The present application claims priority under 35 U.S.C. § 119 to Japanese Patent Application No. 2018-015942, filed on Jan. 31, 2018, the entire contents of which are incorporated herein by reference.
The disclosures herein generally relate to an information processing system, an electronic whiteboard apparatus, and a non-transitory recording medium.
Conventionally, electronic whiteboard apparatuses have been used in conferences attended by a plurality of users. Some of the conventional electronic whiteboard apparatuses used in conferences attended by a plurality of users have mechanisms for ensuring confidentiality.
For example, such conventional electronic whiteboard apparatuses include an electronic whiteboard apparatus that effectively detects a third party participant in a conference by using face authentication so as to ensure confidentiality (see Patent Document 1, for example).
Such conventional electronic whiteboard apparatuses also include an electronic whiteboard system that requests authentication such as a signature, a personal identification number, and a password when a user accesses an electronic file that is used for an electronic whiteboard function, so as to ensure confidentiality even when the electronic whiteboard system is used by an unspecified large number of users (see Patent Document 2, for example).
Recently, authentication techniques have become widespread. Thus, it has become possible for apparatuses such as electronic whiteboard apparatuses, which are used in conferences attended by a plurality of users and allow the users to share a display screen, to include a plurality of user authentication methods such as IC card authentication and face authentication. Further, with the widespread use of cloud computing, it has also become possible for users to use external services such as storage services. Accordingly, in a conference in which an electronic whiteboard is used, it is useful if users can obtain images to be displayed on the screen, from external services available to the users.
However, the accuracy of authentication methods included in such electronic whiteboard apparatuses sometimes varies. Thus, in the conventional electronic whiteboard apparatuses, a user mistakenly authenticated by a low-accuracy authentication method becomes able to operate a file owned by an original user, which is not preferable in terms of security.
Application Publication No. 2015-99537
According to at least one embodiment, an information processing system including a plurality of authentication methods for identifying a user is provided. The information processing system comprises a memory, and a processor coupled to the memory and configured to, identify the user by a given authentication method of the plurality of authentication methods, the authentication methods being associated with actions allowed to users, receive an instruction to execute an action from the user, make a determination whether the instruction to execute the action is allowed based on the given authentication method, and execute the action or restrict the action from being executed based on a result of the determination.
It is a general object of at least one embodiment of the present invention to provide an information processing system that restricts an action that can be performed by a user in accordance with an authentication method by which the user is authenticated.
In the following, embodiments of the present invention will be described with reference to the accompanying drawings. In the following embodiments, an example in which an electronic whiteboard apparatus used in a conference attended by plural users will be described. However, the electronic whiteboard apparatus may be applied not only to a conference, but also to a variety of circumstances where plural users view a display of the electronic whiteboard apparatus.
An external service group provided by the external service group system 12 refers to an integrated service such as Office 365 (registered trademark), which includes a user service, a storage service, and an email service, for example. The external service group is provided in such a manner that services such as a user service, a storage service, and an email service can be used with the same user account. The external service group may be different for each user, and one or more external service groups may be provided. The external service group system 12 is implemented by one or more computers.
The user information server apparatus 10 stores information such as a user information list and external service setting information, which will be described later. Also, the user information server apparatus 10 is available from the electronic whiteboard apparatus 14 or the external service group system 12. The user information server apparatus 10 may be shared by a plurality of electronic whiteboard apparatuses 14, and is not required to be located on a same network segment. Also, the user information server apparatus 10 may be included in the electronic whiteboard apparatus 14. The user information server apparatus 10 is implemented by one or more computers.
The electronic whiteboard apparatus 14 is used in a conference attended by a plurality of users. For example, the electronic whiteboard apparatus 14 displays an image drawn by an electronic pen or by a user's hand. Also, the electronic whiteboard apparatus 14 can display an image of an electronic file, which is read from a personal computer (PC) connected via a USB memory or a cable or is read from the external service group system 12.
The electronic whiteboard apparatus 14 has a function to distribute image data being displayed on the electronic whiteboard apparatus 14 to all participants participating in a conference. Destinations to which the electronic whiteboard apparatus 14 distribute the image data includes the external service group system 12 for which a usage setting is required for each user, as will be described later. Also, the electronic whiteboard apparatus 14 has a plurality of authentication methods for authenticating a user, such as IC card authentication and face authentication.
The electronic whiteboard apparatus 14 is merely exemplary, and may be any apparatus such as a remote conference system, a display, and a projector as long as such an apparatus has a function to load and distribute (send) data to be displayed.
The configuration of the information processing system 1 illustrated in
The user information server apparatus 10 and the external service group system 12 in
A computer 500 illustrated in
The input device 501 includes a keyboard, a mouse, and a touch panel, and is used by a user to input operation signals. The display device 502 includes a display, for example, and displays a processing result obtained from the computer 500.
The communication I/F 507 is an interface for connecting the computer 500 to various networks. The computer 500 can perform data communication via the communication I/F 507.
The HDD 508 is an example of non-volatile storage that stores programs and data. The programs and data stored in the HDD 508 include an operating system (OS) that is basic software for controlling the entire computer 500, and include applications that provide functions on the OS. Instead of the HDD 508, the computer 500 may use a drive device (such as a solid-state drive) that uses flash memory as a storage medium.
The external I/F 503 is an interface with an external device. The external device includes a recording medium 503a. The computer 500 can read from and write to the recording medium 503a via the external I/F 503. The recording medium 503a includes a flexible disk, a compact disc (CD), a digital versatile disc (DVD), a secure digital (SD) memory card, a universal serial bus (USB) memory, and a subscriber identity module (SIM) card.
The ROM 505 is an example of non-volatile semiconductor memory (storage) that can retain programs and data even when the power is turned off. The ROM 505 stores programs and data such as the basic input/output system (BIOS) executed at the start of the computer 500, OS settings, and network settings. The RAM 504 is an example of volatile semiconductor memory (storage) that temporarily stores programs and data.
The CPU 506 is a processor that reads programs and data from storage such as the ROM 505 or the HDD 508 into the RAM 504 and performs operations so as to control the entire computer 500 and implement functions. The CPU 506 may be implemented by one or more processors.
The user information server apparatus 10 and the external service group system 12 can perform various processes, which will be described later, by using the hardware configuration of the computer 500 illustrated in
The CPU 601 controls the overall operation of the electronic whiteboard apparatus 14. The ROM 602 stores programs used to drive the CPU 601. The RAM 603 is used as a work area for the CPU 601. The SSD 604 stores various types of data such as a program for the electronic whiteboard apparatus 14. The network controller 605 controls communication with the network 16. The external storage controller 606 controls communication with a recording medium such as a USB memory 5.
Also, the electronic whiteboard apparatus includes a capture device 611, a graphics processing unit (GPU) 612, a display controller 613, a sensor controller 614, a contact sensor 615, an electronic pen controller 616, a RF tag reader 617, and a camera 618.
The capture device 611 captures video information from a PC 6 or the camera 618 as a still image file or a moving image file. The GPU 612 is specifically used for graphics. The display controller 613 controls and manages display so as to output images from the GPU 612 to a display 3 and a teleconference terminal 7. The contact sensor 615 detects an electronic pen 4 or a user's hand H that has touched the display 3.
The contact sensor 615 inputs and detects coordinates by using an infrared ray blocking method. In the method of inputting and detecting coordinates, two light receiving/emitting devices, which are placed at both upper end portions of the display 3, emit a plurality of infrared rays in parallel to the display 3, the infrared rays are reflected by reflecting members placed around the display 3, and light receivers receive light returning along the same optical paths as those of the emitted infrared rays. The contact sensor 615 outputs, to the sensor controller 614, identification (ID) of the infrared rays emitted by the two light emitting/receiving devices and blocked by an object. The sensor controller 614 identifies a coordinate position that is a contact position of the object.
Further, the contact sensor 615 does not necessarily use the infrared ray blocking method. The contact sensor 615 may use various kinds of detection methods, including: a capacitive type touch panel that identifies a contact position by detecting a change in electrostatic capacity; a resistive film type touch panel that identifies a contact position by a voltage change of two opposing resistive films; and an electromagnetic induction type touch panel that identifies a contact position by detecting electromagnetic induction caused when an object makes contact with a display part.
The electronic pen controller 616 communicates with the electronic pen 4 so as to determine whether the tip or the bottom of the pen has touched the display 3. Note that the electronic pen controller 616 may determine whether a part of the electronic pen 4 held by the user or other parts of the electronic pen 4 have touched the display 3.
The RF tag reader 617 reads identification information specific to the IC card 630 from a RF tag embedded in the IC card 630 via radio communication.
The RF tag reader 617 may be included in the electronic whiteboard apparatus 14 or may be externally provided. Note that the IC card 630 may be included in a smart device such as a smartphone. Also, the electronic whiteboard apparatus 14 may use any device other than the RF tag reader 617 as long as identification information capable of identifying a user can be obtained. For example, a biometric authentication device (such as a fingerprint, a palm print, or an iris authentication device) or a barcode reader may be used.
The electronic whiteboard apparatus 14 of
<Software Configuration>
The information processing system 1 according to the first embodiment is implemented by a functional configuration as illustrated in
The information processing system 1 of
The external service group system 12 stores user service account information illustrated in
The storage service 32 is storage in which a user's file can be stored. Information such as a type (a file or a folder) and a name are managed as storage service storage information on a per-user basis, as illustrated in
The user information server apparatus 10 includes an external service setting information unit 20 and a user information unit 22. The user information unit 22 stores a user information list illustrated in
The external service setting ID is information for identifying external service setting information, which will be described later. Identification information is information for identifying a user detected by an IC card detecting unit 48 or a face image detecting unit 50. Identification information “ICCARD-123” and “ICCARD-248” of
The external service setting information unit 20 stores external service setting information as illustrated in
The address information and the external service user ID are examples of connection information for the external service group system 12. The external service authentication token is an example of authentication information for the external service group system 12.
The electronic whiteboard apparatus 14 includes a batch distribution unit 42, a participant management unit 44, a written data displaying unit 46, the IC card detecting unit 48, the face image detecting unit 50, a file loading unit 52, and a permission management unit 54. The IC card detecting unit 48 reads identification information from the IC card 630 of a detected user. The face image detecting unit 50 detects a user's face from an image captured by the camera 618, and reads identification information of the detected user's face.
The participant management unit 44 manages conference participants by using a participant management information list of
For example, the participant management unit 44 identifies user information from the user information list of
The written data displaying unit 46 receives data written to the electronic whiteboard apparatus 14 by a user, and displays the written data. The file loading unit 52 has a function and a user interface (UI) for loading a file from various services such as the storage service 32 of the external service group system 12 to be displayed on the electronic whiteboard apparatus 14.
The batch distribution unit 42 has a user interface for putting contents displayed on the electronic whiteboard apparatus 14 together into a file, and sending the file to various services such as the storage service 32 of the external service group system 12, such that the file is distributed to all destinations of conference participants. Storing a file in the storage service 32 is an example of sending a file to the storage service 32.
The permission management unit 54 determines whether a user instruction such as file loading is permitted, based on a permission setting table on a per-authenticator/detector basis of
The permission setting table on a per-authenticator/detector basis of
In the permission setting table on a per-authenticator/detector basis of
Further, in the permission setting table on a per-authenticator/detector basis of
The permission setting table on a per-authenticator/detector basis of
Also, the electronic whiteboard system may include any detecting unit other than the IC card detecting unit 48 and the face image detecting unit 50. The IC card detecting unit 48, the face image detecting unit 50, and said other detecting unit may hereinafter be collectively referred to as a “participant detecting/setting unit”. Further, the file loading unit 52 and the batch distribution unit 42 may be collectively referred to as a process executing unit, and the electronic whiteboard system may include any process executing unit other than the file loading unit 52 and the batch distribution unit 42.
Furthermore, the electronic whiteboard system may individually assign permissions for performing actions as separate permission types, or may assign permissions having similar characteristics as the same permission type. In the permission setting table on a per-authenticator/detector basis of
The information processing system 1 according to the first embodiment causes a participant to be included in the participant management information list of
In step S11, the participant management unit 44 obtains identification information of a participant detected by the IC card detecting unit 48 or the face image detecting unit 50 serving as a participant detecting/setting unit. In step S12, the participant management unit 44 utilizes the user information list illustrated in
When the participant management information list of
When the participant management information list of
In step S15, the participant management unit 44 adds, to the participant management information list of
Further, the information processing system 1 according to the first embodiment performs a conference-related process by the following procedure, for example.
In response to receiving an instruction to perform an action, in step S21, the process executing unit requests the permission management unit 54 to perform a permission inquiring process illustrated in
The permission inquiring process is performed by a procedure illustrated in
When the permission to perform the action, for which the instruction has been received, is not “granted”, the permission management unit 54 proceeds to step S34. In step S34, the permission management unit 54 searches an (alternative) authenticator/detector having the permission (argument 2) to perform the action, by referring to the permission setting table on a per-authenticator/detector basis of
In the information processing system 1 according to the first embodiment, the electronic whiteboard apparatus 14 is used in a conference by the following procedure, for example. In the following, an example will be described in which participants are registered in the electronic whiteboard apparatus 14 during a conference, a file owned by a participant is loaded and displayed on the electronic whiteboard apparatus 14, and a file containing contents displayed on the electronic whiteboard apparatus 14 is distributed to all conference participants.
In step S42, during the conference, the electronic whiteboard apparatus 14 receives an operation such as writing to the electronic whiteboard apparatus 14, and updates contents displayed on the electronic whiteboard apparatus 14. When the IC card detecting unit 48 detects an IC card 630, the participant management unit 44 identifies a user based on identification information that has been read from the IC card 630, and adds the user to the participant management information list of
The conference participants added in steps S43 and S44 are included in the list of participants 1002 displayed on the operation panel 1000. As described above with reference to the permission setting table on a per-authenticator/detector basis of
In response to an operation performed on the operation panel 1000, a user interface as illustrated in
As illustrated in
Also, as illustrated in
As illustrated in
For example, after step S44 of
In step S47, when the participant with the user ID “user002” additionally performs the IC card authentication, the screen transits to the permitted participant operation screen 1010. In step S48, upon the “Load File” button 1012 being pressed, the file loading unit 52 displays the file loading screen 1020. Upon the “Load” button 1022 being pressed, the file loading unit 52 loads a file with file name confidential.doc, which has been selected on the file loading screen 1020, from the storage service 32 onto the electronic whiteboard apparatus 14.
Further, upon the “Batch Distribution” button 1004 being pressed on the operation panel 1000, the batch distribution unit 42 displays the distribution screen 1030 in step S50. Upon the “Send” button 1032 being pressed, the batch distribution unit 42 puts contents being displayed on the electronic whiteboard apparatus 14 together into a file, and distributes the file to all the destinations set on a per-participant basis.
For example, the distribution screen 1030 illustrated in
For example, in step S43 of
In step S61, the participant management unit 44 obtains the identification information read from the IC card 630. In step S62, the participant management unit 44 determines whether a user having the same identification information is included in the participant management information list by referring to the user information list.
When the participant management information list includes a user having the same identification information, the participant management unit 44 proceeds to step S63. In step S63, the participant management unit 44 adds “ICCARD”, which indicates the IC card detecting unit 48 that has detected the identification information, as an authentication/detection source of the participant management information list of
When the participant management information list does not include a user having the identification information, the participant management unit 44 proceeds to step S64. In step S64, the participant management unit 44 requests the user information unit 22 to search user information by using the identification information obtained in step S61. The participant management unit 44 obtains user information corresponding to the identification information obtained in step S61, from the user information unit 22 as a response to the request for search.
In step S65, the participant management unit 44 adds, to the participant management information list of
For example, when the IC card detecting unit 48 detects the IC card 630 of “Mary Smith” illustrated in the user information list of
In step S62, the participant management 44 determines whether a user having the same identification information as the identification information “ICCARD-123” obtained in step S61 is included in the participant management information list by referring to the user information list of
Because it is determined that a user having the same identification information is not included, the participant management unit 44 proceeds to step S64 and requests the user information unit 22 to search user information by using the identification information “ICCARD-123” obtained in step S61. The participant management unit 44 obtains user information corresponding to the identification information “ICCARD-123” obtained in step S61, from the user information unit 22 as a response to the request for search.
In step S65, as illustrated in
For example, in step S44 of
In step S71, the face image detecting unit 50 calculates identification information of the face image from the face region of the detected user. In step S72, the participant management unit 44 determines whether a user having the same identification information is included in the participant management information list by referring to the user information list of
When the participant management information list includes a user having the same identification information, the participant management unit 44 proceeds to step S73. In step S73, the participant management unit 44 adds “FACE”, which indicates the face image detecting unit 50 that has detected the identification information, as an authentication/detection source of the participant management information list of
When the participant management information list does not include a user having the identification information, the participant management unit 44 proceeds to step S74. In step S74, the participant management unit 44 requests the user information unit 22 to search user information by using the identification information obtained in step S71. The participant management unit 44 obtains user information corresponding to the identification information obtained in step S71, from the user information unit 22 as a response to the request for search. In step S75, the participant management unit 44 adds, to the participant management information list of
For example, when the camera 618 captures an image of “Sato Suzuki” illustrated in the user information list of
In step S72, the participant management unit 44 determines whether a user having the same identification information as the identification information “FACE-404” obtained in step S71 is included in the participant management information list by referring to the user information list of
Because it is determined that a user having the same identification information is not included, the participant management unit 44 proceeds to step S74 and requests the user information unit 22 to search user information by using the identification information “FACE-404” obtained in step S71. The participant management unit 44 obtains user information corresponding to the identification information “FACE-404”, from the user information unit 22 as a response to the request for search.
In step S75, as illustrated in
For example, in steps S45 and S46 of
In response to receiving an instruction to load a file, the file loading unit 52 proceeds to step S81 and requests the permission management unit 54 to determine whether the permission to perform the “Load File” action is granted by performing the permission inquiring process illustrated in
The permission inquiring process in step 81 is performed by a procedure illustrated in
When the permission to perform the “Load File” action is not “granted”, the permission management unit 54 proceeds to step S94. In step S94, the permission management unit 54 searches the authenticator/detector (ICCARD) having the permission (argument 2) to perform the “Load File” action, by referring to the permission setting table on a per-authenticator/detector basis of
For example, in order to additionally load a file owned by the participant with the user ID “user002” from the storage service 32, the participant instructs the file loading unit 52 to start loading the file. In response to receiving the instruction to start loading the file, the file loading unit 52 specifies the authentication/detection source “FACE” by referring to the participant management information held by the participant management unit 44 and also the “Load File” action, so as to request the permission management unit 54 to determine whether the permission is granted.
The permission management unit 54 checks the permission setting table on a per-authenticator/detector basis of
Next, the participant with the user ID “user002” performs the IC card authentication by using his/her own IC card 630. For example, the procedure illustrated in
Again, in order to additionally load the file owned by the participant with the user ID “user002” from the storage service 32, the participant instructs the file loading unit 52 to start loading the file. In response to receiving the instruction to start loading the file, the file loading unit 52 specifies the authentication/detection sources “FACE” and “ICCARD” by referring to the participant management information of the user ID “user002” held by the participant management unit 44 and also specifies the “Load File” action, so as to request the permission management unit 54 to determine whether the permission is granted.
The permission management unit 54 checks the permission setting table on a per-authenticator/detector basis of
As described above, the electronic whiteboard apparatus 14 verifies an authentication and detection source of a participant with the permission setting table on a per-authenticator/detector basis. Accordingly, when an authenticator/detector is unreliable, for example, when the accuracy of an authenticator/detector is low, it becomes possible to restrict files from being loaded from the storage service 32, thus preventing information leakage. Also, when file loading from the storage service 32 is restricted, a participant is provided with notification of an alternative authenticator/detector such that restrictions on file loading from the storage service 32 can be removed. Accordingly, it becomes possible to readily remove restrictions on file loading from the storage service 32.
For example, in steps S50 and S51 of
Upon the “Batch Distribution” button 1004 being pressed, in steps S101 through S105, the batch distribution unit 42 performs the permission inquiring process of step S102 for all participants managed in the participant management information list obtained from the participant management unit 44, and performs a destination adding process of step S104 for participants having the permission.
After steps S101 through S105 are performed for all the participants, the batch distribution unit 42 displays the distribution screen 1030 in step S106. Upon the “Send” button 1032 being pressed, the batch distribution unit 42 proceeds to step S107 and performs a process for distributing the file containing the contents displayed on the electronic whiteboard apparatus 14 to all destinations, which have been associated with the participants as a result of the destination adding process of step S104.
For example, in step S102 of
In step S111, the permission management unit 54 determines whether an authentication/detection source of a participant has the permission to perform the “distribute files” action by referring to the permission setting table on a per-authenticator/detector basis illustrated in
For example, in step S104 of
In step S121, the batch distribution unit 42 uses an external service authentication token of external service setting information of a participant illustrated in
In step S123, the batch distribution unit 42 adds an email address included in the user service account information as a destination to which to send the file. In step S124, the batch distribution unit 42 adds an address included in the external service setting information as a destination in which to save the file.
In the following, steps S101 through S105 will be described in detail by taking, as an example, the user information list of
The batch distribution unit 42 performs the batch distribution process for each of the two participants with the user IDs “user001” and “user002”. For the participant with the user ID “user001”, the batch distribution unit 42 specifies the authentication/detection source “ICCARD” of the user ID “user001”, which is included in the participant management information obtained from the participant management unit 44, and also specifies the “Load File” action, so as to cause the permission management unit 54 to perform the permission inquiry process.
The permission management unit 54 determines that the permission to perform the “Load File” action is granted to the authentication/detection source “ICCARD” by referring to the permission setting table on a per-authenticator/detector basis illustrated in
The batch distribution unit 42 requests the external service setting information unit 20 to obtain user service account information of the participant with the user ID “user001”. The external service setting information unit 20 uses an external service authentication token “eyJhbGc11”, which differs for each participant, to requests the user service 30 of the address information “office.example.com” to obtain user service account information of an external service user ID “office1”. As a result, an email address “office1@office.example.com” is obtained. The batch distribution unit 42 adds the obtained email address “office1@office.example.com” as a destination, to which the file is sent, of the participant with user ID “user001”.
Also, the batch distribution unit 42 adds the address information “office.example.com” included in the external service setting information of the user ID “user001” as a destination, in which the file is saved, of the participant.
In step S107 of
The batch distribution unit 42 repeatedly performs steps S131 through S134 for all the destinations, which have been added as destinations displayed on the distribution screen 1030 as a result of the destination adding process of
After the batch distribution unit 42 stores the file in all the destinations, which have been added as destinations displayed on the distribution screen 1030 as a result of the destination adding process of
In step S138, the batch distribution unit 42 sends the email with the file containing the contents displayed on the electronic whiteboard apparatus 14, to all the email addresses added as destinations displayed on the distribution screen 1030.
As described, in the process for sending a file to all destinations illustrated in
According to the first embodiment, when a file containing contents being displayed on the electronic whiteboard apparatus 14 is distributed to a conference participant, an action to be performed by the participant can be restricted in accordance with an authenticator/detector that has authenticated the participant.
The external service group system 12 according to the first embodiment may include a schedule service. The schedule service manages activity schedules and conference schedules of users. Such a schedule service has conference schedule information such as prospective conference participants.
In the second embodiment, prospective conference participants are set in the schedule service of the external service group system, an a conference schedule to be attended by the prospective conference participants is regarded as an authentication/detection source of a permission setting table on a per-authenticator/detector basis.
Based on the permission setting table on a per-authenticator/detector basis, actions such as file loading are restricted. Also, in the second embodiment, the prospective participants are subjected to the batch distribution process.
The schedule service 36 includes schedule information as illustrated in
The conference schedule setting unit 56 of the electronic whiteboard apparatus 14 includes a user interface for setting a conference schedule, communicates with the schedule service 36 of the external service group system 12, and displays schedule information whose schedule type is “conference”, and causes a user to select a conference schedule.
Also, in the second embodiment, a permission setting table on a per-authenticator/detector basis as illustrated in
The permission setting table on a per-authenticator/detector basis of
Briefly, in the second embodiment, a participant who is detected first after the start of a conference is regarded as a leader by the conference schedule setting unit 56. If the participant is an owner user and has the permission to “Load Schedule”, the conference schedule setting unit 56 obtains conference schedule information.
The conference schedule setting unit 56 presents a list of conference schedules to the user based on the obtained conference schedule information. When the user selects a conference from the list of conference schedules, the conference schedule setting unit 56 reads and displays an attachment for the conference. Further, the participant management unit 44 adds prospective conference participants to a list of participants 1002 of the operation panel 1000, adds the prospective conference participants to a participant management information list, and “SCHEDULE” is set as their authentication/detection sources. Because the conference leader can freely set prospective conference participants, the prospective conference participants are added to the participant management information list as participants only having the permission to distribute a file. Accordingly, in the second embodiment, even when prospective conference participants are treated as conference participants in conjunction with the schedule service 36 of the external service group system 12, it becomes possible to reduce security risks such as illegally loading files.
In the example of the conference schedule setting process of
In step S141, in response to receiving an instruction to load a schedule, the conference schedule setting unit 56 requests the permission management unit 54 to perform the permission inquiring process illustrated in
In step S144, the conference schedule setting unit 56 indicates, to the participant management unit 44, prospective conference participants included in the conference schedule selected by the user, and causes the prospective conference participants to be added to the participant management information list. In step S145, the conference schedule setting unit 56 reads out and displays an attachment for the conference schedule selected by the user.
Also, in step S141 of
When the permission to perform the “Load Schedule” action is “granted”, the permission management unit 54 returns “permission granted” to the conference schedule setting unit 56 in step S153. When the permission to perform the “Load Schedule” action is not “granted”, the permission management unit 54 proceeds to step S154 and searches an authenticator/detector (“ICCARD”) having the permission to perform the “Load Schedule” action by referring to the permission setting table on a per-authenticator/detector basis of
In step S155, the permission management unit 54 returns “not permitted” to the conference schedule setting unit 56, together with information of the authentication/detection source “ICCARD” to which the permission to perform the “Load Schedule” action is granted.
In step S144 of
When there is user information corresponding to the external service user ID, the participant management unit 44 adds a user ID of the prospective conference participant to the participant management information list of
In the following, the flowchart illustrated in
It is assumed that user information of the user ID “user001” illustrated in
In response to receiving an instruction to load a schedule, the conference schedule setting unit 56 requests the permission management unit 54 to determine whether the authentication/detection source “ICCARD”, which has detected the first user with the user ID “user001”, has the permission to perform the “Load Schedule” action based on the permission setting table on a per-authenticator/detector basis illustrated in
Next, the conference schedule setting unit 56 receives the user ID “user001” and the external service setting ID “connectla” of the first participant from the participant management unit 44. By referring to the external service setting information of the external service setting ID “connectla”, the conference schedule setting unit 56 uses an external service authentication token “eyJhbGcll . . . ” to connect to the schedule service 36 of address information “office.example.com”. Accordingly, schedule information of a schedule ID “sch-1” in which the user ID “office1” is set as an owner user can be obtained.
Based on the obtained schedule ID “sch-1”, the conference schedule setting unit 56 displays the schedule list screen 1040 of
The participant management unit 44 refers to the external service setting information of the external service setting ID “connect1a”, which corresponds to the ID “user001” of the participant. In this case, because the external service user ID of the external service setting information is “office1”, the participant management unit 44 excludes “office1” from the indicated prospective participants “office1 and office2”.
Next, the participant management unit 44 requests information about the prospective participant “office2” from the user information server apparatus 10. The external service setting information unit 20 of the user information server apparatus 10 refers to external service setting information of the external service user ID “office2” of
The participant management unit 44 adds the user ID “user002”, obtained by requesting the information about the external service user ID “office2”, to the participant management information list of
After the conference schedule setting process of
In step S171, the batch distribution unit 42 uses an external service authentication token included in the external service setting information illustrated in
In step S173, the batch distribution unit 42 adds an email address included in the user service account information as a destination to which to send a file. In step S174, the batch distribution unit 42 adds an address included in the user service account information as a destination in which to save the file. In step S175, the batch distribution unit 42 adds the current schedule information as a destination to which to attach the file.
As a result, a distribution screen is created as illustrated in
In the process for sending a file to all destinations illustrated in
In step S189, if “attach file to this conference schedule” is added as a destination on the distribution screen 1030 after the destination adding process of
For example, in order to store the file to the schedule information of the schedule ID “sch-1”, the batch distribution unit 42 uses the external service authentication token of the external service setting ID “connectla”, which corresponds to the owner user “office1”, to connect to the schedule service 36, and stores the file as an attachment. In this way, a conference schedule itself can be included as a destination, to which a file containing contents being displayed on the electronic whiteboard apparatus 14 is sent. Accordingly, it becomes easier to distribute a file as a conference deliverable.
In the second embodiment, when an authentication/detection source of a participant is “FACE”, the “Load File” and “Load Schedule” actions are prohibited. This is because, firstly, there may be a possibility that a participant's face may be impersonated by, for example, placing a picture of the participant's face onto the face image detecting unit 50. Secondly, if a person who resembles the participant is mistakenly detected as the participant, wrongdoing may be made without the knowledge of the participant.
However, if the electronic whiteboard apparatus 14 is placed inside a company building where security is ensured to a certain extent and monitoring cameras are installed, impersonation risks related to suspicious behavior will be low. Also, a problem of false detection may become acceptable by taking the following points into account.
If a participant is preliminarily registered as a prospective conference participant, the participant receives an announcement indicating that a conference is to be held. Thus, there is an effect of preventing wrongdoing. Also, the accuracy of face authentication can be increased by preliminarily providing information on prospective participants. Further, if the schedule service 36 requires implicit consent of prospective participants, security risks can be further reduced.
In the third embodiment, as illustrated in
In the permission setting table on a per-authenticator/detector basis of
Further, the permission to perform the “Distribute File” action is granted to a prospective participant who is preliminarily registered. Thus, even if the participant does not participate in a conference and is not authenticated by face authentication, the participant can be subjected to the batch distribution process, thereby maintaining convenience.
Furthermore, in the third embodiment, the permission to perform the “Load File” and “Load Schedule” actions may be granted to a combination of the authenticators/detectors “SCHEDULE” and “ICCARD”. In a permission setting table in which the permission to perform the “Load File” and “Load Schedule” actions is granted to the combination of the authenticators/detectors “SCHEDULE” and “ICCARD”, a preliminarily registered prospective participant can be subjected to the batch distribution process, and can also execute all the actions by additionally performing IC card authentication. Accordingly, it is possible to reduce security risks while maintaining convenience.
An authenticator/detector “IDPASS” indicates that a participant is added (detected) by authentication using a user ID and a password. An authenticator/detector “BLE” indicates that a participant is detected upon the approach of a near-field communication (such as Bluetooth (registered trademark)) device owned by the participant and preliminarily registered (paired).
An authenticator/detector “SOUND” indicates that a participant is identified and detected by a preliminarily registered (paired) sound pattern played back from a terminal. An authenticator/detector “SUPERSONIC” indicates that a participant is identified and detected upon the approach of a terminal owned by the participant and emitting a preliminarily registered Maired) ultrasonic wave pattern.
An authenticator/detector “VOICE” indicates that a participant is identified and detected when a preliminarily registered voice pattern matches a voice pattern of the participant. An authenticator/detector “REMOTEPC” indicates that a participant is detected by user information when the participant with authentication connects to the electronic whiteboard apparatus 14. An authenticator/detector “REMOTEWB” indicates that, when one electronic whiteboard apparatus 14 communicates with another electronic whiteboard apparatus 14 so as to share contents, a participant is detected on the other electronic whiteboard apparatus 14.
In the permission setting table for various authenticators/detectors of
The permission setting table for various authenticators/detectors of
The authenticators/detectors according to the present embodiment are merely exemplary. All combinations are not necessarily combinations of authenticators/detectors and actions. Combinations of authenticators/detectors and security levels and combinations of security levels and actions may be used.
Further, the present invention is not limited to these embodiments, but various variations and modifications may be made without departing from the scope of the present invention. The information processing system 1 described in the embodiments is merely exemplary. Needless to say, there may be various system configuration examples in accordance with applications and purposes.
Number | Date | Country | Kind |
---|---|---|---|
2018-015942 | Jan 2018 | JP | national |