WO2011007554A1 - アクセス制御装置、アクセス制御方法、プログラム、記録媒体及び集積回路 - Google Patents
アクセス制御装置、アクセス制御方法、プログラム、記録媒体及び集積回路 Download PDFInfo
- Publication number
- WO2011007554A1 WO2011007554A1 PCT/JP2010/004537 JP2010004537W WO2011007554A1 WO 2011007554 A1 WO2011007554 A1 WO 2011007554A1 JP 2010004537 W JP2010004537 W JP 2010004537W WO 2011007554 A1 WO2011007554 A1 WO 2011007554A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- content
- access
- information
- personal information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 101
- 238000012545 processing Methods 0.000 claims description 111
- 230000008569 process Effects 0.000 claims description 91
- 230000004044 response Effects 0.000 claims description 62
- 230000008859 change Effects 0.000 description 32
- 238000012508 change request Methods 0.000 description 32
- 238000004891 communication Methods 0.000 description 31
- 230000006870 function Effects 0.000 description 26
- 238000001514 detection method Methods 0.000 description 20
- 238000012986 modification Methods 0.000 description 20
- 230000004048 modification Effects 0.000 description 20
- 230000005540 biological transmission Effects 0.000 description 16
- 238000012217 deletion Methods 0.000 description 16
- 230000037430 deletion Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 12
- 239000004973 liquid crystal related substance Substances 0.000 description 8
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000010354 integration Effects 0.000 description 3
- 238000012015 optical character recognition Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000007423 decrease Effects 0.000 description 1
- 230000005764 inhibitory process Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000002194 synthesizing effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Definitions
- the present invention relates to a technique for controlling access to content such as image data.
- Patent Document 1 In a content management system that registers and manages content on a server on the Internet, it is known that when a user registers content, it is possible to set whether other users are allowed to access the content. (For example, Patent Document 1).
- contents may contain information related to individuals (hereinafter referred to as “personal information”).
- personal information For example, subject face image data or moving image data included in still image data (hereinafter also referred to as “image data”) or AV (Audio Visual) data (hereinafter also referred to as “moving image data”).
- image data still image data
- AV (Audio Visual) data hereinafter also referred to as “moving image data”.
- the range of users allowed to access registered content is determined by the intention of the user who registered the content, and access to the registered content is controlled according to the determination.
- the determination of the user range that is permitted to access does not reflect the will of the individual related to the personal information included in the content (hereinafter also referred to as “the owner of personal information”). It may happen that access to the content is permitted to those who do not want to permit access by the owner.
- the present invention has been made in view of such problems, and it is possible to perform control related to permission or disapproval of access to content reflecting the intention of the owner of personal information included in the content.
- An object is to provide an access control apparatus.
- an access control apparatus in a system for providing a user with an access service for content, and obtains content including one or more pieces of personal information. And the first user information indicating the personal information and the user who is determined to be permitted to access the content including the personal information or the user who is determined not to be permitted. On the basis of the first user information stored in association with the personal information included in the content acquired by the acquisition unit and whether or not access to the content is permitted. And a control means for performing.
- the access control apparatus having the above-described configuration is capable of performing control related to permission / inhibition of access to content reflecting the intention of the owner of the personal information included in the content.
- FIG. 1 System configuration diagram of access control system 1000 according to Embodiment 1
- FIG. The figure which shows the data structure of the registration request 30 of a content, the access request 40 of a content, and the change request 50 of 1st user information, and an example of content
- the flowchart which shows the registration process of the content which concerns on Embodiment 1 Flowchart showing access control processing for registered content according to the first embodiment
- the figure which shows the detection result example of the image data 1 which is an example of the content for registration, and a user's personal information The figure which shows the image data 7 after performing a mosaic process to the image data 1
- the figure which shows the example of the content of the personal information table 10 after registering the image data 1, and the access control table 20 The figure which shows the example of the content of the response with respect to the adjustment request which concerns on Embodiment 1, and an adjustment request
- the figure which shows the example of the content of a content registration notification and a content temporary registration notification The figure which shows the data structure and content example of the access control table 60 which concern on a modification.
- the flowchart which shows the registration process of the content which concerns on a modification FIG.
- FIG. 15 is a flowchart showing access control processing for registered content according to the modification example, continued from FIG.
- FIG. 14 is a flowchart showing access control processing for registered content according to the modification, continued from FIG.
- System configuration diagram of access control system 1100 according to Embodiment 2 The figure which shows the data structure of the access control table 70 which concerns on Embodiment 2, and the change request 55 of 1st user information, and the example of content
- FIG. 19 is a flowchart illustrating content registration processing according to the second embodiment, continued from FIG. Flowchart showing content registration processing according to Embodiment 2 continued from FIG.
- the flowchart which shows the change process of the 1st user information which concerns on Embodiment 2.
- FIG. The flowchart which shows the change process of the authorized user information which concerns on Embodiment 2.
- Embodiment 1 >> ⁇ Configuration> The configuration of access control system 1000 according to Embodiment 1 will be described.
- FIG. 1 is a system configuration diagram of an access control system 1000 according to the first embodiment.
- the access control system 1000 includes an access control device 100 and terminal devices 200A, 200B, and 200C that are connected to each other via the Internet 300.
- terminal devices 200A, 200B, and 200C
- the number of terminal devices included in the access control system 1000 is one or more, even if it is 100, 10000 It may be a table.
- the access control device 100 when the access control device 100 receives a content registration request from each terminal device via the Internet 300, the access control device 100 has a function of adjusting the users permitted to access the content and registering the content.
- This adjustment is based on the range of each user that the user of the terminal device wants to access the content and the range of each user that the owner of each personal information included in the content may access. This is done so as not to exceed the range of each user who can be accessed by the owner of each personal information. By adjusting in this way, it is possible to prevent a situation where a user who does not want the owner of each piece of personal information included in the content to access is permitted to access the content.
- Each terminal device (200A, 200B, and 200C) is a personal computer (having a display) used by each user of the access control system 1000.
- Each terminal device has a function of transmitting various requests based on a user operation. Specifically, a content registration request for causing the access control device 100 to register content that the user wants to share with other users, Then, an access request or the like for accessing a predetermined content registered in the access control apparatus 100 by another user is transmitted.
- the configuration of the access control device 100 and each terminal device will be described in more detail with reference to FIG. 1, but since the configuration of each terminal device is the same, the terminal device 200A will be described below.
- the access control apparatus 100 includes a communication unit 110, a storage unit 120, and a control unit 130, as shown in FIG.
- the access control apparatus 100 includes a memory and a processor (not shown), and the function of the control unit 130 is realized by the processor executing a program on the memory.
- the communication unit 110 has a function of transmitting / receiving data to / from each terminal device (200A, 200B, and 200C) via the Internet 300.
- the storage unit 120 registers various contents (image data, moving image data, text data, etc.) that are registered based on content registration requests from each terminal device. ) And is realized by a hard disk or the like.
- the personal information table 10 is information indicating the personal information of the user and the user that the user may permit to access content including the personal information. (Hereinafter referred to as “first user information”).
- the access control table 20 is a table in which information indicating users who are actually permitted to access the content (hereinafter referred to as “permitted user information”) and the like are registered for each registered content. .
- control unit 130 has a function of executing processing according to various requests transmitted from each terminal device, and includes a personal information detection unit 131, a determination unit 132, and a content processing unit 133. , An adjustment unit 134, a content management unit 135, a personal information table update unit 136, and an access request processing unit 137.
- the personal information detection unit 131 refers to the personal information table 10 when receiving a content registration request transmitted from one of the terminal devices (200A, 200B, or 200C) via the communication unit 110.
- the access control system 1000 has a function of detecting personal information of the user included in the content related to the registration request.
- information indicating a user in the access control system 1000 that the user of the terminal device that is the transmission source wants to access the content hereinafter referred to as “second”.
- User information indicating a user in the access control system 1000 that the user of the terminal device that is the transmission source wants to access the content
- the determination unit 132 is a user who is not included in all the users indicated by the first user information of the user (owner of personal information) related to the personal information for each personal information detected by the personal information detection unit 131. And a function of determining whether or not there is a user included in all the users indicated by the second user information (hereinafter referred to as “out-of-range user”).
- the out-of-range user is included in the user who wants to access the content by the user who intends to register the content (hereinafter also referred to as “content owner”), but the personal information included in the content. It is a user who is not included in the users who may be allowed to access.
- the content processing unit 133 has a function of processing content so that other users cannot be specified from personal information of other users other than the specific user.
- the adjustment unit 134 causes the owner of the personal information related to the determination to access the content including the personal information for the out-of-range user. It has a function of requesting a response indicating whether or not it is acceptable.
- these requests and responses are made using mail.
- This request is also referred to as an “adjustment request”.
- the adjustment unit 134 includes the content processed by the content processing unit 133 so that the individual cannot be identified from the personal information of the owner other than the owner of the personal information that is the destination of the adjustment request. Send.
- the content management unit 135 has a function of storing the content in the storage unit 120 in response to a content registration request, and in particular, the access control table according to the content of the response to the adjustment request transmitted by the adjustment unit 134. 20 has a function of registering authorized user information.
- the personal information table update unit 136 determines the first information about the user who transmitted the response (the owner of the personal information) in the personal information table 10. It has a function of updating one user information so as to include out-of-range users.
- the access request processing unit 137 When the access request processing unit 137 receives an access request for content from each terminal device via the communication unit 110, the access request processing unit 137 relates to the request stored in the storage unit 120 according to the content of the received access request. It has a function of controlling whether or not the content or the content processed by the content processing unit 133 is transmitted to the requesting terminal device via the communication unit 110.
- the terminal device 200A includes a communication unit 210, a content storage unit 220, an input unit 230, an output unit 240, and a control unit 250, as shown in FIG.
- the terminal device 200A includes a memory and a processor (not shown), and the function of the control unit 250 is realized by the processor executing a program on the memory.
- the communication unit 210 has a function of transmitting and receiving data to and from the access control apparatus 100 via the Internet 300.
- the content storage unit 220 is a memory area for storing each content owned by the user of the device itself, and is realized by a hard disk or the like.
- content acquired from the access control apparatus 100 (content owned by another user) is stored in the memory under the control of the control unit 250, but is not stored in the content storage unit 220. .
- the input unit 230 is an input device such as a keyboard or a mouse, and has a function of transmitting input signals corresponding to keys and buttons pressed by the user to the control unit 250.
- the output unit 240 is a liquid crystal display ( An output device such as LCD (Liquid Crystal Display) or a speaker, and has a function of displaying characters and outputting sound in accordance with instructions from the control unit 250.
- control unit 250 In addition to controlling the entire apparatus, the control unit 250 also sends various requests and responses to adjustment requests received from the access control device 100 based on the content of the input signal transmitted from the input unit 230. And a function of outputting content received from the access control apparatus 100 to the output unit 240.
- the control unit 250 includes a request transmission processing unit 251, an adjustment request processing unit 252, and a received content processing unit 253.
- the request transmission processing unit 251 includes a request corresponding to the content of the input signal transmitted from the input unit 230, that is, a content registration request, a content access request, and a first user information change request. Is generated and transmitted to the access control apparatus 100 via the communication unit 210.
- the adjustment request processing unit 252 generates a response corresponding to the adjustment request received from the access control apparatus 100 via the communication unit 210 based on the content of the input signal transmitted from the input unit 230, and passes through the communication unit 210. A function of transmitting to the access control apparatus 100.
- the adjustment request processing unit 252 since the adjustment request and the response are made using mail, the adjustment request processing unit 252 has a mail transmission / reception function.
- the received content processing unit 253 has a function of performing output processing to the output unit 240 according to the type of content received from the access control apparatus 100 via the communication unit 210. For example, when the content is image data or text data, an image or a character is displayed on the liquid crystal display. When the content is moving image data, an image is displayed on the liquid crystal display and a sound is output from the speaker. .
- FIG. 2A is a diagram showing a data configuration and example contents of the personal information table 10.
- the personal information table 10 is information configured by associating the user ID 11, the user name 12, the face data 13, the mail address 14, and the first user information 15 for each user of the access control system 1000. .
- information including the user ID 11, the user name 12, the face data 13, the mail address 14, and the first user information 15 is also referred to as “record”.
- the personal information table 10 is referred to when the personal information detection unit 131 detects personal information included in the content related to the registration request, or when the determination unit 132 determines whether there is an out-of-range user. To be done.
- the record registered in the personal information table 10 is updated by the personal information table update unit 136 according to the content of the response to the adjustment request and according to the change request for the first user information.
- registration of a new record in the personal information table 10 and deletion of a registered record are performed when an input device such as a keyboard or a mouse provided in the access control device 100 (unusable when the number of users of the access control device 100 increases or decreases). Via the administrator of the access control apparatus 100.
- the user ID 11 is identification information of the corresponding user, and is text format data.
- the user name 12 is data in text format indicating the name of the corresponding user
- the face data 13 is image data (for example, JPEG (Joint Photographic Experts Group) data generated by photographing the face of the corresponding user.
- JPEG Joint Photographic Experts Group
- the administrator of the access control apparatus 100 When the administrator of the access control apparatus 100 obtains image data generated by photographing the user's face, the administrator of the access control apparatus 100 extracts the image feature parameter group (face data). This face data is registered. Note that an apparatus different from the access control apparatus 100 may be made to extract the image feature parameter group (face data).
- the email address 14 is data in text format indicating the email address owned by the corresponding user.
- Each of the user ID 11, the user name 12, the face data 13, and the mail address 14 is personal information because it is information that can identify an individual alone or by collating with other information of the personal information table 10.
- the first user information 15 may allow the corresponding user to access content including at least one of his / her personal information, that is, the corresponding user ID, user name, face data, and e-mail address. It is information indicating each user.
- the user name of the user whose user ID is “U0001” is “Ichiyama Ako”
- the face data is “face data A”
- the mail address is “a ⁇ a@aaa.com”.
- the first user information is “U0001” and “U0002”, that is, the user “Ichiyama Ako” may access the content including his / her personal information. “Yama Ako” (that is, the person) and “Futagawa B Male”.
- FIG. 2B is a diagram showing a data configuration and example contents of the access control table 20.
- the access control table 20 is information configured by associating a content ID 21, personal information owner information 22, and permitted user information 23 for each content registered in the access control apparatus 100.
- information including the content ID 21, the personal information owner information 22, and the authorized user information 23 is also referred to as “record”.
- the access control table 20 is referred to when the access request processing unit 137 receives a content access request from each terminal device. Registration of a new record in the access control table 20 is performed when the content management unit 135 receives a content registration request from each terminal device.
- the content ID 21 is identification information of the corresponding content
- the personal information owner information 22 is identification information of the owner of the personal information included in the corresponding content. It matches the user ID.
- the permitted user information 23 is identification information of a user who is permitted to access the corresponding content, and matches one of the user IDs in the personal information table 10.
- the personal information owner information of the personal information included in the content whose content ID is “C0001” is “U0001” (that is, Aichi Ichiyama), and the permitted user information is “U0001” (that is, , Ichiyama Ako) and "U0002” (that is, Futagawa B male).
- this content includes personal information of “Ichiyama Ako”, indicating that “Ichiyama Ako” and “Futagawa B O” are allowed to access this content. Yes.
- FIG. 3A is a diagram illustrating a data configuration and a content example of the content registration request 30.
- the content registration request 30 is a command transmitted from each terminal device to the access control apparatus 100 in order for the content owner to register the content in the access control apparatus 100.
- the content registration request 30 includes a type 31, content data 32, second user information 33, and a user ID 34, as shown in FIG.
- type 31 is information indicating the type of request, and in this example, a request for which “registration” is set indicates a content registration request.
- the content data 32 is content data to be registered, and the second user information 33 is information indicating each user the content owner wants to access the corresponding content data 32. This matches one of the user IDs in the table 10.
- the user ID 34 is information indicating the requesting user (that is, the owner of the content) and matches any user ID in the personal information table 10.
- the content data that is a request target of a request whose type is “registration” (that is, a content registration request) is “image data I”
- the second user information is “U0001” (that is, one Yama Ako), “U0002” (that is, Futagawa B male), “U0004” (that is, Sikai D male), and the requesting user ID is “U0001” (that is, Ichiyama A child). It is shown that. That is, “Ichiyama Ako” who is the owner of “Image Data I” makes “Ichiyama Ako”, “Futagawa B O” and “Shikai D O” access to “Image Data I”. Indicates what you want.
- the content data is image data
- the content registered in the access control apparatus 100 is not limited to image data, but video data, audio data, It may be various contents such as text data.
- FIG. 3B is a diagram illustrating a data configuration and a content example of the content access request 40.
- the content access request 40 is a command transmitted from each terminal device to the access control apparatus 100 in order for each user of the access control system 1000 to access the content registered in the access control apparatus 100.
- the content access request 40 includes a type 41, a content ID 42, and a user ID 43, as shown in FIG.
- the type 41 is information indicating the type of request.
- a request for which “access” is set indicates a content access request
- the content ID 42 is a target of the request.
- Content identification information is information indicating the type of request.
- the authorized user information associated with the registered content in the access control table 20 is stored as described later.
- Each user shown is notified by e-mail that the content permitted to be accessed by the user is registered.
- the content ID of the registered content is included in the mail, and each user designates this content ID as the content ID 42.
- the user ID 43 is information indicating the requesting user, and matches one of the user IDs in the personal information table 10.
- a request for a request whose type is “access” is a content whose content ID is “C0001”, and the user ID of the request source is “U0002” ( That is, it shows that it is Futagawa B male).
- FIG. 3C is a diagram showing a data configuration and example contents of the change request 50 for the first user information.
- the first user information change request 50 is sent from each terminal device to the access control device 100 so that each user of the access control system 1000 changes the first user information of the user registered in the personal information table 10.
- the command to be sent is sent.
- the first user information change request 50 includes a type 51, a user ID 52, and first user information 53, as shown in FIG.
- the type 51 is information indicating the type of request, and in this example, the request for which “change” is set indicates a change request for the first user information.
- the user ID 52 is information indicating the requesting user and matches any user ID in the personal information table 10
- the first user information 53 is information indicating the changed first user information. It is.
- the user ID of the request source of the request whose type is “change” (that is, the change request for the first user information) is “U0001” (that is, Aichi Ichiyama)
- One user information indicates “U0001” (that is, Ichiyama Ako), “U0002” (that is, Futagawa B male), and “U0003” (that is, Mimori C child).
- FIG. 4 is a flowchart showing content registration processing by the access control apparatus 100.
- the request transmission processing unit 251 of the control unit 250 The registration request is generated and transmitted to the access control apparatus 100 via the communication unit 210.
- the content management unit 135 When the control unit 130 of the access control device 100 receives a content registration request from the terminal device via the communication unit 110 (step S1), the content management unit 135 generates a new content ID.
- the generated content ID is also referred to as “registration target content ID” below.
- the content management unit 135 has a configuration in which the content ID is configured by a one-digit alphabet “C” followed by a four-digit number.
- the content ID is configured by a one-digit alphabet “C” followed by a four-digit number.
- an alphabet “C” followed by a 4-digit number obtained by adding 1 to the maximum 4-digit number among already registered content IDs is generated.
- the personal information detection unit 131 performs a process of detecting personal information of the user of the access control system 1000 included in content data (hereinafter also referred to as “registration target content”) included in the received content registration request. To identify the owner of the detected personal information (step S2).
- the personal information detection unit 131 performs OCR (Optical Character Reader) processing on the registration target content (that is, image data) when the type of registration target content is, for example, image data. Extracting text data corresponding to an image representing characters included in the registration target content, and collating the extracted text data with each user ID, each user name, and each e-mail address registered in the personal information table 10 In addition, an image feature parameter group is extracted from the registration target content and collated with each face data registered in the personal information table 10.
- OCR Optical Character Reader
- the type of content to be registered is moving image data
- the above-described verification is performed on each frame image.
- each user ID registered in the personal information table 10 When the type of content to be registered is text data, for example, the content to be registered (that is, text data), each user ID registered in the personal information table 10, each user name, each e-mail address, Perform the verification. In this verification, when data registered in the personal information table 10 is found, the user ID associated with the data in the personal information table 10 is acquired, and the user indicated by the acquired user ID is detected. Identified as the owner of personal information.
- the personal information detection unit 131 determines whether or not the personal information of the user of the access control system 1000 has been detected in the detection process of step S2 (step S3). (S3: NO), the content management unit 135 associates the registration target content ID with the registration target content and stores them in the storage unit 120. Further, the content management unit 135 associates this registration target content ID with the permitted user information set with the second user information included in the content registration request received in step S1, and controls the access of the storage unit 120. Registration in the table 20 (step S4), the access control apparatus 100 ends the content registration process.
- the content management unit 135 notifies each user indicated by the registered permitted user information that accessible content has been registered. This notification is referred to as “content registration notification”.
- a user name and an email address associated with the user ID and the personal information table 10 are acquired, and the acquired email address is set as a destination.
- a mail including the content ID in the body is transmitted.
- the content management unit 135 transmits a content registration notification to the content owner who has requested the content registration.
- step S3 YES
- step S5 determines all the personal information specified. It is determined whether or not the owner in step S6 described below has been processed (step S5).
- step S5 the determination unit 132 owns one personal information among the unprocessed personal information owners.
- the user ID of the person hereinafter referred to as “target user”
- target user the user ID of the person
- the first user information associated with the selected user ID in the personal information table 10 is acquired.
- the determination unit 132 determines whether there is an out-of-range user based on the acquired first user information and the second user information included in the content registration request received in Step S1 (Step S1). S6).
- the determination unit 132 is a user who is not included in all the users indicated by the first user information and is included in all the users indicated by the second user information. Is determined to be present (step S6: YES).
- step S6 NO
- the determination unit 132 performs the process from step S5 again.
- the content processing unit 133 includes other than the target user among the individual information included in the registration target content.
- the content to be registered is processed so that the other user cannot be identified from the personal information of the user (step S7).
- the registration target content is image data or moving image data
- so-called mosaic processing is performed on an image portion including personal information of another user.
- a process of replacing a character part including personal information of another user with another character such as “ ⁇ ” (so-called prone character process) is performed.
- the adjustment unit 134 transmits an adjustment request including the registration target content processed by the content processing unit 133 to the target user (step S8).
- the adjustment unit 134 acquires an email address associated with the user ID of the target user in the personal information table 10, and responds to the content registration request received in step S 1 from the personal information table 10.
- the user name corresponding to the included user ID of the request source and the user name of the user outside the range are acquired. For example, as shown in FIG. 10 (a), an e-mail address obtained by generating an e-mail including the registration target content ID (see part M1) in the subject and the user name of the out-of-range user (see part M2) in the body Send an email addressed to.
- the adjustment request processing unit 252 in the control unit 250 of the terminal device (200A, 200B, or 200C) used by the target user receives this adjustment request via the communication unit 210, the received adjustment request screen ( 10A is displayed on the liquid crystal display of the output unit 240, and a response to the adjustment request is generated based on the input from the input unit 230 and accessed via the communication unit 210. It transmits to the control apparatus 100.
- the subject includes the registration target content ID (see the part M3), and “1 ”(Refer to part M4) is transmitted.
- the subject includes the registration target content ID (refer to the part M5), and “0” ( It is assumed that an e-mail describing part M6) is transmitted.
- the adjustment unit 134 determines whether or not a response to the effect that the out-of-range user is allowed to access is received in response to the transmitted adjustment request (step S9).
- step S8 when an e-mail including the registration target content ID in the subject and “1” in the e-mail body is received from the destination of the adjustment request transmitted in step S8, the out-of-range user It is determined that a response to the effect that the user agrees to access is received (step S9: YES).
- step S9 When a response indicating that the user outside the range is not allowed to access is received (step S9: NO), the determination unit 132 performs the process from step S5 again. Note that, when the response is not received within a predetermined time after the adjustment request is transmitted in step S8, the determination unit 132 performs the process from step S5 again.
- step S9 If a response indicating that the user outside the range is allowed to access is received (step S9: YES), the personal information table update unit 136 is associated with the user ID of the target user in the personal information table 10. The user ID of the out-of-range user is added to the first user information (step S10), and the determination unit 132 performs the process from step S5 again.
- the content management unit 135 associates the registration target content ID with the registration target content and stores them in the storage unit 120.
- the content management unit 135 includes a registration target content ID, personal information owner information including the user ID of each personal information owner specified in step S2, and each user ID specified as described below.
- the authorized user information is associated and registered in the access control table 20 of the storage unit 120 (step S11), and the access control apparatus 100 ends the content registration process.
- Each user ID that constitutes the permitted user information is specified as follows.
- each first user information associated with the user IDs of the owners of all the personal information specified in step S2 in the personal information table 10 is acquired, and each user included in each acquired first user information is acquired.
- Each user ID that is common to the ID and each user ID included in the second user information included in the content registration request received in step S1 is identified as each user ID constituting the permitted user information.
- the content management unit 135 sends a content registration notification to each user indicated by the registered permitted user information and the content owner who has requested the content registration, as in the case of the process of step S4.
- FIG. 5 is a flowchart showing access control processing for registered content by the access control apparatus 100.
- a request transmission processing unit of the control unit 250 251 When a user who desires access to content performs a predetermined operation for transmitting a content access request at the input unit 230 of the terminal device (200A, 200B, or 200C), a request transmission processing unit of the control unit 250 251 generates a content access request and transmits the request to the access control apparatus 100 via the communication unit 210.
- the predetermined operation for transmitting the content access request includes an operation for designating the content ID of the content for which access is requested.
- a content registration notification (mail) including the content ID of the registered content is transmitted to each user indicated by the authorized user information.
- the content ID is designated.
- the access request processing unit 137 accesses the content.
- the permitted user information associated with the content ID included in the request and the access control table 20 of the storage unit 120 is acquired (step S22).
- the access request processing unit 137 determines whether or not the user ID included in the content access request received in step S21 is included in the acquired permitted user information (step S23). (Step S23: YES), the content ID included in the content access request and the content stored in association with the storage unit 120 (hereinafter also referred to as “access target content”) are acquired, and this access is performed.
- the target content is transmitted to the terminal device (200A, 200B, or 200C) that is the transmission source of the content access request (step S24), and the access control device 100 ends the access control process for the registered content.
- the received content processing unit 253 in the control unit 250 of the terminal device (200A, 200B, or 200C) that is the transmission source of the content access request receives the accessed content via the communication unit 210.
- output to the liquid crystal display or speaker of the output unit 240 is performed.
- step S21 when the user ID included in the content access request received in step S21 is not included in the acquired permitted user information (step S23: NO), the access request processing unit 137 accesses the content.
- the personal information owner information associated with the content ID included in the request and the access control table 20 of the storage unit 120 is acquired (step S25).
- the access request processing unit 137 determines whether or not the user ID included in the content access request is included in the acquired personal information owner information (step S26). (Step S26: YES), the content processing unit 133 is identified by the user ID included in the content access request among the individual information included in the access target content, as in the process of Step S7 in FIG. The content to be accessed is processed so that the other user cannot be identified from the personal information of other users other than the user to be used.
- the access request processing unit 137 transmits the processed access target content to the terminal device that has transmitted the content access request (step S27), and the access control device 100 ends the access control process for the registered content. .
- the received content processing unit 253 in the control unit 250 of the terminal device that has transmitted the content access request receives the processed access target content via the communication unit 210, the received processed target content is processed.
- the output unit 240 outputs to a liquid crystal display or a speaker.
- step S26 when the user ID included in the content access request is not included in the acquired personal information owner information (step S26: NO), a message indicating that there is no access authority is displayed. Is transmitted to the transmission source terminal device (step S28), and the access control device 100 ends the access control processing for the registered content.
- the received content processing unit 253 in the control unit 250 of the terminal device that has transmitted the content access request receives the message indicating that the user does not have access authority via the communication unit 210
- the received content processing unit 253 receives the message in the output unit 240. Display on the LCD.
- FIG. 6 is a flowchart showing the first user information changing process by the access control apparatus 100.
- a user who desires to change the content of the first user information performs a predetermined operation for transmitting a change request for the first user information at the input unit 230 of the terminal device (200A, 200B, or 200C).
- the request transmission processing unit 251 of the unit 250 generates a first user information change request and transmits the first user information change request to the access control apparatus 100 via the communication unit 210.
- the control unit 130 of the access control device 100 receives a change request for the first user information from the terminal device (200A, 200B, or 200C) via the communication unit 110 (step S31).
- the personal information table update unit 136 receives the first user information associated with the user ID included in the received change request for the first user information and the personal information table 10 of the storage unit 120.
- the first user information included in the information change request is updated (step S32), and the access control apparatus 100 ends the first user information change process.
- step S32 The access control apparatus 100 ends the change process of the first user information without performing the process.
- the owner of the registration target content (image data 1) shown in FIG. 7A is “Mimori C child” whose user ID is “U0003”, and the owner of this content has the user ID “U0001”. ”To“ U0004 ”is assumed to be accessed, and the owner of this content is assumed to be using the terminal device 200A.
- the request transmission processing unit 251 of the control unit 250 has the type “ “Registration”, the content data is the image data 1 shown in FIG. 7A, and the second user information is “U0001, U0002, U0003, U0004”. To the access control apparatus 100.
- the content management unit 135 sets a new content ID (here, “C1001”). Generate).
- the personal information detection unit 131 performs processing for detecting personal information of the user of the access control system 1000 included in the content data (image data 1) included in the received content registration request, and detects the detected personal information. Is identified (step S2).
- the image data 1 is collated with each face data registered in the personal information table 10, and the face image 2 is collated with the face data A, as shown in FIG.
- the face image 3 is detected by matching with the face data C
- the face image 4 is detected by matching with the face data C
- the face image 5 is detected by matching with the face data D.
- the user IDs “U0001” to “U0004” are specified.
- a face image 6 indicated by a dotted line in FIG. 7B shows a face image that could not be detected by collation with each face data registered in the personal information table 10 for explanation.
- the personal information detection unit 131 detects the personal information of the user of the access control system 1000 (step S3: YES), and the determination unit 132 is the owner (user) of all the specified personal information. For each user whose ID is “U0001” to “U0004”, the process of step S6 described below is not performed (step S5: NO), and therefore the user ID of the target user (here, “U0001”) And the first user information (U0001, U0002) associated with the selected user ID in the personal information table 10 is acquired.
- the acquired first user information is “U0001, U0002”
- the second user information is “U0001, U0002, U0003, U0004”. Therefore, the determination unit 132 is a user who is not included in all the users indicated by the first user information and is a user included in all the users indicated by the second user information. It is determined that there are outside users (“U0003” and “U0004”) (step S6: YES).
- the content processing unit 133 determines the other personal information included in the registration target content from the personal information of users other than the target user (“Ichiyama Ako” whose user ID is “U0001”).
- the content to be registered is processed so that no user can be identified (step S7).
- mosaic processing is performed on the face images 3 to 5 shown in FIG.
- FIG. 8 shows the image data 7 after the mosaic processing is performed on the image data 1.
- the shaded part in the figure indicates that mosaic processing has been performed.
- the adjustment unit 134 transmits an adjustment request including the registration target content (image data 7) processed by the content processing unit 133 to the target user (step S8).
- the adjustment unit 134 acquires a mail address (a*a@aaa.com) associated with the user ID (U0001) of the target user in the personal information table 10, and the personal information table 10 To the user name (Mimori C child) of the user ID (U0003) of the request source included in the content registration request received in step S1 and the user names (“U0003” and “U0004”) of the user outside the range (“ “Mimori C child” and “Shikai D man”). Also, for example, as shown in FIG. 10 (a), the registration target content ID (C1001) is included in the subject, and the user names of out-of-range users (“Mimori C child” and “Shikai D man”) are included in the text. Send an email addressed to the obtained email address.
- a*a@aaa.com a mail address associated with the user ID (U0001) of the target user in the personal information table 10
- the personal information table 10 To the user name (Mimori C child) of the user ID (U0003) of the request
- the terminal device used by the target user (Ichiyama Ako) who has received this adjustment request is based on the input from the input unit 230, and the user is out of range as shown in FIG. It is assumed that a response not agreeing to access is generated and transmitted to the access control apparatus 100.
- the adjustment unit 134 receives a response indicating that it does not agree to allow access to an out-of-range user (step S9: NO), and thus the determination unit 132 performs the processing from step S5 again.
- step S6 Since the determination unit 132 does not perform the process of step S6 described below for all identified personal information owners (step S5: NO), the user ID of the target user (here, “U0002”). ) And the first user information (U0002, U0004) associated with the selected user ID in the personal information table 10 is acquired.
- the acquired first user information is “U0002, U0004”
- the second user information is “U0001, U0002, U0003, U0004”
- users outside the range (“U0001” and “U0003”. Is determined to exist (step S6: YES).
- the content processing unit 133 determines the other personal information included in the registration target content from the personal information of users other than the target user (“Futagawa B man” whose user ID is “U0002”).
- the registration target content is processed so that the user cannot be identified, that is, the mosaic process is performed on the face images 2, 4, and 5 shown in FIG. 7B (step S7).
- the adjustment unit 134 transmits an adjustment request including the registration target content processed by the content processing unit 133 to the target user (step S8).
- the terminal device used by the target user accesses an out-of-range user as shown in FIG. 10B based on the input from the input unit 230. It is assumed that a response that agrees to be generated is generated and transmitted to the access control apparatus 100.
- the adjustment unit 134 receives a response indicating that the user outside the range is allowed to access (step S9: YES), so the personal information table update unit 136 receives the user ID (U0002) of the target user. ) And the first user information (U0002, U0004) associated with each other in the personal information table 10, the user IDs of the out-of-range users ("U0001" and "U0003") are added (step S10). The process is performed again from step S5.
- step S6 Since the determination unit 132 does not perform the process of step S6 described below for all identified personal information owners (step S5: NO), the user ID of the target user (here, “U0003” is used). ) And the first user information (“U0001, U0002, U0003, U0004”) associated with the selected user ID in the personal information table 10 is acquired.
- the acquired first user information is “U0001, U0002, U0003, U0004”
- the second user information is “U0001, U0002, U0003, U0004”
- there is no out-of-range user Step S6: NO
- the determination unit 132 performs the processing from Step S5 again.
- step S6 Since the determination unit 132 does not perform the process of step S6 described below for all identified personal information owners (step S5: NO), the user ID of the target user (here, “U0004” is used). ) And the same processing as when the target user is “Ichiyama Ako”.
- the terminal device used by the target user does not agree to allow an out-of-range user to access based on the input from the input unit 230. Is transmitted to the access control apparatus 100.
- the personal information table 10 having the contents shown in FIG. 2A is updated to the contents shown in FIG.
- the content management unit 135 since the determination unit 132 has performed processing for all identified personal information owners (step S5: YES), the content management unit 135 includes the registration target content ID (C1001) and the registration target content. (Image data 1) is stored in the storage unit 120 in association with each other.
- the content management unit 135 stores the first user information associated with the user IDs (U0001, U0002, U0003, U0004) of the owners of all personal information identified in step S2 in the personal information table 10. get.
- the content management unit 135 is included in each user ID included in each acquired first user information and second user information (U0001, U0002, U0003, U0004) included in the content registration request received in step S1.
- Each user ID (U0001, U0002) common to each user ID is identified as each user ID constituting the permitted user information.
- the content management unit 135 includes personal information owner information including the content ID (C1001), the user ID (U0001, U0002, U0003, U0004) of each personal information owner identified in step S2, and each identified user.
- the authorized user information consisting of IDs (U0001, U0002) is associated and registered in the access control table 20 of the storage unit 120 (step S11), and the access control apparatus 100 ends the content registration process.
- the first embodiment has been described with reference to an example in which the access control apparatus 100 makes an adjustment request as necessary when receiving a content registration request.
- modified access control device has slightly changed the function of the control unit 130 of the access control device 100 according to the first embodiment and the data structure of the access control table. Since it is a thing, it demonstrates focusing on the changed part from the access control apparatus 100.
- FIG. 1 The access control device according to this modified example (hereinafter referred to as “modified access control device”) has slightly changed the function of the control unit 130 of the access control device 100 according to the first embodiment and the data structure of the access control table. Since it is a thing, it demonstrates focusing on the changed part from the access control apparatus 100.
- modified access control system an access control system including this modified access control device is referred to as a “modified access control system”.
- FIG. 12 is a diagram showing a data configuration and example contents of the access control table 60 stored in the storage unit 120 of the modified access control apparatus.
- the access control table 60 is information configured by associating the content ID 21, the personal information owner information 22, the second user information 61, and the permitted user information 23 for each content registered in the modified access control device. It is.
- the content ID 21, the personal information owner information 22, and the permitted user information 23 are the same as the data items of the access control table 20, and the second user information 61 is the content of the corresponding content. This is second user information included in the registration request.
- the personal information owner information of the personal information included in the content whose content ID is “C0001” is “U0001”
- the second user information is “U0001” (that is, “Ichiyama Ako”).
- “U0002” that is, “Futagawa B male”
- “U0003” that is, “Mimori C child”
- the permitted user information is “U0001” and “U0002”. That is, the content owner indicates that “Ichiyama Ako”, “Futagawa B O” and “Mimori C Child” want to access this content.
- FIG. 13 is a flowchart showing content registration processing by the modified access control apparatus.
- steps S1 to S4 are the same as the processing of steps S1 to S4 (see FIG. 4) of the content registration processing by the access control device 100 according to the first embodiment. is there.
- step S12 performed when a positive determination is made in step S3 (step S3: YES) will be described.
- the personal information detection unit 131 of the control unit (hereinafter referred to as “deformation control unit”) in the modified access control apparatus detects the personal information of the user of the modified access control system in the detection process of step S2 (step S3). : YES)
- the content management unit in the deformation control unit (hereinafter referred to as “transformed content management unit”) stores the registration target content ID and the registration target content in the storage unit 120 in association with each other.
- the modified content management unit is included in the registration request for the content to be registered, the personal information owner information including the user ID of each personal information owner identified in step S2, and the content received in step S1.
- the modified second control information is registered in the access control table 60 of the storage unit 120 in association with the second user information (step S12), and the modified access control apparatus ends the content registration process.
- the modified content management unit notifies each user indicated by the second user information that content that may be permitted to be accessed has been registered.
- this notification is referred to as “content provisional registration notification”.
- the method of sending this notification is the same as the content registration notification according to the first embodiment, but the content of the notification is, for example, the content shown in FIG.
- the content temporary registration notification also includes the content ID (refer to the part M8) in the mail body, similarly to the content registration notification shown in FIG.
- ⁇ Content access control processing> 14 and 15 are flowcharts showing access control processing for registered content by the modified access control apparatus.
- the modification control unit of the modified access control apparatus receives a content access request from any of the terminal devices (200A, 200B, or 200C) via the communication unit 110 (step S21 in FIG. 14), the modification control unit determines The unit (hereinafter referred to as “deformation determination unit”) determines whether or not permitted user information is registered in the record of the access control table 60 including the content ID included in the content access request received in step S21. (Step S50).
- deformation determination unit determines whether or not permitted user information is registered in the record of the access control table 60 including the content ID included in the content access request received in step S21.
- step S50 If the permitted user information is registered (step S50: YES), the process proceeds to step S22 in FIG.
- step S50 NO
- the deformation determination unit is associated in the access control table 60 with the content ID included in the content access request received in step S21.
- Step S5 in FIG. 4 indicates whether or not the personal information owner information and the second user information are acquired and the processing of Step S52 described below has been performed for all the owners of the personal information indicated by the personal information owner information. It judges similarly to the process of (step S51).
- step S51 NO
- the deformation determination unit selects the user ID of one target user, the selected user ID, and the personal information table First user information associated with 10 is acquired.
- the deformation determination unit determines whether or not there is an out-of-range user based on the acquired first user information and second user information (step S52).
- step S52 When it is determined that there is no out-of-range user (step S52: NO), the deformation determination unit performs the process from step S51 again, and the deformation determination unit determines that there is an out-of-range user. In this case (step S52: YES), the processes of steps S7 to S10 are performed in the same manner as described in the first embodiment.
- the modified content management unit When the processing for all the owners of the personal information is performed (step S51: YES), the modified content management unit includes the content ID and the access control table 60 included in the content access request received in step S21.
- the first user information associated with each user ID included in the personal information owner information associated with the personal information table 10 is acquired. Based on the acquired first user information and second user information, the modified content management unit identifies each user ID constituting the permitted user information in the same manner as in step S11 of FIG.
- the modified content management unit sets each identified user ID in the permitted user information associated with the content ID included in the access request for the content received in step S21 in the access control table 60 (step S54).
- the subsequent steps S22 to S28 are the same as the steps S21 to S28 (see FIG. 5) of the content access control process performed by the access control apparatus 100 according to the first embodiment, and a description thereof will be omitted.
- Embodiment 2 when a user who has received an adjustment request agrees to allow an out-of-range user to access, the first user information of this user is updated to include the out-of-range user. did.
- each user can flexibly select whether or not to consent to access an out-of-range user for each content including his / her personal information, and this selection is performed later.
- An example in which the change can be made will be described.
- FIG. 16 is a system configuration diagram of an access control system 1100 according to the second embodiment.
- the access control system 1100 includes an access control device 150 instead of the access control device 100 of the access control system 1000 according to the first embodiment.
- the access control device 150 includes a control unit 151 instead of the control unit 130 of the access control device 100 according to the first embodiment, and the access configuration slightly changes the data configuration of the access control table 20 according to the first embodiment.
- a control table 70 is stored in the storage unit 120.
- control unit 151 is configured by changing the functions of the adjustment unit 134, the content management unit 135, and the personal information table update unit 136 of the control unit 130 according to the first embodiment.
- the adjustment unit 152, the content management unit 153, and the individual An information table update unit 154 is provided.
- FIG. 17A is a diagram showing a data configuration and example contents of the access control table 70.
- a content ID 21, personal information owner information 22, second user information 61, and permitted user information 23 are associated with each other. Further, the content is information in which the first user information 71 is associated with each piece of personal information owner information 22.
- the data items of the access control table 20 according to the first embodiment and the second user information 61 according to the modified example is the same as 60 data items.
- the 1st user information 71 is information which shows each user whom the user may make it access about the corresponding content containing self personal information for every user which corresponding personal information owner information shows. is there.
- the personal information owner information of the personal information included in the content whose content ID is “C0004” is “U0001” and “U0003”, and this personal information owner information is “U0001”.
- the first user information about this content of the user ie Aichi Ichiyama
- the user whose personal information owner information is “U0003” ie, Mimori C child
- the first user information for this content is “U0001”, “U0002”, “U0003”, and “U0004”
- the second user information is “U0001”, “U0002”, and “U0003”
- the permitted user information indicates “U0001” and “U0002”.
- the personal information owner information of the personal information included in the content whose content ID is “C0005” is “U0001” and “U0002”, and this personal information owner information is “U0001”.
- the first user information of the user indicates “U0001”, “U0002”, and “U0003”.
- the access control table 70 can set each user who is allowed to access the content for each content by the owner of each personal information included in the content.
- FIG. 17B is a diagram illustrating a data configuration and an example of the content of the first user information change request 55.
- the first user information change request 55 includes a type 51, a content ID 56, a user ID 52, and first user information 53, as shown in FIG.
- the type 51, the user ID 52, and the first user information 53 are the same as the data items of the first user information change request 50, and the content ID 56 is the identification information of the content to be requested. It is specified when only the first user information for the specific content registered in the access control device 150 is changed.
- the request of the request whose type is “change” (that is, the change request for the first user information) is the content whose content ID is “C0004”, and the user ID of the request source is “
- the first user information after the change is “U0001” (that is, Aichi Ichiyama), “U0002” (that is, Futagawa B male), and “U0003” (that is, Mimori C child).
- ⁇ Content registration process> 18 and 19 are flowcharts showing content registration processing by the access control device 150.
- FIG. 18 and 19 are flowcharts showing content registration processing by the access control device 150.
- the processing of steps S1 to S7 is the same as the processing of steps S1 to S7 of the content registration processing by the access control device 100 according to Embodiment 1 (see FIG. 4). is there.
- the adjustment unit 152 of the control unit 151 transmits an adjustment request including the registration target content processed by the content processing unit 133 to the target user (step S13 in FIG. 18).
- the method of generating and transmitting the adjustment request is the same as that described in the first embodiment, but the mail text is, for example, the content shown in FIG.
- the adjustment request processing unit 252 in the control unit 250 of the terminal device (200A, 200B, or 200C) used by the target user who has received the adjustment request returns a response to the adjustment request based on the input from the input unit 230. And transmitted to the access control device 150 via the communication unit 210.
- the response is the same as that described in the first embodiment (see FIG. 10B).
- a response (mail) in which “1” is written in the mail body is transmitted.
- the subject includes the registration target content ID (see the part M9), and the mail text It is assumed that a response (mail) in which “2” (see the part M10) is written is sent.
- the adjustment unit 152 determines the type of response to the transmitted adjustment request (step S14).
- step S13 when an e-mail including a registration target content ID in the subject and “1” in the e-mail text is received from the destination of the adjustment request transmitted in step S13, all contents are sent to out-of-range users. It is determined that a response indicating that access is to be agreed has been received (step S14: agreement for all contents).
- the personal information table update unit 136 adds the user ID of the out-of-range user to the first user information associated with the user ID of the target user in the personal information table 10 (step S10).
- the content management unit 153 of the control unit 151 associates the registration target content ID with the personal information owner information in which the user ID of the target user is set, and the first user to which the user ID of the user outside the range is added.
- the information is registered in the access control table 70 (step S15), and the determination unit 132 performs the process from step S5 again.
- step S14 when a mail including the registration target content ID in the subject and “2” in the mail body is received from the destination of the adjustment request transmitted in step S13, the registration target content is out of range. It is determined that a response indicating that the user agrees to access is received (step S14: agreement is made only on the registration target content).
- the content management unit 153 acquires the first user information associated with the user ID of the target user in the personal information table 10. Further, the content management unit 153 associates the registration target content ID with the personal information owner information in which the target user's user ID is set, and the acquired first user information to which the user ID of the out-of-range user is added. The set first user information is registered in the access control table 70 (step S15), and the determination unit 132 performs the process from step S5 again.
- step S14 when a mail including the registration target content ID in the subject and “0” in the mail body is received from the destination of the adjustment request transmitted in step S13, the scope of any content is It is determined that a response indicating that the outside user is not allowed to access is received (step S14: not agreed).
- the content management unit 153 acquires the first user information associated with the user ID of the target user in the personal information table 10.
- the content management unit 153 registers the personal information owner information in which the user ID of the target user is set in association with the registration target content ID and the acquired first user information in the access control table 70 (step S16). ),
- the determination unit 132 performs the processing from step S5 again.
- the content management unit 153 associates the registration target content ID with the registration target content and stores them in the storage unit 120. Store. In addition, the content management unit 153 acquires the first user information and the second user information associated with the registration target content ID in the access control table 70, and specifies them by the same method as the process of step S11 in FIG. The permitted user information including each user ID is registered in the access control table 70 in association with the registration target content ID (step S18), and the access control apparatus 150 ends the content registration process.
- FIG. 20 is a flowchart showing the first user information changing process by the access control device 150.
- steps S31 and S32 are the processes of steps S31 and S32 of the changing process of the first user information by the access control apparatus 100 according to Embodiment 1 (FIG. 6).
- control unit 151 of the access control device 150 receives the change request for the first user information from any of the terminal devices (200A, 200B, or 200C) via the communication unit 110 (step S31), the control unit 151 personal The information table update unit 154 determines whether or not the content ID is included in the received change request for the first user information (step S33).
- step S33 When the content ID is included (step S33: YES), the content management unit 153 of the control unit 151 performs the change process of the permitted user information using the content ID as the change target content ID (step S34). The process for changing the permitted user information will be described later (see FIG. 21).
- the access control device 150 ends the change process of the first user information.
- step S33 when the content ID is not included in the received change request for the first user information (step S33: NO), the personal information table update unit 154 is included in the received change request for the first user information.
- the first user information associated with the existing user ID in the personal information table 10 is updated with the first user information included in the received first user information change request (step S32).
- the content management unit 153 identifies all content IDs associated in the access control table 70 with the personal information owner information that matches the user ID included in the received change request for the first user information. (Step S34).
- the content management unit 153 determines whether or not the processing of step S37 described below has been performed for all the specified content IDs (step S36). If not (step S36: NO), the content management unit 153 determines whether the processing has not been performed. Of the identified content IDs, one content ID is set as the change target content ID, and the change process of the permitted user information is performed (step S37).
- the content management unit 153 performs the process from step S36 again.
- step S37 when the process of step S37 is performed for all the specified content IDs (step S36: YES), the access control device 150 ends the first user information change process.
- FIG. 21 is a flowchart showing a process for changing permitted user information by the access control device 150.
- the content management unit 153 acquires the first user information associated with the change target content ID and the user ID included in the received change request for the first user information in the access control table 70 (step S41).
- the content management unit 153 compares the acquired first user information with the first user information included in the received change request for the first user information, and identifies the added user ID.
- the added user ID is a user ID not included in the acquired first user information, and is included in the first user information included in the received change request for the first user information.
- User ID is a user ID not included in the acquired first user information, and is included in the first user information included in the received change request for the first user information.
- the content management unit 153 determines whether there is an added user ID (step S42). If there is no user ID (step S42: NO), the content management unit 153 proceeds to the process of step S45 described later.
- step S42 When there is an added user ID (step S42: YES), the content management unit 153 acquires second user information associated with the change target content ID in the access control table 70 (step S43). ).
- the content management unit 153 determines whether or not the added second user information includes the added user ID (step S44). If not included (step S44: NO), the access control is performed. The device 150 ends the process for changing the permitted user information.
- the content management unit 153 requests the change of the change target content ID and the received first user information.
- the first user information associated with the user ID included in the access control table 70 is updated with the first user information included in the received first user information change request (step S45).
- the content management unit 153 acquires each first user information associated with the change target content ID in the access control table 70, and each user ID included in each acquired first user information, in step S43.
- the permitted user information associated with the change target content ID and the access control table 70 is updated with each user ID common to each user ID included in the acquired second user information (step S46).
- the data item of the access control table does not include information on the requesting user (that is, the owner of the content) of the content registration request.
- a user ID hereinafter referred to as “content owner information”.
- the access control processing (FIGS. 5 and 14 to 15) according to the embodiment is performed, for example, when the user ID included in the access request for a certain content permits the content. Even if it is not included in the user information, if it is included in the owner information of the content, the content to be accessed may be changed to be transmitted.
- the second user information associated with the content ID included in the received content access request in the access control table 60 includes the user ID included in the content access request. Only in this case, the processing after step S50 may be performed.
- the adjustment request (email) has been described as attaching the registered content to be processed, but it may not be attached. However, it is preferable to attach the registration target content after processing.
- step S23 if the user ID included in the access request is not included in the permitted user information for the content (step S23: NO), a message indicating that there is no access authority is uniformly transmitted to the content access request. You may make it transmit to the original terminal device (step S28).
- the registration of a new record in the personal information table 10 and the deletion of the registered record are described as being performed by the administrator of the access control apparatus according to the embodiment.
- a user registration request and a user deletion request may be changed to be added so that a person who desires user registration and deletion can perform it himself.
- the user registration request includes, among the data items set in each record of the personal information table 10, the request source user name, face image data, mail address, and first user information.
- the access control apparatus extracts an image feature parameter group (face data) from the face image data included in the received user registration request, and generates a new user ID. Then, a record including the generated user ID, the extracted face data, and the user name, mail address, and first user information included in the received user registration request is added to the personal information table 10. After adding the record, the access control apparatus according to this modification notifies the generated user ID to the mail address included in the added record.
- face data image feature parameter group
- the user deletion request includes the requesting user ID, and the access control apparatus according to this modification that has received the user deletion request implements the user ID included in the received user deletion request. Are deleted from the permitted user information in the access control table according to the form.
- the record of the personal information table 10 including the user ID included in the received user deletion request may be deleted.
- the user ID included in the received user deletion request may be deleted from the personal information owner information in the access control table according to the embodiment, and in this case, in particular, the access according to the second embodiment.
- the first user information corresponding to the personal information owner information may be deleted from the access control table 70.
- the user ID included in the received user deletion request is deleted from the personal information owner information in the access control table (60, 70).
- the permitted user information may be reset.
- the access control device has been described as detecting personal information of the user of the access control system according to the embodiment (step S2 in FIGS. 4, 13, and 18), for example, Ordinary face image templates and dictionary data such as names of people may be stored, and based on these, personal information other than the user may be detected.
- the personal information other than the user may be subjected to the mosaic processing or the prone character processing.
- steps S2 to S4 and S12 in FIG. 13 may be performed between steps S50 and S51 in FIG.
- image data, moving image data, and text data have been described as examples of registration target content.
- the registration target content may be other data, for example, audio data. It may be.
- a speech recognition process is performed on the registration target content (speech data), text data corresponding to the speech included in the registration target content is extracted, and registered in the extracted text data and personal information table 10.
- speech data text data corresponding to the speech included in the registration target content is extracted, and registered in the extracted text data and personal information table 10.
- modification is made so that the voice data of each user is registered in the personal information table 10, and the voice (personal information) of each user is detected by comparing the voice data with the content to be registered. Also good.
- the detection of the personal information included in the registration target content may be modified so as to be similarly applied to the audio data included in the moving image data.
- the received content processing unit 253 of the control unit 250 of each terminal device outputs audio to the speaker of the output unit 240.
- the content processing unit 133 has been described as performing mosaic processing and prone processing as an example of a method of processing the registration target content and the access target content, but other users than the specific user Other processes may be performed as long as the process cannot prevent the other user from being identified from the personal information.
- data (image data or text data) of a part including personal information of another user may be deleted, or, for example, a process of painting an image part including personal information of another user with black is performed.
- a process (synthesizing process) for superimposing images of a predetermined pattern for example, tile images may be performed so that an image portion including personal information of other users cannot be seen.
- the content once registered may be deleted by the owner of the content and the owner of the personal information included in the content.
- the content deletion request may be added as a command transmitted from each terminal device to the access control device according to the embodiment.
- the content deletion request is, for example, a command in which the type 41 of the content access request 40 shown in FIG. 3B is changed to “delete”.
- the access control device that has received this content deletion request, when the user ID included in the received content deletion request indicates the owner of the content or the owner of the personal information,
- the contents stored in the storage unit 120 in association with each other are deleted, and the record including the content ID is deleted from the access control table according to the embodiment.
- the user indicated by the authorized user information included in this record may be notified that the content has been deleted.
- the data item of the access control table according to the embodiment does not include the content owner information
- the data item of the access control table according to the embodiment is included so as to include the content owner information.
- the data structure needs to be changed.
- the content and the record on the access control table may be deleted in the same manner as when the content deletion request is received.
- the content owner may be notified that the content has been deleted.
- the first user information, the second user information, the permitted user information, and the personal information owner information have been described as including individual user IDs, but specific data, for example, “U0000” ”Is included, all users of the access control system according to the embodiment may be shown.
- an adjustment request is always made when there is an out-of-range user, but it is included in the content registered in the personal information table 10 without making this adjustment request.
- the permitted user information may be determined based on the first user information and the second user information regarding the owner of each personal information. As a result, it is possible to shorten the time from when the content registration request is transmitted from each terminal device to when the content is actually registered.
- an adjustment request transmission process (step S8 in FIG. 4, FIG. 14, step S13 in FIG. 18) and response are sequentially performed.
- the processing according to the contents (steps S9 and S10 in FIGS. 4 and 14 and steps S14, S10, S15 and S16 in FIG. 18) has been described.
- an adjustment request is sequentially transmitted to the owner of each personal information included in the registration target content, and each time a response to the transmitted adjustment request is received, processing corresponding to the response content is performed.
- the processing corresponding to the response content for the owners of all personal information included in the registration target content is completed, the registration processing of permitted user information (step S11 in FIG. 4, step S54 in FIG. 14). , Steps S17 and S18 in FIG. 19 may be performed.
- each terminal device (200A, 200B, and 200C) has been described as a personal computer (having a display) used by the user of the access control system 1000, but the display function on the display is provided.
- Various devices for example, battery-driven portable display terminals such as mobile phones, portable music players, digital cameras, digital video cameras, etc., and high-resolution information display devices such as televisions, digital video recorders, car navigation systems, etc.
- the display is not limited to a liquid crystal display (LCD), but may be a cathode ray tube (CRT), a PDP (plasma display panel), a flat display such as an organic EL, or a projection display represented by a projector.
- the access control device in the embodiment is typically realized as an LSI (Large Scale Integration) which is a semiconductor integrated circuit. These may be individually made into one chip, or may be made into one chip so as to include a part or all of them.
- LSI Large Scale Integration
- the name used here is LSI, but it may also be called IC, system LSI, super LSI, or ultra LSI depending on the degree of integration.
- the method of circuit integration is not limited to LSI, and may be realized by a dedicated circuit or a general-purpose processor.
- An FPGA Field Programmable Gate Array
- a reconfigurable processor that can reconfigure the connection and setting of circuit cells inside the LSI may be used.
- a CPU Central Processing Unit
- Such recording media include IC (Integrated Circuit) cards, optical disks, flexible disks, ROM (Read Only Memory), flash memory, hard disks, and the like.
- the distributed and distributed program is used by being stored in a memory or the like that can be read by the CPU in the device, and each function of the access control device described in the embodiment is executed by the CPU executing the program. Is realized.
- An access control apparatus is an access control apparatus in a system that provides a user with an access service for content, and an acquisition unit that acquires content including one or a plurality of personal information Personal information and first user information indicating a user who is determined to be permitted to access content including the personal information, or a user who is determined not to be permitted. Based on first storage information stored in association with personal information included in the content acquired by the acquisition unit, and on the basis of the first user information stored in association with the content acquired by the acquisition unit Control means.
- the content refers to information such as image data, moving image data, audio data, text data, and the like.
- Personal information refers to information related to an individual. For example, in addition to information that can identify an individual alone, information that can identify an individual in combination with other easily available information is also included. It is.
- Examples of information that can identify an individual alone include, for example, human face image data included in captured image data and moving image data, human voice data included in moving image data and audio data, Image data representing the name, address, and date of birth of a person included in the image data and moving image data, and text data representing the name, address, and date of birth of a person included in the text data.
- Examples of information that can identify an individual by combining with other information include a user ID.
- whether or not access to the content is permitted is determined by the person (owner of the personal information) related to the personal information included in the content. This is performed based on first user information indicating a user who is allowed to permit access to content including information or a user who is determined not to permit access. Therefore, according to this access control apparatus, it is possible to permit or deny access to the content reflecting the intention of the owner of the personal information included in the acquired content.
- the acquisition means indicates the content transmitted from the outside and a user who has determined that the sender of the content wants to access the content, or a user who has determined not to access the content.
- the second user information may be received, and the control unit may permit or deny access to the content based on the second user information acquired by the acquisition unit.
- this access control device determines whether the access to the content is permitted or not by the user who has transmitted the content (the owner of the content) who wants to access the content or does not want to access the content. This is also performed based on the second user information indicating the determined user. Therefore, according to this access control apparatus, it is possible to permit or deny access to the content reflecting the intention of the acquired content owner.
- the first user information is a set of user identification information determined that a person related to the corresponding personal information may permit access to the content including the personal information
- the second user information is a set of identification information of users who want the sender of the content acquired by the acquisition means to access the content
- the control means includes all users indicated by the second user information.
- access to the content acquired by the acquisition means from each user indicated by the second user information may be permitted.
- this access control device it is possible to permit access to the content to users in a range where both the content owner and the owner of the personal information included in the content agree.
- An individual related to the personal information stored by the storage means is a user of the access control device, and the control means is included in each user indicated by the second user information, and When there is an out-of-range user that is not included in each user indicated by the first user information, the user associated with the personal information stored in association with the first user information is transferred to the out-of-range user.
- this access control apparatus while respecting the intention of the owner of the personal information included in the content, the intention of the owner of the content is reflected as it is, and the user permitted to access the content is determined. can do.
- control means When the control means further receives a response from the user related to the personal information stored in association with the first user information to permit access to the out-of-range user.
- first user information may be updated so that each user indicated by the first user information includes the out-of-range user.
- this access control device When the owner of the personal information included in the content once agrees to allow access to the content by, for example, an out-of-range user A as well, this access control device The first user information corresponding to the information is updated.
- this access control apparatus for other contents including the personal information of the owner of the personal information acquired after the update, a response indicating whether or not to allow access to the user A outside the range is given. No need to request. Therefore, it is possible to reduce the processing load of the access control device and to save the trouble of re-response by the owner of the personal information.
- control means When the control means receives a response from the user related to the personal information stored in association with the first user information indicating that access to the out-of-range user is not permitted.
- the access to the content acquired by the acquisition unit from each user indicated by the second user information excluding the out-of-range user may be permitted.
- this access control apparatus it is possible to appropriately prevent a situation in which access to a user not intended by the owner of personal information is permitted while reflecting the intention of the content owner to some extent.
- the individual related to the personal information stored in the storage means is a user of the access control device, and the control means further stores the personal information in association with the personal information of the user.
- the first user information may be updated.
- each user can flexibly change the user who may be permitted to access the newly acquired content including his / her personal information in accordance with the circumstances.
- the control unit For each content acquired by the acquisition unit, the control unit further associates permitted user information indicating each user who is permitted to access the content with second user information about the content.
- the content When the first user information is updated, the content includes information indicating the updated first user information and the personal information of the requesting user of the first user information update request.
- the permitted user information for the content may be updated based on the second user information.
- the individual related to the personal information stored in the storage means is a user of the access control device, and the control means further transfers each content acquired by the acquisition means to the content.
- the permitted user information indicating each user who is permitted to access and the second user information on the content are managed in association with each other, and the user is permitted to access the content including the personal information of the user.
- the permitted user information for the content may be updated based on the information and the second user information for the content.
- the owner of personal information included in the content later prohibits or permits access to a user who has been permitted access once or who has not been permitted access to a certain content. Can do.
- each user can flexibly change the user who is permitted to access the content including his / her personal information according to the situation at that time.
- the control unit stores first user information stored in association with the personal information for each personal information. It is determined whether or not there is a user outside the range included in each user indicated by the second user information, and when there is a user outside the range, the user related to the personal information. In response to requesting a response indicating whether or not to allow access to the out-of-range user, and when there is a response indicating that access to the out-of-range user is permitted, Permit access to the content acquired by the acquisition means from each user indicated by the second user information, and do not permit access from any user to the user outside the range. When there is a response indicating, it is also possible to allow access to the contents acquisition unit has acquired from the user indicating the second user information except the range users.
- this access control device it is possible to respect the intentions of all owners of the personal information included in the content, and permit access to the content to users within the range intended by all the owners. it can.
- control unit when the control unit makes a request for the response to the user related to the personal information included in the content acquired by the acquiring unit, the control unit uses personal information other than the personal information of the user.
- the content may be processed so that related individuals cannot be identified, and the processed content may be presented to the user.
- the owner of the personal information included in the content confirms his / her own personal information included in the content, and then permits an out-of-range user to access the content. You can decide whether to agree.
- this access control device even if the content includes a plurality of pieces of personal information with different owners, a certain owner can receive the other information related to the personal information from the personal information of other owners. Content processed so that the owner cannot be identified is presented. Therefore, according to this access control device, it is possible to prevent a situation in which content is presented to a user who is not intended by the owner of other personal information.
- the individual related to the personal information stored in the storage unit is a user of the access control device, and the control unit further transfers each content acquired by the acquisition unit to the content.
- Personal information included in the content which is a user other than each user indicated by the permitted user information for the one content acquired by the acquisition means. It is also possible to allow access to the processed content that has been processed so that the related individual cannot be identified from other personal information other than the user's personal information.
- this access control device even if the owner of the content that the content owner wants to permit access does not include the owner of the personal information included in the content, the user's personal information included in the content is stored. Can be confirmed.
- this access control device even if the content includes a plurality of pieces of personal information with different owners, a certain owner can receive the other information related to the personal information from the personal information of other owners. Access to content that has been processed so that the owner cannot be identified is permitted. Therefore, according to this access control apparatus, it is possible to prevent a situation in which access to the content is permitted to a user who is not intended by the owner of other personal information.
- the acquisition unit, the storage unit, and the control unit of the access control device according to the present invention correspond to, for example, the communication unit 110, the storage unit 120, and the control unit of the access control device according to the embodiment.
- the present invention can be used for access control to contents such as image data.
- Access control device 110 100, 150 Access control device 110, 210 Communication unit 120 Storage unit 130, 151, 250 Control unit 131 Personal information detection unit 132 Determination unit 133 Content processing unit 134, 152 Adjustment unit 135, 153 Content management unit 136, 154 Personal information table Update unit 137 Access request processing unit 200 Terminal device 220 Content storage unit 230 Input unit 240 Output unit 251 Request transmission processing unit 252 Adjustment request processing unit 253 Received content processing unit 300 Internet 1000 1100 Access control system
Abstract
Description
<構成>
実施の形態1に係るアクセス制御システム1000の構成について説明する。
図1は、実施の形態1に係るアクセス制御システム1000のシステム構成図である。
まず、アクセス制御装置100の構成について説明する。
次に、端末装置200Aの構成について説明する。
以下、アクセス制御システム1000において使用されるデータについて説明する。
図2(a)は、個人情報テーブル10のデータ構成及び内容例を示す図である。
図2(b)は、アクセス制御テーブル20のデータ構成及び内容例を示す図である。
図3(a)は、コンテンツの登録要求30のデータ構成及び内容例を示す図である。
図3(b)は、コンテンツのアクセス要求40のデータ構成及び内容例を示す図である。
図3(c)は、第1ユーザ情報の変更要求50のデータ構成及び内容例を示す図である。
以下、アクセス制御装置100の動作について説明する。
図4は、アクセス制御装置100によるコンテンツの登録処理を示すフローチャートである。
図5は、アクセス制御装置100による登録済コンテンツへのアクセス制御処理を示すフローチャートである。
図6は、アクセス制御装置100による第1ユーザ情報の変更処理を示すフローチャートである。
以下、上述したアクセス制御装置100によるコンテンツの登録処理を、図7(a)に示す画像データ1を登録する場合を例にして、図4に示すフローチャートに即して説明する。
実施の形態1では、アクセス制御装置100が、コンテンツの登録要求を受信した際に、必要に応じて調整要求を行う例に説明した。
図12は、変形アクセス制御装置の記憶部120に記憶されているアクセス制御テーブル60のデータ構成及び内容例を示す図である。
以下、変形アクセス制御装置の動作を説明する。
図13は、変形アクセス制御装置によるコンテンツの登録処理を示すフローチャートである。
図14及び図15は、変形アクセス制御装置による登録済コンテンツへのアクセス制御処理を示すフローチャートである。
実施の形態1では、範囲外ユーザにアクセスさせることに、調整要求を受信したユーザが同意した場合には、このユーザの第1ユーザ情報を、この範囲外ユーザを含めるように更新するものとして説明した。
図16は、実施の形態2に係るアクセス制御システム1100のシステム構成図である。
<アクセス制御テーブル>
図17(a)は、アクセス制御テーブル70のデータ構成及び内容例を示す図である。
図17(b)は、第1ユーザ情報の変更要求55のデータ構成及び内容例を示す図である。
以下、アクセス制御装置150の動作を説明する。
図18及び図19は、アクセス制御装置150によるコンテンツの登録処理を示すフローチャートである。
図20は、アクセス制御装置150による第1ユーザ情報の変更処理を示すフローチャートである。
続いて、上記ステップS34及びステップS37で行う許可ユーザ情報の変更処理について説明する。
以上、本発明に係るアクセス制御装置を、実施の形態1、2及び変形例(以下、単に「実施の形態」ともいう)に基づいて説明したが、以下のように変形することも可能であり、本発明は実施の形態で示した通りのアクセス制御装置に限られないことは勿論である。
110、210 通信部
120 記憶部
130、151、250 制御部
131 個人情報検出部
132 判定部
133 コンテンツ加工部
134、152 調整部
135、153 コンテンツ管理部
136、154 個人情報テーブル更新部
137 アクセス要求処理部
200 端末装置
220 コンテンツ記憶部
230 入力部
240 出力部
251 要求送信処理部
252 調整要求処理部
253 受信コンテンツ処理部
300 インターネット
1000、1100 アクセス制御システム
Claims (16)
- ユーザにコンテンツへのアクセスサービスを提供するシステムにおけるアクセス制御装置であって、
1又は複数の個人情報を含むコンテンツを取得する取得手段と、
個人情報と、当該個人情報に関連する者が、当該個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザ、又は許可したくないと定めたユーザを示す第1ユーザ情報とを対応付けて記憶する記憶手段と、
前記取得手段が取得した前記コンテンツに含まれている個人情報と対応付けて記憶されている第1ユーザ情報に基づいて、当該コンテンツへのアクセスの許否を行う制御手段とを備える
ことを特徴とするアクセス制御装置。 - 前記取得手段は、
外部から送信された前記コンテンツと、当該コンテンツの送信者が当該コンテンツへアクセスさせることを希望すると定めたユーザ、又はアクセスさせないことを希望すると定めたユーザを示す第2ユーザ情報とを受信するものであり、
前記制御手段は、
前記取得手段が取得した前記第2ユーザ情報にも基づいて、前記コンテンツへのアクセスの許否を行う
ことを特徴とする請求項1記載のアクセス制御装置。 - 前記第1ユーザ情報は、対応する個人情報に関連する者が、当該個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザの識別情報の集合であり、
前記第2ユーザ情報は、前記取得手段が取得したコンテンツの送信者が当該コンテンツへアクセスさせることを希望するユーザの識別情報の集合であり、
前記制御手段は、
前記第2ユーザ情報が示す全ユーザが、前記第1ユーザ情報が示す全ユーザの中に含まれる場合に、前記第2ユーザ情報が示す各ユーザからの前記取得手段が取得したコンテンツへのアクセスを許可する
ことを特徴とする請求項2記載のアクセス制御装置。 - 前記記憶手段により記憶されている前記個人情報に関連する個人は、前記アクセス制御装置のユーザであり、
前記制御手段は、
前記第2ユーザ情報が示す各ユーザに含まれ、かつ前記第1ユーザ情報が示す各ユーザに含まれない範囲外ユーザが存在する場合には、当該第1ユーザ情報と対応付けて記憶されている個人情報に関連するユーザに対し、前記範囲外ユーザへのアクセスを許可するか否かを示す応答の要求を行い、前記範囲外ユーザへのアクセスを許可することを示す応答があったときに、前記第2ユーザ情報が示す各ユーザからの前記取得手段が取得したコンテンツへのアクセスを許可する
ことを特徴とする請求項3記載のアクセス制御装置。 - 前記制御手段は、更に
前記第1ユーザ情報と対応付けて記憶されている個人情報に関連するユーザから、前記範囲外ユーザへのアクセスを許可することを示す応答があった場合に、当該第1ユーザ情報が示す各ユーザに、前記範囲外ユーザを含めるよう当該第1ユーザ情報を更新する
ことを特徴とする請求項4記載のアクセス制御装置。 - 前記制御手段は、
前記第1ユーザ情報と対応付けて記憶されている個人情報に関連するユーザから、前記範囲外ユーザへのアクセスを許可しないことを示す応答があった場合に、当該範囲外ユーザを除く前記第2ユーザ情報が示す各ユーザからの前記取得手段が取得したコンテンツへのアクセスを許可する
ことを特徴とする請求項4記載のアクセス制御装置。 - 前記記憶手段により記憶されている前記個人情報に関連する個人は、前記アクセス制御装置のユーザであり、
前記制御手段は、更に
ユーザから、当該ユーザの個人情報と対応付けて記憶されている第1ユーザ情報の更新要求を受け付けた場合に、当該第1ユーザ情報の更新を行う
ことを特徴とする請求項3記載のアクセス制御装置。 - 前記制御手段は、更に
前記取得手段が取得した各コンテンツについて、当該コンテンツへのアクセスを許可する各ユーザを示す許可ユーザ情報と、当該コンテンツについての第2ユーザ情報とを対応付けて管理しており、
前記第1ユーザ情報の更新を行う際に、更新後の第1ユーザ情報を示す情報と、当該第1ユーザ情報の更新要求の要求元のユーザの個人情報を含むコンテンツについての第2ユーザ情報とに基づいて、当該コンテンツについての許可ユーザ情報を更新する
ことを特徴とする請求項7記載のアクセス制御装置。 - 前記記憶手段により記憶されている前記個人情報に関連する個人は、前記アクセス制御装置のユーザであり、
前記制御手段は、更に
前記取得手段が取得した各コンテンツについて、当該コンテンツへのアクセスを許可する各ユーザを示す許可ユーザ情報と、当該コンテンツについての第2ユーザ情報とを対応付けて管理しており、
ユーザから、当該ユーザの個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザを示す情報を受け付けた場合に、当該情報と、当該コンテンツについての第2ユーザ情報とに基づいて、当該コンテンツについての許可ユーザ情報を更新する
ことを特徴とする請求項3記載のアクセス制御装置。 - 前記制御手段は、
前記取得手段が取得したコンテンツに複数の個人情報が含まれている場合に、各個人情報について、当該個人情報と対応付けて記憶されている第1ユーザ情報が示す各ユーザに含まれず、かつ前記第2ユーザ情報が示す各ユーザに含まれる範囲外ユーザが存在するか否かを判定し、当該範囲外ユーザが存在するときには、当該個人情報に関連するユーザに対し、前記範囲外ユーザへのアクセスを許可するか否かを示す応答の要求を行い、
全てのユーザから、前記範囲外ユーザへのアクセスを許可することを示す応答があった場合に、前記第2ユーザ情報が示す各ユーザからの前記取得手段が取得したコンテンツへのアクセスを許可し、
いずれかのユーザから、前記範囲外ユーザへのアクセスを許可しないことを示す応答があった場合に、当該範囲外ユーザを除く前記第2ユーザ情報が示す各ユーザからの前記取得手段が取得したコンテンツへのアクセスを許可する
ことを特徴とする請求項3記載のアクセス制御装置。 - 前記制御手段は、
前記取得手段が取得したコンテンツに含まれる個人情報に関連するユーザに対し、前記応答の要求を行う場合に、当該ユーザの個人情報以外の他の個人情報から関連する個人を特定できないように当該コンテンツを加工し、加工後のコンテンツを当該ユーザに提示する
ことを特徴とする請求項10記載のアクセス制御装置。 - 前記記憶手段により記憶されている前記個人情報に関連する個人は、前記アクセス制御装置のユーザであり、
前記制御手段は、更に
前記取得手段が取得した各コンテンツについて、当該コンテンツへのアクセスを許可する各ユーザを示す許可ユーザ情報を管理しており、
前記取得手段が取得した一のコンテンツについての許可ユーザ情報が示す各ユーザ以外のユーザであって、当該コンテンツに含まれる個人情報に関連するユーザに対しては、当該コンテンツを当該ユーザの個人情報以外の他の個人情報から関連する個人を特定できないように加工した加工後のコンテンツへのアクセスを許可する
ことを特徴とする請求項3記載のアクセス制御装置。 - ユーザにコンテンツへのアクセスサービスを提供するシステムを構成するアクセス制御装置におけるアクセス制御方法であって、
1又は複数の個人情報を含むコンテンツを取得する取得ステップと、
個人情報と、当該個人情報に関連する者が、当該個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザ、又は許可したくないと定めたユーザを示す第1ユーザ情報とを対応付けて記憶する記憶ステップと、
前記取得ステップにより取得された前記コンテンツに含まれている個人情報と対応付けて記憶されている第1ユーザ情報に基づいて、当該コンテンツへのアクセスの許否を行う制御ステップとを含む
ことを特徴とするアクセス制御方法。 - ユーザにコンテンツへのアクセスサービスを提供するシステムを構成するアクセス制御装置におけるプロセッサに、アクセス制御処理を行わせるためのプログラムであって、
前記アクセス制御処理は、
1又は複数の個人情報を含むコンテンツを取得する取得ステップと、
個人情報と、当該個人情報に関連する者が、当該個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザ、又は許可したくないと定めたユーザを示す第1ユーザ情報とを対応付けて記憶する記憶ステップと、
前記取得ステップにより取得された前記コンテンツに含まれている個人情報と対応付けて記憶されている第1ユーザ情報に基づいて、当該コンテンツへのアクセスの許否を行う制御ステップとを含む
ことを特徴とするプログラム。 - ユーザにコンテンツへのアクセスサービスを提供するシステムを構成するアクセス制御装置におけるコンピュータに、アクセス制御処理を行わせるためのプログラムを記録したコンピュータ読み取り可能な記録媒体であって、
前記アクセス制御処理は、
1又は複数の個人情報を含むコンテンツを取得する取得ステップと、
個人情報と、当該個人情報に関連する者が、当該個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザ、又は許可したくないと定めたユーザを示す第1ユーザ情報とを対応付けて記憶する記憶ステップと、
前記取得ステップにより取得された前記コンテンツに含まれている個人情報と対応付けて記憶されている第1ユーザ情報に基づいて、当該コンテンツへのアクセスの許否を行う制御ステップとを含む
ことを特徴とする記録媒体。 - ユーザにコンテンツへのアクセスサービスを提供するシステムにおけるアクセス制御装置で用いられる集積回路であって、
1又は複数の個人情報を含むコンテンツを取得する取得手段と、
個人情報と、当該個人情報に関連する者が、当該個人情報を含むコンテンツへのアクセスを許可してもよいと定めたユーザ、又は許可したくないと定めたユーザを示す第1ユーザ情報とを対応付けて記憶する記憶手段と、
前記取得手段が取得した前記コンテンツに含まれている個人情報と対応付けて記憶されている第1ユーザ情報に基づいて、当該コンテンツへのアクセスの許否を行う制御手段とを備える
ことを特徴とする集積回路。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201080010016.0A CN102405475B (zh) | 2009-07-16 | 2010-07-13 | 访问控制装置、访问控制方法、程序、记录介质及集成电路 |
EP10799618.3A EP2455884B1 (en) | 2009-07-16 | 2010-07-13 | Access control device, access control method, program, storage medium, and integrated circuit |
JP2011522727A JP5475779B2 (ja) | 2009-07-16 | 2010-07-13 | アクセス制御装置、アクセス制御方法、プログラム、記録媒体及び集積回路 |
US13/148,734 US8689293B2 (en) | 2009-07-16 | 2010-07-13 | Access control device, access control method, program, storage medium, and integrated circuit |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009167399 | 2009-07-16 | ||
JP2009-167399 | 2009-07-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011007554A1 true WO2011007554A1 (ja) | 2011-01-20 |
Family
ID=43449164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/004537 WO2011007554A1 (ja) | 2009-07-16 | 2010-07-13 | アクセス制御装置、アクセス制御方法、プログラム、記録媒体及び集積回路 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8689293B2 (ja) |
EP (1) | EP2455884B1 (ja) |
JP (1) | JP5475779B2 (ja) |
CN (1) | CN102405475B (ja) |
WO (1) | WO2011007554A1 (ja) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014073171A1 (ja) * | 2012-11-06 | 2014-05-15 | パナソニック株式会社 | 公開承認依頼方法、公開承認依頼システムおよび公開承認依頼サーバ |
JP2014238635A (ja) * | 2013-06-06 | 2014-12-18 | 凸版印刷株式会社 | 情報処理サーバ、情報処理システム、および、情報処理方法 |
EP2871592A1 (en) | 2013-11-06 | 2015-05-13 | Canon Kabushiki Kaisha | Information processing apparatus, control method therefor and system |
JP2021022066A (ja) * | 2019-07-25 | 2021-02-18 | 株式会社エクサウィザーズ | 情報処理装置、情報処理システム、コンピュータプログラム及び情報処理方法 |
JP7011019B1 (ja) | 2020-10-30 | 2022-02-14 | サークレイス株式会社 | ユーザ情報管理システム、ユーザ情報管理方法及びコンピュータプログラム |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
JP5401420B2 (ja) * | 2009-09-09 | 2014-01-29 | パナソニック株式会社 | 撮像装置 |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US20160012248A1 (en) * | 2012-08-31 | 2016-01-14 | Nec Casio Mobile Communications, Ltd. | Access permission system and access permission determination method |
US10620902B2 (en) * | 2012-09-28 | 2020-04-14 | Nokia Technologies Oy | Method and apparatus for providing an indication regarding content presented to another user |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US8925037B2 (en) * | 2013-01-02 | 2014-12-30 | Symantec Corporation | Systems and methods for enforcing data-loss-prevention policies using mobile sensors |
US10929551B2 (en) * | 2013-03-13 | 2021-02-23 | Comcast Cable Communications, Llc | Methods and systems for managing data assets |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US20140283125A1 (en) * | 2013-03-15 | 2014-09-18 | Ground Six Spaceworks | Facial recognition-based information discovery |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US20140380506A1 (en) * | 2013-06-23 | 2014-12-25 | Ran Oz | Controlled distribution of a visual asset that includes images of participants |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
CN104820509A (zh) * | 2014-01-30 | 2015-08-05 | 联发科技(新加坡)私人有限公司 | 权限控制方法以及触控电子装置 |
US10681088B2 (en) * | 2015-09-30 | 2020-06-09 | International Business Machines Corporation | Data security system |
US10404697B1 (en) | 2015-12-28 | 2019-09-03 | Symantec Corporation | Systems and methods for using vehicles as information sources for knowledge-based authentication |
US10326733B2 (en) | 2015-12-30 | 2019-06-18 | Symantec Corporation | Systems and methods for facilitating single sign-on for multiple devices |
US10375114B1 (en) | 2016-06-27 | 2019-08-06 | Symantec Corporation | Systems and methods for enforcing access-control policies |
US10462184B1 (en) | 2016-06-28 | 2019-10-29 | Symantec Corporation | Systems and methods for enforcing access-control policies in an arbitrary physical space |
CN106294813A (zh) * | 2016-08-15 | 2017-01-04 | 歌尔股份有限公司 | 一种智能设备人物识别的方法和装置 |
US10469457B1 (en) | 2016-09-26 | 2019-11-05 | Symantec Corporation | Systems and methods for securely sharing cloud-service credentials within a network of computing devices |
US10812981B1 (en) | 2017-03-22 | 2020-10-20 | NortonLifeLock, Inc. | Systems and methods for certifying geolocation coordinates of computing devices |
US20200074541A1 (en) | 2018-09-05 | 2020-03-05 | Consumerinfo.Com, Inc. | Generation of data structures based on categories of matched data items |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11048549B2 (en) * | 2019-04-04 | 2021-06-29 | Google Llc | Transferral of process state and/or components in computing environments |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001005833A (ja) * | 1999-06-24 | 2001-01-12 | Sony Corp | 情報処理装置および情報処理方法、並びに記録媒体 |
JP2001325259A (ja) | 2000-05-16 | 2001-11-22 | Hitachi Ltd | デジタルアルバム登録公開方法とそのシステム及び電子サービスサイトの運営システム |
JP2003032616A (ja) * | 2001-07-17 | 2003-01-31 | Nhk Computer Service:Kk | 映像情報生成装置及び映像編集装置及び映像情報生成プログラム並びに映像編集プログラム |
JP2006146426A (ja) * | 2004-11-17 | 2006-06-08 | Nippon Telegr & Teleph Corp <Ntt> | コンテンツ管理システムにおけるコンテンツの格納方法及び公開方法並びにコンテンツ管理プログラム及び記録媒体 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6754665B1 (en) * | 1999-06-24 | 2004-06-22 | Sony Corporation | Information processing apparatus, information processing method, and storage medium |
EP1307019A1 (en) * | 2001-10-25 | 2003-05-02 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for personal information access control |
JP4206888B2 (ja) * | 2003-09-30 | 2009-01-14 | カシオ計算機株式会社 | 画像処理装置及びプログラム |
US7558408B1 (en) | 2004-01-22 | 2009-07-07 | Fotonation Vision Limited | Classification system for consumer digital images using workflow and user interface modules, and face detection and recognition |
JP4823758B2 (ja) * | 2006-04-28 | 2011-11-24 | 富士フイルム株式会社 | 画像管理サーバ |
US20080133327A1 (en) * | 2006-09-14 | 2008-06-05 | Shah Ullah | Methods and systems for securing content played on mobile devices |
JP4424364B2 (ja) * | 2007-03-19 | 2010-03-03 | ソニー株式会社 | 画像処理装置、画像処理方法 |
JP2009033738A (ja) * | 2007-07-04 | 2009-02-12 | Sanyo Electric Co Ltd | 撮像装置、画像ファイルのデータ構造 |
US8233677B2 (en) * | 2007-07-04 | 2012-07-31 | Sanyo Electric Co., Ltd. | Image sensing apparatus and image file data structure |
WO2009082814A1 (en) * | 2007-12-31 | 2009-07-09 | Ray Ganong | Method, system, and computer program for identification and sharing of digital images with face signatures |
US8788493B2 (en) * | 2008-06-30 | 2014-07-22 | Verizon Patent And Licensing Inc. | Digital image tagging apparatuses, systems, and methods |
JP5348682B2 (ja) * | 2008-11-17 | 2013-11-20 | Necビッグローブ株式会社 | 画像管理装置、その制御方法及びプログラム |
-
2010
- 2010-07-13 EP EP10799618.3A patent/EP2455884B1/en not_active Not-in-force
- 2010-07-13 WO PCT/JP2010/004537 patent/WO2011007554A1/ja active Application Filing
- 2010-07-13 CN CN201080010016.0A patent/CN102405475B/zh not_active Expired - Fee Related
- 2010-07-13 JP JP2011522727A patent/JP5475779B2/ja not_active Expired - Fee Related
- 2010-07-13 US US13/148,734 patent/US8689293B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001005833A (ja) * | 1999-06-24 | 2001-01-12 | Sony Corp | 情報処理装置および情報処理方法、並びに記録媒体 |
JP2001325259A (ja) | 2000-05-16 | 2001-11-22 | Hitachi Ltd | デジタルアルバム登録公開方法とそのシステム及び電子サービスサイトの運営システム |
JP2003032616A (ja) * | 2001-07-17 | 2003-01-31 | Nhk Computer Service:Kk | 映像情報生成装置及び映像編集装置及び映像情報生成プログラム並びに映像編集プログラム |
JP2006146426A (ja) * | 2004-11-17 | 2006-06-08 | Nippon Telegr & Teleph Corp <Ntt> | コンテンツ管理システムにおけるコンテンツの格納方法及び公開方法並びにコンテンツ管理プログラム及び記録媒体 |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014073171A1 (ja) * | 2012-11-06 | 2014-05-15 | パナソニック株式会社 | 公開承認依頼方法、公開承認依頼システムおよび公開承認依頼サーバ |
JP2014238635A (ja) * | 2013-06-06 | 2014-12-18 | 凸版印刷株式会社 | 情報処理サーバ、情報処理システム、および、情報処理方法 |
EP2871592A1 (en) | 2013-11-06 | 2015-05-13 | Canon Kabushiki Kaisha | Information processing apparatus, control method therefor and system |
US9864869B2 (en) | 2013-11-06 | 2018-01-09 | Canon Kabushiki Kaisha | Information processing apparatus configured to control access to content, control method therefor and system |
JP2021022066A (ja) * | 2019-07-25 | 2021-02-18 | 株式会社エクサウィザーズ | 情報処理装置、情報処理システム、コンピュータプログラム及び情報処理方法 |
JP7011019B1 (ja) | 2020-10-30 | 2022-02-14 | サークレイス株式会社 | ユーザ情報管理システム、ユーザ情報管理方法及びコンピュータプログラム |
WO2022091619A1 (ja) * | 2020-10-30 | 2022-05-05 | サークレイス株式会社 | ユーザ情報管理システム、ユーザ情報管理方法及びコンピュータプログラム |
JP2022073280A (ja) * | 2020-10-30 | 2022-05-17 | サークレイス株式会社 | ユーザ情報管理システム、ユーザ情報管理方法及びコンピュータプログラム |
Also Published As
Publication number | Publication date |
---|---|
EP2455884A1 (en) | 2012-05-23 |
EP2455884A4 (en) | 2013-10-02 |
CN102405475B (zh) | 2015-07-29 |
CN102405475A (zh) | 2012-04-04 |
JP5475779B2 (ja) | 2014-04-16 |
EP2455884B1 (en) | 2018-04-25 |
JPWO2011007554A1 (ja) | 2012-12-20 |
US8689293B2 (en) | 2014-04-01 |
US20110321137A1 (en) | 2011-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5475779B2 (ja) | アクセス制御装置、アクセス制御方法、プログラム、記録媒体及び集積回路 | |
US10541806B2 (en) | Authorizing account access via blinded identifiers | |
US11818253B2 (en) | Trustworthy data exchange using distributed databases | |
US7412717B2 (en) | Access control apparatus, access control method, and access control program | |
US7987140B2 (en) | Digital rights management of captured content based on criteria regulating a combination of elements | |
US8630956B2 (en) | Obscuring image of person in picture when consent to share image is denied | |
WO2017066002A1 (en) | Blockchain-based identity and transaction platform | |
US9906475B2 (en) | Information processing apparatus, communication system, non-transitory computer readable medium, and information processing method | |
US20140222695A1 (en) | Integrated authentication system using electronic contract | |
JP6796544B2 (ja) | 顔認証システム | |
CN102947809A (zh) | 信息存储装置和信息服务系统 | |
JP2006236190A (ja) | 認証出力システム、デバイス利用装置、デバイス管理装置、ネットワークデバイス、出力要求プログラムおよび出力制御プログラム、並びに認証出力方法 | |
US9224178B2 (en) | Dynamic negotiation and authorization system to record rights-managed content | |
US9086723B2 (en) | Image processing apparatus and control method for determining and associating private information with an image | |
US7242927B2 (en) | Establishing special relationships between mobile devices | |
US20150324331A1 (en) | Method and apparatus for incorporating additional content in a printed document at a time of printing | |
JP2006268628A (ja) | 出力内容承認システム、出力内容承認デバイス、出力内容承認装置および出力内容承認プログラム、並びに出力内容承認方法 | |
JP2005339205A (ja) | 個人情報管理システム | |
JP2022093095A (ja) | 管理装置、管理方法およびプログラム | |
JP2008112375A (ja) | 通信制御装置、通信制御方法 | |
JP2007102597A (ja) | 参拝サービスシステムおよび参拝管理サーバ | |
JP2004362108A (ja) | 情報提供装置、依頼管理システム、及び情報提供方法 | |
JP2013219477A (ja) | 情報処理装置 | |
JP2011134078A (ja) | データ処理システム、方法、及び、プログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080010016.0 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10799618 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 13148734 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011522727 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010799618 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |