1. Field of the Invention
The present invention relates to a communication system in which video or audio content data is relayed among a plurality of terminals.
2. Description of the Related Art
An electronic conference system has been widely adopted in which terminals located at distant places communicate with each other through a network such as the Internet, and thereby a conference is conducted. In the electronic conference system, an image which is photographed by a camera of the terminal which is operated by one of participants of the conference and sound which is collected by a microphone of the terminal are transmitted to the terminal of the counterpart. Since the terminal of the counterpart displays the image on a display and outputs the sound by a speaker or a headset, the participants may share the image and the sound, even if the terminals are located at the distant places (c.f. Patent Document 1 (Japanese Unexamined Patent Publication No. 2011-254453)). Patent Document 1 discloses a technique for sharing a document which is used for a conference. In the technique, a document which is the same as that of a transmission source is displayed on a terminal of the counterpart of the conference by transmitting the display data of the document to the counterpart.
In many cases, a document which is displayed on the terminal of the transmission source and the terminal of the counterpart is a file of an application program. Contrary to this, a screen which is shared by the electronic conference system is the screen which captures the document (hard copy of the document) which is displayed on the display. Accordingly, it is possible that a participant wishes to view all parts of the document, since the screen includes only a part of the document, or the participant wishes to view the previous page and the next page. Further, it is possible that the participant wishes to magnify a character or a figure, since the character or the figure is small.
A file itself, which is displayed as a document, may be shared between the terminals. As a method of sharing the file, a method can be considered such that the terminal of the transmission source attaches the file to an e-mail, and the e-mail is transmitted to the terminal of the counterpart, or a method can be considered such that a file is shared through a network storage. However, when a user of the terminal (e.g., a presenter), who operates the terminal, transmits an e-mail during operating the terminal, operability of the electronic conference system may be lowered. Further, an e-mail address of the counterpart may be known in advance, and the process may be complicated. Furthermore, for the case of an e-mail, security of the attached document may not be guaranteed on the network. When the network storage is utilized, it may be required to create accounts for the transmitting side and receiving side in advance, and a process may be complicated. Furthermore, security may not be sufficient when the data is shared by using the Internet.
Additionally, a method can be considered such that the service which transmits the image and the sound also transmits the document. However, since this service is performing the process of smoothly transmitting the image and the sound, and the process of smoothly receiving the image and the sound from the terminal of the counterpart, if the document is transmitted and received, the conference may not progress smoothly.
Accordingly, there is a need for a communication system which enables sharing of images and sound such that a document which is used for a conference can be securely shared.
According to an aspect of the present invention, there is provided a communication system including a plurality of terminals which participate in a conference and a file sharing apparatus configured to provide a file to the terminals. The communication system includes an attribute storage unit configured to store attributes of the terminals; a shared folder location information notification unit configured to transmit location information of a shared folder, wherein the shared folder is created based on the attributes of the terminals which participate in the conference; and a shared folder storage unit configured to store the location information of the shared folder and identification information of the terminals which mount the shared folder, wherein the shared folder storage unit is configured to associate conference identification information with the location information of the shared folder and the identification information of the terminals. The file sharing apparatus includes the shared folder which is created at a location indicated by the location information of the shared folder; and a first file synchronization unit configured to transmit the file to the terminals, wherein, when a first file is stored in the shared folder from a first terminal, the first file synchronization unit is configured to transmit first file information to the terminals other than the first terminal which participate in the conference, wherein the first terminal participates in the conference. Each of the terminals includes a folder mount unit configured to mount the shared folder on the terminal; and a second file synchronization unit configured to transmit a second file to the shared folder, wherein the second file is stored in a storage area created by the mounting.
According to another aspect of the present invention, there is provided an information processing apparatus for providing a file to a plurality of terminals wherein the terminals participate in a conference, and each of the terminals includes a folder mount unit configured to mount a shared folder to the terminal; a second synchronization unit configured to transmit a second file to the shared folder, wherein the second file is stored in a storage area created by the mounting. The information processing apparatus includes an attribute storage unit configured to store attributes of the terminals; a shared folder location information notification unit configured to transmit location information of the shared folder, wherein the shared folder is created based on the attributes of the terminals which participate in the conference; a shared folder storage unit configured to store the location information of the shared folder and identification information of the terminals which mount the shared folder, wherein the shared folder storage unit is configured to associate conference identification information with the location information of the shared folder and the identification information of the terminals; the shared folder which is created at a location indicated by the location information of the shared folder; and a first file synchronization unit configured to transmit the file to the terminals, wherein, when a first file is stored in the shared folder from a first terminal, the first file synchronization unit is configured to transmit first file information to the terminals other than the first terminal which participate in the conference, wherein the first terminal participates in the conference.
According to another aspect of the present invention, there is provided a terminal configured to connected to a communication system. The communication system includes a plurality of terminals which participate in a conference; a file sharing apparatus configured to provide a file to the terminals; an attribute storage unit configured to store attributes of the terminals; a shared folder location information notification unit configured to transmit location information of a shared folder, wherein the shared folder is created based on the attributes of the terminals which participate in the conference; and a shared folder storage unit configured to store the location information of the shared folder and identification information of the terminals which mount the shared folder, wherein the shared folder storage unit is configured to associate conference identification information with the location information of the shared folder and the identification information of the terminals. The file sharing apparatus includes the shared folder which is created at a location indicated by the location information of the shared folder; and a first file synchronization unit configured to transmit the file to the terminals, wherein, when a first file is stored in the shared folder from a first terminal, the first file synchronization unit is configured to transmit first file information to the terminals other than the first terminal which participate in the conference, wherein the first terminal participates in the conference. The terminal includes a folder mount unit configured to mount the shared folder on the terminal; and a second file synchronization unit configured to transmit a second file to the shared folder, wherein the second file is stored in a storage area created by the mounting.
According to an embodiment of the present invention, there can be provided a communication system which enables sharing of an image and sound such that a document which is used for a conference can be securely shared.
Other objects, features and advantages of the present invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings.
Hereinafter, there is explained a configuration for implementing an embodiment of the present invention by referring to the accompanying drawings.
An outline of the embodiment is explained by referring to
The transmission system 1 (1a or 1b) includes a data providing system in which a transmission terminal device unilaterally transmits content data to another transmission terminal device through a transmission management system 50, and a communication system in which plural transmission terminal devices mutually transmit information and impressions through the transmission management system 50. The communication system is for a plurality of communication terminal devices (which correspond to the “transmission terminal devices”) to mutually communicate information and impressions through a communication management system (which corresponds to the “transmission management system 50”). Examples of the communication system includes a video conference system, a videophone system, an audio conferencing system, a voice telephone system, a personal computer (PC) screen sharing system, etc.
In the embodiment, a video conference system is assumed to be an example of the communication system 1, a video conference management system is assumed to be an example of the communication management system 50, and a video conference terminal device is assumed to be an example of the communication terminal device. Based on these assumptions, there is explained the transmission system 1, the transmission management system 50, and the transmission terminal devices. Namely, the transmission terminal devices and the transmission management system 50 according to the embodiment of the present invention can be applied to the video conference system as well as the communication system and a transmission system.
The transmission system 1a shown in
Hereinafter, the “transmission terminal” is simply denoted as the “terminal,” and the “transmission management system 50” is simply denoted as the “management system 50.” In the embodiment, the “terminal 10” represents any one of the transmission terminal devices (10aa, 10ab, . . . ); the “display 120” represents any one of the displays (120aa, 120ab, . . . ), and “the relaying apparatus 30” represents any one of the relaying apparatus (30a, 30ab, 30cd, 30d and 30abcd).
The terminal 10 transmits and receives image data and audio data as an example of content data. Namely, in the embodiment, calling includes transmission and reception of voice data as well as transmission and reception of image data. Namely, the terminal 10 according to the embodiment performs transmission and reception of image data and audio data. However, the terminal 10 may not perform transmission and reception of image data, and the terminal 10 may perform only transmission and reception of voice data.
In the embodiment, there is explained an example case in which an image included in image data is a moving picture. However, the image is not limited to the moving picture, and the image may be a still picture. Further, the image included in the image data may include both the moving picture and the still picture. The relaying apparatus 30 relays image data and audio data among the plurality of terminals 10. The management system 50 centrally manages the terminal 10, the relaying apparatus 30, and the file temporary storage device 40.
Further,
A program providing system 90 includes a hard disk (HD) 204 which is shown in
The maintenance system 100 is a computer which is for performing maintenance and/or management of at least one of the terminal 10, the relaying apparatus 30, the management system 50, and the program providing system 90. For example, for a case in which the maintenance system 100 is installed within a country, and the terminal 10, the relaying apparatus 30, the management system 50, or the program providing system 90 is installed outside the country, the maintenance system 100 remotely performs maintenance and management of at least one of the terminal 10, the relaying apparatus 30, the management system 50, and the program providing system 90 through a communication network 2. Further, the maintenance system 100 performs maintenance, such as management of a model number, a serial number, a customer, maintenance and inspection history, or failure history, of at least one of the terminal 10, the relaying apparatus 30, the management system 50, and the program providing system 90, without passing data through the communication network 2.
The terminals (10aa, 10ab, 10a, . . . ), the relaying apparatus 30a, and the router 70 are communicatably connected to a LAN 2a. The terminals (10aa, 10ab, 10a, . . . ), the relaying apparatus 30a, and the router 70 are included in a predetermined intranet A. The terminals (10ba, 10bb, 10b, . . . ), and the router 70b are communicatably connected to a LAN 2b. The terminals (10ba, 10bb, 10b, . . . ), and the router 70b are included in a predetermined intranet B. For example, the intranet A is managed by a company A, and the LAN 2a is installed in an office which is located in Tokyo. The intranet B is managed by a company B, and the LAN 2b is installed in an office which is located in Osaka. Further, the LAN 2a and the LAN 2b are installed in a segment AB. Here, the segment means a region (area) which is divided depending on a location on the communication network 2 or a geographical location. The segment AB is Japan, for example.
The terminals (10ca, 10cb, 10c, . . . ), and the router 70c are communicatably connected to a LAN 2c. The terminals (10ca, 10cb, 10c, . . . ), and the router 70c are installed in a predetermined intranet C. The terminals (10da, 10db, 10d, . . . ), the relaying apparatus 30d, and the router 70d are communicatably connected to a LAN 2d. The terminals (10da, 10db, 10d, . . . ), the relaying apparatus 30d, and the router 70d are installed in a predetermined intranet D. For example, the intranet C is managed by a company C, and the LAN 2c is installed in an office which is located in New York. Further, the intranet D is managed by a company D, and the LAN 2d is installed in an office which is located in Washington D.C. Here, the LAN 2c and the LAN 2d are installed in a segment CD. In the embodiment, the segment CD is the United States, for example. The intranet A, the intranet B, the intranet C, and the intranet D are communicatably connected to the Internet 2i through the corresponding routers (70a, 70b, 70c, and 70d). Here, between the intranets (A, B, C, and D) and the Internet 2i, corresponding firewalls are provided.
The terminal 10 can be moved. The terminal 10 can be connected to the Internet 2i from an area which is different from the area in which the terminal 10 is usually installed, and the terminal 10 can communicate content data with another terminal through the relaying apparatus 30. For example, the terminal 10ac can be connected to the intranet A through the Internet 2i from an area which is different from the area (Tokyo) in which the terminal 10ac is usually installed, and the terminal 10ac can communicate content data with another terminal through the relaying apparatus 30.
As shown in
In the transmission system 1 according to the embodiment, the relaying apparatus 30a is communicatably connected to the terminals (10aa, 10ab, 10ac, . . . ) and the management system 50 through the communication network 2. The relaying apparatus 30a is installed in the LAN 2a or VPN 2va so as to optimize the communication path. When at least one of the terminals (10aa, 10ab, 10ac, . . . ) communicates with another terminal which is installed in the LAN 2a, the relaying apparatus 30a is used for relaying content data.
In the transmission system 1 according to the embodiment, the relaying apparatus 30d is communicatably connected to the terminals (10da, 10db, . . . ) and the management system 50 through the communication network 2. The relaying apparatus 30d is installed in the LAN 2d or VPN 2vd so as to optimize the communication path. When at least one of the terminals (10da, 10db, . . . ) communicates with another terminal which is installed in the LAN 2d, the relaying apparatus 30d is used for relaying content data.
In the transmission system 1 according to the embodiment, the relaying apparatus 30ab is communicatably connected to the terminals (10aa, 10ab, 10ac, 10ba, 10bb, . . . ) and the management system 50 through the communication network 2. The relaying apparatus 30ab is installed in an area other than the area A and the area B, so that the relaying apparatus 30ab may avoid an effect of a traffic amount in the local area, which is the area A or the area B. When at least one of the terminals (10aa, 10ab, 10ac . . . , 10ba, 10bb, . . . ) communicates with another terminal which is installed in the LAN 2a or LAN 2b, the relaying apparatus 30ab is used for relaying content data. Hereinafter, an area including the LAN 2a and the LAN 2b is also referred to as a “segment AB.”
In the transmission system 1 according to the embodiment, the relaying apparatus 30cd is communicatably connected to the terminals (10ca, 10cb, 10da, 10db, . . . ) and the management system 50 through the communication network 2. The relaying apparatus 30cd is installed in an area other than the area C and the area D, so that the relaying apparatus 30cd may avoid an effect of a traffic amount in the local area, which is the area C or the area D. When at least one of the terminals (10ca, 10cb, 10da, 10db, . . . ) communicates with another terminal which is installed in the LAN 2c or LAN 2d, the relaying apparatus 30cd is used for relaying content data. Hereinafter, an area including the LAN 2c and the LAN 2d is also referred to as a “segment CD.”
In the transmission system 1 according to the embodiment, the relaying apparatus 30abcd is communicatably connected to the terminals (10aa, 10ab, 10ac, 10ba, 10bb, 10ca, 10cb, 10da, 10db, . . . ) and the management system 50 through the communication network 2. The relaying apparatus 30abcd is installed in an area other than the areas A, B, C, and D, so that the relaying apparatus 30abcd may avoid an effect of a traffic amount in the local area, which is the area A, B, C, or D. When at least one of the terminals (10aa, 10ab, 10ac, 10ba, 10bb, 10ca, 10cb, 10da, 10db, . . . ) communicates with another terminal which is installed in the LANs 2a, 2b, 2c, or 2d, the relaying apparatus 30abcd is used for relaying content data.
In the transmission system 1 according to the embodiment, the management system 50 and the program providing system 90 are communicatably connected to the terminal 10 and the relaying apparatus 30 through the Internet 2i. The management system 50 and the program providing system 90 may be installed in the area A, B, C, or D. Alternatively, the management system 50 and the program providing system 90 may be installed in an area other than the areas A, B, C, and D.
In the embodiment, the communication network 2 includes the LANs 2a, 2b, 2c, and 2e, and the Internet 2i. The communication network 2 may include not only a portion in which wired communication is performed, but also a portion in which wireless communication is performed.
In
<<Hardware Configurations According to the Embodiment>>
Next, there are explained hardware configurations according to the embodiment.
As shown in
An operations panel 1150 is formed in the chassis 1100 at a side of the right wall surface 1130. The operations panel 1150 includes a plurality of operation buttons (108a-108e), a power switch 109 (described later), and an alarm lamp 119 (described later). Further, the operations panel 1150 includes a sound output plane 1151. The sound output plane 1151 includes a plurality of sound output holes. Output sound from the built-in speaker 115 passes through the sound output holes. Further, an accommodating portion 1160 is formed in the chassis 1100 at a side of a left wall surface 1140 as a concave portion for accommodating the arm 1200 and the camera housing 1300. Further, a plurality of connecting ports 1132a-1132c is formed in the right wall surface 1130 of the chassis 1100. The connecting ports 1132a-1132c are for electrically connecting corresponding cables to an external device connecting I/F 118 (described later). A connecting port (not shown) for electrically connecting a cable 120c for a display 120 to the external device connecting I/F 118 is formed in the left wall surface 1140 of the chassis 1100.
In the explanation below, “the operation button 108” represents any one of the operation buttons 108a-108e, and “the connecting port 1132” represents any one of the connecting ports 1132a-1132c.
The arm 1200 is attached to the chassis 1100 through a torque hinge 1210. The arm 1200 can be pivoted in the vertical direction within a range of a tilt angle θ1 from 0 degrees to 135 degrees with respect to the chassis 1100.
The camera housing 1300 includes a built-in camera 1021. For example, a user, a document, and a room can be photographed. The camera housing 1300 includes the torque hinge 1310. The camera housing 1300 is attached to the arm 1200 through the torque hinge 1310. The camera housing 1300 can be pivoted in the horizontal direction and in the vertical direction with respect to the arm 1200. The camera housing 1300 can be pivoted in the horizontal direction within a range of a pan angle θ2 from −180 degrees to +180 degrees.
The external view shown in
Since external appearances of the relaying apparatus 30, the management system 50, the program providing system 90, and the maintenance system 100 are the same as that of an information processing apparatus such as a usual server computer, explanations of the external appearances of the relaying apparatus 30, the management system 50, the program providing system 90, and the maintenance system 100 are omitted.
The terminal 10 may include a SIM slot 131. The SIM slot 131 is for the terminal 10 to access a Subscriber Identity Module (SIM) card 130. The SIM card 130 stores authentication information for the terminal 10. The SIM card 130 may include a large memory area. Since the SIM card 130 is individually managed by a user, the SIM card 130 can be used as a secure memory area. The SIM card 130 has an access (reading/writing) control function, which is based on Personal Identification Number (PIN) input. The access control function enhances the security. An IC chip is included inside the SIM card 130. Besides storing the authentication information, the SIM card 130 performs calculation based on secret information which is stored inside the SIM card 130, in response to a request from the management system 50. By the calculation, the SIM card 130 generates information which can only be obtained by a legitimate SIM card. The authentication is performed on the basis of this information.
For a case in which the terminal 10 is compatible with the SIM card 130, the authentication information may only be stored in the SIM card 130, without being stored in the flash memory 104 and the like. When the authentication information of the terminal 10 is stored in the flash memory 104 as well as in the SIM card 130, and when the SIM card 130 is attached to the terminal 10, the authentication information which is stored in the SIM card 130 may be preferentially used. Alternatively, a user may select which authentication information is to be used.
The terminal 10 includes an operation button 108, a power switch 109, and a network interface (I/F) 111. The operation button 108 is for selecting a communication destination of the terminal device 10, for example. The power switch 109 is for turning on and off a power supply of the terminal device. The network I/F 111 is for transmitting data by using the communication network 2 (described later).
Further, the terminal 10 includes a built-in camera 112; an image sensor I/F 113; a built-in microphone 114; a built-in speaker 115; an audio input-output I/F 116; a display I/F 117; the external device connecting I/F 118; an alarm lamp 119; and a bus line 110. The built-in camera 112 photographs an object and obtains image data in accordance with the control of the CPU 101. The image sensor I/F 113 controls driving of the camera 112. The built-in microphone 114 is for audio input. The built-in speaker 115 is for audio output. The audio input/output I/F 116 processes the input and output of audio signals between the microphone 114 and the speaker 115 in accordance with the control of the CPU 101. The display I/F 117 transmits image data to the external display 120 in accordance with the control of the CPU 101. The external device connecting I/F 118 is for connecting various types of external devices. The alarm lamp 119 is for reporting an abnormal state of various types of functions of the terminal 10. The bus line 110 is an address bus and/or a data bus for electrically connecting the above-described components as shown in
The display 120 is a display screen that includes liquid crystals or organic light-emitting diodes for displaying, for example, an image of an object and an operational icon. The display 120 is connected to the display I/F 117 through the cable 120c. The cable 120c may be a cable for analog RGB (VGA) signals, a cable for the component video, or a cable for High-Definition Multimedia Interface (HDMI) signals or Digital VideoInteractive (DVI) signals.
The camera 112 includes, for example, a lens and a solid state image sensor for converting an image (picture) of an object into electronic data by converting light into charges. As the solid state image sensor, a complementary metal oxide semiconductor (CMOS) or a charge coupled device (CCD) is used, for example.
An external device such as an external camera, an external microphone, and an external speaker can be electrically connected to the external device connecting I/F 118 through a universal serial bus (USB) cable that is connected to the connecting port 1132 of the chassis 1100 shown in
The recording medium 106 is detachably attached to the terminal 10. Instead of the flash memory 104, an electrically erasable and programmable ROM (EEPROM) may be utilized as a non-volatile memory into which data can be written and from which data can be read out in accordance with the control of the CPU 101.
Further, the above-described terminal program may be stored in a computer readable recording medium (e.g., the recording medium 106) as a file in a format that can be installed or in a format that can be executed. In this case, the computer readable recording medium storing the transmission terminal program may be distributed. Further, the above-described terminal program may be stored in the ROM 102, instead of the flash memory 104.
In
For a case in which video and audio are used, it may be required that the communication terminal includes a camera and/or a microphone. However, for a case in which one of the video and audio is not required or neither the video nor audio is required, the communication terminal may not include the camera and/or the microphone. Even if neither the video nor audio is utilized, the shared folder function (described later) can be utilized. Additionally, another communication terminal such as a projector having a communication function may be used.
The above-described transmission management program may be stored in a computer readable recording medium such as the recording medium 206 or the CD-ROM 213 as a file in a format that can be installed or in a format that can be executed. In this case, the computer readable recording medium storing the transmission management program may be distributed.
Since the relaying apparatus 30 has a hardware configuration similar to that of the management system 50, the explanation of the hardware configuration of the relaying apparatus 30 is omitted. However, for the case of the relaying apparatus 30, the ROM 202 stores a relaying apparatus program. In this case, the relaying apparatus program may be stored in a computer readable recording medium such as the recording medium 206 or the CD-ROM 213 as a file in a format that can be installed or in a format that can be executed, and the computer readable recording medium storing the program may be distributed.
Since a hardware configuration of the program providing system 90 is the same as that of the management system 50, the explanation of the hardware configuration of the program providing system 90 is omitted. However, for the case of the program providing system 90, the ROM 202 stores a program providing system program, which is for controlling the program providing system 90. In this case, the program providing system program may also be stored in a computer readable recording medium such as the recording medium 206 or the CD-ROM 213 as a file in a format that can be installed or in a format that can be executed, and the computer readable recording medium storing the program may be distributed.
Since a hardware configuration of the maintenance system 100 is the same as that of the management system 50, the explanation of the hardware configuration of the maintenance system 100 is omitted. However, for the case of the maintenance system 100, the ROM 202 stores a maintenance system program, which is for controlling the maintenance system 100. In this case, the maintenance system program may also be stored in a computer readable recording medium such as the recording medium 206 or the CD-ROM 213 as a file in a format that can be installed or in a format that can be executed, and the computer readable recording medium storing the program may be distributed.
Since a hardware configuration of the file temporary storage device 40 is the same as that of the management system 50, the explanation of the hardware configuration of the file temporary storage device 40 is omitted. However, for the case of the file temporary storage device 40, the ROM 202 or the HD 204 stores a file temporary storage device program, which is for controlling the file temporary storage device 40. In this case, the file temporary storage program may also be stored in a computer readable recording medium such as the recording medium 206 or the CD-ROM 213 as a file in a format that can be installed or in a format that can be executed, and the computer readable recording medium storing the program may be distributed.
As another example of the removable recording medium, a compact disc recordable (CD-R), a digital versatile disk (DVD), or a blu-ray disk can be considered. Each of the above-described programs may be recorded in the CD-R, the DVD, or the blu-ray disk, and the CD-R, the DVD, or the blu-ray disk (BD) storing the corresponding program may be distributed.
<<Functional Configuration of the Transmission System>>
Next, there is explained a functional configuration of the transmission system 1 according to the embodiment.
<Functional Configuration of the Terminal>
The transmission terminal device 10 includes a communication unit 11; an operation input receiving unit 12; a log-in requesting unit 13; a photographing unit 14a; an audio input unit 15a; an audio output unit 15b; a display control unit 16; a delay detection unit 18; a storing and reading unit 19; a destination list creation unit 20; a PC communication unit 21; a mount drive 22; a folder mount unit 23; a file synchronization unit 24; and a SIM card storing/reading processing unit 25. These functional elements or steps are executed when the corresponding elements shown in
<Functional Elements of the Terminal>
Next, functional elements of the terminal device 10 are explained in detail. The communication unit 11 of the terminal 10 includes the network I/F 111 shown in
The operation input receiving unit 12 is achieved by an operation button 108 and a power switch 109, which are shown in
The photographing unit 14 is achieved by an instruction from the CPU 101, the camera 112, and the image sensor I/F 113, which are shown in
The image display control unit 16 is achieved by the display I/F 117. The image display control unit 16 controls transmission of image data to the external display 120. Furthermore, prior to the requested terminal 10 starting calling of a video conference with a desired destination terminal 10, the display control unit 16 causes the display 120 to display a destination list including destination names, based on the state information received by the communication unit 11.
For example, on the display 120, a destination list table 311-1 (c.f.,
The delay detection unit 18 is executed by an instruction from the CPU 101, which is shown in
The storing and reading unit 19 is executed by an instruction from the CPU 101, which is shown in
The destination list creation unit 20 creates or updates the destination list (cf.,
The terminal device ID according to the embodiment is, for example, identifying information such as descriptions, characters, symbols, or various types of marks that are used for uniquely identifying the terminal 10. Similarly, the relaying apparatus ID (described later) is, for example, identifying information such as descriptions, characters, symbols, or various types of marks that are used for uniquely identifying the relaying apparatus 30. Further, the terminal device ID and the relaying apparatus ID may be identifying information in which at least two of the above-described descriptions, characters, symbols, and various types of marks are combined.
The PC communication unit 21 is achieved, for example, by the external device connecting I/F 118, which is shown in
The mount drive 22 is created by loading the shared folder 47 by the terminal 10. When the terminal 10 retrieves information of a URI of the shared folder 47 from the management system 50, the folder mount drive unit 23 loads the shared folder 47 onto the terminal 10. The mount drive 22 is created by the loading. By the loading, the shared folder 47 at a source of the loading is synchronized with the file of the mount drive 22.
A file, which is received by the PC communication unit 21 from the PC 120, is written in the mount drive 22. The mount drive 22 is achieved, for example, by the RAM 103 or the flash memory 104, which are shown in
When the file synchronization unit 24 receives information that the file is written in the mount drive 22 from the PC communication unit 21 (receive interruption), the file synchronization unit 24 may detect that the file is written in the mount drive 22. Alternatively, by periodically monitoring the mount drive 22, the file synchronization unit 24 may detect that the file is written in the mount drive 22.
When the file synchronization unit 24 detects that the file is written in the mount drive 22, the file synchronization unit 24 transmits the file of the mount drive 22 to a file temporary storage device 40 by using the communication unit 11.
When the file synchronization unit 24 receives a file name of the file which is stored in the shared folder 47 from a file synchronization unit 44 of the file temporary storage device 40, the file synchronization unit 24 registers the file name with the mount drive 22. Accordingly, the PC 120 may recognize that the file exists in the mount drive 22.
When the terminal 10 is compatible with the SIM card 130, the SIM card storing/reading processing unit 25 stores information in the SIM card 130, and reads out information in the SIM card 130.
(Functional Configuration of the Relaying Apparatus)
Next, functions and/or units of the relaying apparatus 30 are explained. The relaying apparatus 30 includes a communication unit 31; a state detection unit 32; a data quality confirming unit 33; a change quality management unit 34; a data quality changing unit 35; and a storing and reading unit 39. These functional elements or the units are achieved when the corresponding elements shown in
(Change Quality Management Table)
The non-volatile memory 3000 includes a change quality management data base (DB) 3001 that includes a change quality management table as shown in
Hereinafter, there is explained resolution of an image of image data according to the embodiment by referring to
<Functional Elements of the Relaying Apparatus>
Next, the functional elements of the relaying apparatus 30 are explained in detail. In the explanation below, while explaining the functional elements of the relaying apparatus 30, there are explained relationships between the functional elements and the major components (among the components shown in
The communication unit 31 of the relaying apparatus 30 shown in
The data quality confirming unit 33 is executed by an instruction from the CPU 201 shown in
The data quality changing unit 35 is executed by an instruction from the CPU 201, which is shown in
<Functional Configuration of the Management System>
Next, functions and/or units of the management system 50 are explained. The management system 50 includes a communication unit 51; a terminal authentication unit 52; a state management unit 53; a terminal extracting unit 54; a terminal state acquisition unit 55; a relaying apparatus selection unit 56; a session management unit 57; a quality determination unit 58; a storing and reading unit 59; a delay time management unit 60, and a shared folder management unit 61. These functional elements or the units are achieved when the corresponding elements shown in
(Relaying Apparatus Management Table)
The non-volatile memory 5000 includes a relaying apparatus management DB 5001 that includes a relaying apparatus management table, which is shown in
(Terminal Device Authentication Management Table)
Further, the non-volatile memory 5000 includes a terminal device authentication management DB 5002 that includes a terminal device authentication management table such as shown in
(Terminal Device Management Table)
Further, the non-volatile memory 5000 includes a terminal management DB 5003 that includes a terminal management table such as shown in
(Destination List Management Table)
Further, the non-volatile memory 5000 includes a destination list management DB 5004 that includes a destination list management table such as shown in
(Session Management Table)
Further, the non-volatile memory 5000 includes a session management DB 5005 that includes a session management table such as shown in
(Quality Management Table)
Further, the non-volatile memory 5000 includes a quality management DB 5007 that includes a quality management table such as shown in
(Attribute Management Table)
The non-volatile memory 5000 includes an attribute management DB 5008, which includes an attribute management table such as shown in
(Functional Elements of the Transmission Management System)
Next, functional elements of the transmission management system 50 are explained in detail. In the explanation below, while explaining the functional elements of the management system 50, there are explained relationships between the functional elements and the major components (among the components shown in
The communication unit 51 is executed by the network I/F 209 shown in
In order to manage an operating state of the requesting terminal that requests to log-in, the state management unit 53 associates the terminal ID of the requesting terminal with the an operating state of the requesting terminal, date and time of receiving the log-in request information by the management system 50, and the IP address of the requesting terminal. The state management unit 53 stores the terminal ID of the requesting terminal, the operating state of the requesting terminal, the date and time of receiving the log-in request information by the management system 50, and the IP address of the requesting terminal in the terminal management table (cf.
The terminal extracting unit 54 searches the destination list management table (cf.
The terminal state acquisition unit 55 searches the terminal management table (cf.
The relaying apparatus selection unit 56 selects, for each session in which content data is communicated among the terminals 10, the relaying apparatus 30, which is used for relaying image data and audio data. To do this, the relaying apparatus selection unit 56 achieves a session ID generating unit 56a, a destination determination unit 56b, an attribute extraction unit 56c, an attribute determination unit 56d, and a selection unit 56e, which are shown in
The session ID generating unit 56a generates a session ID for identifying a session, in which content data is communicated among the terminals 10. The destination determination unit 56b determines whether a terminal ID of a requesting terminal which requests for a video conference is the same as a terminal ID of a destination terminal which is requested to participate in the video conference. The attribute extraction unit 56c searches the attribute management table (cf.
The session management unit 57 manages the session management table of the non-volatile memory 5000 (cf.
The quality determination unit 58 searches the quality management table (cf.
Subsequent to establishing a session by the management system 50, the shared folder management unit 61 mainly performs the following processes.
In the shared folder table 48 (which is explained later), a shared folder URI, an account name, and a password are registered. The shared folder URI indicates the location of the shared folder 47. The account name and the password are included in the account information. Additionally, access control information is registered in the shared folder table 48. This is explained later.
The shared folder management unit 61 transmits a record to the file temporary storage device 40 each time one record of the shared folder table 48 is created. The shared folder management unit 61 transmits the shared folder URI, the account name, and the password to the terminals 10 and the file temporary storage device 40.
<File Temporary Storage Device>
Next, functional units of the file temporary storage device 40 are explained. The file temporary storage device 40 includes a folder storage unit 41, a shared folder creation unit 42, an access control unit 43, a file synchronization unit 44, a communication unit 45, and a file management DB 46.
(Shared Folder Table)
The shared folder URI indicates the location of the shared folder 47 in accordance with the URI schema. For the case of
The “account name” is identification information for the file temporary storage device 40 to identify the terminal 10. The “password” is the authentication information for the terminal 10 to load the shared folder 47. When a combination of the “account name” and the “password,” which is transmitted from the terminal 10, coincides with a combination of the “account name” and the “password,” which is registered in the shared folder table 48, the file temporary storage device 40 allows loading of the shared folder 47.
Access right for reading a file of the shared folder 47 and for writing a file of the shared folder 47 is given to the terminal 10. Namely, all the terminals 10 have the access right for reading and writing. The access right may be limited only for reading. Similarly, the access right may be limited only for writing.
The folder storage unit 41 is achieved by the HD 204, which is shown in
When the shared folder creation unit 42 receives a request for creating a shared folder from the shared folder management unit 61, the shared folder creation unit 42 creates, for each session, an independent shared folder 47. The folder may be referred to as a “directory.” In this case, the shared folder is the shared directory. The shared folder creation unit 42 deletes the shared folder 47 when the conference is terminated. In many cases, one shared folder 47 is created for a single session. However, it is possible that a plurality of shared folders 47 is created for a single session.
The access control unit 43 determines whether the terminal 10 has the access right for writing by referring to the shared folder table 48. Similarly, the access control unit 43 determines whether the terminal 10 has the access right for reading by referring to the shared folder table 48.
The file synchronization unit 44 manages sharing of a file, so that a file of the share folder 47 which is loaded by a terminal 10 can be accessed by another terminal 10, by communicating with the file synchronization unit 24 of the terminal 10. Namely, a file which is stored in the shared folder 47 can be displayed or opened on the PC 120, which is connected to the other terminal 10. The entity of the file is stored in the file temporary storage device 40. In a normal state, each of the terminals 10 stores only the file name of the file (which includes the icon of the file).
The file which is written by the PC 120 on the terminal 10 is uploaded to the shared folder 47 by the folder synchronization unit 26 of the terminal 10 by communicating with the folder synchronization unit 44 of the file temporary storage device 40. No files remain in the terminal 10. Further, the folder synchronization unit 44 of the file temporary storage device 40 transmits the file name to other terminals 10 with which the session is established. Accordingly, the file name can be referred to from all the terminals (PC), and the file can be read, provided that the access right for reading is given.
The file synchronization unit 24 of the terminal 10 and the file synchronization unit 44 of the file temporary storage device 40 share a file, for example, by using a protocol such as the Server Message Block (SMB) or the Common Internet File System (CIFS). The file sharing is achieved in such a manner that one of devices, which are connected through a network, transmits a request to a file system of another one of the devices, and the one of the devices retrieves the processed result. For example, when one of devices transmits a request for a file to another one of the devices, the other one of the devices reads out the file, and the other one of the devices transmits the file to the one of the devices. Alternatively, when one of devices transmits a file to another one of the devices, the other one of the devices writes the file, and the other one of the devices transmits to the one of the devices that the other one of the devices has written the file.
For a case in which the file synchronization units 24 and 44 share a file by the SMB, a SMB service is called. For the case of the SMB, the file sharing is provided as a client-server type service (a service such that a client requests a service, and the server provides the service). In the embodiment, the file temporary storage device 40 may be a server or a client, and the terminal 10 may be a server or a client. Accordingly, the terminal 10 and the file temporary storage device 40 have both a client SMB service and a server SMB service. Here, as a protocol for the file sharing, the WebDAV, the Network File System (NFS), or the like may be utilized.
<PC>
Next, functional units of the PC 120 are explained in detail. Since a hardware configuration of the PC 120 is the same as that of the management system 50, an explanation of the hardware configuration is omitted. In many cases, the PC 120 is a personal computer. However, it suffices if the PC 120 is an information processing device including a display, such as a tablet terminal, a smart phone, or a mobile telephone.
The PC 120 includes an operation receiving unit 71, a file operating unit 72, a file DB 73, and a communication unit 74. The communication unit 74 is achieved by the external device I/F 215, which is shown in
The file DB 73 is achieved by the HD 204, which is shown in
The operation receiving unit 71 is achieved by the keyboard 211 and the mouse 212, which are shown in
When the operation receiving unit 71 receives such a file operation, the file operating unit 72 operates on the file. For example, when a participant performs an operation for copying a file of the file DB to the terminal 10, the file operating unit 72 transmits the file of the file DB to the terminal 10 through the communication unit 74. The PC communication unit 21 of the terminal 10 stores the received file in the mount drive 22. The display 208 of the PC 120 displays a file name of the file, which is copied to the mount drive 22 of the terminal 10.
<<Processing and Operations>>
The configuration and functions (or units) of the transmission system 1 according to the embodiment are described above. Hereinafter, there is explained a processing method in the transmission system 1 according to the embodiment by referring to
First, there is explained the process of managing the state information indicating the states of the corresponding relaying apparatuses 30 that is transmitted from the corresponding relaying apparatuses 30 to the management system 50 by referring to
In the above-described steps (step S2-1-step S2-3) for transmitting the state information, when the relaying apparatus 30 transmits the state information through a firewall, it is preferable for the relaying apparatus 30 to perform secure communication to ensure the security. Here, the secure communication means that communication is performed in such a manner that a third party cannot understand contents of the communication. Examples of the secure communication include communications using the Transport Layer Security (TLS), the Secure Sockets Layer (SSL), or a tunneling service. For example, in the transmission system 1a of
Next, the communication unit 51 of the management system 50 receives the state information which is transmitted from the relaying apparatuses 30. Here, for the case in which the communication is mapped, the communication unit 51 can receive the state information through the tunneling service of the management system 50. The management system 50 stores, for each of the relaying apparatus IDs, the corresponding received state information in the relaying apparatus management table (cf.
Next, there is explained a state of the transmission system 1, in which image data, audio data, and various types of management information are transmitted and received, by referring to
Next, there is explained a process of transmitting and receiving various types of management information between the terminal 10aa and the terminal 10db at a preparatory stage prior to starting communication by referring to
When a user of the terminal 10aa turns on the power switch 109 (which is shown in
When the terminal 10aa is compatible with the SIM card 130, the SIM card 130 is made accessible by inputting a PIN to the SIM card 130 (step S21-2). Then, log-in information is retrieved from the SIM card 130 (step S21-3). The terminal 10aa may store the PIN. Alternatively, a PIN input screen may be provided, and a user may be prompted to input the PIN. The SIM card 130 may store the terminal ID and the password as the log-in information, and that log-in information may be retrieved. However, usually, in an authentication process using a SIM card, a key which is stored inside the SIM card is not output. Instead, within the SIM card, the SIM applies an operation, in which the key is utilized, to a specific value which is input by a server, and the SIM card returns a value which can only be calculated by the SIM to the server. In this manner, client authentication is performed with respect to the server.
It can be changed, depending on implementation, as to whether the PIN input is enabled or disabled. In addition, it can also be changed, depending on implementation, which type of access is enabled by the PIN input. For example, when no PINs are input, both the reading and writing may be disabled, and when a correct PIN is input, both the reading and writing may be enabled. A function may be provided such that, when an erroneous PIN is input multiple times, the SIM is locked.
Subsequently, the log-in requesting unit 13 automatically transmits log-in request information (which indicates a log-in request) from the communication unit 11 to the management system 50 through the communication network 2 (step S22). The log-in request information includes the terminal ID and the password, which are for identifying the terminal 10aa as a requesting source. The terminal ID and the password are read out from the non-volatile memory 1000 through the storing and reading unit 19, and transmitted to the communication unit 11. When the log-in request information is transmitted from the terminal 10aa to the management system 50, the management system 50, which is a receiving side, can recognize an IP address of the terminal 10aa, which is a transmitting side.
Subsequently, the terminal authentication unit 52 of the management system 50 searches the terminal authentication management table (cf.
When the terminal authentication unit 52 determines that the terminal ID and the password, which are the same as the terminal ID and the password included in the log-in request information, are managed by the terminal management table of the terminal management DB 5003, and thereby the terminal authentication unit 52 determines that the log-in request is from the terminal 10 having a valid usage right, the state management unit 53 associates the terminal ID of the terminal 10aa with, for each of the records indicated by the destination names, the operating state, the date and time of receiving the log-in request information, and the IP address of the terminal 10aa, and stores the terminal ID of the terminal 10aa, the operating state, the date and time of receiving the log-in request information, and the IP address of the terminal 10aa into the terminal management table (step S24). In this manner, in the terminal management table shown in
The communication unit 51 of the management system 50 transmits authentication result information indicating the result of the authentication that is obtained by the terminal authentication unit 52 to the requesting terminal (terminal 10aa) that requests to log-in through the communication network 2 (step S25).
Next, post-processes of the authentication are explained for a case in which the authentication by the terminal authentication unit 53 is successful. When the terminal 10aa receives authentication result information indicating that the terminal 10aa is determined to be a terminal having a legitimate usage right, the communication unit 11 transmits destination list request information indicating that a destination list is requested to the management system 50 through the communication network 2 (step S26). In this manner, the communication unit 51 of the management system 50 receives the destination list request information.
Next, the terminal extracting unit 54 searches the destination list management table (cf.
Subsequently, the communication unit 51 of the management system 50 reads out data of the destination list table (which is the data of the destination list table 311-1 of
As described above, according to the embodiment, the destination list is not managed by the terminals 10, but the management system 50 centrally manages the destination list information of all the terminals 10. Accordingly, even if a new terminal 10 is introduced to the transmission system 1, a terminal 10 as a new model is introduced to the transmission system 1 in place of an already included terminal 10, or an appearance of the destination list table is changed, since the management system 50 collectively handles these processes, complexity of updating the destination list information in each of the terminals can be eliminated.
The terminal state acquisition unit 55 of the management system searches the terminal device management table (cf.
Subsequently, the communication unit 51 transmits “terminal state information” to the requesting terminal (terminal 10aa) through the communication network 2 (step S32). Here, the “terminal state information” includes the terminal ID “01ab” as the search key, which is used at step S27, and the corresponding operating state “on-line (being communicatable)” of the destination terminal (terminal 10ab). Similarly, as a part of step S32, the communication unit 51 individually transmits remaining “terminal state information” to the requesting terminal (terminal 10aa). Here, the remaining “terminal state information” is, for example, the “terminal state information” including the terminal ID of “01ba” and the operating state of “on-line (temporarily suspended)” of the corresponding destination terminal (terminal 10ba).
Subsequently, the storing and reading unit 19 of the requesting terminal (terminal 10aa) sequentially stores the state information of the terminals, which are received from the management system 50, into the volatile memory 1002 (step S33). By receiving the state information of each of the terminals 10, the requesting terminal (terminal 10aa) can retrieve corresponding current operating state information of the terminals 10, which are candidates for the destination terminal. Here, the destination terminal can communicate with the requesting terminal (terminal 10aa).
Subsequently, the destination list creation unit 20 of the requesting terminal (terminal 10aa) creates a destination list based on the destination list information, which is stored in the volatile memory 1002, and the state information of the terminals 10. Here, the destination list indicates the states of the terminals 10 as the destination candidates. At the same time, the display control unit 16 controls the timing for displaying the destination list on the display 120 (which is shown in
By doing these, the destination list is displayed on the display 120aa, as shown in
Referring again to
Subsequently, the terminal state acquisition unit 55 of the management system 50 searches the terminal management table (cf.
Then, the communication unit 51 transmits “terminal state information” to the terminals (10ba, and 10db) (step S37-1, and step S37-2). Here, among the terminals (10ab, 10ba, and 10db) corresponding to the terminal IDs (“01ab,” “01ba,” and “01db”), which are extracted at step S35, the operating states of the terminals (10ba, and 10db) are “on-line” in the terminal management table (cf.
In other terminals 10, similar to step S21, when a user turns on the power supply 109 (which is shown in
Next, there are explained processes for the terminal to start communicating with another terminal by referring to
When a user of the requesting terminal (terminal 10aa) selects a destination terminal (which is assumed to be the terminal 10db, here) by pressing the operation button 108 (which is shown in
In the terminal management DB 5003 (cf.
Next, the management system 50 performs a process for selecting the relaying apparatus 30. In this case, the session ID generating unit 56a generates a session ID “se1” (step S44). The session ID “se1” is for identifying a session (an image/audio data session sed) for executing the communication with the destination terminal, which is requested by the requesting terminal (terminal 10aa).
Subsequently, the relaying apparatus selection unit 56 of the management system 50 selects the relaying apparatus 30 for relaying the communication between the requesting terminal (terminal 10aa) and the destination terminal, based on the relaying apparatus management DB 5001 and a selection management DB (step S45). Hereinafter, the process of selecting the relaying apparatus 30 is concretely explained.
First, the destination determination unit 56b determines whether the terminal ID of the destination terminal (terminal 10db), which is included in the start request information transmitted from the requesting terminal (terminal 10aa), is the same as the terminal ID of the requesting terminal (whether the requesting terminal itself is selected as the destination). When the terminal ID of the destination terminal is the same as the terminal ID of the requesting terminal, the selection unit 56e selects the relaying apparatus 30abcd (a common relaying apparatus). At the time of selecting the relaying apparatus 30, the communication network 2, to which a terminal that subsequently participates in this session is connected, is unknown, and an area, in which the terminal is connected to the communication network 2, is unknown. Thus, it is preferable to select a relaying apparatus to which all the terminals can be connected.
When the terminal ID of the destination terminal is not the same as the terminal ID of the requesting terminal, the attribute extraction unit 56c searches the attribute management table (cf.
Here, even if the intranet relaying apparatus IDs, which are extracted by the attribute extraction unit 56c, are the same, depending on the state of the intranet relaying apparatus which is identified by the intranet relaying apparatus ID, subsequent processes are executed. In this case, the management system 50 searches the relaying apparatus management table (cf.
When the relaying apparatus IDs, which are extracted by the attribute extraction unit 56c, are not the same, the attribute extraction unit 56c searches the attribute management table (cf.
Here, even if the segment relaying apparatus IDs, which are extracted by the attribute extraction unit 56c, are the same, depending on the state of the segment apparatus which is identified by the segment relaying apparatus ID, subsequent processes executed. In this case, the management system 50 searches the relaying apparatus management table (cf.
When the extracted segment terminal IDs are not the same, the selection unit 56e selects the relaying apparatus 30abcd (a common relaying apparatus). This is because it is not possible for the terminals which participate in the session to use the same communication network relaying apparatus 30 or the same segment relaying apparatus 30.
After completion of the process of selecting the relaying apparatus 30, the session management unit 57 stores the session ID “se1” which is generated at step S44; the terminal ID of the requesting terminal (terminal 10aa); the terminal ID of the destination terminal (terminal 10db); and the relaying apparatus ID of the selected relaying apparatus in the session management table (cf.
Next, the communication unit 51 (which is shown in
Next, the communication unit 51 transmits the start request information including the terminal ID of the requesting terminal (terminal 10aa) and the session ID “se1”; the relaying apparatus connection information which is used for connecting a terminal to the relaying apparatus 30; and the IP address of the management system 50 to the destination terminal (terminal 10db) (step S48). In this manner, the communication unit 11 of the terminal 10db receives the start request information. At the same time, the communication unit 11 of the terminal 10db recognizes the relaying apparatus connection information which is used for connecting a terminal to the relaying apparatus 30 (which is used for relaying the content data), and the IP address “1.1.1.2” of the management system 50, which is the transmission source.
Subsequently, the communication unit 51 of the management system 50 transmits relaying start request information indicating a request to start relaying to the relaying apparatus 30, which is selected through the communication network 2 (step S49). The relaying start request information includes IP addresses of the requesting terminal (terminal 10aa) and the destination terminal (terminal 10db), respectively, to which the content data is relayed. In this manner, the relaying apparatus 30 establishes a session (an image/audio data session sed) for communicating low-resolution image data, middle-resolution image data, high-resolution image data, and audio data between the terminals 10aa and 10db (step S50). With this, the terminals 10 can start a video conference.
<Outline of File Sharing Operation>
The video conferencing server 200 includes the transmission management system (management system) 50; the relaying apparatus 30; and the file temporary storage device 40. The management system 50 provides a service for managing communication among terminals, which participate in a conference. Thus, for example, the management system 50 generates a session ID for identifying a session in which content data such as video and/or audio data is communicated among the terminals. By the session ID, the terminals can be identified which share files in the electronic conference system 300.
The relaying apparatus 30 provides a service for relaying content data. The relaying apparatus 30 optimizes a relay path of content data and resolution by monitoring delay time, for example.
The file temporary storage device 40 provides a service for sharing files among the terminals which participate in a conference. An example is explained in which a file of the PC 1 in
(1) When a conference is started, the management system 50 causes the file temporary storage device 40 to create a shared folder. The file temporary storage device 40 creates the shared folder, which is to be shared among the terminals which participate in the conference. The file temporary storage device 40 transmits a shared folder's URI (Uniform Resource Identifier) and account information to the terminals 1 and 2.
(2) The terminals 1 and 2 mount their folders to the shared folder's URI by using the account information. Here, “to mount” means to enable the shared folder of the file temporary storage device 40 to be used by the terminals 1 and 2, similar to the case in which the terminals 1 and 2 use their own folders. In the dedicated terminal 2, the shared folder is mounted to any portion in the storage area in the terminal 10. In the terminal 1, which includes the PC 1 and the SIM card 130, the shared folder is mounted to a secure storage area inside the SIM card 130.
(3) After the shared folder is mounted, if the PC 1 of the terminal 1 writes a file into the shared folder, the terminal 1 detects writing of the file, and the terminal 1 transmsits the file to the file temporary storage device 40.
(4) The file temporary storage device 40 stores the file in the shared folder.
(5) The file temporary storage device 40 transmits a file name, which is stored in the shared folder, to the terminal 2 to which the shared folder is mounted. The entity of the file is not transmitted to the terminal 2, until an explicit request is received. A user of the PC 2 sees the file name, and if the file is necessary, the user of PC 2 may send a request for mounting the file to the file temporary storage device 40. If there is such a user operation, the PC 2 retrieves the entity of the file from the shared folder through the terminal 2, and the PC 2 may display the entity of the file on a display.
(6) When the conference is terminated, the shared folders of the file temporary storage device 40, the terminal 1, and the terminal 2 are unmounted, and the contents of the shared folders are deleted. However, in the terminal 1, which includes the PC 1 and the SIM card 130, the shared folder is copied onto another portion of the SIM card 130, prior to unmounting, and the contents of the shared folder are substantially maintained. If it is possible to perform unmounting while retaining the data of the shared folder (a case in which the shared folder is changed into a normal folder by unmounting, without deleting the contents of the shared folder), it is not necessary to copy the shared folder to the other portion.
That is because, for the case of the dedicated terminal 2, which may be used by an unspecified user, a security problem may be caused by leaving the contents of the shared folder. For the case of the SIM card 130, which is individually managed by the corresponding user, and which can perform access control based on the PIN, such a security problem may not be caused. Furthermore, there is an advantage such that the shared file can be carried as it is and utilized. For the case of the dedicated terminal 2, if a file which is stored in the shared folder is to be used after terminating the conference, the file may be copied to the PC 2, for example, prior to unmounting the shared folder.
In this manner, a file can be shared between the terminal 1 and the terminal 2, only by writing the file into the shared folder by the PC 1 of the terminal 1. Moreover, with such a configuration, security and usability of the system can be ensured.
In the electronic conference system 300 according to the embodiment, since the file is shared by a service which is different from the relaying apparatus 30, which transmits the content data, the file can be shared among the terminals without affecting the transmission and reception of the content data. Further, since the file temporary storage device 40 manages the file while associating the file with the session ID, the file temporary storage device 40, which is a service different from the management system 50, can manage the sharing of the file. Further, since the file is shared among the terminals having the same session ID, security can be ensured by the session ID.
As explained above, the management system 50 performs communication control such as establishing a session among terminals 10. The relaying apparatus 30 relays the image data and audio data so that the image data and audio data are transmitted through an optimized path, which is selected by the relaying apparatus 30 for the image data and audio data. The file temporary storage device 40 enables sharing of files among terminals 10.
S1. Establishment of Session
A session is established between the terminal 1 and the terminal 2 by the above-described procedure.
S2. The shared folder management unit 61 of the management system 50 causes the file temporary storage device 40 to create the shared folder 47, and creates the shared folder table 48, subsequent to the above-described steps S47 and S48, for example. Since, for the management system 50, the URI of the shared folder 47 is unknown, the management system 50 receives the URI from the file temporary storage device 40. Accordingly, the shared folder creation unit 42 of the file temporary storage device 40 creates the shared folder 47, and the shared folder creation unit 42 transmits the shared folder URI of the shared folder 47 to the management system 50.
The shared folder management unit 61 of the management system 50 transmits the shared folder table 48 including the shared folder URI to the file temporary storage device 40.
Alternatively, the management system 50 may create the shared folder URI in advance. Namely, the shared folder management unit 61 creates the shared folder URI by adding a session ID, for example, to the URL of the file temporary storage device 40. By reporting the shared folder URI as the shared folder table 48 to the file temporary storage device 40, the shared folder creation unit 42 creates the shared folder 47 at the shared folder URI.
The file temporary storage device 40 updates the shared folder table 48 by adding a record to the shared folder table 48 of the file management DB 46.
As described above, when the management system 50 creates the shared folder table 48, the management system 50 creates the account information (the account name and the password). Each of the terminals 10 has the access rights for reading and writing, except for a case in which the management system 50 particularly limits the access rights.
In
Further, each of the terminals 10 may request establishment of the above-described shared folder table 48 during mounting the mount drive 22.
S3-1/3-2. Notification of the shared folder URI and the account information
When the shared folder 47 is created in the file temporary storage device 40, the shared folder management unit 61 reports the shared folder URI and the account information to each of the terminals 10 which participate in the conference.
S4-1/4-2. Mounting of the shared folder The folder mount units 23 of the terminals 1 and 2 mount the shared folder 47 to the terminals 1 and 2, respectively. For example, a command for mounting is as follows, for a case in which the SMB is utilized.
mount_shared folder_URI account name_password_path to the destination of mounting
The SMB is a protocol for establishing file sharing or printer sharing. By using server/client software “Samba” in which the protocol is implemented, a file can be shared among Linux (registered trademark) device and Windows (registered trademark) devices. Further, an account can be created, and an access right can be set for each of the files or folders.
For a protocol other than the SMB, the command name and the format are different. However, it is the same as the SMB in a point that the mounting can be performed. Other protocols for creating a folder on a network and for sharing a file through the network include WebDAV, CIFS, and NFS, for example.
In this manner, the file synchronization unit 24 and the file synchronization unit 44 communicate, and the shared folder 47 is mounted on the paths, which are specified by the “destination paths of the mounting” of the terminals 1 and 2. The file synchronization unit 44 manages the account names of the terminals 1 and 2 on which the shared folder 47 is mounted, while associating the account names with the shared folder URI. Since the shared folder 47 is managed on the basis of an account name, it is possible that a plurality of the terminals have the same account name.
When the file “file.txt” is stored in the shared folder 47 of the file temporary storage device 40, the file synchronization units 24, and 44 communicate, and a file name of “file.txt” is displayed on the D drives of the terminals 1 and 2 (the entity of the file is stored in the shared folder 47).
At the start of the conference, when the previous shared folder is stored in the secure storage area of the SIM card 130, the previous shared folder may be shared again by mounting a new shared folder and subsequently copying the previous shared folder onto the new shared folder.
Further, since the conference is not always held among the same parties, a user may select as to whether to share the previous shared folder. Further, a plurality of the shared folders may be stored, and a user may select a folder to be shared depending on the party of the conference. Alternatively, a shared folder which is associated with the party of the conference may be automatically selected.
S5-1/5-2. Writing/Reading
For example, a file is written in the D drive. Here, it is assumed that terminal 1 writes the file.
S6. Synchronization
The file synchronization unit 24 detects the writing in the D drive. The file synchronization unit 24 specifies the shared folder 47 of the file temporary storage device 40 and transmits the file to the shared folder 47. The file synchronization unit 44 stores the file in the shared folder 47, and the file synchronization unit 44 transmits the file name to the terminal 1 and to the terminal 2, on which the shared folder 47 is mounted. On the D drives of the terminals 1 and 2, the same file name is displayed. The terminal 1 may transmit the file and the terminal ID, and the file temporary storage device 40 may identify the session ID from the terminal ID. If the session ID is identified, the other terminal which participates in the same conference can be identified and the shared folder URI can be retrieved from the shared folder table 48.
[Access Control]
Access control is explained. The file temporary storage device 40 can control access to the shared folder 47 depending on the access right on the reading and/or writing.
The shared folder management unit 61 gives the access right to the terminal in accordance with the predetermined rules below.
The shared folder management unit 61 may not give any access right to a terminal by not transmitting the account information to the terminal. In
The plurality of shared folders 47 is utilized as described below.
Only the terminal side may perform the access control, or the file temporary storage device 40 side may perform the access control. Alternatively, both the terminal side and the file temporary storage device 40 side may perform the access control. Namely, the access control may be performed by any one of the shared folder 47 of the file temporary storage device 40 and the D drives of the terminals 1 and 2.
For Writing
When the access control is performed by the shared folder 47 of the file temporary storage device 40, the access control unit 43 prevents writing of a file from the terminals 1 and 2 based on the access right.
When the access control is performed by the D drives of the terminals 1 and 2, the file synchronization units 24 prevent writing of a file from the terminals 1 and 2 based on the access right.
For Reading
When the access control is performed by the shared folder 47 of the file temporary storage device 40, the access control unit 43 does not transmit the file name to the terminal not having the access right for reading. When the access control is performed by the D drives of the terminals 1 and 2, the D drives discard the file name even if the file name is transmitted from the file temporary storage device 40, and the file synchronization units 24 do not display the file name.
[Example of File Sharing]
In
In
In
In
By controlling the access right in such a diversified manner, for example, when the conference is a multi-base electronic conference (by the terminals 1, 2, 3, and 4), the management system 50 or the individual terminals can easily achieve the access control such that “the terminals 1 and 2 can read and write; the terminal 3 can only read; and terminal 4 cannot read or write.”
For example, when a conference is conducted among a main office and branch offices, the management system 50 may set the system such that the terminals at the main office can read and write, and the terminals at the branch offices can only read. Consequently, control can be enabled such that documents and data can be distributed from the main office to the branch offices, but documents and data may not uploaded from the branch offices (to prevent tampering of the documents).
As described above, with the electronic conference system 300 according to the embodiment, the terminal 1 and the terminal 2 can share the same file only by writing the file by the PC 1 onto the terminal 1.
Hereinafter, another example of the electronic conference system 300 according to the embodiment is explained in which the terminal 3, which participates in the conference after the start of the conference, can share a file with the terminals 1 and 2. It is assumed that a terminal, which participates in the conference after the start of the conference, is the terminal 3. In this case, synchronization of the file is also enabled when the management system 50 transmits the shared folder URI and the account information to the terminal 3.
S1. During Conference
The conference is already started between the terminal 1 and the terminal 2. A session is already established.
S2. Participate in the Conference in the Middle
When the power supply of the terminal 3 is turned on, the log-in requesting unit 13 requests the management system 50 to log-in, A user of the PC 3, which is connected to the terminal 3, participates in the conference after the start of the conference by specifying one of the destination terminals (which performs the conference).
S3. Establishment of Session
The management system 50 establishes a session between the terminal 3 and the terminals 1 and 2. The management system 50 identifies the session ID and the other terminals of the conference, in which the terminal 3 is to participate, by referring to the session management table based on the destination terminal.
S4. Confirmation of Shared Folder Table
The shared folder management unit 61 transmits the session ID to the file temporary storage device 40, and thereby the shared folder management unit 61 retrieves the URI of the shared folder 47 and the shared folder table 48 of the conference.
At this time, the access control information is generated. The management system 50 may grant the access right for reading only to the terminal 3, which participates in the conference after the start, or the management system 50 may grant the access right in response to the request from the terminal 3.
S5. Notification of the Shared Folder URI and the Shared Folder Table
The shared folder management unit 61 transmits the shared folder URI and the account information to the terminal 3, which participates in the conference after the start.
S6. Mounting of the Shared Folder
The folder mount unit 23 of the terminal 3 mounts the shared folder 47. By the mounting, synchronization is started between the shared folder 47 of the file temporary storage device 40 and the drive, which is mounted on the terminal. The file synchronization unit 44 transmits the file name of the file, which is stored in the shared folder 47, to the terminal 3. In this manner, the PC 3 can display the file name of the drive which is mounted on the terminal 3 to the display 208, as if it were a USB memory.
According to this example, upon participating in the conference, a file can be shared with the terminal, which participates in the conference after the conference is started. Here, the file has been shared among the parties, prior to the participation of the terminal.
In this example, there is explained the shred folder 47 after terminating the conference. When a file is stored in the shared folder 47 as the above-described examples, it is not preferable to leave as it is from the perspective of security. I is preferable to delete the file.
S1-1, S1-2 Termination of the Conference
Examples of the trigger of terminating the conference include notification by one or more terminals 10 of the termination of the conference to the management system 50; and no responses by all the terminals 10 included in the session management table in response to an inquiry from the management system 50. Here, it is assumed that the conference is terminated under management of the management system 50. When the conference is terminated, the management system 50 reports it to the terminals 1 and 2.
S1-1-2 Holding of the Shared Folder
In the terminal 10 which is compatible with the SIM card 130, the contents of the shared folder are stored by copying them into another area of the SIM card 130, prior to unmounting. Here, for the case in which unmounting is performed while leaving the data in the shared folder (the case in which the shared folder is changed into a normal folder by unmounting, and the contents may not be deleted), it is not necessary to copy the data to the other area. Further, the contents may be automatically stored in the SIM card 130. Alternatively, at the time of terminating the conference, the user may be queried whether the contents are to be stored, and the user may determined whether or not to store the contents. Here, since the PIN is already input at the activation of the terminal, the SIM card 130 is in a state in which a file can be written in the SIM card 130. Depending on the implementation, an input of the PIN may be required for each access.
S2-1, 2-2 Unmounting of the Shared Folder
When the folder mount units 23 of the terminals 1 and 2 detect termination of the conference, the folder mount units 23 unmount the shared folder 47 with respect to the file temporary storage device 40. The following is an example of a SMB unmount command:
unmount_destination path of the mounting Further, by unmounting, the file synchronization units 24 delete the D drives which are mounted on the terminals 1 and 2, respectively. By doing this, the PC 1 and the PC 2 become unable to display the file name of the D drives.
S3 Deletion of the Shared Folder
When the conference is terminated, the shared folder creation unit 42 prompts the file temporary storage device 40 to delete the shared folder 47 from the folder storage unit 41, based on the session ID of the terminated conference. The shared folder creation unit 42 deletes all the files which are transmitted from the terminals 10 by deleting the shared folder 47.
Further, the access control unit 43 updates the shared folder table 48 by deleting the terminated conference from the shared folder table 48 of the file management DB 46.
According to this example, the files can be deleted from the file temporary storage device 40 in accordance with the termination of the conference. Consequently, the security can be prevented from being lowered.
In this example, a more secure electronic conference system 300 is explained.
In
Since the management system 50, which has already established a session, sets a relaying apparatus ID in the session management table, the management system 50 has already identified the relaying apparatus 30 which relays video and audio. Accordingly, by comparing the network addresses in the IP addresses of the relaying apparatus 30 and the terminals 10, it can be found that the terminals 1 and 2 are using the office server 80, which is connected to the office LAN. When the network addresses are not directly retrieved, the IP addresses may be requested from the DNS. If it is determined that the host names are the same, it can be found that the terminals 1 and 2 and the relaying apparatus 30 are connected to the same LAN.
In the configuration such as shown in
S1.5 Confirmation of the Routing Path
The management system 50 confirms the routing path of the conference immediately after starting the conference (S150).
When the Internet is utilized, the shared folder 47 is created on the outside (on the Internet), similar to the case of the first one of the above-described examples (S152).
When the private network is utilized, the shared folder 47 is created inside a server (e.g., a part of the office server 80 or the relaying apparatus 30) which is installed in the private network (S151).
The subsequent processes are the same as those of the first one of the above-described examples. Namely, the management system 50 creates the shared folder URI and the account information, and the management system 50 transmits them to the file temporary storage device 40 (S153).
Further, the management system 50 transmits the shared folder URI and the account information to the terminals 1 and 2 (S154).
In this manner, the terminals 1 and 2 mount the mount drives 22 on the specified URI, without recognizing the location where the files are stored.
According to this example, the shared folder URI may be changed depending on the terminals which participate in the conference. If the private network is utilized, the file can be completely prevented from leaking outside. Consequently, the security risk can be significantly reduced.
The present invention is not limited to the specifically disclosed embodiment, and variations and modifications may be made without departing from the scope of the present invention.
The present application is based on and claims the benefit of priority of Japanese Priority Application No. 2012-201144, filed on Sep. 13, 2012, the entire contents of which are hereby incorporated herein by reference.
Number | Date | Country | Kind |
---|---|---|---|
2012-201144 | Sep 2012 | JP | national |