BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram illustrating a system for protecting digital files according to a preferred embodiment;
FIG. 2 is a block diagram illustrating the system in FIG. 1;
FIG. 3 is a data flow diagram illustrating a preferred method for protecting digital files;
FIG. 4 is a flowchart of the preferred method for protecting digital files; and
FIG. 5 is a detailed description of one step in FIG. 4, namely searching for an access right of a user intending to operate the digital file.