Electronic whiteboard and exchange method thereof
Technical field
The present invention relates to a kind of interactive electric whiteboard, particularly the method for operation of multi-user electronic blank.
Background technology
Electronic whiteboard is developed by common blank, along with the development of technology and the needs in market, interactive electric whiteboard occurred.Interactive electric whiteboard can carry out information communication with computer, electronic whiteboard is connected to PC, and utilize projector that the content on the PC is projected on the electronic whiteboard screen, under the support of special application program, can construct a large-screen, interactively cooperation meeting or teaching environment.Utilize specific pen with means for holding it in right position to replace mouse at the enterprising line operate of blank, can move Any Application, any operation that can edit file, note, preservation etc. utilizes keyboard and mouse to realize on computers.The electronic whiteboard operation principle is divided into two kinds of pressure sensitivity principle and laser following principle.The touch blank of use pressure sensitivity principle is equivalent to a touch-screen of computer, is a kind of human-computer interaction formula input equipment of finishing the work of appointment with shown option on finger or style of writing and the screen.There is two-layer pressure-sensitive film this electronic whiteboard inside, and when whiteboard surface a bit was under pressure, two membranes caused short circuit in this, and the controller of electronic whiteboard detects the coordinate figure of pressure spot, sends into computer through the RS232 interface.Use each generating laser of both sides, blank upper end of laser following principle.After blank started, generating laser sent laser and strafes whiteboard surface, and handtailor pen has induction laser function, thus the position of feedback pen.
The distributed electronic blank refers to that the shown information dispersion of each terminal is stored on each terminal node, each terminal can be operated electronic whiteboard separately, be characterized in high efficiency, but make mistakes easily, the displaying contents of electronic whiteboard is edited such as the party A-subscriber, and the party B-subscriber really attempts to close current interface of browsing.So just produce operating collision, thereby influence the operate as normal of electronic whiteboard.
Therefore, be necessary to invent a kind of interactive system of new electronic whiteboard and method to overcome the problems referred to above.
Summary of the invention
Because the above-mentioned defective of prior art, the embodiment of the invention provides a kind of electronic whiteboard interactive system based on token and method.
A kind of multi-user electronic blank method of work based on token comprises:
Step 1: request end structure token message is sent to service end with token message;
Step 2: the request end obtains answer message that service end returns to obtain the certificate of authority;
Step 3: the request end utilizes the certificate of authority that obtains that the message that sends is encapsulated, and the message that will seal after changeing sends to service end.
According to said method, it is characterized in that whether the request end regular check has the certificate of authority, execution in step 1 to 3 under the situation that does not possess the certificate of authority.
According to said method, it is characterized in that the token message in the step 1 comprises user ID and the speech duration of request end.
According to said method, it is characterized in that step 3 specifically comprises utilizes the certificate of authority that the message that sends is encrypted.
A kind of method of work of the multi-user electronic blank based on token comprises:
Step 1: obtain user's solicitation message, each user's solicitation message is buffered in the corresponding message queue;
Step 2: each message queue of training in rotation successively, solicitation message is verified;
Step 3: send the certificate of authority to the user by checking;
Step 4: the decruption key of updated stored is complementary with maintenance and the current certificate of authority.
According to said method, it is characterized in that, also comprise after the step 4:
Step 5: obtain messages sent by users;
Step 6: utilize current decruption key that message is decrypted, the message of successful decryption is sent on the electronic whiteboard.
According to said method, it is characterized in that: step 3 also is included in and starts timer when sending the certificate of authority; Also comprise after the step 6: whether then to check timer, under situation then, the next message queue of training in rotation is verified the solicitation message in the next message queue.
A kind ofly comprise request end and service end for the system based on the multi-user electronic blank of token, wherein the request end has:
Constructing module: be used for structure and have the token message of customer parameter;
Sending/receiving module: be used for sending message to service end, and receive message from service end;
Parsing module: be used for to resolve the message that obtains from service end to obtain the certificate of authority;
Service end has:
Sending/receiving module: be used for to request end transmission message, and receive message from the request end;
Memory module: be used for the token message that the request end sends is buffered in message queue the corresponding request end of each message queue;
Authentication module: be used for obtaining token message with the legitimacy of checking request end from message queue, when legal in the request end, to signal of sending/receiving module transmission;
Timer: when the sending/receiving module sends the certificate of authority to the request end, start timer.
According to said system, it is characterized in that, described service end also has a generation module, under the situation that authentication module is proved to be successful, generation module generates the certificate of authority and the decruption key corresponding with this certificate of authority, service end sends to the request end with the certificate of authority, and decruption key is stored in the memory module.
Description of drawings
Fig. 1 is the electric whiteboard system structure chart of prior art.
Fig. 2 is multi-user electronic whiteboard system figure of the present invention.
Fig. 3 is the request end workflow diagram.
Fig. 4 is the service end workflow diagram.
Fig. 5 is the transmitting terminal system construction drawing.
Fig. 6 is the service end system structure chart.
Embodiment
Fig. 1 is the system diagram of electronic whiteboard.Wherein, 11 represent computer, and it has display, and 12 represent projecting apparatus, and it is connected with computer 11 by communication link 15,13 representative touching pens, and electronic whiteboard 14 is connected with computer by communication link 16;
Wherein, this touching pen contact electronic whiteboard, logical circuit in the electronic whiteboard is felt contact position, then touch coordinate is converted into the signal of telecommunication and sends to computer, computer receives and resolves this signal of telecommunication, be translated into the signal that drives mouse, control the operation of computer thus, the computer interface after projecting apparatus will be operated is again delivered on electronic whiteboard.Equally, the user also can operate on computers, and projecting apparatus is delivered the picture of computer on electronic whiteboard.
Fig. 2 is multi-user electronic whiteboard system figure.User A, user B are connected with electronic whiteboard by router with user C.For example: user A, user B and user C use the electronic whiteboard call for Votes in meeting, and all are controlled electronic whiteboard with the terminal that can operate separately per family.For example user A thinks speech, and at this moment user A sends speech then at the enterprising edlin of the terminal of oneself, and electronic whiteboard is presented at the speech of user A on the screen.When a plurality of users need make a speech, just need a kind of mechanism, the operation that guarantees these users is glitch-free, and is transparent concerning the user.Therefore, in having a plurality of users' system, need to set a service end, user terminal A for example, this service end manages all users' speech, speech is presented on the curtain of electronic whiteboard in a certain order.
Fig. 3 is request end method of work flow chart.
Step 1: user B thinks speech, at this moment user B need check whether have the certificate of authority, this certificate of authority is the certificate of authority that obtains from service end (supposing user A), if B has the effective certificate of authority, then B will make a speech and send to A together with the certificate of authority, after A obtains this speech, it is presented on the curtain of electronic whiteboard; Preferably, user B utilizes the effective certificate of authority that speech is encrypted, message after will encrypting then sends to service end A, service end utilizes the current effective decruption key that message is decrypted, if successful decryption proves that then user B has the effective certificate of authority, the speech after service end A will decipher this moment is presented on the electronic whiteboard, if deciphering failure, this illustrates that this certificate of authority is invalid, and service end A reminds the certificate of user B to lose efficacy, please applies for new certificate again;
If user B finds oneself not have the certificate of authority, perhaps the certificate of authority is out-of-date, then token of user B structure, this token comprises id number and the some other parameter of oneself, preferably, these parameters can be the priority of user B, some parameters such as the number of words of speech;
Step 2: the message that user B will have token is sent to service end, user B can send this message when the user wants to make a speech, also can manually be set by user B, just send at set intervals a token message to service end to obtain the effective certificate of authority.
Step 3: wait for the answer message of service end, user B may obtain following answer message: (1) certificate of authority, service end determine right to speak is sent to user B, and user B can utilize this certificate of authority to make a speech; (2) refuse information, service end differentiates that to the user back this user of discovery does not possess the speech qualification, and perhaps owing to there are other users to make a speech, can't authorize this moment to user B, and at this moment service end will send a refuse information to user B.
Fig. 4 is service end method of work flow chart.
Step 1: service end is waited for user's request, and all users' request will be buffered in the message queue, and this message queue is stored in the memory module, and memory module can be internal memory, hard disk or other storage mediums; Preferentially, user's request message enters a message queue according to time sequencing, and perhaps, for each user sets a message queue, the request of different user comes in the different message queues, server these formations of poll successively.Like this, just avoided the appearance of situation of malice application of a user's a plurality of requests of continuous transmission.
Step 2: service end verifies that to request checking comprises the identity to the user, and the series of parameters such as reasonability of speech are judged;
Step 3: service end sends answer message, and service end sends the certificate of authority to the user by authentication, and the decruption key with self is updated to the consistent key of the current certificate of authority simultaneously; Service end waits for a period of time, from obtaining next one application, repeating step 1-3 to being listed as.
Fig. 5 and Fig. 6 are the structured flowcharts of realizing said method.The system construction drawing of Fig. 5 corresponding requests end, it comprises sending/receiving module, constructing module and parsing module.Wherein, the sending/receiving module is used for sending message to service end, perhaps receives message from service end, and preferably, this sending module also possesses retransmitting function; Constructing module is used for structure and possesses the token that self indicates, and this token is encapsulated, and parsing module is used for resolving the message of obtaining from the sending/receiving module, to obtain the effective certificate of authority.The system construction drawing of Fig. 6 corresponding with service end, this service end comprises sending/receiving module, authentication module, memory module, generation module and timer.Wherein, the sending/receiving module is used for sending message and receiving message from the user to the user; Memory module is stored the token message that one or more formations receive from the user with buffer memory, authentication module is used for obtaining the token message of formation, with the legitimacy of checking token, send the certificate of authority, generation module for generating the certificate of authority and the decruption key corresponding with the certificate of authority to legal users then; The sending/receiving module starts timer when sending the certificate of authority to the request end, the timer countdown, and after the time of advent, authentication module obtains next token message to verify its legitimacy from the message queue of memory module storage at timer.
The above only is several specific embodiment of the present invention, and above embodiment only is used for technical scheme of the present invention and inventive concept are explained and unrestricted claim scope of the present invention.All technical staff in the art in conjunction with prior art, by the available other technologies scheme of logic analysis, reasoning or limited experiment, also should be considered to drop within the claim protection range of the present invention on the inventive concept basis of this patent.