Information management apparatus, storage medium and information management method
An information management device and mental state technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as difficulty in suppressing improper behavior
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Deformed example 1
[0156] In an implementation, such as figure 1 As shown, the user terminal 10 and the information management server 12 exist independently and are connected by the communication line 16, but the user terminal 10 and the information management server 12 may be integrated. In this case, the user terminal 10 functions as an information management device.
[0157] Figure 21 A system configuration of a modified example is shown. The user terminal 10 and the manager terminal 14 are connected via a communication line 16 . The user terminal 10 also functions as an information management server 12 that acquires biometric information when important information is displayed through the operation of the authority user, and uses the acquired biometric information to evaluate the possibility of information leakage behavior. Suppress message output when possible.
[0158] Figure 22 The functional block diagram of the user terminal 10 which shows a modification. will be figure 2 The ...
Deformed example 2
[0161] In the embodiment, when the acquired biometric information deviates from the reference value, information output is suppressed because there is a possibility of information leakage behavior, but the suppression of information output may be released when the acquired biometric information falls within the normal range thereafter. For example, if Figure 18 As shown, when the acquired biological information deviates from the baseline value, it is considered that there is a possibility of information leakage behavior, which is determined by Figure 18 The screen of (a) changes to Figure 18 (b) screen, but it can also be used when the acquired biological information falls within the normal range Figure 18 The picture of (b) changes again to Figure 18 The picture of (a).
[0162] and, Figure 20 In this method, the information output is suppressed when the third party 60 recognizes the screen of the user terminal 10, but it may also be controlled by Figure 20 screen...
Deformed example 3
[0164] In the embodiment, when the acquired biometric information deviates from the reference value, information output is suppressed because there is a possibility of information leakage. However, information output may be suppressed at all when the user terminal 10 moves during the acquisition of biometric information.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


