US-12625984-B2 - Display control system, display control method, and display control program
Abstract
A work terminal ( 10 ) that displays a web screen displays an ID marker indicating confidential information in an allocation area of the confidential information on the web screen. Thereafter, smart glasses ( 20 ) worn by a worker of the work terminal ( 10 ) read an ID marker displayed on the web screen of the work terminal ( 10 ). Then, the smart glasses ( 20 ) acquire confidential information corresponding to the read ID marker from a DB that stores confidential information corresponding to the ID marker, and display the confidential information on a screen unit of the smart glasses ( 20 ).
Inventors
- Masashi TADOKORO
- Tomonori Mori
- Taisuke WAKASUGI
- Akira Kataoka
- Haruo OISHI
Assignees
- NTT, INC.
Dates
- Publication Date
- 20260512
- Application Date
- 20210630
Claims (20)
- 1 . A display control system comprising a processor configured to execute operations comprising: displaying an identification marker indicating confidential information in an allocation area of the confidential information on a web screen, wherein the allocation area indicates an area where the confidential information on the web screen using an extended User Interface (UI) is displayed; acquiring an image of the web screen; identifying the identification marker displayed on the web screen using an acquired image of the web screen; acquiring the confidential information corresponding to the read identification marker from a database that stores the confidential information corresponding to the identification marker, wherein acquiring the confidential information further comprises acquiring the confidential information by acquiring decryption information for decrypting encryption information indicated by the identified identification marker from the database, and decrypting the encryption information using the acquired decryption information, wherein the acquired decryption information is controlled by a user's gestures; and upon successfully decrypting the encryption information, displaying the acquired the confidential information.
- 2 . The display control system according to claim 1 , wherein the displaying the identification marker further comprises displaying the identification marker indicating the encryption information of the confidential information in the allocation area of the confidential information on the web screen.
- 3 . The display control system according to claim 1 , wherein the displaying the identification marker further comprises displaying the identification marker indicating identification information of the confidential information in an allocation area of the confidential information on the web screen, and the acquiring the confidential information further comprises acquiring the confidential information corresponding to identification information indicated by the identified identification marker from the database.
- 4 . The display control system according to claim 1 , wherein the acquiring the confidential information further comprises acquiring the confidential information corresponding to the identified identification marker from the database in a case where decryption information for decrypting encryption information indicated by the identified identification marker is not in the database.
- 5 . The display control system according to claim 1 , wherein the displaying the confidential information further comprises displaying the confidential information at a position within a predetermined distance from a position of the identification marker when the web screen is viewed on a basis of a position of the identification marker on the web screen identified from the image of the web screen.
- 6 . The display control system according to claim 1 , wherein the displaying the confidential information further comprises displaying the confidential information including an input field for receiving an input operation, and the processor further configured to execute operations comprising transmitting a result of the input operation received in the input field as operation information regarding the confidential information corresponding to the identification marker.
- 7 . The display control system according to claim 1 , wherein the displaying the acquired confidential information further comprises displaying the acquired confidential information on a screen of a mobile terminal, the mobile terminal includes a camera, and the acquiring the image of the web screen further comprises capturing the image of the web screen using the camera.
- 8 . A computer implemented method for controlling display, comprising: displaying an identification marker indicating the confidential information in an allocation area of the confidential information on a web screen; acquiring an image of the web screen; reading an identification marker displayed on the web screen using an acquired image; acquiring confidential information corresponding to the read identification marker from a database that stores the confidential information corresponding to the identification marker, wherein acquiring the confidential information further comprises: acquiring the confidential information by acquiring decryption information for decrypting encryption information indicated by the identified identification marker from the database, and decrypting the encryption information using the acquired decryption information, wherein the acquired decryption information is controlled by a user's gestures; and upon successfully decrypting the encryption information, displaying the acquired confidential information.
- 9 . The computer implemented method according to claim 8 , wherein displaying the identification marker further comprises displaying the identification marker indicating encryption information of confidential information in the allocation area of the confidential information on the web screen.
- 10 . The computer implemented method according to claim 9 , wherein the acquiring the confidential information further comprises acquiring the confidential information corresponding to the identified identification marker from the database in a case where decryption information for decrypting encryption information indicated by the identified identification marker is not in the database.
- 11 . The computer implemented method according to claim 8 , wherein displaying the identification marker further comprises displaying the identification marker indicating identification information of the confidential information in the allocation area of the confidential information on the web screen, and the acquiring the confidential information further comprises acquiring the confidential information corresponding to identification information indicated by the identified identification marker from the database.
- 12 . The computer implemented method according to claim 8 , wherein displaying the confidential information further comprises displaying the confidential information at a position within a predetermined distance from a position of an identification marker when the web screen is viewed on a basis of a position of the identification marker on the web screen identified from the image of the web screen.
- 13 . The computer implemented method according to claim 8 , wherein displaying the confidential information further comprises displaying the confidential information including an input field for receiving an input operation, and the method further comprising transmitting a result of the input operation received in the input field as operation information regarding confidential information corresponding to the identification marker.
- 14 . The computer implemented method according to claim 8 , wherein displaying the acquired confidential information further comprises displaying the acquired confidential information on a screen of a mobile terminal, the mobile terminal includes a camera, and the acquiring the image of the web screen further comprises capturing the image of the web screen using the camera.
- 15 . A computer-readable non-transitory recording medium storing a computer-executable program instructions that when executed by a processor cause a computer system to execute operations comprising: acquiring an image of a web screen displayed by a work terminal; identifying an identification marker displayed on the web screen using an acquired image of the web screen; acquiring confidential information corresponding to the identified identification marker from a database that stores the confidential information corresponding to the identification marker, wherein acquiring the confidential information further comprises: acquiring the confidential information by acquiring decryption information for decrypting encryption information indicated by the identified identification marker from the database, and decrypting the encryption information using the acquired decryption information, wherein the acquired decryption information is controlled by a user's gestures; and upon successfully decrypting the encryption information, displaying the acquired confidential information.
- 16 . The computer-readable non-transitory recording medium according to claim 15 , wherein displaying the identification marker further comprises displaying the identification marker indicating encryption information of confidential information in the allocation area of the confidential information on the web screen.
- 17 . The computer-readable non-transitory recording medium according to claim 16 , wherein the acquiring confidential information further comprises acquiring the confidential information corresponding to the identified identification marker from the database in a case where decryption information for decrypting encryption information indicated by the identified identification marker is not in the database.
- 18 . The computer-readable non-transitory recording medium according to claim 15 , wherein displaying the identification marker further comprises displaying the identification marker indicating identification information of confidential information in the allocation area of the confidential information on the web screen, and acquiring the confidential information further comprises acquiring confidential information corresponding to identification information indicated by the identified identification marker from the database.
- 19 . The computer-readable non-transitory recording medium according to claim 15 , wherein displaying the confidential information further comprises displaying the confidential information at a position within a predetermined distance from a position of an identification marker when the web screen is viewed through the screen unit on a basis of a position of the identification marker on the web screen identified from the image of the web screen.
- 20 . The computer-readable non-transitory recording medium according to claim 15 , wherein displaying the confidential information further comprises displaying the confidential information including an input field for receiving an input operation, displaying the acquired confidential information further comprises displaying the acquired confidential information on a screen of a mobile terminal, the mobile terminal includes a camera, and the acquiring the image of the web screen further comprises capturing the image of the web screen using the camera, and the computer-executable program instructions when executed further causing the computer system to execute operations comprising transmitting a result of the input operation received in the input field as operation information regarding confidential information corresponding to the identification marker.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS This application is a U.S. 371 Application of International Patent Application No. PCT/JP2021/024881, filed on 30 Jun. 2021, the disclosure of which is hereby incorporated herein by reference in its entirety. TECHNICAL FIELD The present invention relates to a display control system, a display control method, and a display control program for performing display control of confidential information. BACKGROUND ART Conventionally, there is a technology (user interface (UI) extension technology) in which an extension UI is displayed in an overlay manner on a web screen to extend a function without modifying an existing system (see Patent Literature 1). CITATION LIST Patent Literature Patent Literature 1: JP 2017-72872 A SUMMARY OF INVENTION Technical Problem In a case where confidential information such as personal information or in-house confidential information is included in a UI component displayed by the UI extension technology in a system to which the UI extension technology is applied, display of the confidential information on a web screen of a terminal may be prohibited depending on the environment of the terminal that displays the web screen of the system. In such a case, a worker of the system needs to confirm confidential information by another means, which causes a decrease in work efficiency. Therefore, an object of the present invention is to solve the above-described issue and to eliminate the need to confirm confidential information by another means by a worker of a system. Solution to Problem In order to solve the above issue, the present invention is a display control system including a work terminal that displays a web screen, and a mobile terminal with a camera carried by a worker of the work terminal, in which the work terminal includes a first display control unit that displays an ID marker indicating confidential information in an allocation area of the confidential information on the web screen, and the mobile terminal includes, an image acquisition unit that acquires an image of the web screen, a reading unit that reads an ID marker displayed on the web screen using an acquired image of the web screen, an acquisition unit that acquires confidential information corresponding to the read ID marker from a DB that stores confidential information corresponding to the ID marker, and a second display control unit that displays the acquired confidential information on a screen unit. Advantageous Effects of Invention According to the present invention, the need to confirm confidential information by another means by a worker of a system can be eliminated. BRIEF DESCRIPTION OF DRAWINGS FIG. 1 is a diagram for describing an outline of a display control system of a first embodiment. FIG. 2 is a diagram illustrating a configuration example of the display control system of the first embodiment. FIG. 3 is a flowchart illustrating an example of a processing procedure of a work terminal of FIG. 2. FIG. 4 is a flowchart illustrating an example of a processing procedure of smart glasses of FIG. 2. FIG. 5 is a diagram for describing an outline of a display control system of a second embodiment. FIG. 6 is a diagram illustrating a configuration example of the display control system of the second embodiment. FIG. 7 is a flowchart illustrating an example of a processing procedure of smart glasses of FIG. 6. FIG. 8 is a diagram illustrating a configuration example of smart glasses of a third embodiment. FIG. 9 is a flowchart illustrating an example of a processing procedure of the smart glasses of FIG. 8. FIG. 10 is a diagram for describing an outline of a display control system of a fourth embodiment. FIG. 11 is a diagram illustrating a configuration example of the display control system of the fourth embodiment. FIG. 12 is a sequence diagram illustrating an example of a processing procedure of the display control system of FIG. 11. FIG. 13 is a diagram illustrating an application example of the display control system of the fourth embodiment. FIG. 14 is a diagram illustrating an application example of the display control system of the fourth embodiment. FIG. 15 is a diagram illustrating a configuration example of a computer that executes a display program. DESCRIPTION OF EMBODIMENTS Hereinafter, modes (embodiments) for carrying out the present invention will be described separately from a first embodiment to a fourth embodiment with reference to the drawings. The present invention is not limited to the embodiments described below. Hereinafter, a case where a mobile terminal carried by a worker of a work terminal is smart glasses will be described as an example, but the present invention is not limited thereto. For example, the mobile terminal may be a mobile terminal with a camera (for example, smartphone with a camera or the like). Furthermore, confidential information is information that is not preferable to be displayed on a web screen, such as personal information a