WO2022202955A1 - Meeting recording processing device and security assurance method for meeting recording - Google Patents

Meeting recording processing device and security assurance method for meeting recording Download PDF

Info

Publication number
WO2022202955A1
WO2022202955A1 PCT/JP2022/013807 JP2022013807W WO2022202955A1 WO 2022202955 A1 WO2022202955 A1 WO 2022202955A1 JP 2022013807 W JP2022013807 W JP 2022013807W WO 2022202955 A1 WO2022202955 A1 WO 2022202955A1
Authority
WO
WIPO (PCT)
Prior art keywords
conference
data
recording
recorded
information
Prior art date
Application number
PCT/JP2022/013807
Other languages
French (fr)
Japanese (ja)
Inventor
貴之 福谷
Original Assignee
日本電気株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日本電気株式会社 filed Critical 日本電気株式会社
Priority to JP2023509274A priority Critical patent/JPWO2022202955A1/ja
Publication of WO2022202955A1 publication Critical patent/WO2022202955A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems

Definitions

  • the present invention relates to a conference recording processing device and a method of ensuring security in conference recording, which can enhance the security of a Web conference held remotely via the Internet.
  • Patent Documents 1 and 2 are known as techniques related to the recording function of such a Web conference.
  • the recording apparatus disclosed in Patent Literature 1 includes acquisition means for acquiring viewing authority for each type of image included in media data received by a receiving means based on authority information specified for each meeting; and specifying means for specifying, for each meeting, a masked area of an image to be displayed on the display unit based on the obtained viewing authority.
  • the data of the image displayed on the display unit of the conference device is recorded during the teleconference in a manner corresponding to the viewing authority of the viewer so that the data can be viewed after the teleconference ends.
  • image processing apparatus when an area to be hidden is selected by an operating means such as a mouse while viewing a photographed image displayed on a display, etc., the coordinates, shape, and characteristics of the selected area are displayed. It is stored in the feature storage means as feature information.
  • image conversion means configured by a CPU (Central Processing Unit) or the like detects a concealment area in the captured image based on the feature information stored in the feature storage means, and executes concealment processing.
  • Patent Document 2 requires a prior operation such as selecting an area to be hidden using an operating means such as a mouse, which makes the operation cumbersome.
  • the present invention has been made in view of the above-described circumstances, and provides a simple method using a policy setting table and an authority management table that define objects to be protected. It is possible to prevent the careless leakage of recordings. Accordingly, a conference recording processing apparatus and a method for ensuring security in recording a conference are provided, which can enhance security in a Web conference or the like.
  • a policy setting table for setting, in advance, information to be protected in the information included in the conference recording data of each conference, and a policy setting table that can be viewed by one or more registrants a table storage means for storing an authority management table for setting a perusal period of the conference recorded data; and the conference generated by the imaging device according to the protection object of the policy setting table stored in the table storage means. masking recorded data to generate masked recorded meeting data, and masking the masked meeting recording for the one or more registrants in accordance with the viewable period of the authority management table; and image control means for permitting or prohibiting viewing of data.
  • a policy setting table for setting information to be protected in the information included in the conference recording data of each conference is set in advance, and one or more registrants storing an authority management table for setting a viewable period of the viewable recorded meeting data, and masking the recorded meeting data in accordance with the protection object of the stored policy setting table; and permits or prohibits the one or more registrants from viewing the masked conference recorded data in accordance with the permissible viewing period of the authority management table.
  • FIG. 1 is a schematic configuration diagram showing the minimum configuration of a conference recording processing apparatus according to the present invention
  • FIG. 1 is a system configuration diagram showing a conference recording processing device according to an embodiment
  • FIG. 10 is a diagram showing a policy setting table
  • FIG. It is a figure which shows an authority management table.
  • FIG. 10 is a diagram illustrating an example of normal conference recording processing; It is a figure which shows an example of a process in the case of performing a mask process. It is a figure which shows the mask process which concerns on a modification.
  • This conference recording processing device 10 has table storage means 1 and image control means 2 .
  • the table storage means 1 predetermines the object to be protected in each meeting as a policy setting table A1, and predetermines the viewable period of conference recordings that can be viewed by registrants as an authority management table A2.
  • the protection target indicates information to be masked among the information included in the recording data of the conference recording.
  • Information to be masked includes, for example, a specific person's image, a specific person's voice, an image displayed in a meeting, and a predetermined range on the image.
  • Registrants include, for example, the host who organizes the conference, participants, viewers of conference recordings, and the like.
  • Various data settings in the policy setting table A1 and the authority management table A2 in the table storage means 1 are executed by the authority of the administrator B.
  • the administrator B has authority required for the setting processing of the policy setting table A1 and the authority management table A2. Administrator B may, for example, be the host of the conference.
  • the image control means 2 masks the recording of the meeting taken by the imaging device 3 according to the protection target of the policy setting table A1 stored in the table storage means 1, and the registrant according to the viewable period of the authority management table A2. to allow/prohibit viewing of masked meeting recordings.
  • a policy setting table A1 for setting a protection target in each conference and a conference recording that can be browsed by registrants are stored in advance. It stores an authority management table A2 for setting a period. Thereafter, the image control means 2 masks the conference recording according to the protection object of the policy setting table A1 stored in the table storage means 1, and masks the registrants according to the viewable period of the authority management table A2. Allow/prevent viewing of meeting recordings.
  • the conference recording processing apparatus 10 can easily mask the conference recording by simple operations using the policy setting table A1 and the authority management table A2 that define the objects to be protected. Careless leakage can be prevented. As a result, it is possible to enhance security in a conference such as a web conference.
  • FIG. 1 The conference recording processing apparatus GA shown in the embodiment has table storage means G1 and image control means G2, as shown in FIG.
  • the table storage means G1 predetermines a policy setting table 500 for protection targets in each meeting, and predetermines an authority management table 510 for viewing periods of conference recordings that can be viewed by registrants. This will be described later with reference to FIGS. 3 and 4.
  • FIG. Various types of data are stored in the policy setting table 500 and the authority management table 510 in the table storage means G1 under the authority of the administrator 30 and/or the conference host H.
  • the image control means G2 masks meeting recordings (including photographs and moving images) taken by the imaging devices 20 to 22 according to the protection target of the policy setting table 500 stored in the table storage means G1, and manages authority.
  • the viewers 40 registered according to the viewable period of the table 510 are permitted/prohibited from viewing the masked conference recording.
  • FIG. 3 is a diagram showing an example of the policy setting table 500.
  • the policy setting table 500 includes a conference name 50 (X conference in this example), conference participants 51 (Mr. A policy consisting of a form of recording to be saved 52, a protection setting 53, and the like is set.
  • the conference name 50 is information identifying each of a plurality of conferences.
  • the conference participants 51 are also called registrants.
  • Recording modes 52 to be saved include original recording without mask processing, masked recording with mask processing (protection recording 1 and protection recording 2 in this example), and the like.
  • As the protection setting 53 the face and voice of a specific person, and the location and character position of slide information are set as targets for mask processing.
  • the type of recording 52 indicates the type of conference recording with different protection settings 53 .
  • the protection setting 53 indicates information to be hidden or covered among image information and audio information included in the recorded data. In other words, the protection setting 53 indicates information to be concealed from viewers among image information and audio information included in the recorded data.
  • As the protection settings 53 for example, a specific person's image, a specific person's voice, a slide page displayed on the screen, a position range within the slide, and the like may be designated.
  • the policy setting table 500 in FIG. 3 shows information when the conference name 50 is the X conference, it is not limited to this example.
  • the policy setting table 500 may include information on other conference names. Alternatively, the policy setting table 500 may be generated for each meeting.
  • the policy setting table 500 may hold information on the protection setting 53 and identification information (recording form 52) of the recorded data corresponding to the protection setting 53 for a predetermined conference. In this way, the policy setting table 500 is set with the meeting name, recording identification information, and protection target information. At least one of an image of a specific person's face, a specific person's voice, and a predetermined slide position range is set as protection target information stored in the policy setting table 500 .
  • FIG. 4 is a diagram showing an example of the authority management table 510.
  • a recorded conference viewing period 62 is set for each authority 61 with the conference participants 60 as registrants.
  • Mr. A, Mr. B, Mr. C, and others (ANY) are set as the conference participants 60 .
  • the authority 61 indicates the recording authority that the conference participants 60 can view. In this example, "A can view protected recording 1" and "B can view protected recording 2". , "Mr. C can view the normal recording without mask", and "Other people cannot view the recording”.
  • permissions 61 indicate the types of recordings 52 that conference participants 60 can view.
  • the recording mode 52 is set in the policy setting table 500 in FIG. 3, for example.
  • the authority management table 510 for each registrant, a perusal period of recorded conference data after masking according to information to be protected is set.
  • the authority management table 510 of FIG. 4 has, as the authority 61, information of the conference participants 60 who are not permitted to view, in addition to the information of the conference participants 60 who have the authority to view the normal recording and the protected videos 1 and 2. .
  • the authority management table 510 does not have to hold information on the conference participants 60 who are not viewable. In this case, for example, conference participants 60 who are not registered in the authority management table 510 cannot browse.
  • the authority management table 510 of FIG. 4 has information on conference participants 60, authorities 61, and permissible viewing periods 62, but may also have conference names. Alternatively, the authority management table 510 may be generated for each conference.
  • the imaging devices 20 to 22 may be provided with dedicated cameras at the place of the meeting, or may use cameras integrally built into terminals such as PCs (Personal Computers) 400, 410 and tablets 420 that serve as display devices.
  • PCs Personal Computers
  • the image control means G2 incorporates components such as the web conference application 110, the data mask mechanism 120, the data deletion mechanism 130, the transfer processing mechanism 140, the authentication mechanism 150, the policy analysis mechanism 160, and the web conference client 450 into the host computer 100. equip.
  • the host computer 100 includes a CPU (Central Processing Unit), an IF (Interface), a communication module, a ROM (Read Only Memory), a RAM (Random Access Memory), an HDD (Hard Disk Drive), and the like. It is a computer with A communication module is hardware that controls communication with other devices.
  • the CPU of the host computer 100 is provided with a Web conference application 110, a data mask mechanism 120, a data deletion mechanism 130, a transfer processing mechanism 140, an authentication mechanism 150, and a policy analysis mechanism 160 by executing stored programs.
  • the host computer 100 also has a recorded data storage unit 200 and an authentication data storage unit 300 .
  • the recorded data storage unit 200 records, in real time, conference recording data captured by the imaging devices 20 to 22, and stores masked conference recording data obtained by masking the conference recording data.
  • the authentication data storage unit 300 stores ID (Identification) data and the like regarding conference participants (A to D) and viewers 40 .
  • the recorded data storage unit 200 and the authentication data storage unit 300 are set in, for example, an internal area of the host computer 100 or an externally attached external area. Further, in the following description, the recorded data recorded in the recorded data storage unit 200 is indicated by reference numeral 200A, and the authentication data recorded in the authentication data storage unit 300 is indicated by reference numeral 300A.
  • the authentication data 300A includes a public document such as a driver's license that identifies an individual, and passwords set by the participants (Mr. A to D) and the reader 40 corresponding to the official document.
  • the authentication data 300A may hold image data of official documents, electronic signatures, and the like.
  • the authentication data 300A holds, for example, each registrant (conference participant, viewer, etc.) in association with an ID and a set password.
  • the Web conference application 110 When receiving a notification from the conference host H, the Web conference application 110 captures the conference recording taken by the target imaging devices 20 to 22 into the recorded data storage unit 200 of the host computer 100 and stores it as image data 200A. .
  • the data masking mechanism 120 partially masks the corresponding portion of the recorded data 200A based on the analysis result of the policy analyzing mechanism 160 (described later) referring to the policy setting table 500, thereby masking the data of the corresponding portion. Browsing is prohibited.
  • the data masking mechanism 120 uses artificial intelligence (AI) technology such as voice recognition, image recognition, and natural language processing to recognize the faces and voices of pre-registered conference participants from captured images. By doing so, mask processing is applied to the corresponding portion that will be the policy in the recording.
  • AI artificial intelligence
  • the data deletion mechanism 130 deletes the video data for which the viewable period 62 (see FIG. 4) of the authority management table 510 has ended.
  • the data deletion mechanism 130 deletes the recorded data of each conference recording stored in the recorded data storage unit 200 based on the viewable period 62 .
  • the transfer processing mechanism 140 performs masking processing and decoding on the recorded data according to the viewing authority (policy setting table 500 and authority management table 510) shown in FIGS. Then, the recorded data is transferred to the viewer 40 who requested the data. For example, the transfer processing mechanism 140 encrypts the recorded data and transmits the encrypted recorded data to the terminal device of the viewer 40 .
  • the authentication mechanism 150 refers to the authority management table 510 (see FIG. 4) through the web conference client 450 when the viewer 40 requests viewing of the recorded meeting, and also refers to the authentication stored in the authentication data storage unit 300. Authentication is performed based on the data 300A, and the authority of the viewer 40 is confirmed.
  • the policy analysis mechanism 160 refers to the policy setting table 500 (see FIG. 3), notifies the data mask mechanism 120 of the masked portion of the recorded data, and puts the data mask mechanism 120 on standby for mask processing.
  • the Web conference client 450 includes conference terminals (PCs 400, 410 and tablet 420) and their imaging devices 20 to 22, and also has a function as a server for transmitting data to the host computer 100.
  • the Web conference client 450 uses a scrambled data decoding format that is difficult to restore even if it is intercepted from the outside.
  • the web conference client 450 is, for example, a computer having a configuration such as a CPU, IF, communication module, ROM, RAM, and HDD.
  • the CPU of the web conference client 450 has the functions of the web conference client 450 by executing a stored program.
  • the conference host H sends the web conference application 110 in the host computer 100 via the conference terminals (PCs 400, 410 and tablet 420) equipped with the web conference client 450, "Web conference Operation starts by setting "start”. That is, the conference host H instructs the web conference application 110 of the host computer 100 to "start the web conference” by operating the conference terminal.
  • the conference terminals PCs 400, 410 and tablet 420
  • the conference host H sets the content of the main conference to be recorded, and issues an instruction on the premise that the content of the conference will be streamed and distributed as recorded conference data at a later date. That is, the conference host H instructs the Web conference application 110 to set the recording of the conference by operating the conference terminal.
  • the conference host H sets "Web conference start" from the Web conference client 450 to the Web conference application 110, and at the same time, registers it in the policy setting table 500 and the authority management table 510. Make settings for "participation registration" for conference participants who will be The conference host H registers at least one or more participants in the web conference application 110 by operating the conference terminal.
  • the policy analysis mechanism 160 in the host computer 100 receives the setting instruction of “Web conference start” from the Web conference client 450, refers to the policy setting table 500, and uses the data mask mechanism to mask the conference recording data. 120 and stand by for processing.
  • the policy analysis mechanism 160 refers to the policy setting table 500 based on the conference participant information and acquires one or more protection settings 53 .
  • the policy analyzing mechanism 160 notifies the data masking mechanism 120 of information to be masked indicated by each protection setting 53 .
  • the policy setting table 500 includes descriptions of specific voices, slides (locations, characters), persons, and the like.
  • the data masking mechanism 120 is equipped with AI technology functions such as voice recognition technology, image recognition technology, natural language processing, etc., in order to apply this policy and extract the relevant portion of the mask processing from the meeting recording.
  • the host computer 100 that has undergone the preparation stage as described above holds a Web conference at a predetermined conference holding time.
  • the participants connect to the host computer 100 from the conference terminals (PCs 400, 410 and tablet 420) having the Web conference client 450, and participate in the established conference. participate.
  • a participant transitions to a participation state by operating the Web conference client 450 activated on the conference terminal.
  • the PCs 400, 410 and tablet 420 are used as terminals for participating in the conference, any device that can participate in the conference via the Web conference application 110, such as a mobile phone or a terminal that can be viewed with a Web browser, can be used.
  • the types of terminals participating in the conference are not limited.
  • the conference host H who has received the conference notifies the Web conference application 110 in the host computer 100 of a recording start instruction from the conference terminals 400 to 420 .
  • the conference host H instructs the Web conference application 110 to start recording by operating the Web conference client 450 .
  • the Web conference application 110 that has received the notification starts recording the recorded data 200A in the recorded data storage unit 200 of the peripheral device such as the memory storage area of the host computer 100 and the external storage.
  • the data masking mechanism 120 masking and jamming processing of the recorded data 200A.
  • the data masking mechanism 120 may perform masking and jamming processing on the recorded data during the web conference or at the end of the web conference.
  • the data masking mechanism 120 refers to the policy setting table 500 and acquires one or more recording types 52 of the target conference name 50 and protection settings 53 for the recording types 52 .
  • the data masking mechanism 120 acquires masking target information indicated by the protection settings 53 for each of the recording modes 52 .
  • the protection setting 53 includes, for example, image information of a specific person's face, specific person's voice information, and image information of a predetermined coordinate range on a predetermined page or slide displayed in a conference.
  • the data masking mechanism 120 recognizes facial images of pre-registered conference participants or voices of conference participants from recorded data by at least one of artificial intelligence techniques such as speech recognition, image recognition, and natural language processing. do.
  • the data masking mechanism 120 analyzes recorded conference data using functions of AI technology such as voice recognition technology, image recognition technology, and natural language processing.
  • the data masking mechanism 120 identifies person image information, audio information, slide image information, and the like included in the recorded data based on the analysis result.
  • the data masking mechanism 120 identifies image information and audio information to be masked from the identified information. For example, the feature amount of the face image of each person is stored in advance in the host computer 100 .
  • the data masking mechanism 120 analyzes the image information of each person included in the recorded data, and extracts the feature amount of each person's face.
  • the data masking mechanism 120 identifies the person based on the extracted facial feature amount of each person and the prestored facial feature amount of each person, and specifies the image of the person specified by the protection setting 53 .
  • the feature amount of each person's voice is stored in advance in the host computer 100 .
  • the data masking mechanism 120 analyzes the voice information of each person included in the recorded data, and extracts the feature amount of each person's voice.
  • the data masking mechanism 120 identifies the person based on the extracted feature amount of the voice of each person and the prestored feature amount of the voice of each person, and determines the voice of the person specified by the protection setting 53 . Further, for example, the data masking mechanism 120 identifies the image of the slide of the predetermined page designated by the protection setting 53 and the image of the position range on the slide among the image information of the recorded data. The data masking mechanism 120 deletes the image or audio information to be masked specified as the protection setting 53 or replaces it with other information. For example, the data masking mechanism 120 replaces image information specified as a mask target with predetermined image information. The data masking mechanism 120 deletes the audio information specified as the masking target. Alternatively, the data masking mechanism 120 may scramble the specified image information or audio information. As a result, data processing (masking) is performed so that the information to be masked in the recorded data cannot be viewed by the viewer.
  • the data masking mechanism 120 causes the recorded data storage unit 200 to store the recorded data 200A after the masking and jamming processing as masked conference recording.
  • the viewer 40 sends the recording to the Web conference application 110 through the terminal (PC 400, 410, tablet 420, etc.) equipped with the Web conference client 450. Streaming playback of data 200A can be requested.
  • the Web conference client 450 refers to the authority management table 510 through the authentication mechanism 150 , and based on the authentication data 300 A in the authentication data storage unit 300 . , and thereby the authority of the viewer 40 is confirmed.
  • the Web conference client 450 outputs to the host computer 100 a viewing request (viewing application) for the conference image (recorded data of the conference recording).
  • the viewing request includes an ID that identifies the requesting viewer 40 and authentication information.
  • the requesting viewer 40 may be, for example, a conference host, a conference participant, a person not participating in the conference, or the like.
  • the authentication mechanism 150 of the host computer refers to the authority management table 510 based on the received browsing request, and determines whether or not the browseable period applies. Specifically, the authentication mechanism 150 refers to the authority management table 510, acquires the permissible perusal period of the viewer, and determines whether or not it is included in the permissible perusal period.
  • the authentication mechanism 150 refers to the authentication data 300A based on the authentication information included in the perusal request, and performs the perusal authentication process. If the authentication succeeds, the authentication mechanism 150 determines that the viewer can view the recorded data. Note that, in the above example, the authentication mechanism 150 performs the authentication process for the viewer when the viewer is included in the permissible viewing period. However, it is not limited to this example. The authentication mechanism 150 may determine whether or not it is included in the perusal period when the authentication is successful.
  • the authenticated Web conference client 450 can partially change the masking process generated by the masking mechanism 120 according to the authority of the viewer 40 .
  • masking processing is performed for each participant (indicated by reference numeral 51) set in the policy setting table 500 (see FIG. 3), and the authority management table 510 (see FIG. 4) is masked.
  • decoding via the transfer processing mechanism 140 can be performed for a specific viewer 40, and the recorded data of the masked conference recording can be transferred. do.
  • FIG. 5A is a diagram illustrating an example of normal recording processing.
  • FIG. 5A shows an example in which, in normal recording, conference recording data D3 is created by subjecting conference recording recording data D1 to normal noise composite data processing D2.
  • the conference participants, slides (locations, characters), etc. that should be hidden can be viewed, and security is not maintained.
  • Recorded data D3 of conference recording in FIG. 5A shows recorded data (normal recording, original) when masking processing is not performed.
  • the recorded data is viewable by the participant C.
  • FIG. 5B is a diagram illustrating an example of processing when mask processing is performed.
  • noise composite data processing D5 including mask processing is performed on the recording data D4 of the conference recording, so that specific conference participants and slides (places, characters) are masked. Recorded data D6 of the recorded conference is created.
  • An example is shown in which security is greatly improved by performing masking processing based on the protection settings 53 .
  • FIGS. 5A and 5B illustrate a case where noise compound data processing is performed on photographed image data generated by an imaging device. However, it is not limited to this example. Noise composite data processing may be omitted.
  • the masking processing in the transfer processing mechanism 140 is performed by transferring one stream after decoding processing using a combination of encrypted code and non-encrypted code, transferring the field to be scrambled by detecting the field to be scrambled by the scrambler, and so on. Any technique may be used as long as the field can be restored and transferred. Therefore, the transfer processing in the transfer processing mechanism 140 is not bound by a predetermined transfer method.
  • the data deletion mechanism 130 under the Web conference application 110 makes it possible to delete the recorded data 200A when the viewing period of the authority management table 510 has expired.
  • the information to be protected in the information contained in the conference recording data of each conference is stored as the policy setting table 500 in advance.
  • an authority management table 510 is defined for the viewable period of recorded conference data that can be viewed by one or more registrants.
  • the host computer 100 serving as the image control means G2 performs mask processing on the recorded conference data generated by the imaging device according to the protection target of the policy setting table 500 stored in the table storage means G1. Generate conference recording data after mask processing.
  • the host computer 100 permits or prohibits one or more registrants from viewing the masked conference recording according to the permissible viewing period of the authority management table 510 .
  • the conference recording processing apparatus GA it is possible to easily mask conference recordings by simple operations using the policy setting table 500 and the authority management table 510 that define the objects to be protected, and to mask the conference recordings. Inadvertent leakage can be prevented, thereby enhancing security in a conference such as a web conference.
  • the conference recording processing apparatus GA can hold in advance a plurality of patterns of protection target settings with different confidential target information.
  • the conference recording processing device GA can hold a person who can view and a viewing period for a plurality of patterns of recorded data with different information to be concealed.
  • the conference recording processing device GA it is possible to prevent information leakage from recorded data and protect compliance and personal information by displaying only the information according to the authority of the user in the Web conference. .
  • the host computer 100 can automatically generate recorded data with privacy protection without the need for editing, and can delete the recorded data at an appropriate timing.
  • the conference recording processing apparatus GA can delete recorded data for which the viewable time limit has passed by referring to the authority management table 510 set in advance.
  • operation rules of the Web conference are set in the policy setting table 500 in advance as a policy. This makes it possible to appropriately change information that can be disclosed and information that cannot be disclosed even in the same meeting, based on user authority (administrator authority).
  • the host computer 100 which is the image control means G2, allows the participants 60 (see FIG. 4) set in the authority management table 510 to view the conference recording.
  • the host computer 100 performs mask processing according to the protection target of the policy setting table 500 on the conference image within a predetermined time (delay time), and then reproduces and outputs the conference image almost in real time.
  • a function may be provided.
  • noise composite data processing D8 including mask processing is performed on the recording data D7 of the conference recording, and after a delay time associated with this processing, specific conference participants , the recorded data D9 of the conference recording in which the slides (places, characters) are masked may be output and reproduced.
  • the host computer 100 performs jamming processing and noise compositing processing on the captured image data to generate recorded data D8 that is not masked.
  • the host computer 100 performs noise composition processing including jamming processing and masking processing on the photographed image data in parallel with the generation processing of the recorded data D8 to generate masked recorded data D9.
  • the host computer 100 outputs and reproduces the recorded data D8 and the recorded data D9 after the time (delay time) required for jamming processing, noise compounding processing, masking processing, and the like. In this manner, the host computer 100 performs mask processing on the recorded data based on the policy setting table 500 within a predetermined delay time to generate masked recorded data, and then reproduces the masked image data. output for As a result, in this embodiment, for example, if there are participants with different authorizations to be displayed during an online conference such as a web conference, the conference will be delayed by the processing time of the transfer mechanism, but according to the viewing authorization of the participants. It is possible to display the recorded data.
  • the present invention relates to a conference recording processing device and a method of ensuring security in conference recording, which can enhance the security of a Web conference held remotely via the Internet.

Abstract

The present invention is a meeting recording processing device comprising: a table storage means that stores, in advance, a policy setting table for setting information about protection targets for information of meeting recording data for each meeting, and a rights management table for setting the viewable period of the meeting recording data that one or multiple registrants can view; and an image control means that, according to the protection targets in the policy setting table stored in the table storage means, executes a masking process on the meeting recording data generated by an imaging device, generates meeting recording data after the masking process, and permits or forbids the one or multiple registrants to read the meeting recording data after the mask process, according to the viewable period in the rights management table.

Description

会議録画処理装置及び会議録画におけるセキュリティ確保方法CONFERENCE RECORDING PROCESSING DEVICE AND SECURITY ENSUREMENT METHOD IN CONFERENCE RECORDING
 本発明は、インターネットを介してリモートで実施されるWeb会議でのセキュリティを高めることができる、会議録画処理装置及び会議録画におけるセキュリティ確保方法に関する。 The present invention relates to a conference recording processing device and a method of ensuring security in conference recording, which can enhance the security of a Web conference held remotely via the Internet.
 近年では、デジタル化が進む中、テレワーク・リモートワークなど物理的に離れた場所での働き方が急増し、これに伴い、Web会議アプリケーションを利用したWeb会議が増加している。 In recent years, as digitization advances, working styles in physically distant locations, such as telework and remote work, have increased rapidly, and along with this, the number of web conferences using web conferencing applications has increased.
 そして、Web会議では録画機能を有するアプリケーションが多く用いられている。当該アプリケーションでは、会議記録を未参加者に後日共有できたり、会議の内容を確認したりとメリットを有する。
 その一方で、当該アプリケーションでは、会議の場で表示された企業のコンプライアンスに関わるスライド、個人情報が付与された映像録画を部分的に削除する場合に、再編集が必要となって手間がかかるという問題がある。
Many applications having a recording function are used in Web conferences. This application has merits such as being able to share the conference record with non-participants at a later date and confirming the contents of the conference.
On the other hand, with this application, if you want to partially delete the slides related to corporate compliance displayed at the meeting, or the video recordings with personal information, you need to re-edit them, which is troublesome. There's a problem.
 そして、このようなWeb会議の録画機能に関する技術として特許文献1及び2が知られている。
 特許文献1に示される記録装置は、受信手段によって受信されたメディアデータに含まれる画像の種別毎の閲覧権限を、会議毎に特定される権限情報に基づき取得する取得手段と、該取得手段によって取得された閲覧権限に基づき表示部に表示する画像のマスク領域を会議毎に特定する特定手段と、を有する。
 そして、このような記録装置では、遠隔会議中に、会議装置の表示部に表示された画像のデータを、閲覧者の閲覧権限に応じた態様で遠隔会議の終了後に閲覧できるように記録する。
Patent Documents 1 and 2 are known as techniques related to the recording function of such a Web conference.
The recording apparatus disclosed in Patent Literature 1 includes acquisition means for acquiring viewing authority for each type of image included in media data received by a receiving means based on authority information specified for each meeting; and specifying means for specifying, for each meeting, a masked area of an image to be displayed on the display unit based on the obtained viewing authority.
In such a recording device, the data of the image displayed on the display unit of the conference device is recorded during the teleconference in a manner corresponding to the viewing authority of the viewer so that the data can be viewed after the teleconference ends.
 また、特許文献2に示される画像処理装置は、ディスプレイなどに表示される撮影画像を見ながら、マウスなどの操作手段により隠ぺいしたい領域を選択した場合に、選択した領域の座標、形、特徴が特徴情報として特徴記憶手段に記憶される。
 その後、CPU(Central Processing Unit)などで構成される画像変換手段では、特徴記憶手段に記憶されている特徴情報に基づき、撮影画像に対して隠ぺい領域を検出して隠ぺい処理を実施する。
Further, in the image processing apparatus disclosed in Patent Document 2, when an area to be hidden is selected by an operating means such as a mouse while viewing a photographed image displayed on a display, etc., the coordinates, shape, and characteristics of the selected area are displayed. It is stored in the feature storage means as feature information.
After that, image conversion means configured by a CPU (Central Processing Unit) or the like detects a concealment area in the captured image based on the feature information stored in the feature storage means, and executes concealment processing.
 そして、このような画像処理装置では、テレビ電話などの画像通信端末において、目だけを隠す/部屋の様子を相手に知られないようにする/表示できない者の顔や自動車のナンバープレートを隠す、などの画像処理をすることができ、1フレームずつ編集する作業が必要でなくなるなどの利点がある。 In such an image processing apparatus, in an image communication terminal such as a videophone, only the eyes are hidden/the state of the room is hidden from the other party/the face of a person who cannot be displayed or the license plate of the vehicle is hidden. and other image processing, and there is an advantage that it is not necessary to edit each frame.
特開2014-197813号公報JP 2014-197813 A 特開2004-56488号公報JP-A-2004-56488
 しかしながら、特許文献1に示される記録装置では、操作者が事前に手動でマスキングする箇所を指定しなければならないため、会議中のリアルタイムな柔軟な変更に対応することが難しい。また、マスク処理前のストリーミングデータが流出すると、データ漏洩が発生するという問題がある。 However, with the recording device shown in Patent Document 1, since the operator must manually specify the portions to be masked in advance, it is difficult to respond flexibly to real-time changes during the meeting. In addition, there is a problem that data leakage occurs when streaming data before masking is leaked.
 また、特許文献2に示される画像処理装置では、マウスなどの操作手段により隠ぺいしたい領域を選択するなどの事前操作が必要となって、操作が面倒なものとなっていた。 In addition, the image processing apparatus disclosed in Patent Document 2 requires a prior operation such as selecting an area to be hidden using an operating means such as a mouse, which makes the operation cumbersome.
 この発明は、上述した事情に鑑みてなされたものであって、保護対象を定めるポリシー設定用テーブル及び権限管理テーブルを用いた簡易な方式によって、会議録画に容易にマスク処理を実施しかつ該会議録画の不用意な漏洩を防止することができる。これによりWeb会議等でのセキュリティを高めることができる会議録画処理装置及び会議録画におけるセキュリティ確保方法を提供する。 SUMMARY OF THE INVENTION The present invention has been made in view of the above-described circumstances, and provides a simple method using a policy setting table and an authority management table that define objects to be protected. It is possible to prevent the careless leakage of recordings. Accordingly, a conference recording processing apparatus and a method for ensuring security in recording a conference are provided, which can enhance security in a Web conference or the like.
 上記課題を解決するために、この発明は以下の手段を提案している。
 本発明の第1態様に示す会議録画処理装置では、事前に、各会議の会議録画データが有する情報における保護対象の情報を設定するポリシー設定用テーブルと、一人又は複数の登録者が閲覧可能な前記会議録画データの閲覧可能期間を設定する権限管理テーブルとを記憶するテーブル記憶手段と、該テーブル記憶手段に記憶された前記ポリシー設定用テーブルの前記保護対象に従って、撮像装置によって生成される前記会議録画データに対してマスク処理を実行してマスク処理後の会議録画データを生成するとともに、前記権限管理テーブルの前記閲覧可能期間に従って前記一人又は複数の登録者に対して前記マスク処理後の会議録画データの閲覧を許可又は禁止する画像制御手段と、を具備する。
In order to solve the above problems, the present invention proposes the following means.
In the conference recording processing apparatus according to the first aspect of the present invention, a policy setting table for setting, in advance, information to be protected in the information included in the conference recording data of each conference, and a policy setting table that can be viewed by one or more registrants a table storage means for storing an authority management table for setting a perusal period of the conference recorded data; and the conference generated by the imaging device according to the protection object of the policy setting table stored in the table storage means. masking recorded data to generate masked recorded meeting data, and masking the masked meeting recording for the one or more registrants in accordance with the viewable period of the authority management table; and image control means for permitting or prohibiting viewing of data.
 本発明の第2態様に示す会議録画における会議録画処理方法では、事前に、各会議の会議録画データが有する情報における保護対象の情報を設定するポリシー設定用テーブルと、一人又は複数の登録者が閲覧可能な前記会議録画データの閲覧可能期間を設定する権限管理テーブルを記憶し、記憶された前記ポリシー設定用テーブルの前記保護対象に従って前記会議録画データに対してマスク処理を実行してマスク処理後の会議録画データを生成するとともに、前記権限管理テーブルの前記閲覧可能期間に従って前記一人又は複数の登録者に対して前記マスク処理後の会議録画データの閲覧を許可又は禁止する。 In the conference recording processing method for conference recording according to the second aspect of the present invention, a policy setting table for setting information to be protected in the information included in the conference recording data of each conference is set in advance, and one or more registrants storing an authority management table for setting a viewable period of the viewable recorded meeting data, and masking the recorded meeting data in accordance with the protection object of the stored policy setting table; and permits or prohibits the one or more registrants from viewing the masked conference recorded data in accordance with the permissible viewing period of the authority management table.
 本発明では、保護対象を定めるポリシー設定用テーブル及び権限管理テーブルを用いた簡易な操作により、容易に会議録画にマスク処理をすることができかつ会議録画の不用意な漏洩を防止でき、これによりWeb会議でのセキュリティを高めることができる。 According to the present invention, it is possible to easily mask conference recordings and prevent inadvertent leakage of conference recordings by simple operations using a policy setting table and an authority management table that define protection targets. It is possible to enhance the security of the web conference.
本発明に係る会議録画処理装置の最小構成を示す概略構成図である。1 is a schematic configuration diagram showing the minimum configuration of a conference recording processing apparatus according to the present invention; FIG. 実施形態に係る会議録画処理装置を示すシステム構成図である。1 is a system configuration diagram showing a conference recording processing device according to an embodiment; FIG. ポリシー設定用テーブルを示す図である。FIG. 10 is a diagram showing a policy setting table; FIG. 権限管理テーブルを示す図である。It is a figure which shows an authority management table. 通常の会議録画の処理の一例を示す図である。FIG. 10 is a diagram illustrating an example of normal conference recording processing; マスク処理を行う場合の処理の一例を示す図である。It is a figure which shows an example of a process in the case of performing a mask process. 変形例に係るマスク処理を示す図である。It is a figure which shows the mask process which concerns on a modification.
 本発明に係る会議録画処理装置10の最小構成について図1を参照して説明する。
 この会議録画処理装置10は、テーブル記憶手段1及び画像制御手段2を有する。
A minimum configuration of a conference recording processing apparatus 10 according to the present invention will be described with reference to FIG.
This conference recording processing device 10 has table storage means 1 and image control means 2 .
 テーブル記憶手段1は、事前に各会議における保護対象をポリシー設定用テーブルA1として定めるとともに、登録者が閲覧可能な会議録画の閲覧可能期間を権限管理テーブルA2として定める。保護対象は、会議録画の録画データに含まれる情報のうち、マスクされる対象の情報を示す。マスクされる対象の情報は、例えば、特定人物の画像、特定人物の音声、会議内で表示される画像、画像上の所定範囲を含む。登録者は、例えば、会議を開催するホスト、参加者、会議録画の閲覧者等を含む。
 なお、テーブル記憶手段1内のポリシー設定用テーブルA1及び権限管理テーブルA2への各種データ設定は、管理者Bの権限により実行される。管理者Bは、ポリシー設定用テーブルA1及び権限管理テーブルA2の設定処理に要する権限を有する。管理者Bは、例えば、会議のホストであってもよい。
The table storage means 1 predetermines the object to be protected in each meeting as a policy setting table A1, and predetermines the viewable period of conference recordings that can be viewed by registrants as an authority management table A2. The protection target indicates information to be masked among the information included in the recording data of the conference recording. Information to be masked includes, for example, a specific person's image, a specific person's voice, an image displayed in a meeting, and a predetermined range on the image. Registrants include, for example, the host who organizes the conference, participants, viewers of conference recordings, and the like.
Various data settings in the policy setting table A1 and the authority management table A2 in the table storage means 1 are executed by the authority of the administrator B. FIG. The administrator B has authority required for the setting processing of the policy setting table A1 and the authority management table A2. Administrator B may, for example, be the host of the conference.
 画像制御手段2は、テーブル記憶手段1で記憶したポリシー設定用テーブルA1の保護対象に従って、撮像装置3で撮影した会議録画に対してマスクを入れるとともに、権限管理テーブルA2の閲覧可能期間に従って登録者に対してマスク入り会議録画の閲覧を許可/禁止する。 The image control means 2 masks the recording of the meeting taken by the imaging device 3 according to the protection target of the policy setting table A1 stored in the table storage means 1, and the registrant according to the viewable period of the authority management table A2. to allow/prohibit viewing of masked meeting recordings.
 そして、上記のような会議録画処理装置10では、まず、テーブル記憶手段1にて事前に、各会議における保護対象を設定するポリシー設定用テーブルA1と、登録者が閲覧可能な会議録画の閲覧可能期間を設定する権限管理テーブルA2とを記憶する。
 その後、画像制御手段2は、テーブル記憶手段1に記憶したポリシー設定用テーブルA1の保護対象に従って会議録画に対してマスクを入れるとともに、権限管理テーブルA2の閲覧可能期間に従い登録者に対してマスク入り会議録画の閲覧を許可/禁止する。
In the conference recording processing apparatus 10 as described above, first, in the table storage means 1, a policy setting table A1 for setting a protection target in each conference and a conference recording that can be browsed by registrants are stored in advance. It stores an authority management table A2 for setting a period.
Thereafter, the image control means 2 masks the conference recording according to the protection object of the policy setting table A1 stored in the table storage means 1, and masks the registrants according to the viewable period of the authority management table A2. Allow/prevent viewing of meeting recordings.
 これにより上記会議録画処理装置10では、保護対象を定めるポリシー設定用テーブルA1及び権限管理テーブルA2を用いた簡易な操作により、容易に会議録画にマスク処理をすることができるとともに、該会議録画の不用意な漏洩を防止することができる。これによりWeb会議等の会議でのセキュリティを高めることができる。 As a result, the conference recording processing apparatus 10 can easily mask the conference recording by simple operations using the policy setting table A1 and the authority management table A2 that define the objects to be protected. Careless leakage can be prevented. As a result, it is possible to enhance security in a conference such as a web conference.
(実施形態)
 本発明の実施形態について図2~図6を参照して説明する。
 実施形態に示す会議録画処理装置GAは、図2に示すように、テーブル記憶手段G1及び画像制御手段G2を有する。
(embodiment)
Embodiments of the present invention will be described with reference to FIGS. 2 to 6. FIG.
The conference recording processing apparatus GA shown in the embodiment has table storage means G1 and image control means G2, as shown in FIG.
 テーブル記憶手段G1は、事前に各会議における保護対象をポリシー設定用テーブル500として定めるとともに、登録者が閲覧可能な会議録画の閲覧可能期間を権限管理テーブル510として定めるものであるが、詳細については図3及び図4を参照して後述する。なお、テーブル記憶手段G1内のポリシー設定用テーブル500及び権限管理テーブル510への各種データ記憶は、管理者30及び/又は会議ホストHの権限により実行される。 The table storage means G1 predetermines a policy setting table 500 for protection targets in each meeting, and predetermines an authority management table 510 for viewing periods of conference recordings that can be viewed by registrants. This will be described later with reference to FIGS. 3 and 4. FIG. Various types of data are stored in the policy setting table 500 and the authority management table 510 in the table storage means G1 under the authority of the administrator 30 and/or the conference host H. FIG.
 画像制御手段G2は、テーブル記憶手段G1で記憶したポリシー設定用テーブル500の保護対象に従って、撮像装置20~22で撮影した会議録画(写真、動画を含む)に対してマスクを入れるとともに、権限管理テーブル510の閲覧可能期間に従って登録された閲覧者40に対して、マスク入り会議録画の閲覧を許可/禁止する。 The image control means G2 masks meeting recordings (including photographs and moving images) taken by the imaging devices 20 to 22 according to the protection target of the policy setting table 500 stored in the table storage means G1, and manages authority. The viewers 40 registered according to the viewable period of the table 510 are permitted/prohibited from viewing the masked conference recording.
 図3は、ポリシー設定用テーブル500の一例を示す図である。なお、ポリシー設定用テーブル500としては、図3に示すように、会議名50(本例ではX会議)、会議参加者51(本例では、Aさん、Bさん、Cさん、Dさん)、保存する録画の形態52及び保護設定53等からなるポリシーが設定される。会議名50は、複数の会議のそれぞれを識別する情報である。会議参加者51を、登録者とも称する。
 保存する録画の形態52としては、マスク処理しないオリジナル録画、マスク処理を施したマスク付き録画(本例では保護録画1、保護録画2)などがある。また、保護設定53としては、特定人物の顔・音声、及びスライド情報となる場所及び文字位置などがマスク処理の対象として設定される。
 録画の形態52は、保護設定53が異なる会議録画の種類を示す。保護設定53は、録画データが含む画像情報及び音声情報のうち、隠す又は覆う対象の情報を示す。換言すると、保護設定53は、録画データが含む画像情報や音声情報のうち、閲覧者から秘匿される対象の情報を示す。保護設定53として、例えば、特定人物の画像、特定人物の音声、画面上に表示されるスライドのページや、スライド内の位置範囲等が指定されてもよい。
 なお、図3のポリシー設定用テーブル500は会議名50がX会議である場合の情報を示すが、この例に限定されるものではない。ポリシー設定用テーブル500は、他の会議名の情報を含んでいてもよい。または、会議ごとに、ポリシー設定用テーブル500が生成されてもよい。
 また、図3のポリシー設定用テーブル500は、会議参加者51の情報を有するが、この例に限定されるものではない。ポリシー設定用テーブル500は、所定の会議について、保護設定53の情報と、当該保護設定53に対応する録画データの識別情報(録画の形態52)を保持していればよい。このように、ポリシー設定用テーブル500には、会議名、録画の識別情報、及び、保護対象の情報が設定される。また、ポリシー設定用テーブル500に記憶される保護対象の情報として、特定人物の顔の画像、特定人物の音声、及び所定のスライドの位置範囲の少なくとも一つが設定される。
FIG. 3 is a diagram showing an example of the policy setting table 500. As shown in FIG. As shown in FIG. 3, the policy setting table 500 includes a conference name 50 (X conference in this example), conference participants 51 (Mr. A policy consisting of a form of recording to be saved 52, a protection setting 53, and the like is set. The conference name 50 is information identifying each of a plurality of conferences. The conference participants 51 are also called registrants.
Recording modes 52 to be saved include original recording without mask processing, masked recording with mask processing (protection recording 1 and protection recording 2 in this example), and the like. As the protection setting 53, the face and voice of a specific person, and the location and character position of slide information are set as targets for mask processing.
The type of recording 52 indicates the type of conference recording with different protection settings 53 . The protection setting 53 indicates information to be hidden or covered among image information and audio information included in the recorded data. In other words, the protection setting 53 indicates information to be concealed from viewers among image information and audio information included in the recorded data. As the protection settings 53, for example, a specific person's image, a specific person's voice, a slide page displayed on the screen, a position range within the slide, and the like may be designated.
Although the policy setting table 500 in FIG. 3 shows information when the conference name 50 is the X conference, it is not limited to this example. The policy setting table 500 may include information on other conference names. Alternatively, the policy setting table 500 may be generated for each meeting.
Although the policy setting table 500 of FIG. 3 has information of the conference participants 51, it is not limited to this example. The policy setting table 500 may hold information on the protection setting 53 and identification information (recording form 52) of the recorded data corresponding to the protection setting 53 for a predetermined conference. In this way, the policy setting table 500 is set with the meeting name, recording identification information, and protection target information. At least one of an image of a specific person's face, a specific person's voice, and a predetermined slide position range is set as protection target information stored in the policy setting table 500 .
 図4は、権限管理テーブル510の一例を示す図である。権限管理テーブル510には、図4に示すように、会議参加者60を登録者として権限61毎の会議録画の閲覧可能期間62が設定される。
 なお、図4の例では、会議参加者60としてAさん、Bさん、Cさん及びその他(ANY)が設定されている。また、権限61は、会議参加者60が閲覧できる録画の権限を示すものであって、本例では、「Aさんが保護録画1を閲覧可能」、「Bさんが保護録画2を閲覧可能」、「Cさんがマスクなしの通常録画を閲覧可能」、「その他の人は録画を閲覧不可」である旨が設定されている。換言すると、権限61は、会議参加者60が閲覧可能な録画の形態52を示す。録画の形態52は、例えば、図3のポリシー設定用テーブル500で設定される。このように、権限管理テーブル510には、各登録者について、保護対象の情報に応じたマスク処理後の会議録画データの閲覧可能期間が設定される。
 なお、図4の権限管理テーブル510は、権限61として、通常録画、保護動画1、2の閲覧権限を有する会議参加者60の情報に加えて、閲覧不可である会議参加者60の情報を有する。ただし、この例に限定されるものではない。権限管理テーブル510は、閲覧不可である会議参加者60の情報を保持しなくてもよい。この場合、例えば、権限管理テーブル510に登録されていない会議参加者60は、閲覧不可である。
 図4の権限管理テーブル510は、会議参加者60、権限61、及び閲覧可能期間62の情報を有するが、さらに会議名を有してもよい。または、会議ごとに、権限管理テーブル510が生成されてもよい。
FIG. 4 is a diagram showing an example of the authority management table 510. As shown in FIG. In the authority management table 510, as shown in FIG. 4, a recorded conference viewing period 62 is set for each authority 61 with the conference participants 60 as registrants.
In the example of FIG. 4, Mr. A, Mr. B, Mr. C, and others (ANY) are set as the conference participants 60 . The authority 61 indicates the recording authority that the conference participants 60 can view. In this example, "A can view protected recording 1" and "B can view protected recording 2". , "Mr. C can view the normal recording without mask", and "Other people cannot view the recording". In other words, permissions 61 indicate the types of recordings 52 that conference participants 60 can view. The recording mode 52 is set in the policy setting table 500 in FIG. 3, for example. In this way, in the authority management table 510, for each registrant, a perusal period of recorded conference data after masking according to information to be protected is set.
Note that the authority management table 510 of FIG. 4 has, as the authority 61, information of the conference participants 60 who are not permitted to view, in addition to the information of the conference participants 60 who have the authority to view the normal recording and the protected videos 1 and 2. . However, it is not limited to this example. The authority management table 510 does not have to hold information on the conference participants 60 who are not viewable. In this case, for example, conference participants 60 who are not registered in the authority management table 510 cannot browse.
The authority management table 510 of FIG. 4 has information on conference participants 60, authorities 61, and permissible viewing periods 62, but may also have conference names. Alternatively, the authority management table 510 may be generated for each conference.
 また、撮像装置20~22は会議の場所に専用のカメラを設けても良いし、表示装置となるPC(Personal Computer)400,410及びタブレット420等の端末に一体に内蔵されるカメラを利用しても良い。 In addition, the imaging devices 20 to 22 may be provided with dedicated cameras at the place of the meeting, or may use cameras integrally built into terminals such as PCs (Personal Computers) 400, 410 and tablets 420 that serve as display devices. can be
 次に、会議録画処理装置GAの画像制御手段G2について図2を参照して説明する。この画像制御手段G2は、Web会議アプリケーション110、データマスク機構120、データ削除機構130、転送処理機構140、認証機構150、ポリシー解析機構160及びWeb会議クライアント450といった構成要素を、ホスト計算機100内に具備する。
 ホスト計算機100は、図示していないが、CPU(Central Processing Unit)、IF(Interface)、通信モジュール、ROM(Read Only Memory)、RAM(Random Access Memory)、HDD(Hard Disk Drive)などの構成を備えたコンピュータである。通信モジュールは他装置と通信を制御するハードウェアである。ホスト計算機100のCPUは、記憶するプログラムを実行することにより、Web会議アプリケーション110、データマスク機構120、データ削除機構130、転送処理機構140、認証機構150、及びポリシー解析機構160を備える。
 また、このホスト計算機100は、録画データ記憶部200、及び認証データ記憶部300を有する。録画データ記憶部200は、撮像装置20~22で撮影した会議録画の録画データをリアルタイムで記録するとともに、会議録画の録画データにマスク処理を施したマスク入り会議録画の録画データを記憶する。認証データ記憶部300は、会議参加者(A~Dさん)や閲覧者40に関するID(Identification)データ等を記憶する。
Next, the image control means G2 of the conference recording processor GA will be described with reference to FIG. The image control means G2 incorporates components such as the web conference application 110, the data mask mechanism 120, the data deletion mechanism 130, the transfer processing mechanism 140, the authentication mechanism 150, the policy analysis mechanism 160, and the web conference client 450 into the host computer 100. equip.
Although not shown, the host computer 100 includes a CPU (Central Processing Unit), an IF (Interface), a communication module, a ROM (Read Only Memory), a RAM (Random Access Memory), an HDD (Hard Disk Drive), and the like. It is a computer with A communication module is hardware that controls communication with other devices. The CPU of the host computer 100 is provided with a Web conference application 110, a data mask mechanism 120, a data deletion mechanism 130, a transfer processing mechanism 140, an authentication mechanism 150, and a policy analysis mechanism 160 by executing stored programs.
The host computer 100 also has a recorded data storage unit 200 and an authentication data storage unit 300 . The recorded data storage unit 200 records, in real time, conference recording data captured by the imaging devices 20 to 22, and stores masked conference recording data obtained by masking the conference recording data. The authentication data storage unit 300 stores ID (Identification) data and the like regarding conference participants (A to D) and viewers 40 .
 なお、これら録画データ記憶部200及び認証データ記憶部300は、例えば、ホスト計算機100の内部領域又は外付けされた外部領域に設定される。
 また、以下の説明において、録画データ記憶部200に記録される録画データを符号200Aで示し、認証データ記憶部300に記録される認証データを符号300Aで示す。また、認証データ300Aは、免許書などの個人を特定する公的書類とともに、当該公的書類に対応した参加者(A~Dさん)及び閲覧者40による設定パスワードなどを含む。認証データ300Aは、公的書類の画像データ、電子署名等を保持してもよい。認証データ300Aは、例えば、各登録者(会議参加者、閲覧者等)について、IDと設定パスワードとを関連付けて保持する。
Note that the recorded data storage unit 200 and the authentication data storage unit 300 are set in, for example, an internal area of the host computer 100 or an externally attached external area.
Further, in the following description, the recorded data recorded in the recorded data storage unit 200 is indicated by reference numeral 200A, and the authentication data recorded in the authentication data storage unit 300 is indicated by reference numeral 300A. In addition, the authentication data 300A includes a public document such as a driver's license that identifies an individual, and passwords set by the participants (Mr. A to D) and the reader 40 corresponding to the official document. The authentication data 300A may hold image data of official documents, electronic signatures, and the like. The authentication data 300A holds, for example, each registrant (conference participant, viewer, etc.) in association with an ID and a set password.
 Web会議アプリケーション110は、会議ホストHからの通知を受けた場合に、ホスト計算機100の録画データ記憶部200に、対象となる撮像装置20~22で撮影した会議録画を取り込み画像データ200Aとして記憶させる。
 データマスク機構120は、ポリシー設定用テーブル500を参照したポリシー解析機構160(後述する)の解析結果に基づき、録画データ200Aの該当箇所に部分的にマスク掛けをすることで、該当箇所のデータを閲覧不可とする。
 なお、このデータマスク機構120は、音声認識、画像認識、自然言語処理等の人工知能(Artificial Intelligence:AI)技術により、撮影画像の中から、予め登録した会議参加者の顔・音声等を認識することで、録画内のポリシーとなる該当箇所にマスク処理を施す。
When receiving a notification from the conference host H, the Web conference application 110 captures the conference recording taken by the target imaging devices 20 to 22 into the recorded data storage unit 200 of the host computer 100 and stores it as image data 200A. .
The data masking mechanism 120 partially masks the corresponding portion of the recorded data 200A based on the analysis result of the policy analyzing mechanism 160 (described later) referring to the policy setting table 500, thereby masking the data of the corresponding portion. Browsing is prohibited.
The data masking mechanism 120 uses artificial intelligence (AI) technology such as voice recognition, image recognition, and natural language processing to recognize the faces and voices of pre-registered conference participants from captured images. By doing so, mask processing is applied to the corresponding portion that will be the policy in the recording.
 データ削除機構130は、権限管理テーブル510の閲覧可能期間62(図4参照)を全て終了した動画データを削除する。データ削除機構130は、録画データ記憶部200に記憶された各会議録画の録画データを、閲覧可能期間62に基づいて削除する。
 転送処理機構140は、図3及び図4に示す閲覧権限(ポリシー設定用テーブル500及び権限管理テーブル510)に応じた録画データへのマスキング処理、デコードを実施した上で、Web会議クライアント450に対して、データ要求があった閲覧者40に録画データを転送させる。例えば、転送処理機構140は、録画データを暗号化して、暗号化処理後の録画データを閲覧者40の端末装置に送信する。
The data deletion mechanism 130 deletes the video data for which the viewable period 62 (see FIG. 4) of the authority management table 510 has ended. The data deletion mechanism 130 deletes the recorded data of each conference recording stored in the recorded data storage unit 200 based on the viewable period 62 .
The transfer processing mechanism 140 performs masking processing and decoding on the recorded data according to the viewing authority (policy setting table 500 and authority management table 510) shown in FIGS. Then, the recorded data is transferred to the viewer 40 who requested the data. For example, the transfer processing mechanism 140 encrypts the recorded data and transmits the encrypted recorded data to the terminal device of the viewer 40 .
 認証機構150は、閲覧者40から会議録画の閲覧申請があった場合に、Web会議クライアント450を通じて権限管理テーブル510(図4参照)を参照するとともに、認証データ記憶部300内に記憶される認証データ300Aを元に認証を行い、当該閲覧者40の権限を確認する。
 ポリシー解析機構160は、ポリシー設定用テーブル500(図3参照)を参照し、録画データのマスク部分をデータマスク機構120に通知し、データマスク機構120でのマスク処理のスタンバイを行う。
The authentication mechanism 150 refers to the authority management table 510 (see FIG. 4) through the web conference client 450 when the viewer 40 requests viewing of the recorded meeting, and also refers to the authentication stored in the authentication data storage unit 300. Authentication is performed based on the data 300A, and the authority of the viewer 40 is confirmed.
The policy analysis mechanism 160 refers to the policy setting table 500 (see FIG. 3), notifies the data mask mechanism 120 of the masked portion of the recorded data, and puts the data mask mechanism 120 on standby for mask processing.
 Web会議クライアント450は、会議用端末(PC400,410及びタブレット420)及びその撮像装置20~22を含んでおり、ホスト計算機100にデータ送信するサーバとしての機能も有する。
 なお、Web会議クライアント450では、スクランブルデータ・デコード形式により、外部から傍受された場合でも復元が難しい通信手段が用いられる。
 Web会議クライアント450は、例えば、CPU、IF、通信モジュール、ROM、RAM、HDDなどの構成を備えたコンピュータである。Web会議クライアント450のCPUは、記憶するプログラムを実行することにより、Web会議クライアント450の機能を備える。
The Web conference client 450 includes conference terminals ( PCs 400, 410 and tablet 420) and their imaging devices 20 to 22, and also has a function as a server for transmitting data to the host computer 100. FIG.
The Web conference client 450 uses a scrambled data decoding format that is difficult to restore even if it is intercepted from the outside.
The web conference client 450 is, for example, a computer having a configuration such as a CPU, IF, communication module, ROM, RAM, and HDD. The CPU of the web conference client 450 has the functions of the web conference client 450 by executing a stored program.
《実施形態の動作説明》
 次に、図2に示す会議録画処理装置GAの動作について順に説明する。
 会議録画処理装置GAでは、まず、会議ホストHが、Web会議クライアント450を備えた会議用端末(PC400,410及びタブレット420)を通じて、ホスト計算機100内のWeb会議アプリケーション110に対して、「Web会議開始」を設定することで動作が始まる。すなわち、会議ホストHは、会議用端末を操作することで、「Web会議開始」をホスト計算機100のWeb会議アプリケーション110に指示する。
<<Explanation of operation of the embodiment>>
Next, the operation of the conference recording processing device GA shown in FIG. 2 will be described in order.
In the conference recording processing device GA, first, the conference host H sends the web conference application 110 in the host computer 100 via the conference terminals ( PCs 400, 410 and tablet 420) equipped with the web conference client 450, "Web conference Operation starts by setting "start". That is, the conference host H instructs the web conference application 110 of the host computer 100 to "start the web conference" by operating the conference terminal.
 その際に、会議ホストHは、本会議内容を録画設定し、後日、会議録画データとしてストリーミング配信など展開を行うことを前提とした指示を出す。すなわち、会議ホストHは、会議用端末を操作することで、会議の録画に係る設定を、Web会議アプリケーション110に指示する。
 このとき、会議ホストHは、Web会議の設定時に、Web会議クライアント450からWeb会議アプリケーション110に対して「Web会議開始」の設定を行うと同時に、ポリシー設定用テーブル500及び権限管理テーブル510に登録される会議参加者の「参加登録」の設定を行う。会議ホストHは、会議用端末を操作することで、少なくとも一人以上の参加者を、Web会議アプリケーション110に登録する。
At that time, the conference host H sets the content of the main conference to be recorded, and issues an instruction on the premise that the content of the conference will be streamed and distributed as recorded conference data at a later date. That is, the conference host H instructs the Web conference application 110 to set the recording of the conference by operating the conference terminal.
At this time, when setting up the Web conference, the conference host H sets "Web conference start" from the Web conference client 450 to the Web conference application 110, and at the same time, registers it in the policy setting table 500 and the authority management table 510. Make settings for "participation registration" for conference participants who will be The conference host H registers at least one or more participants in the web conference application 110 by operating the conference terminal.
 そして、ホスト計算機100内のポリシー解析機構160は、Web会議クライアント450からの「Web会議開始」の設定指示を受けて、ポリシー設定用テーブル500を参照し、会議録画データのマスク部分をデータマスク機構120に通知し、処理のスタンバイを行う。ポリシー解析機構160は、会議参加者の情報に基づいてポリシー設定用テーブル500を参照し、1つ又は複数の保護設定53を取得する。ポリシー解析機構160は、各保護設定53が示すマスク対象の情報をデータマスク機構120に通知する。
 ここで、前述したようにポリシー設定用テーブル500には、特定の音声、スライド(場所、文字)、人物などの記載がある。このため、データマスク機構120には、本ポリシーを適用して会議録画からマスク処理の該当箇所を抽出するために音声認識技術、画像認識技術、自然言語処理等、AI技術の機能が備えられている。
Then, the policy analysis mechanism 160 in the host computer 100 receives the setting instruction of “Web conference start” from the Web conference client 450, refers to the policy setting table 500, and uses the data mask mechanism to mask the conference recording data. 120 and stand by for processing. The policy analysis mechanism 160 refers to the policy setting table 500 based on the conference participant information and acquires one or more protection settings 53 . The policy analyzing mechanism 160 notifies the data masking mechanism 120 of information to be masked indicated by each protection setting 53 .
Here, as described above, the policy setting table 500 includes descriptions of specific voices, slides (locations, characters), persons, and the like. For this reason, the data masking mechanism 120 is equipped with AI technology functions such as voice recognition technology, image recognition technology, natural language processing, etc., in order to apply this policy and extract the relevant portion of the mask processing from the meeting recording. there is
 そして、以上のような準備段階を経たホスト計算機100では、予め定めた会議開催時間になると、Web会議を開催する。
 これと並行して参加者(図2では、Aさん、Bさん)は、Web会議クライアント450を有する会議用端末(PC400,410及びタブレット420)からホスト計算機100に接続し、開設された会議に参加する。参加者は、会議用端末で起動しているWeb会議クライアント450を操作することで、参加状態に移行する。
 なお、会議に参加する端末としてPC400,410及びタブレット420を例に上げたが、モバイルフォン、Webブラウザで閲覧可能な端末など、Web会議アプリケーション110を介して会議参加可能な機器であればよい。会議に参加する端末の種類は制限されない。
Then, the host computer 100 that has undergone the preparation stage as described above holds a Web conference at a predetermined conference holding time.
In parallel with this, the participants (Mr. A and Ms. B in FIG. 2) connect to the host computer 100 from the conference terminals ( PCs 400, 410 and tablet 420) having the Web conference client 450, and participate in the established conference. participate. A participant transitions to a participation state by operating the Web conference client 450 activated on the conference terminal.
Although the PCs 400, 410 and tablet 420 are used as terminals for participating in the conference, any device that can participate in the conference via the Web conference application 110, such as a mobile phone or a terminal that can be viewed with a Web browser, can be used. The types of terminals participating in the conference are not limited.
 その後、会議開催を受けた会議ホストHは、会議用端末400~420から録画の開始指示をホスト計算機100内のWeb会議アプリケーション110に通知する。会議ホストHは、Web会議クライアント450を操作することによって、録画の開始を、Web会議アプリケーション110に対して指示する。
 通知を受けたWeb会議アプリケーション110は、ホスト計算機100の記憶格納領域及び外付けストレージなどの周辺機器の録画データ記憶部200内への、録画データ200Aの記録を開始する。
 また、このWeb会議アプリケーション110は、Web会議中又はWeb会議終了時に、会議ホストH又は参加者からの録画終了指示を受けた場合に、Web会議の録画を終了した後、データマスク機構120に対して録画データ200Aのマスキング及びジャミング処理を行わせる。
 なお、データマスク機構120は、録画データに対するマスキング及びジャミング処理を、Web会議中に実施してもよいし、Web会議終了時に実施してもよい。
 データマスク機構120は、ポリシー設定用テーブル500を参照し、対象の会議名50の一つ又は複数の録画の形態52、及び当該録画の形態52の保護設定53を取得する。データマスク機構120は、録画の形態52それぞれについて、保護設定53が示すマスクする対象の情報を取得する。保護設定53は、例えば、特定の人物の顔の画像情報、特定の人物の音声情報、会議内で表示されるスライドの所定ページ又はスライド上の所定の座標範囲の画像情報を含む。
 データマスク機構120は、音声認識、画像認識、自然言語処理の少なくともいずれかの人工知能技術により、録画データの中から、予め登録した会議参加者の顔の画像、又は会議参加者の音声を認識する。データマスク機構120は、音声認識技術、画像認識技術、自然言語処理等、AI技術の機能を用いて、会議の録画データを解析する。データマスク機構120は、解析結果に基づいて、録画データが含む人物の画像情報、音声情報、スライドの画像情報等を識別する。データマスク機構120は、識別した情報のうち、マスク対象の画像情報、及び音声情報を特定する。
 例えば、各人物の顔の画像の特徴量が予めホスト計算機100に格納される。データマスク機構120は、録画データが有する各人物の画像情報を解析し、各人物の顔の特徴量を抽出する。データマスク機構120は、抽出した人物の顔の特徴量と、予め保持する各人物の顔の特徴量とに基づいて人物を識別し、保護設定53で指定される人物の画像を特定する。
 例えば、各人物の音声の特徴量が予めホスト計算機100に格納される。例えば、データマスク機構120は、録画データが有する各人物の音声情報を解析し、各人物の音声の特徴量を抽出する。データマスク機構120は、抽出した人物の音声の特徴量と、予め保持する各人物の音声の特徴量とに基づいて人物を識別し、保護設定53で指定される人物の音声を判定する。
 また、例えば、データマスク機構120は、録画データが有する画像情報のうち、保護設定53で指定される所定ページのスライドの画像や、当該スライド上の位置範囲の画像を特定する。
 データマスク機構120は、保護設定53として指定されたマスク対象の画像又は音声の情報の削除、又は他の情報への置き換え処理を行う。例えば、データマスク機構120は、マスク対象として特定した画像情報を所定の画像情報に差し替える。データマスク機構120は、マスク対象として特定した音声情報を削除する。または、データマスク機構120は、特定した画像情報や音声情報に対してスクランブル処理を実施してもよい。これにより、録画データ内のマスク対象の情報が視聴者にとって閲覧不可な状態にデータ処理(マスク処理)される。
After that, the conference host H who has received the conference notifies the Web conference application 110 in the host computer 100 of a recording start instruction from the conference terminals 400 to 420 . The conference host H instructs the Web conference application 110 to start recording by operating the Web conference client 450 .
The Web conference application 110 that has received the notification starts recording the recorded data 200A in the recorded data storage unit 200 of the peripheral device such as the memory storage area of the host computer 100 and the external storage.
In addition, when the Web conference application 110 receives a recording end instruction from the conference host H or a participant during the Web conference or at the end of the Web conference, after finishing the recording of the Web conference, the data masking mechanism 120 masking and jamming processing of the recorded data 200A.
Note that the data masking mechanism 120 may perform masking and jamming processing on the recorded data during the web conference or at the end of the web conference.
The data masking mechanism 120 refers to the policy setting table 500 and acquires one or more recording types 52 of the target conference name 50 and protection settings 53 for the recording types 52 . The data masking mechanism 120 acquires masking target information indicated by the protection settings 53 for each of the recording modes 52 . The protection setting 53 includes, for example, image information of a specific person's face, specific person's voice information, and image information of a predetermined coordinate range on a predetermined page or slide displayed in a conference.
The data masking mechanism 120 recognizes facial images of pre-registered conference participants or voices of conference participants from recorded data by at least one of artificial intelligence techniques such as speech recognition, image recognition, and natural language processing. do. The data masking mechanism 120 analyzes recorded conference data using functions of AI technology such as voice recognition technology, image recognition technology, and natural language processing. The data masking mechanism 120 identifies person image information, audio information, slide image information, and the like included in the recorded data based on the analysis result. The data masking mechanism 120 identifies image information and audio information to be masked from the identified information.
For example, the feature amount of the face image of each person is stored in advance in the host computer 100 . The data masking mechanism 120 analyzes the image information of each person included in the recorded data, and extracts the feature amount of each person's face. The data masking mechanism 120 identifies the person based on the extracted facial feature amount of each person and the prestored facial feature amount of each person, and specifies the image of the person specified by the protection setting 53 .
For example, the feature amount of each person's voice is stored in advance in the host computer 100 . For example, the data masking mechanism 120 analyzes the voice information of each person included in the recorded data, and extracts the feature amount of each person's voice. The data masking mechanism 120 identifies the person based on the extracted feature amount of the voice of each person and the prestored feature amount of the voice of each person, and determines the voice of the person specified by the protection setting 53 .
Further, for example, the data masking mechanism 120 identifies the image of the slide of the predetermined page designated by the protection setting 53 and the image of the position range on the slide among the image information of the recorded data.
The data masking mechanism 120 deletes the image or audio information to be masked specified as the protection setting 53 or replaces it with other information. For example, the data masking mechanism 120 replaces image information specified as a mask target with predetermined image information. The data masking mechanism 120 deletes the audio information specified as the masking target. Alternatively, the data masking mechanism 120 may scramble the specified image information or audio information. As a result, data processing (masking) is performed so that the information to be masked in the recorded data cannot be viewed by the viewer.
 そして、データマスク機構120は、マスキング及びジャミング処理を行った後の録画データ200Aを、マスク付き会議録画として録画データ記憶部200に記憶させる。その後、マスク付き会議録画が録画データ記憶部200に記憶された場合には、Web会議クライアント450を備える端末(PC400,410及びタブレット420など)を通じて、閲覧者40によりWeb会議アプリケーション110に対し、録画データ200Aのストリーミング再生が要求可能となる。
 そして、Web会議クライアント450は、閲覧者40から会議画像の閲覧要求が出された場合に、認証機構150を通じて権限管理テーブル510を参照した上で、認証データ記憶部300内の認証データ300Aを元に認証を行い、これにより当該閲覧者40の権限を確認する。
 Web会議クライアント450は、会議画像(会議録画の録画データ)の閲覧要求(閲覧申請)をホスト計算機100に出力する。閲覧要求は、要求元の閲覧者40を識別するID、及び認証情報を含む。要求元の閲覧者40は、例えば、会議のホスト、会議参加者、会議に参加していない人物等である。
 ホスト計算機の認証機構150は、受信した閲覧要求に基づいて権限管理テーブル510を参照し、閲覧可能期間に該当するか否かを判定する。具体的には、認証機構150は、権限管理テーブル510を参照し、閲覧者の閲覧可能期間を取得し、閲覧可能期間に含まれるか否かを判定する。閲覧可能期間に含まれる場合、認証機構150は、閲覧要求が含む認証情報に基づいて認証データ300Aを参照し、閲覧者の認証処理を行う。認証に成功した場合、認証機構150は、閲覧者が録画データを閲覧可能である旨、判定する。
 なお、上記の例では、認証機構150は、閲覧者について、閲覧可能期間に含まれる場合に認証処理を行う。しかしながら、この例に限定されるものではない。認証機構150は認証に成功した場合に、閲覧可能期間に含まれるか否かを判定してもよい。
Then, the data masking mechanism 120 causes the recorded data storage unit 200 to store the recorded data 200A after the masking and jamming processing as masked conference recording. After that, when the masked meeting recording is stored in the recorded data storage unit 200, the viewer 40 sends the recording to the Web conference application 110 through the terminal ( PC 400, 410, tablet 420, etc.) equipped with the Web conference client 450. Streaming playback of data 200A can be requested.
Then, when the viewer 40 issues a conference image viewing request, the Web conference client 450 refers to the authority management table 510 through the authentication mechanism 150 , and based on the authentication data 300 A in the authentication data storage unit 300 . , and thereby the authority of the viewer 40 is confirmed.
The Web conference client 450 outputs to the host computer 100 a viewing request (viewing application) for the conference image (recorded data of the conference recording). The viewing request includes an ID that identifies the requesting viewer 40 and authentication information. The requesting viewer 40 may be, for example, a conference host, a conference participant, a person not participating in the conference, or the like.
The authentication mechanism 150 of the host computer refers to the authority management table 510 based on the received browsing request, and determines whether or not the browseable period applies. Specifically, the authentication mechanism 150 refers to the authority management table 510, acquires the permissible perusal period of the viewer, and determines whether or not it is included in the permissible perusal period. If it is included in the perusal period, the authentication mechanism 150 refers to the authentication data 300A based on the authentication information included in the perusal request, and performs the perusal authentication process. If the authentication succeeds, the authentication mechanism 150 determines that the viewer can view the recorded data.
Note that, in the above example, the authentication mechanism 150 performs the authentication process for the viewer when the viewer is included in the permissible viewing period. However, it is not limited to this example. The authentication mechanism 150 may determine whether or not it is included in the perusal period when the authentication is successful.
 さらに、認証が完了したWeb会議クライアント450は、閲覧者40の権限に応じてマスキング機構120によって生成されたマスキング処理を部分変更可能とする。
 具体的には、Web会議クライアント450では、ポリシー設定用テーブル500(図3参照)に設定された参加者(符号51で示す)別のマスキング処理を実施し、権限管理テーブル510(図4参照)に設定された参加者(符号60で示す)の閲覧権限に基づき、特定の閲覧者40に対して転送処理機構140を介したデコードを実施して、マスク付き会議録画の録画データを転送可能とする。
Furthermore, the authenticated Web conference client 450 can partially change the masking process generated by the masking mechanism 120 according to the authority of the viewer 40 .
Specifically, in the Web conference client 450, masking processing is performed for each participant (indicated by reference numeral 51) set in the policy setting table 500 (see FIG. 3), and the authority management table 510 (see FIG. 4) is masked. Based on the viewing authority of the participant (indicated by reference numeral 60) set in , decoding via the transfer processing mechanism 140 can be performed for a specific viewer 40, and the recorded data of the masked conference recording can be transferred. do.
 図5Aは、通常録画の処理の一例を示す図である。例えば、図5Aには、通常録画において、会議録画の録画データD1に通常のノイズ複合データ処理D2を行って会議録画の録画データD3を作成した例が示されている。この例では、作成された会議録画の録画データD3でのマスク処理が行われていないので、隠すべき会議参加者、スライド(場所、文字)などが閲覧可能であり、セキュリティが保たれていない。図5Aの会議録画の録画データD3は、マスキング処理が行われていない場合の録画データ(通常録画、オリジナル)を示す。例えば、図3のポリシー設定用テーブル500の場合、参加者Cが閲覧可能な録画データである。
 図5Bは、マスク処理を行う場合の処理の一例を示す図である。マスク処理が施される場合、図5Bによると、会議録画の録画データD4にマスク処理を含むノイズ複合データ処理D5がなされることで、特定の会議参加者、スライド(場所、文字)にマスクが掛けられた会議録画の録画データD6が作成される。保護設定53に基づくマスキング処理が行われたことで、セキュリティが大幅に向上した例が示されている。
 なお、図5A、図5Bは、撮影装置によって生成された撮影画像データに対して、ノイズ複合データ処理を行う場合を例示する。ただし、この例に限定されるものではない。ノイズ複合データ処理は省略されてもよい。
FIG. 5A is a diagram illustrating an example of normal recording processing. For example, FIG. 5A shows an example in which, in normal recording, conference recording data D3 is created by subjecting conference recording recording data D1 to normal noise composite data processing D2. In this example, since mask processing is not performed on the recording data D3 of the created conference recording, the conference participants, slides (locations, characters), etc. that should be hidden can be viewed, and security is not maintained. Recorded data D3 of conference recording in FIG. 5A shows recorded data (normal recording, original) when masking processing is not performed. For example, in the case of the policy setting table 500 in FIG. 3, the recorded data is viewable by the participant C.
FIG. 5B is a diagram illustrating an example of processing when mask processing is performed. When mask processing is performed, according to FIG. 5B, noise composite data processing D5 including mask processing is performed on the recording data D4 of the conference recording, so that specific conference participants and slides (places, characters) are masked. Recorded data D6 of the recorded conference is created. An example is shown in which security is greatly improved by performing masking processing based on the protection settings 53 .
Note that FIGS. 5A and 5B illustrate a case where noise compound data processing is performed on photographed image data generated by an imaging device. However, it is not limited to this example. Noise composite data processing may be omitted.
 なお、転送処理機構140におけるマスキング処理は、一つのストリームを暗号コードと非暗号コードの組み合わせによるデコード処理後に転送、スクランブルすべきフィールドをスクランブラーが検出して転送、など、当該発明における復元すべきフィールドを復元し転送可能な技術であればよい。このため、転送処理機構140における転送処理は、所定の転送方式に縛られない。
 また、Web会議アプリケーション110下にあるデータ削除機構130では、権限管理テーブル510の閲覧期間を超過した場合に、録画データ200Aを消去することを可能とする。
The masking processing in the transfer processing mechanism 140 is performed by transferring one stream after decoding processing using a combination of encrypted code and non-encrypted code, transferring the field to be scrambled by detecting the field to be scrambled by the scrambler, and so on. Any technique may be used as long as the field can be restored and transferred. Therefore, the transfer processing in the transfer processing mechanism 140 is not bound by a predetermined transfer method.
In addition, the data deletion mechanism 130 under the Web conference application 110 makes it possible to delete the recorded data 200A when the viewing period of the authority management table 510 has expired.
 そして、以上詳細に説明した本実施形態の会議録画処理装置GAでは、まず、テーブル記憶手段G1にて、事前に各会議の会議録画データが有する情報における保護対象の情報をポリシー設定用テーブル500として定めるとともに、一人又は複数の登録者が閲覧可能な会議録画データの閲覧可能期間を権限管理テーブル510として定めておく。
 その後、画像制御手段G2となるホスト計算機100は、テーブル記憶手段G1に記憶されたポリシー設定用テーブル500の保護対象に従って、撮影装置によって生成される会議録画データに対してマスク処理を実行して、マスク処理後の会議録画データを生成する。また、ホスト計算機100は、権限管理テーブル510の閲覧可能期間に従い一人又は複数の登録者に対してマスク処理後の会議録画の閲覧を許可又は禁止する。
In the conference recording processing apparatus GA of the present embodiment described in detail above, first, in the table storage means G1, the information to be protected in the information contained in the conference recording data of each conference is stored as the policy setting table 500 in advance. At the same time, an authority management table 510 is defined for the viewable period of recorded conference data that can be viewed by one or more registrants.
After that, the host computer 100 serving as the image control means G2 performs mask processing on the recorded conference data generated by the imaging device according to the protection target of the policy setting table 500 stored in the table storage means G1. Generate conference recording data after mask processing. In addition, the host computer 100 permits or prohibits one or more registrants from viewing the masked conference recording according to the permissible viewing period of the authority management table 510 .
 これにより上記会議録画処理装置GAでは、保護対象を定めるポリシー設定用テーブル500及び権限管理テーブル510を用いた簡易な操作により、容易に会議録画にマスク処理をすることができるとともに、該会議録画の不用意な漏洩を防止することができ、これによりWeb会議等の会議でのセキュリティを高めることができる。
 会議録画処理装置GAは、予め、秘匿対象の情報が異なる複数パターンの保護対象の設定を保持できる。また、会議録画処理装置GAは、秘匿対象の情報が異なる複数パターンの録画データについて、閲覧可能な人物、及び閲覧可能期間を保持できる。このように、ポリシー設定用テーブル500及び権限管理テーブル510を事前に記憶することで、秘匿対象の情報が異なる複数パターンの録画データを生成できるとともに、当該複数パターンの録画データの閲覧権限や閲覧期間を制御できる。また、秘匿の対象や、秘匿の度合いを、録画データに応じて異ならせることができる。
 また、予め、秘匿対象の情報を保護設定として指定しておくことで、録画データの生成後に、当該録画データの手動による編集を要することなく、保護設定に応じた各録画データを生成できる。さらに、保護設定に応じた録画データの閲覧者及び閲覧期間を、保護設定に対応して予め指定しておくことができる。
As a result, in the conference recording processing apparatus GA, it is possible to easily mask conference recordings by simple operations using the policy setting table 500 and the authority management table 510 that define the objects to be protected, and to mask the conference recordings. Inadvertent leakage can be prevented, thereby enhancing security in a conference such as a web conference.
The conference recording processing apparatus GA can hold in advance a plurality of patterns of protection target settings with different confidential target information. In addition, the conference recording processing device GA can hold a person who can view and a viewing period for a plurality of patterns of recorded data with different information to be concealed. In this way, by storing the policy setting table 500 and the authority management table 510 in advance, it is possible to generate a plurality of patterns of recorded data with different information to be concealed, and at the same time, it is possible to generate viewing rights and viewing periods for the plurality of patterns of recorded data. can be controlled. In addition, the object of concealment and the degree of concealment can be varied according to the recorded data.
In addition, by specifying information to be concealed as protection settings in advance, each recorded data can be generated according to the protection settings without requiring manual editing of the recorded data after the recording data is generated. Furthermore, viewers and viewing periods for recorded data according to protection settings can be specified in advance in correspondence with protection settings.
 また、上記会議録画処理装置GAでは、Web会議において、ユーザの権限に応じた情報のみを表示した上で、録画データからの情報漏洩を防止し、コンプライアンス・個人情報を保護することが可能となる。
 また、上記会議録画処理装置GAでは、ホスト計算機100にて、編集する手間を省いてプライバシー保護を確立した録画データを自動的に生成し、適切なタイミングで録画データを削除することができる。すなわち、会議録画処理装置GAは、事前に設定した権限管理テーブル510を参照することで、閲覧可能期限が経過した録画データを削除できる。
 さらに、上記会議録画処理装置GAでは、ポリシー設定用テーブル500に、事前にWeb会議の運用ルールをポリシーとして設定する。これにより、同一の会議でも開示できる情報とそうではない情報をユーザ権限(管理者権限)に基づいて適宜変更することも可能となる。
In addition, in the conference recording processing device GA, it is possible to prevent information leakage from recorded data and protect compliance and personal information by displaying only the information according to the authority of the user in the Web conference. .
Further, in the conference recording processing apparatus GA, the host computer 100 can automatically generate recorded data with privacy protection without the need for editing, and can delete the recorded data at an appropriate timing. In other words, the conference recording processing apparatus GA can delete recorded data for which the viewable time limit has passed by referring to the authority management table 510 set in advance.
Further, in the conference recording processing apparatus GA, operation rules of the Web conference are set in the policy setting table 500 in advance as a policy. This makes it possible to appropriately change information that can be disclosed and information that cannot be disclosed even in the same meeting, based on user authority (administrator authority).
(他の実施形態) 
 なお、上記実施形態では、画像制御手段G2となるホスト計算機100にて、権限管理テーブル510に設定した参加者60(図4参照)に会議録画を閲覧可能とした。しかし、これに限定されるものではない。ホスト計算機100にて、所定時間内(ディレイ時間となる)で会議画像にポリシー設定用テーブル500の保護対象に従ったマスク処理を行なった後で、当該会議画像をほぼリアルタイムで再生出力するという拡張機能を設けても良い。
(Other embodiments)
In the above embodiment, the host computer 100, which is the image control means G2, allows the participants 60 (see FIG. 4) set in the authority management table 510 to view the conference recording. However, it is not limited to this. An extension in which the host computer 100 performs mask processing according to the protection target of the policy setting table 500 on the conference image within a predetermined time (delay time), and then reproduces and outputs the conference image almost in real time. A function may be provided.
 具体的には、ホスト計算機100にて、図6に示すように会議録画の録画データD7にマスク処理を含むノイズ複合データ処理D8を実施し、この処理に伴うディレイ時間後に、特定の会議参加者、スライド(場所、文字)にマスクを掛けた会議録画の録画データD9を出力再生するようにしても良い。
 例えば、ホスト計算機100は、撮影画像データに対して、ジャミング処理、及びノイズ複合処理を行って、マスク処理が行われない録画データD8を生成する。ホスト計算機100は、録画データD8の生成処理と並行して、撮影画像データに対して、ジャミング処理及びマスキング処理を含むノイズ複合処理を行って、マスク処理が行われた録画データD9を生成する。
 ホスト計算機100は、ジャミング処理、ノイズ複合処理、及びマスキング処理等に要する時間(ディレイ時間)後に、録画データD8及び録画データD9を出力再生させる。
 このように、ホスト計算機100は、所定のディレイ時間内で録画データにポリシー設定用テーブル500に基づくマスク処理を行なってマスク処理後の録画データを生成した後、当該マスク処理後の画像データを再生のために出力する。
 これにより、当該実施形態では、例えばWebカンファレンス等のオンライン会議中に表示したい権限の異なる参加者がいた場合、転送機構による処理時間の分だけ会議に遅延が生じるものの、参加者の閲覧権限に応じた録画データを表示することを可能とする。
Specifically, in the host computer 100, as shown in FIG. 6, noise composite data processing D8 including mask processing is performed on the recording data D7 of the conference recording, and after a delay time associated with this processing, specific conference participants , the recorded data D9 of the conference recording in which the slides (places, characters) are masked may be output and reproduced.
For example, the host computer 100 performs jamming processing and noise compositing processing on the captured image data to generate recorded data D8 that is not masked. The host computer 100 performs noise composition processing including jamming processing and masking processing on the photographed image data in parallel with the generation processing of the recorded data D8 to generate masked recorded data D9.
The host computer 100 outputs and reproduces the recorded data D8 and the recorded data D9 after the time (delay time) required for jamming processing, noise compounding processing, masking processing, and the like.
In this manner, the host computer 100 performs mask processing on the recorded data based on the policy setting table 500 within a predetermined delay time to generate masked recorded data, and then reproduces the masked image data. output for
As a result, in this embodiment, for example, if there are participants with different authorizations to be displayed during an online conference such as a web conference, the conference will be delayed by the processing time of the transfer mechanism, but according to the viewing authorization of the participants. It is possible to display the recorded data.
 以上、本発明の実施形態について図面を参照して詳述したが、具体的な構成はこの実施形態に限られるものではなく、本発明の要旨を逸脱しない範囲の設計変更等も含まれる。 Although the embodiment of the present invention has been described in detail with reference to the drawings, the specific configuration is not limited to this embodiment, and design changes and the like are included within the scope of the present invention.
 この出願は、2021年3月26日に日本出願された特願2021-053701号を基礎とする優先権を主張し、その開示の全てをここに取り込む。 This application claims priority based on Japanese Patent Application No. 2021-053701 filed in Japan on March 26, 2021, and the entire disclosure thereof is incorporated herein.
 本発明は、インターネットを介してリモートで実施されるWeb会議でのセキュリティを高めることができる、会議録画処理装置及び会議録画におけるセキュリティ確保方法に関する。 The present invention relates to a conference recording processing device and a method of ensuring security in conference recording, which can enhance the security of a Web conference held remotely via the Internet.
 1 テーブル記憶手段
 2 画像制御手段
 10 会議録画処理装置
 20 撮像装置
 21 撮像装置
 22 撮像装置
 30 管理者
 40 閲覧者
 100 ホスト計算機
 110 Web会議アプリケーション
 120 データマスク機構
 130 データ削除機構
 140 転送処理機構
 150 認証機構
 160 ポリシー解析機構
 200 録画データ記憶部
 200A 録画データ
 300 認証データ記憶部
 300A 認証データ
 400、410 PC(会議用端末)
 420 タブレット(会議用端末)
 450 Web会議クライアント
 500 ポリシー設定用テーブル
 510 権限管理テーブル
 A1 ポリシー設定用テーブル
 A2 権限管理テーブル
 B 管理者
 GA 会議録画処理装置
 G1 テーブル記憶手段
 G2 画像制御手段
1 table storage means 2 image control means 10 conference recording processing device 20 imaging device 21 imaging device 22 imaging device 30 administrator 40 viewer 100 host computer 110 web conference application 120 data mask mechanism 130 data deletion mechanism 140 transfer processing mechanism 150 authentication mechanism 160 policy analysis mechanism 200 recorded data storage unit 200A recorded data 300 authentication data storage unit 300A authentication data 400, 410 PC (conference terminal)
420 tablet (conference terminal)
450 Web conference client 500 Policy setting table 510 Authority management table A1 Policy setting table A2 Authority management table B Administrator GA Conference recording processor G1 Table storage means G2 Image control means

Claims (8)

  1.  事前に、各会議の会議録画データが有する情報における保護対象の情報を設定するポリシー設定用テーブルと、一人又は複数の登録者が閲覧可能な前記会議録画データの閲覧可能期間を設定する権限管理テーブルとを記憶するテーブル記憶手段と、
     該テーブル記憶手段に記憶された前記ポリシー設定用テーブルの前記保護対象に従って、撮像装置によって生成される前記会議録画データに対してマスク処理を実行してマスク処理後の会議録画データを生成するとともに、前記権限管理テーブルの前記閲覧可能期間に従って前記一人又は複数の登録者に対して前記マスク処理後の会議録画データの閲覧を許可又は禁止する画像制御手段と、
     を具備する会議録画処理装置。
    A policy setting table for setting, in advance, information to be protected in the information contained in the recorded meeting data of each meeting, and an authority management table for setting the viewing period of the recorded meeting data that can be viewed by one or more registrants. a table storage means for storing and
    masking the conference recording data generated by the imaging device according to the protection target of the policy setting table stored in the table storage means to generate masked conference recording data; image control means for permitting or prohibiting the one or more registrants from viewing the masked conference recorded data in accordance with the permissible viewing period of the authority management table;
    A conference recording processing device comprising:
  2.  前記ポリシー設定用テーブルには、会議名、録画の識別情報及び、前記保護対象の情報が設定される請求項1に記載の会議録画処理装置。  The conference recording processing apparatus according to claim 1, wherein the policy setting table is set with a conference name, recording identification information, and the protection target information.
  3.  前記ポリシー設定用テーブルに記憶される前記保護対象の情報として、特定人物の顔の画像、特定人物の音声、及び所定のスライドの位置範囲の少なくとも一つが設定される請求項2に記載の会議録画処理装置。 3. A conference recording according to claim 2, wherein at least one of a specific person's face image, a specific person's voice, and a predetermined slide position range is set as the protection target information stored in the policy setting table. processing equipment.
  4.  前記権限管理テーブルには、各登録者について、前記保護対象の情報に応じた前記マスク処理後の会議録画データの前記閲覧可能期間が設定される請求項1~3のいずれか1項に記載の会議録画処理装置。 4. The authorization management table according to any one of claims 1 to 3, wherein for each registrant, the viewable period of the masked conference recorded data according to the information to be protected is set. Conference recording processor.
  5.  前記ポリシー設定用テーブル及び前記権限管理テーブルへの各種データ設定は、管理者の権限により実行される請求項1~4のいずれか1項に記載の会議録画処理装置。 The conference recording processing device according to any one of claims 1 to 4, wherein various data settings in the policy setting table and the authority management table are executed by the authority of an administrator.
  6.  前記画像制御手段は、音声認識、画像認識、自然言語処理の少なくともいずれかの人工知能技術により、前記会議録画データの中から、予め登録した会議参加者の顔の画像、又は前記会議参加者の音声を認識する請求項1~5のいずれか1項に記載の会議録画処理装置。 The image control means uses at least one of artificial intelligence technology such as voice recognition, image recognition, and natural language processing to extract, from the recorded conference data, facial images of conference participants registered in advance, or images of the conference participants. 6. The conference recording processing device according to any one of claims 1 to 5, which recognizes voice.
  7.  前記画像制御手段は、所定のディレイ時間内で前記会議録画データに前記ポリシー設定用テーブルに基づく前記マスク処理を行なって前記マスク処理後の会議録画データを生成した後、当該マスク処理後の会議画像データを再生のために出力する請求項1~6のいずれか1項に記載の会議録画処理装置。 The image control means performs the mask processing based on the policy setting table on the conference recorded data within a predetermined delay time to generate the masked conference recorded data, and then generates the masked conference image. 7. The conference recording processing device according to any one of claims 1 to 6, which outputs data for reproduction.
  8.  事前に、各会議の会議録画データが有する情報における保護対象の情報を設定するポリシー設定用テーブルと、一人又は複数の登録者が閲覧可能な前記会議録画データの閲覧可能期間を設定する権限管理テーブルを記憶し、
     記憶された前記ポリシー設定用テーブルの前記保護対象に従って前記会議録画データに対してマスク処理を実行してマスク処理後の会議録画データを生成するとともに、前記権限管理テーブルの前記閲覧可能期間に従って前記一人又は複数の登録者に対して前記マスク処理後の会議録画データの閲覧を許可又は禁止する、会議録画処理方法。
    A policy setting table for setting, in advance, information to be protected in the information contained in the recorded meeting data of each meeting, and an authority management table for setting the viewing period of the recorded meeting data that can be viewed by one or more registrants. remember the
    masking the recorded conference data according to the protection object of the stored policy setting table to generate masked recorded conference data; Alternatively, the conference recording processing method permits or prohibits viewing of the masked conference recording data for a plurality of registrants.
PCT/JP2022/013807 2021-03-26 2022-03-24 Meeting recording processing device and security assurance method for meeting recording WO2022202955A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2023509274A JPWO2022202955A1 (en) 2021-03-26 2022-03-24

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2021053701 2021-03-26
JP2021-053701 2021-03-26

Publications (1)

Publication Number Publication Date
WO2022202955A1 true WO2022202955A1 (en) 2022-09-29

Family

ID=83395797

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2022/013807 WO2022202955A1 (en) 2021-03-26 2022-03-24 Meeting recording processing device and security assurance method for meeting recording

Country Status (2)

Country Link
JP (1) JPWO2022202955A1 (en)
WO (1) WO2022202955A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006155109A (en) * 2004-11-26 2006-06-15 Yec Co Ltd Image processor
JP2007060028A (en) * 2005-08-22 2007-03-08 Canon Inc Image processor and object processing method
JP2007334832A (en) * 2006-06-19 2007-12-27 Fuji Xerox Co Ltd Information processor, conference system, information processing method and information processing program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006155109A (en) * 2004-11-26 2006-06-15 Yec Co Ltd Image processor
JP2007060028A (en) * 2005-08-22 2007-03-08 Canon Inc Image processor and object processing method
JP2007334832A (en) * 2006-06-19 2007-12-27 Fuji Xerox Co Ltd Information processor, conference system, information processing method and information processing program

Also Published As

Publication number Publication date
JPWO2022202955A1 (en) 2022-09-29

Similar Documents

Publication Publication Date Title
US11155725B2 (en) Method and apparatus for redacting video for compression and identification of releasing party
US8218829B2 (en) System and method for using biometrics technology in conferencing
US8266716B2 (en) Digital rights management of streaming captured content based on criteria regulating a sequence of elements
US10169597B2 (en) System and method of applying adaptive privacy control layers to encoded media file types
US10037413B2 (en) System and method of applying multiple adaptive privacy control layers to encoded media file types
US8233677B2 (en) Image sensing apparatus and image file data structure
US8850594B2 (en) Digital rights management of captured content based on capture associated locations
US8046590B2 (en) System and method for protection of creative works
WO2017026356A1 (en) Image processing device, image restoring device, image processing method, and image restoring method
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
US11055437B2 (en) Systems and methods for ensuring privacy in online information sharing applications
WO2022202955A1 (en) Meeting recording processing device and security assurance method for meeting recording
JP2002251393A (en) Recording device, recording method, program, recording medium and recording/reproducing system
JP2006287514A (en) Camera device and control program thereof
JP2008217675A (en) Information browsing system, terminal, control method, control program and storage medium
CN115767003A (en) Method for protecting correct participants in online conference
JP2002281486A (en) System for acquiring image
CN111400768A (en) Face and behavior recognition-based encryption sharing platform and encryption sharing method
JP2008059575A (en) System and method for monitoring seat-leaving of user
JP2000137809A (en) Portable information processor
WO2024053183A1 (en) Person search device and person search method
JP4080700B2 (en) Data operation method and apparatus
JP2005354210A (en) Image reproduction system and image filling system
US20170295495A1 (en) Multimedia exchange system
CN109963104B (en) Method and system for realizing playback limitation of safety shooting equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22775736

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023509274

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22775736

Country of ref document: EP

Kind code of ref document: A1