decrypt a document-------------- <009>


1. How to execute DRM Agent
01 How to execute DRM Agent
0
① The installed DRM Agent runs automatically when Windows OS starts.
② The login of DRM Agent is logged automatically when you log in to the Samsung SDI CPC (https://scpc.samsungsdi.com) website.

[A message pop-up is displayed at the bottom left of the PC]

Login

S
T
A
T
U
S

[Windows Tray's Icon is printed in blue]

[The icon is gray in logoff status]

Samsung SDI's CPC website and DRM Agent are linked to SSO (Single Sign-On) and logged in automatically.

-7-
2. How to decrypt a user’s document
01 Simple decryption method
①0While the Technical Document Encryption Solution (DRM) is logged in and running, documents that are edited and generated are automatically
encrypted when its save.
② Encrypted documents cannot be viewed when the user is log-out status of the CPC website.
③ After logging in to the CPC website, we recommend using only the documents downloaded through the CPC website.
④ In case a user creates a document while logging in to the CPC website, the "simple decryption" function is provided as follows.

Execute
Right click on Select decryptio
the mouse n

※ Support for decryption of multiple selection files [Selection of 4 files : encryption document(4), general document(4) ]

• Select a plurality of encrypted files, "right-click" and decrypt

• Select "Folder" containing an encrypted file, right-click it, and decrypt it.

※ Even if you select including general documents other than encrypted documents, The result
message
decrypt only encrypted documents.

Documents downloaded from Samsung SDI CPC website can not be decrypted through the simple decryption function.

-8-
3. How to folder decrypt a document
01 Folder decryption method
①0While the Technical Document Encryption Solution (DRM) is logged in and running, documents that are edited and generated are automatically
encrypted when its save.
② Encrypted documents cannot be viewed when the user is log-out status of the CPC website.
③ After logging in to the CPC website, we recommend using only the documents downloaded through the CPC website.
④ In case a user creates a document while logging in to the CPC website, the “folder decryption" function is provided as follows.

E
Selec de xec
cr ut
y e
t n ptio
Selec
t

Right click on
the mouse

※ Even if you select including general documents other than encrypted documents,

decrypt only encrypted documents.

Documents downloaded from Samsung SDI CPC website can not be decrypted through the folder decryption function.

-9-
IV Introduction of DRM functions

1. Introduction of DRM solution--------------------- <011>

간지
2. DRM Solution Document Policy------------------ <013>
1. Introduction of DRM solution
01 Solution overview
①0 It is an encryption solution that prevents unauthorized users from viewing and using documents generated by companies if they are leaked to the
outside of the company.
② Documents cannot be viewed and used if there is no DRM solution (DRM Agent) for users or if it is not logged in.

When unauthorized users attempt to file open When the authorizer opens the file

• Unable to view document file. • Able to view the document file.

• Even authorized users cannot use it if they are not logged in to the DRM Agent. • Even authorized users cannot use it if they are not logged in to the DRM Agent.

• Unable to use in the logged out status of the CPC website. • You can't use it even if you're logged out of the CPC website.

- 11 -
1. Introduction of DRM solution
02 How to distinguish encrypted documents
0
① For user convenience, the “ " shape is displayed on the document icon in the encryption document so that you can
distinguish between the general document and the encrypted document..

[ General File] [ Encrypted file]

Decryption EditandSave

※ When you try to access an encrypted document using a text editor, it appears in encryption format

• The contents of the document cannot be


verified because the document file itself has
been encrypted.
• The meaning cannot be confirmed because it
is viewed in the encrypted form.

- 12 -
2. DRM Solution Document Policy
01 Policy for encrypted document
0
① Encrypted documents can be verified through the "encrypted file properties" information.
② Select Encrypted Document  Right-click Context Menu Activation  Select Encrypted File Management Tool  Select
View Encrypted File Properties

Encrypted file.
Look at the
attributes
• Display the selected file
속성 명 ( 권한 명 ) 속성 정보 ( 권한 정보 ) name
SAVE • Display permission to save documents (Possible/Impossible)
Editing • Display permission to edit documents (possible/impossible)
• Display permission to copy and paste the contents of the
Copy and paste
document. (Possible/Impossible)
• When printing a document, indicate whether or not to
WaterMarking
include a watermark.(Possible/Impossible)

• Indicate whether the document is captured or canceled.


Prevent screen cap-
(Possible: Prevention of screenshots, unused: release of
ture • Display the encryption
screenshots)
Encrypted file.
• Indicate whether the history of reading documents is properties of the
Reading log Description of
transmitted to the server. document(Detailed security
attributes
Saving log
• Indicate whether the history of saving documents is sent to policy indication)
the server
• Indicate whether the history of printing the document is
Printing log
transmitted to the server
Exchange documents • Scope of document exchange
Print count • Display the number of count a document can be printed
Read Count • Display the number of count you can read the document
Expiration period • Indicate the expiration date of the document

- 13 -
2. DRM Solution Document Policy
02 examples of actions by encryption attribute

The right to save Screen Capture Policy

• In case of impossible to save, user can not save the document. • Capture is prevented or allowed according to the anti-capture authority

NotUseanti-capture Use anti-capture

• Capture method and scope


Method Scope of Capture

Print Screen Key • The entire screen


- Save related function is controlled such as menu, icon, shortcut key
Alt + Print Screen Key • Active Application Area

capture software • The entire screen or the selected area

Blocking the
Blocking the entire screen
application area

- 14 -
2. DRM Solution Document Policy
02 examples of actions by encryption attribute

Copy & Paste blocks

• Block copy between encrypted and general documents (Copy & Paste) processing authority
Copy Encryption Document Block Per-
Original copy The object to be pasted Execution result
mission
- General documents Encryption document possibility

impossibility Encryption document General documents impossibility

impossibility Encryption document Encryption document possibility

possibility Encryption document Encryption document possibility

possibility Encryption document Encryption document possibility

• Examples of block copying blocking

Encrypted
document
Copy & paste
General document

- 15 -
V Technical support guide

1. Technical support guide-------------------------- <017>

간지
1. Technical support guide
01 Technical support procedures and methods
①0 The technical support procedures and methods for errors and failures that occur when using a technical document encryption (DRM) solution are as
follows.
② In the event of an error or failure, counseling is available through the customer center, and remote support counseling is provided through a remote access
program if necessary.
Customer Support Center Remote assistance counseling

※ Remote Support Method -You can proceed according to the guidance of the counselor.

① Go to MarkAny's website (https://www.markany.com)


② Select Customer Support Menu
(https://www.markany.com/support/technical-support/)
③ Click Select between Remote Support 1 / Remote Support 2 in the "Remote
Support Consultation" menu below.
④ Installation and execution of customer access programs.

[email protected]
⑤ Choose the waiting number according to the counselor's instructions.

※ FAQ

• The failure of DRM Agent installation

• Disable to open decrypted file after installation and log-in of DRM Agent ③
※ If the document does not open, please check whether you are logged in to the

CPC website.

- 17 -
THANK YOU

You might also like