Information gathering system

ABSTRACT

A host computer adds a keycode to e-mail and a terminal unit leads an information gathering candidate to add reply information to the e-mail. When the host computer receives the e-mail to which reply information has been added, the host computer stores the reply information in one of data storage areas having a memory address corresponding to a memory address associated the keycode of the e-mail.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an information gathering system, aterminal unit, program for information gathering, and program for aterminal.

2. Background Art

A system that performs a survey (questionnaires) by sending electronicdata such as E-mail to information gathering candidates through anetwork is disclosed in JP 11-143856 A. In the above-mentionedconventional system, the input form of a reply of a questionnaire isrestricted to the prescribed form which is prescribed by the personconducting the survey. Thereby, it can be easily achieved to automatethe database taking-in work of reply results.

Other prior arts are disclosed in, for example, JP 10-63590 A, JP2005-101883 A, JP 10-154182 A, JP 2005-285111 A, JP 2005-353019 A, JP2003-115011 A, JP 2001-249914 A, JP 2004-272660 A, JP 2004-503013 A, JP2005-31958 A.

If there is disagreement in correspondence between an informationgathering candidate and collected information (that is, reply), accuracyof the information gathering may decrease and the result of theinformation gathering may need to be handled as inaccurate information.Therefore, in the process of information gathering, it is required thatthe correspondence between the reply and an information gatheringcandidate is secured. Besides, it is desirable to avoid taking too muchtime and effort for arrangement and storing of the collectedinformation. In particular, the more there are many candidates ofinformation gathering, the more the number of the acquired information(namely, amount of reply data) proportionally increases. For thisreason, it is acquired to perform arrangement and storing of thereceived information efficiently.

SUMMARY OF THE INVENTION

It is, therefore, an object of the present invention to provide aninformation gathering system, a terminal unit, program for informationgathering, and program for a terminal, which can gather informationefficiently while surely keeping correspondence of a reply and aninformation gathering candidate. Other and further objects, features andadvantages of the invention will appear more fully from the followingdescription.

According to a first aspect of the present invention, an informationgathering system includes a host unit and a terminal unit. The host unitis in connection with a network and includes a memory unit. The memoryunit has a plurality of data storage areas. Each of the plurality of thedata storage areas is respectively associated with each of a pluralityof memory addresses. The terminal unit is in connection with thenetwork. The host unit creates specific data. The specific data includesreply requesting information and one or more sorts of identificationinformation. The identification information is associated with one ofthe plurality of memory addresses in accordance with a predeterminedcorrespondence rule. The reply requesting information is information forrequesting a reply of an information gathering candidate. The terminalunit receives the specific data from the network and displays the replyrequesting information on the terminal unit in a state where replyinformation can be added to the specific data. The host unit receivesthe specific data including the reply information from the network. Thehost unit stores the reply information included in the received specificdata into one of the plurality of the data storage areas so that amemory address of the one of the plurality of the data storage areascorresponds to a memory address associated with the identificationinformation of the received specific data.

According to a second aspect of the present invention, an informationgathering system includes a host unit and a terminal unit. The host unitis in connection with a network and including a memory unit. The memoryunit has a plurality of data storage areas. Each of the plurality of thedata storage areas is respectively associated with each of a pluralityof memory addresses. The terminal unit is in connection with thenetwork. The host unit creates specific data. The specific data includesone or more sorts of identification information. The identificationinformation is associated with one of the plurality of memory addressesin accordance with a predetermined correspondence rule. The terminalunit receives the specific data from the network. The terminal unitcauses a printer to print an information printed material so that theidentification information included in the specific data is printed onthe information printed material. The host unit reads the informationprinted material on which the identification information is printed. Thehost unit converts the identification information printed on theinformation printed material and a written information written in apredetermined position of the information printed material into data.The host unit stores the data of the written information into one of theplurality of the data storage areas as a reply of an informationgathering candidate so that a memory address of the one of the pluralityof the data storage areas corresponds to a memory address associatedwith the identification information printed on the information printedmaterial.

According to a third aspect of the present invention, a terminal unitincludes a monitor, display means and sending means. The display meansdisplays reply requesting information on the monitor upon the terminalunit receiving specific data that is encrypted and includes the replyrequesting information and one or more sorts of identificationinformation. The display means displays the reply requesting informationin a state where the specific data is decrypted and reply information ofan information gathering candidate can be added to the specific data.The identification information is associated with one of a plurality ofmemory addresses of a plurality of data storage areas of a host unit inaccordance with a predetermined correspondence rule. The replyrequesting information is information for requesting a reply of theinformation gathering candidate. The sending means sends the host unitthe specific data that is encrypted and the reply information added to.Modification of the identification information is forbidden at least ina period from a time at which the specific data is decrypted to a timeat which the decrypted specific data is encrypted again.

According to a fourth aspect of the present invention, a terminal unitincludes a monitor, display means, encrypting means and sending means.The display means displays reply requesting information on the monitorupon the terminal unit receiving specific data that is encrypted andincludes the reply requesting information and one or more sorts ofidentification information. The display means displays the replyrequesting information in a state where the specific data is decryptedand reply information of an information gathering candidate can be addedto the specific data. The identification information is associated withone of a plurality of memory addresses of a plurality of data storageareas of a host unit in accordance with a predetermined correspondencerule. The reply requesting information is information for requesting areply of the information gathering candidate. The encrypting meansencrypts the specific data whose reply requesting information isdisplayed on the monitor immediately after closing the display of thereply requesting information of the specific data upon the terminal unitreceiving a command to close the displayed image of the replyinformation of the specific data to which the reply information isadded. The sending means sends the host unit the specific data encryptedby the encrypting means.

According to a fifth aspect of the present invention, an informationgathering program for causing a host unit and a terminal unit to gatherinformation, the host unit being in connection with a network andincluding a memory unit, the memory unit having a plurality of datastorage areas, each of the plurality of the data storage areas beingrespectively associated with each of a plurality of memory addresses theterminal unit being in connection with the network, the programincluding:

means for causing the host unit to create specific data including replyrequesting information and one or more sorts of identificationinformation, the identification information being associated with one ofthe plurality of memory addresses in accordance with a predeterminedcorrespondence rule, the reply requesting information being informationfor requesting a reply of an information gathering candidate;

means for causing the terminal unit to receive the specific data fromthe network and to display the reply requesting information on theterminal unit in a state where reply information can be added to thespecific data; and

means for causing the host unit to store the reply information in thespecific data which the host unit receives from the network into one ofthe plurality of the data storage areas so that a memory address of theone of the plurality of the data storage areas corresponds to a memoryaddress associated with the identification information of the receivedspecific data.

According to a sixth aspect of the present invention, a program for aterminal unit including:

means for causing the terminal unit to display reply requestinginformation on a monitor of the terminal unit upon the terminal unitreceiving specific data, the specific data being encrypted and includingthe reply requesting information and one or more sorts of identificationinformation, the identification information being associated with one ofa plurality of memory addresses of a plurality of data storage areas ofa host unit in accordance with a predetermined correspondence rule, thereply requesting information being information for requesting a reply ofan information gathering candidate, the reply requesting informationbeing displayed by the means in a state where the specific data isdecrypted and reply information of the information gathering candidatecan be added to the specific data; and

means for causing the terminal unit to forbid modification of theidentification information at least in a period from a time at which thespecific data is decrypted to a time at which the decrypted specificdata is encrypted again.

According to a seventh aspect of the present invention, a program for aterminal unit including:

means for causing the terminal unit to display reply requestinginformation on a monitor of the terminal unit upon the terminal unitreceiving specific data, the specific data being encrypted and includingthe reply requesting information and one or more sorts of identificationinformation, the identification information being associated with one ofa plurality of memory addresses of a plurality of data storage areas ofa host unit in accordance with a predetermined correspondence rule, thereply requesting information being information for requesting a reply ofan information gathering candidate, the reply requesting informationbeing displayed by the means in a state where the specific data isdecrypted and reply information of the information gathering candidatecan be added to the specific data; and

means for causing the terminal unit to end displaying of the replyrequesting information of the specific data upon the terminal unitreceiving a command to close the displayed image of the replyinformation of the specific data to which the reply information isadded, the means causing the terminal unit to encrypt the specific dataimmediately after the end of displaying of the reply requestinginformation.

The features and advantages of the present invention may be summarizedas follows. According to the first aspect of the present invention, ahost unit adds identification information to specific data and aterminal unit leads an information gathering candidate to add replyinformation to the specific data. Further, when the host unit receivesthe specific data to which reply information added, the host unit canstore the reply information into one of data storage areas whose memoryaddress corresponds to the identification information of the specificdata. Since each specific data has identification informationindividually, confusion can be suppressed in data management even if thenumber of information gathering candidates is large. Further, since acorrespondence rule of the identification information and memoryaddresses of the data storage areas is orderly determined before thehost unit creates each specific data, the host unit can perform datastoring appropriately with small computation load when the host unitreceives the specific data. Thereby, information gathering can beachieved with high efficiency while securing the accurate correspondenceof each reply and each information gathering candidates.

According to the second aspect of the present invention, the informationgathering system can perform information gathering with high efficiencyeven if information to be gathered includes a particular type ofinformation having a difficulty to be gathered as digital data such as asignature or a seal.

According to the third aspect of the present invention, in a case wherethe terminal unit receives an encrypted specific data, modification ofidentification information in the specific data is forbidden at least ina period in which the specific data is decrypted and exists asnon-encrypted data in the terminal unit. Thereby, the identificationinformation being included in each of the specific data individually,which can specify the operator of the terminal unit, can be protectedwhile adding reply information to the specific data is permitted. Thismakes it possible to lead the information gathering candidates to addtheir replies to each specific data and to suppress falsification ininformation gathering as much as possible. Furthermore, since theterminal unit sends a host unit the specific data to which replyinformation added, the host unit can store the reply information intoits data storage area whose address corresponds to the identificationinformation of the specific data. As described above, the terminal unitaccording to the third aspect makes it possible to perform informationgathering with high efficiency while keeping the correspondence of eachreply and each information gathering candidate.

According to the fourth aspect of the present invention, when anoperator of the terminal unit ends the operation after the operator addsreply information to the specific data, the specific data can beautomatically encrypted by the terminal unit. That is, correspondence ofthe operator and the reply information can be protected when theoperation to the specific data is finished. Thereby, the specific datato which reply information added can be encrypted and be sent whilekeeping the correspondence of the operator and the reply information.Furthermore, since the terminal unit sends a host unit the specific datato which reply information added, the host unit can store the replyinformation into its data storage area whose address corresponds to theidentification information of the specific data. As described above, theterminal unit according to the fourth aspect makes it possible toperform information gathering with high efficiency while keepingcorrespondence of each reply and each information gathering candidate.

According to the fifth aspect of the present invention, an informationgathering program to achieve the first aspect can be obtained.

According to the sixth aspect of the present invention, a program for aterminal unit to achieve the third aspect can be obtained.

According to the seventh aspect of the present invention, a program fora terminal unit to achieve the fourth aspect can be obtained.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram showing the configuration of an informationgathering system according to the first embodiment of the presentinvention.

FIG. 2 is a diagram showing the configuration of an informationgathering system according to the second embodiment of the presentinvention.

FIG. 3 is a diagram showing the configuration of an informationgathering system according to the third embodiment of the presentinvention.

FIG. 4 is a diagram showing the configuration of an informationgathering system according to the fourth embodiment of the presentinvention.

FIG. 5 is a diagram showing the configuration of an informationgathering system according to the fifth embodiment of the presentinvention.

FIG. 6 is a diagram showing the configuration of an informationgathering system according to the sixth embodiment of the presentinvention.

FIG. 7 is a diagram showing the configuration of an informationgathering system according to the seventh embodiment of the presentinvention.

FIG. 8 is a diagram showing the configuration of an informationgathering system according to the eighth embodiment of the presentinvention.

FIG. 9 is a diagram showing the configuration of an informationgathering system according to the ninth embodiment of the presentinvention.

FIG. 10 is a diagram showing the configuration of an informationgathering system according to the ninth embodiment of the presentinvention.

FIG. 11 is a diagram showing the configuration of an informationgathering system according to the tenth embodiment of the presentinvention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS First Embodiment

FIG. 1 is a diagram showing the configuration of an informationgathering system according to a first embodiment. The informationgathering system according to the first embodiment performs aninformation gathering by using e-mail. Specifically, questionnaire isperformed in the first embodiment. E-mail is sent to each informationgathering candidate, then each information gathering candidate writesthe reply in the e-mail.

The information gathering system according to the first embodimentincludes a host computer 10. The host computer 10 has a memory unit anddatabase program for storing data to the memory unit. For convenience,the memory unit and the database program are simply depicted as adatabase 12 in the figure. The database 12 enables data search or datasampling of stored data easily, thereby data reuse can be achieved. Thehost computer 12 is connected to a network (not shown). The networkbeing connected to the host computer 12 may be several types ofcommunication line such as internet, intranet, or Local Area Network(LAN).

The host computer 10 includes an e-mail creating program 14 and canexecute it. For convenience, the e-mail creating program 14 is shown inFIG. 1 as an arrowed line. The e-mail creating program 14 is installedto create e-mail (referred to as “e-mail M” in FIG. 1). When the e-mailcreating program 14 creates the e-mail M, the e-mail creating program 14adds to the e-mail M a particular code that is used as a key.Hereinafter, the particular code is referred to as “keycode”. Thekeycode serves as identification information to distinguish each e-mailM in case where a plurality of e-mails M is sent to the network. Forexample, index key, hash key, main key or unique ID may be used as thekeycode. Destination e-mail address or return e-mail address (forexample, the host computer has a plurality of e-mail address) also maybe used as the keycode. Storage addresses of the database 12 and thekeycodes are associated each other in accordance with a predeterminedcorrespondence rule which is determined beforehand.

The e-mail M is delivered to a terminal unit 50 of the informationgathering candidate A through the network (not shown). The terminal unit50 may be a desk top personal computer, a notebook computer, or a mobilecomputing device such as Personal Digital Assistant. The informationgathering candidate A opens the e-mail M on the terminal unit 50, thenthe information gathering candidate A reads the question (questionnaire)written in the e-mail M. The information gathering candidate A sends thee-mail M to the host computer 10 after writing the reply to thequestion.

The host computer 10 receives the e-mail M from the network (not shown).The host computer 10 can execute a data storage program 16. The datastorage program 16 opens the e-mail M and read the keycode of the e-mailM. Next, the data storage program 16 stores reply information in thee-mail M into a data storage area of the database 12 so that the memoryaddress of the data storage area is equal to memory address associatedto the keycode of the e-mail M. For convenience, the data storageprogram 16 is shown as an arrowed line in FIG. 1.

As described above, according to the first embodiment, the host computer10 adds keycode to the e-mail M, and the terminal unit 50 leads theinformation gathering candidate A to add reply information to the e-mailM. Further, when the host computer 10 receives the e-mail M thatincludes reply information of the information gathering candidate A, thereply information can be stored into one of data storage areas whosememory address corresponds to the received keycode. According to thefirst embodiment, these sequential processes can be automaticallyachieved by the host computer 10. Hence, it is possible to sendquestionnaires and to receive replies by the host computer 10automatically.

Each e-mail M has individual keycode. Therefore, confusion in datamanagement can be suppressed even if the number of e-mail M is large.Further, since the correspondence rule of the keycode and addresses isorderly determined before the host computer 10 creates each e-mail M,the host computer 10 can perform data storing appropriately with smallcomputation load. Thereby, information gathering can be achieved withhigh efficiency while securing the accurate correspondence of each replyand each information gathering candidates.

Specifically, the first embodiment can perform easy-to-use andeasy-to-handle information gathering by using e-mail, while achievingfacilities of data arranging and data storing in a database like aninternet Web. Security is high when using a data transmission andreception manner like an E-mail in which different electronic files areindependently and respectively exchanged between a host system anddifferent information gathering candidates. On the other hand,conventional internet Web questionnaire system is generally designed sothat a database for storing the replies and reply requesting form aredirectly linked. In this case, when abnormal circumstances such ascyber-attack arise, leak of personal information including address andthe like of questionnaire may occur easily. At this point, high securitycan be obtained in the case where information is gathered separately andrespectively by using e-mail and the like.

According to the first embodiment, the keycode corresponds to“identification information” according to the first aspect of thepresent invention, the e-mail M corresponds to “specific data” accordingto the first aspect of the present invention, the reply written in thee-mail M corresponds to “reply information” according to the firstaspect of the present invention, respectively.

Although the system according to the first embodiment causes the e-mailcreating program 14 to create the e-mail M and leads the informationgathering candidate A to write the reply in the e-mail M, the presentinvention is not limited to this. Other types of data exchangetechnology may be used. Specifically, for example, file exchangesoftware or real-time chat program can be used by adding theidentification information (that is, the keycode) totransmitted/received data in them as in the first embodiment.Furthermore, in the case where replies are gathered by an input formprovided on a website, it is possible to add the keycode as in the firstembodiment to exchanged data between a terminal unit and a hostcomputer.

Although the system according to the first embodiment causes theinformation gathering candidate A to write the reply in the e-mail M,the present invention is not limited to this. The information gatheringsystem according to the present invention may be made so that the systemcauses the information gathering candidate to attach an attachment fileincluding the reply to the e-mail M. The information gathering systemaccording to the present invention may also be made so that the otherattachment file including a content of questions is attached to thee-mail M. In the case, a set of the electronic data including the e-mailM and the attachment file corresponds to “specific data” according tothe first aspect of the present invention, the attachment file includingthe reply information corresponds to “reply information” according tothe first aspect of the present invention, respectively.

It should be noted that an application program can be produced forexecuting the function of the host computer 10 and the terminal unit 50of the information gathering system according to the first embodiment onother general system. The application program corresponds to “aninformation gathering program” according to the fifth aspect of thepresent invention.

Second Embodiment

FIG. 2 is a diagram showing the configuration of an informationgathering system according to a second embodiment of the presentinvention. In the second embodiment, questions are written in the e-mailM so that the information gathering candidates answers each questioncorrectly. If the information gathering candidate writes the reply inplain text without any rule of input form, the form of each reply willnot be unified. As a result of this, inconvenience will occur at thetime of equalization processing, investigation, analysis, or reuse ofthe reply data. According to the second embodiment, questions arewritten in the e-mail M beforehand so as to avoid the inconvenientsituation. Preferably, description of the questions is regulative asmuch as possible. It should be noted that the technique disclosed in JPH11-14385A (JP 1999-14385A) can be used when the input form isregulated.

Third Embodiment

FIG. 3 is a diagram showing the configuration of an informationgathering system according to a third embodiment of the presentinvention. In the third embodiment, the e-mail M according to the firstembodiment is encrypted. That is, the host computer 10 encrypts thee-mail M and then sends it to the terminal unit 50. On the other hand,the host computer 10 separately sends e-mail M_P to the terminal unit50. The e-mail M_P includes a password for decryption of the e-mail M.

The information gathering candidate A operates the terminal unit 50 soas to decrypt the e-mail M and write a reply in the e-mail M. Afterwriting the reply in the e-mail M, the information gathering candidate Aoperates the terminal unit 50 so as to encrypt the e-mail M again andsend the encrypted e-mail M to the host computer 10. When the hostcomputer 10 receives the e-mail M, the e-mail M is decrypted, and replyinformation in the e-mail M is stored in predetermined data storage areaby processing of the data storage program 16 as in the first embodiment.In the above described third embodiment, security of the informationgathering system according to the first embodiment can be improved bythe encryption of the e-mail M. It should be noted that the encryptiontechnique can be also applied to modification of the first embodiment aswell.

It should be noted that the encryption and the decryption of the e-mailM can be achieved by using application software in general use. That is,the application for encryption/decryption can be selected from severaltypes of application software in general use. The encryption or thedecryption of the e-mail M on the terminal unit 50 may be done manuallyby the information gathering candidate A or the operator who receivesthe e-mail M on the host computer 10 side.

Fourth Embodiment

FIG. 4 is a diagram showing the configuration of an informationgathering system according to a fourth embodiment of the presentinvention. The information gathering system according to the forthembodiment forbids modification of the keycode, that is the data of thekeycode is protected, while a monitor 52 of the terminal unit 50 isdisplaying the image of reply input form after the e-mail M is openedand decrypted. The information gathering candidate A inputs the reply inthe state where the modification of the keycode is being forbidden.After the information gathering candidate A completes to write a reply,the information gathering candidate A operates the terminal unit 50 soas to encrypt the e-mail M and send it to the host computer 10.

Thereby, modification of the keycode is forbidden while the e-mail Mexists in the terminal unit 50 as decrypted data (“non-encryptedperiod”). Hence, the keycode which the e-mail M individually has can beprotected while the information gathering candidate A can write thereply in the e-mail M. This makes it possible to lead the informationgathering candidate A to add the reply to the e-mail M while suppressingfalsification in information gathering as much as possible. As describedabove, the fourth embodiment makes it possible to gather informationfrom a plurality of information gathering candidates with highefficiency, while keeping correspondence of each reply and eachcandidate with high reliability.

It should be noted that an application program can be produced forexecuting the function of the terminal unit 50 in the informationgathering system according to the fourth embodiment on other generalsystem. The application program corresponds to “a program for a terminalunit” according to the sixth aspect of the present invention, and theterminal unit 50 according to the fourth embodiment corresponds to “aterminal unit” according to the third aspect of the present invention.

Fifth Embodiment

FIG. 5 is a diagram showing the configuration of an informationgathering system according to a fifth embodiment of the presentinvention. In the fifth embodiment, an application 60 is installed inthe terminal unit 50. The application 60 is made so that the followingtwo functions are achieved on the terminal unit 50 when the application60 is executed.

(i) A function, which causes the terminal unit 50 to open and displaythe e-mail M on the monitor 52 upon the e-mail M being decrypted. Thatis, the function causes the monitor 52 to display the content of thee-mail M immediately after the e-mail M is decrypted, withoutinstruction of the operator of the terminal unit 50 to open the e-mailM.

(ii) A function, which causes the terminal unit 50 to encrypt the e-mailM whose reply requesting information is displayed on the monitorimmediately after the information gathering candidate A operates theterminal unit 50 so as to close the displayed image on the monitor 52.

Thereby, in the fifth embodiment, after the e-mail M is decrypted, thefunction (i) can sequentially lead the information gathering candidate Ato operate the terminal unit 50 so as to write the reply in the e-mailM. Further, the e-mail M can be automatically encrypted by the function(ii) when an operator operates the terminal unit 50 so as to finish itsoperation after the reply information is added to the e-mail M. That is,correspondence of the operator and the reply information can be surelymaintained at the time when operation of the e-mail M is completed.Thus, it is possible to secure correspondence of each informationgathering candidate and its reply. Thereby, the terminal unit 50 cangive the operator an opportunity for operation to write the reply in thee-mail M and to close the e-mail M, and the e-mail M can beautomatically encrypted except the periods when the operation are beingexecuted. Thereby, the risk of intervention of other operations, such asfalsification operation, can be reduced.

The application 60 corresponds to “a program for a terminal unit”according to the seventh aspect of the present invention, and theterminal unit 50 according to the fifth embodiment corresponds to “aterminal unit” according to the fourth aspect of the present invention.Although the terminal unit 50 according to the fifth embodiment has bothof the function (i) and the function (ii) described above, however, theterminal unit 50 may have only one of the function (i) and the function(ii).

Sixth Embodiment

FIG. 6 is a diagram showing the configuration of an informationgathering system according to a sixth embodiment of the presentinvention. In the sixth embodiment, general-purpose e-mail software isused for transmitting and receiving the e-mail M between the hostcomputer 10 and the terminal unit 50. It may be possible to design aninformation gathering system so that the e-mail M is automatically sendto the host computer 10 after writing of reply in the e-mail M iscompleted (or after writing of reply in a file attached to the e-mail Mis completed). In this case, however, the e-mail M departs from theinformation gathering candidate A although there is no active operationof e-mail transmission by the information gathering candidate A. In thiscase, an occurrence of unexpected information leak is feared. Accordingto the sixth embodiment, on the other hand, transition of the e-mail Mis stopped until an e-mail sending operation is done by the informationgathering candidate A, and thereby the unexpected information leak canbe suppressed.

Seventh Embodiment

FIG. 7 is a diagram showing the configuration of an informationgathering system according to a seventh embodiment of the presentinvention. In the seventh embodiment, the data storage program 16automatically decrypts the e-mail M and automatically stores the replyin it upon the host computer 10 receiving the e-mail M. Thereby,encryption and storing process in the host computer 10 is completelyautomated. In the seventh embodiment, the host computer 10 alsosupervises a mail server that is the host computer 10 periodicallyaccesses to a mail server. Thereby, the decryption of the e-mail M andthe storing of the reply included in it can be automatically executedimmediately after the e-mail M is received.

Eighth Embodiment

FIG. 8 is a diagram showing the configuration of an informationgathering system according to an eighth embodiment of the presentinvention. In the eighth embodiment, information gathering can beachieved by leading information gathering candidates to attach theirreply to the e-mail M as attached data. Further, the application 60according to the eighth embodiment integrally encrypts the set of thee-mail M and the attached data.

In the eighth embodiment, the application 60 decrypts received e-mail M.When the decryption is completed, a dialog image to request anattachment data 70 is displayed on the monitor 52. For example, thedialog image includes an input box to request an address of theattachment data 70 in the terminal unit 50, and the informationgathering candidate A types the address of the attachment data 70 in theinput box, then attachment operation of the attachment data 70 to thee-mail M is completed. After that, the information gathering candidate Acloses the reply-requesting dialog image, the terminal unit 50 encryptsthe e-mail M and the attachment data 70 so that they become oneintegrated datum. Next, the encrypted e-mail M is returned to the hostcomputer 10.

The host computer 10 receives the e-mail M, decrypts it, and stores theattachment data 70 into one of data storage areas of the database 12whose memory address corresponds to a memory address associated with thekeycode of the e-mail M. The attachment data 70 may be a generalelectronic file (for example, a file of text editor on the market, afile of spreadsheet program on the market or the like) or a specializedelectronic file for particular-information-gathering purpose.

According to the eighth embodiment, the terminal unit 50 integrally(indivisibly) encrypts the e-mail M and the attachment data 70. When theoperator of the terminal unit 50 closes the e-mail M after attachmentoperation of the attachment data, the e-mail M and the attachment data70 are integrally encrypted so as to create encrypted e-mail M, and thenpreparation for sending process of the e-mail M is completed. Thereby,correspondence of the attachment data 70 and its keycode can be surelyconserved, and this enables to maintain correspondence of theinformation gathering candidate A and the reply.

It should be noted that the integral encryption means not only anencryption technique of creating an encrypted data as one electronicfile. The integral encryption may also means an encryption technique ofcreating the encrypted data as a plurality of electronic files by using,for example, file division and uniting software. File division techniqueis a known art, in which a plurality of electronic files are created bydividing one large size electronic file and the electronic files areexchanged. This technique may be used as the integral encryptionaccording to present invention. The attachment data 70 corresponds to“reply information” according to the first aspect.

Ninth Embodiment

FIG. 9 is a diagram showing the configuration of an informationgathering system according to a ninth embodiment of the presentinvention. In the ninth embodiment, the information gathering systemchecks whether a form of the reply matches a prescribed form.Specifically, in the ninth embodiment, the application 60 includes aroutine 62 for a format check of the attachment data 70 and a characterstring check in the attachment data 70, as shown in FIG. 9. Thereby, theattachment data 70 which sent to the host computer 10 can be alwayswritten in accordance with the prescribed form and includes appropriatecharacter strings. FIG. 10 is a diagram for describing an advantage ofthe information gathering system according to the ninth embodiment. Ifcheck function is not provided as in the upper side of FIG. 10, dataexchange may be repeated between the information gathering candidate Aand survey conductor B. In the ninth embodiment, on the other hand,check function is provided as shown in the lower side of FIG. 10,thereby it is possible to receive a reply in appropriate form by onedata exchange.

Tenth Embodiment

FIG. 11 is a diagram showing the configuration of an informationgathering system according to a tenth embodiment of the presentinvention. For example, when a guarantee or a certain certificates isgathered, those documents may need seal or a signature on law. By aprocedure only using electronic data, information gathering in such acase is not easy, so the procedure using physical information media,such as paper, is necessarily used in such a case. In tenth embodiment,the following technique is used for the purpose of collecting repliesefficiently even in cases where the information to be gathered includesparticular information that is not easy to collect as digital data, suchas seal, a signature and etc.

As shown in FIG. 11, the information gathering system according to thetenth embodiment includes a host computer 210 that has a database 212.The host computer 210 is designed so that the encrypted e-mail M havinga keycode can be sent to the terminal unit 50 from the host computer210, as in the host computer 10. In the tenth embodiment, informationdata of two-dimensional bar-code X is added to the e-mail M as a keycode(for example, the digital data of the two-dimensional bar-code X isadded to the e-mail M as an attachment data).

In the tenth embodiment, an application 260 is installed in the terminalunit 50. The application 260 decrypts the e-mail M and opens the data ofthe two-dimensional bar-code X on the terminal unit 50 in a state wherethe two-dimensional bar-code X can be printed out (for example, in astate where data of the two-dimensional bar-code X is opened ingeneralized text editor or the like). Thereby, the information gatheringcandidate A can cause a printer 80 connecting to the terminal unit 50 toprint out a document 82 on which the two-dimensional bar-code X isprinted. In the tenth embodiment, the information gathering candidate Awrites the reply on the document 82, and then the information gatheringcandidate A put a signature or a seal on the document 82. Thereafter,the information gathering candidate A mails the document 82 to thelocation of the host computer 210.

The host computer 210 is in connection with a scanner 218. The scanner218 can read the two-dimensional bar-code X. In addition, the scanner218 can read information 84 written in the predetermined position of thedocument 82 so as to convert the information 84 into electronic data. Ascanner that can automatically read a plurality of sheets of paper maybe preferably used as the scanner 218.

Depending on purpose or use of the document 82, the information 84includes various contents. In the case where a seal or a signature isthe information to be gathered, the signature written in the document 82is scanned. In the case where the document to be gathered is a guaranteeor a certificate, on the other hand, a seal or the like andidentification number of the gathered document are scanned. In the caseof gathering questionnaires, the replies in the questionnaires arescanned.

The host computer 210 includes a data storing program 216. The datastoring program 216 recognizes the information of the two-dimensionalbar-code X, which the scanner 218 read, as a keycode. Thereafter, thedata storing program 216 identifies a particular memory address of thedatabase 212 in accordance with the keycode. The data storing program216 stores the electronic data of the information 84 into one of thedata storage areas of the database 212 in accordance with the memoryaddress identified on the basis of the keycode.

As described above, the information gathering system according to thetenth embodiment can perform information gathering with high efficiencyeven if non digital data such as a signature or a seal is included inthe information to be gathered.

In the tenth embodiment, the two-dimensional bar-code X which serves asa keycode is printed on the document 82. If an easy-decodable code isused as a keycode, forgery of the keycode or the reliability fall ofreply information may occur. However, it is relatively difficult forhumans to read two-dimensional bar-code. Thereby, the informationgathering system according to the tenth embodiment can gather a replywith high efficiency while suppressing the forgery of the keycode andthe reliability fall of reply information.

Although not shown, in the tenth embodiment, a decryption password fordecrypting the e-mail M and a decoding password for decoding thetwo-dimensional bar-code X are created. The decryption password is sentto the terminal unit 50. On the other hand, it is desirable that thedecoding password is stored and kept in secret in the host computer 210.Thereby, forgery of the keycode can be suppressed.

It should be noted that there is no limitation in particular in the sizeof the document 82. Small paper media, such as a postcard, may be used.The material of the document 82 is not limited to paper. The reason isthat it is possible to use at least an object which has a flat shape andbe made of a material which can be put a sign or a seal thereon as asubstitution of the document 82. In the tenth embodiment, the document82 corresponds to “information printed material” according to the secondaspect.

Obviously many modifications and variations of the present invention arepossible in the light of the above teachings. It is therefore to beunderstood that within the scope of the appended claims the inventionmay be practiced otherwise than as specifically described.

The entire disclosure of Japanese Patent Application No. 2009-031140,filed on Feb. 13, 2009, including specification, claims, drawings, andsummary, on which the Convention priority of the present application isbased, is incorporated herein by reference in its entirety.

What is claimed is:
 1. An information gathering system comprising: ahost unit in communication with a network and including a memory unit,the memory unit having a plurality of data storage areas, each of thedata storage areas being respectively associated with one of a pluralityof memory addresses; and a terminal unit in communication with thenetwork, wherein the host unit creates e-mail including one or moresorts of identification information, wherein the identificationinformation is associated with one of the memory addresses of theplurality of memory addresses in accordance with a predeterminedcorrespondence rule, encrypts at least the one or more sorts ofidentification information, and sends the e-mail that includes the oneor more sorts of identification information that has been encrypted tothe network; the terminal unit receives from the network the e-mailincluding the one or more sorts of identification information that hasbeen encrypted, decrypts the one or more sorts of identificationinformation received from the network, using a decryption password sentto the terminal unit, and causes a printer to print information printedmaterial so that the one or more sorts of identification informationincluded in the e-mail that has been received and decrypted is printedon the information printed material, and the host unit reads theinformation printed material on which the one or more sorts ofidentification information has been printed, decodes the one or moresorts of identification information printed on the information printedmaterial using a decoding password and converts written informationwritten in a predetermined position of the information printed materialinto data, and stores the data of the written information in one of thedata storage areas of the plurality of data storage areas as a reply ofan information gathering candidate so that a memory address of the oneof the data storage areas corresponds to a memory address associatedwith the one or more sorts of identification information printed on theinformation printed material.
 2. The information gathering systemaccording to claim 1, wherein the terminal unit causes the printer toprint the information printed material so that the one or more sorts ofidentification information is printed as a two-dimensional bar-code.