Search

JP-7856146-B2 - Processing system, processing method, and processing program

JP7856146B2JP 7856146 B2JP7856146 B2JP 7856146B2JP-7856146-B2

Inventors

  • 田所 将志
  • 若杉 泰輔
  • 片岡 明
  • 田中 秀明

Assignees

  • NTT株式会社

Dates

Publication Date
20260511
Application Date
20220606

Claims (5)

  1. A processing system comprising a first terminal that displays a web screen, and a second terminal equipped with a camera that is carried by the user of the first terminal, The first terminal is, The Web screen has a first display control unit that, in place of the confidential information, displays only an ID marker in the confidential information allocation area, which includes a first ID that identifies the encrypted information of the first confidential information and the first confidential information encrypted based on the encrypted information corresponding to the first ID . The aforementioned second terminal is, An image acquisition unit that acquires images of the aforementioned web screen, A reading unit that uses the acquired image of the web screen to read the first ID and the encrypted first confidential information from the image of the ID marker displayed on the web screen, A selection unit that acquires decryption information corresponding to the first ID, and uses the acquired decryption information to select second confidential information from the encrypted first confidential information that can be viewed by the user of the second terminal according to the user's authority , A second display control unit causes the second confidential information selected by the selection unit to be displayed on the display output unit of the second terminal, A processing system characterized by having the following features.
  2. The aforementioned ID marker includes a second ID that identifies the third confidential information, The reading unit reads the second ID from the image of the ID marker, The selection unit selects from the third confidential information corresponding to the second ID a fourth confidential information that can be viewed according to the permissions of the user of the second terminal, The processing system according to claim 1, characterized in that the second display control unit causes the fourth confidential information to be displayed on the display output unit of the second terminal.
  3. The second display control unit displays confidential information, including an input field that accepts input operations from the user and corresponds to the user's authority on the second terminal, on the display output unit. The aforementioned second terminal is, The processing system according to claim 1, further comprising a transmission unit that transmits the result of an input operation received in the input field to the first terminal as operation information relating to confidential information corresponding to the ID marker.
  4. A processing method performed by a processing system having a first terminal that displays a web screen and a second terminal with a camera carried by the user of the first terminal, The first terminal performs a first display control step in which, in the area for allocating confidential information on the web screen, instead of displaying the confidential information, displays only an ID marker that includes a first ID that identifies the encrypted information of the first confidential information, and the first confidential information encrypted based on the encrypted information corresponding to the first ID , The second terminal performs an image acquisition step of acquiring an image of the web screen, The second terminal performs a reading step of reading the first ID and the encrypted first confidential information from the image of the ID marker displayed on the web screen using the acquired image of the web screen. The second terminal acquires decryption information corresponding to the first ID, and uses the acquired decryption information to select second confidential information from the encrypted first confidential information that the user of the second terminal can view according to the user's authority . The second terminal performs a second display control step, which causes the second confidential information selected in the selection step to be displayed on the display output unit of the second terminal, A processing method characterized by including the following.
  5. A processing program that causes a computer to execute a method, The computer, acting as the first terminal for displaying the web screen, A first display control step is performed in which, in the area for allocating confidential information on the Web screen, instead of the confidential information, only an ID marker is displayed , which includes a first ID that identifies the encrypted information of the first confidential information and the first confidential information encrypted based on the encrypted information corresponding to the first ID . A computer, which serves as a second terminal equipped with a camera and carried by the user of the first terminal, Image acquisition step to acquire the image of the aforementioned web screen, A step of reading the first ID and the encrypted first confidential information from the image of the ID marker displayed on the web screen using the acquired image of the web screen, A selection step of obtaining decryption information corresponding to the first ID, and using the obtained decryption information to select second confidential information from the encrypted first confidential information that can be viewed by the user of the second terminal according to the user's authority , A second display control step in which the second confidential information selected in the selection step is displayed on the display output unit of the second terminal, A processing program characterized by causing the execution of a certain action.

Description

This invention relates to a processing system, a processing method, and a processing program. As a UI (User Interface) extension technology, a technique has been introduced that improves operator productivity by overlaying functional enhancements such as text input boxes and input validation onto the web screen without modifying the system. Japanese Patent Publication No. 2017-72872 Figure 1 is a diagram illustrating the outline of the processing method according to Embodiment 1.Figure 2 shows an example of the configuration of the processing system according to Embodiment 1.Figure 3 shows an example of the data structure of authorization information.Figure 4 is a flowchart showing an example of the processing procedure of the processing system according to Embodiment 1.Figure 5 is a flowchart showing an example of the processing procedure of the processing system according to Embodiment 1.Figure 6 shows another example of the configuration of the processing system according to Embodiment 1.Figure 7 shows another example of the configuration of the processing system according to Embodiment 2.Figure 8 shows an example of the data structure for display conditions.Figure 9 is a flowchart showing an example of the processing procedure of the processing system according to Embodiment 2.Figure 10 shows the configuration of smart glasses according to a modified example of Embodiment 2.Figure 11 is a flowchart showing an example of the processing procedure of the processing system according to a modified example of Embodiment 2.Figure 12 is a diagram illustrating the outline of the processing method according to Embodiment 3.Figure 13 shows an example of the configuration of the processing system according to Embodiment 3.Figure 14 is a flowchart showing an example of the processing procedure of the processing system according to Embodiment 3.Figure 15 is a flowchart showing an example of the processing procedure of the processing system according to Embodiment 3.Figure 16 shows an example of a computer in which a work terminal and smart glasses are realized when a program is executed.Figure 17 is a diagram illustrating the conventional technology. Hereinafter, an embodiment of the present invention will be described in detail with reference to the drawings. However, the present invention is not limited to this embodiment. Furthermore, in the drawings, the same parts are denoted by the same reference numerals. [Embodiment 1] First, the processing system in Embodiment 1 will be described. Figure 1 is a diagram illustrating the outline of the processing method according to Embodiment 1. In Embodiment 1, only the ID marker M1 is displayed on the screen of the work terminal 10 as information related to confidential information (Figure 1(1)). The ID marker M1 is a UI component generated using UI extension technology, and is, for example, a two-dimensional code such as a QR code (registered trademark). The ID marker M1 is displayed as an overlay on the system screen of the work terminal 10. ID marker M1 contains encrypted confidential information that can only be viewed by general employee A and administrator B. Therefore, the confidential information itself is not displayed on work terminal 10P. Then, the smart glasses 20A and 20B read the ID marker M1, decrypt it, and display the confidential information on the smart glasses 20A and 20B (Figure 1 (2)). Smart glasses 20A are used by general employee A. Smart glasses 20B are used by administrator B, who has broader privileges regarding viewing confidential information than general employee A. In this embodiment 1, the confidential information displayed on the smart glasses 20A and 20B is controlled to differ depending on the user's permissions (Figure 1(3)). Specifically, the smart glasses 20A used by regular employee A will display only the contract amount as confidential information Ds-A. In contrast, administrator B has broader authority regarding access to confidential information than regular employee A. Accordingly, the smart glasses 20B used by administrator B will display confidential information Ds-B, including the contract amount as well as contract performance. In this manner, the smart glasses 20 read the ID marker M1 on the work terminal 10 and display confidential information according to the user's permissions. Therefore, in Embodiment 1, the user can only view confidential information that is accessible according to their permissions through the smart glasses 20. Furthermore, in Embodiment 1, since it is only necessary to overlay the ID marker M1 on the screen of the work terminal 10, confidential information according to each user's permissions can be displayed on the smart glasses 20 without modifying the system of the work terminal 10. [Processing System] Next, the processing system of Embodiment 1 will be described. Figure 2 is a diagram showing an example of the configuration of the processing system according to Embodiment 1. As shown in Figure 2, t