The key is divided into the local part and the remote part
The local part is delivered to the end user alongside the slideshow medium as an access code
Both parts are stored in the customer's infrastructure
Data access:
The end user enters their access code into the application
The application generates a request code (containing the local part and the timestamp) and asks the end user to deliver it to the customer
The customer verifies the timestamp and responds with the confirmation code (containing the remote part combined with the request timestamp) and ask the user to enter it into the application
The application extracts the remote part from the confirmation code, and combines it with the local part, resulting with a complete key used for content decryption
If the end user decided to do that, the application stores the local key combined with the machine hash in persistent storage for future use
Key preparation:
Data access:
Access code: