CN111953658A - Paperless intelligent conference management system and method - Google Patents

Paperless intelligent conference management system and method Download PDF

Info

Publication number
CN111953658A
CN111953658A CN202010697198.9A CN202010697198A CN111953658A CN 111953658 A CN111953658 A CN 111953658A CN 202010697198 A CN202010697198 A CN 202010697198A CN 111953658 A CN111953658 A CN 111953658A
Authority
CN
China
Prior art keywords
client
data
chairman
machine
conference management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010697198.9A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Haobo Information Technology Co Ltd
Original Assignee
Guangzhou Haobo Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Haobo Information Technology Co Ltd filed Critical Guangzhou Haobo Information Technology Co Ltd
Priority to CN202010697198.9A priority Critical patent/CN111953658A/en
Publication of CN111953658A publication Critical patent/CN111953658A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms

Abstract

The invention discloses a paperless intelligent conference management system and a paperless intelligent conference management method, wherein the paperless intelligent conference management system comprises the following steps: the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit; the chairman machine and the client are interconnected by adopting the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression; the paperless intelligent conference management system is high in reliability and confidentiality.

Description

Paperless intelligent conference management system and method
Technical Field
The invention relates to a paperless intelligent conference management system and a paperless intelligent conference management method.
Background
In recent years, wireless conference system products such as wireless conference discussion systems and wireless voting systems have appeared. The wireless system can bring great convenience to the equipment installation of engineering technicians and the use and operation of users (for example, because no equipment is connected, some system equipment can not be fixedly installed any more, and therefore, the users can conveniently adjust the system configuration according to the conference scale, and the like). The main drawback of wireless conferencing systems is the relatively low reliability and privacy.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a paperless intelligent conference management system and method with higher reliability and confidentiality.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a paperless intelligent conference management system, comprising:
the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit;
the chairman machine and the client are interconnected by the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression.
Preferably, the chairman end is composed of at least one chairman machine which transmits with the client by adopting a local area network.
Furthermore, the client consists of more than one client which transmits with the chairman machine by adopting a local area network.
Preferably, the encryption unit is a ZIP encryption compression unit.
Further, the decryption unit is a ZIP decryption decompression unit.
Another technical problem to be solved by the present invention is to provide a conference management method, including:
accessing at least one chairman machine and more than one client machine to the same local area network;
the data information between the chairman machine and the client machine is encrypted, compressed, decrypted and decompressed through a secret key;
the chairman machine is connected with the data transmission protocol through a WebSokct connection protocol;
and before the client is connected with the chairman machine, binding association is carried out after account data verification and MAC decryption verification.
Preferably, when the client is actively connected with the chairman, the chairman verifies whether the MAC address of the currently connected client is in the same local area network, and simultaneously verifies whether the data information of the current authorized account number is consistent and whether the decrypted MAC address information is consistent with the MAC address of the currently connected client.
Preferably, before transmitting the data packet, the transmitting party verifies the integrity of the data packet, then performs packetization or packetization according to the size of the data packet, and performs encryption transmission on the finally transmitted data packet.
Further, when receiving the data packet, the receiving party firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet.
Preferably, the conference material is downloaded via the second offline data unit when the client is not in the local area network or is not connected to the chairman, and the second offline data unit is synchronized to the first offline data unit when the client is in the local area network or is connected to the chairman.
Description of the principle:
the chairman machine inputs data such as account number data information and MAC address information in a first database, when a client requests to be connected with the chairman machine, the client encrypts and compresses the account number data information and the MAC address information and then sends the encrypted and compressed account number data information and MAC address information to the chairman machine, the chairman machine decrypts and decompresses the encrypted and decompressed account number data information and MAC address information and compares the obtained account number data information and MAC address information with the account number data information and MAC address information stored in the first database, when the comparison is consistent, verification is passed, the client is prevented from illegally entering a conference system, when the chairman machine sends data information to a registered client, the MAC address is directly sent to the corresponding client
The invention has the beneficial effects that:
1. adopting a C/S architecture, multiple terminals under the same local area network can carry out conference and off-line conference at the same time, and the subject material file is transmitted after being encrypted and compressed by ZIP; under the conventional condition, one chairman machine and a plurality of clients are adopted, data are safely transmitted by using the same local area network, and the safety of the plurality of clients is controlled;
2. the receiving party needs to carry out ZIP decryption and decompression, the receiving party can obtain a complete data packet and display the conference topic and conference materials, the ZIP is utilized to carry out encryption compression and decryption decompression mechanisms through a secret key, the data packet is safe in the transmission process, and meanwhile, the ZIP is utilized to compress the packet and compress the document, the obtained transmission data packet is small, so that the transmission speed is higher, and the experience is better;
3. the method comprises the steps of encoding and sub-packaging transmission data, enabling a receiver to need to arrange data packets, decode and display the data packets, verifying the integrity of the data packets before transmitting the data packets through a WebSokct connection protocol and a data transmission protocol, then performing sub-packaging or packet-packaging according to the size of the data packets, and performing encryption transmission on the finally transmitted data packets. When receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet;
4. the method comprises the steps that account authorization is needed before a client is connected with a chairman machine, MAC is bound and associated after being encrypted by MD5, whether the client is in a valid local area network or not is checked, encryption is carried out according to the MAC address of the client, and binding and association are carried out with authorized account information. When the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account information is consistent or not and whether the encrypted MAC address information is consistent with the currently connected MAC address or not are verified. Preventing the client from illegally entering the conference system and using all functions in the system;
5. after encrypting the conference information and the conference materials through the MAC address, the chairman appoints to send a certain client, or the client actively synchronizes the conference information and the conference materials of the conference, so that the inconsistency of the conference information of the client with the conference information and the conference materials is prevented;
6. the method can provide the offline data packet of the laws and regulations and the offline data packet of the security materials, and when the client is not in the local area network or is not connected with the chairman machine, the client can normally inquire the laws and regulations and the security materials.
Drawings
Fig. 1 is a schematic diagram of a paperless intelligent conference management system according to the present invention.
Detailed Description
The present invention is further described with reference to the following drawings and specific examples so that those skilled in the art can better understand the present invention and can practice the present invention, but the examples are not intended to limit the present invention.
Examples
Referring to fig. 1, a paperless intelligent conference management system includes:
the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit;
the chairman machine and the client are interconnected by the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression.
The chairman end is composed of at least one chairman machine which adopts local area network transmission with the client.
The client consists of more than one client which is transmitted with the chairman machine by adopting a local area network.
The encryption unit is a ZIP encryption compression unit.
The decryption unit is a ZIP decryption decompression unit.
A conference management method, comprising:
accessing at least one chairman machine and more than one client machine to the same local area network;
the data information between the chairman machine and the client machine is encrypted, compressed, decrypted and decompressed through a secret key;
the chairman machine is connected with the data transmission protocol through a WebSokct connection protocol;
and before the client is connected with the chairman machine, binding association is carried out after account data verification and MAC decryption verification.
When the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account data information is consistent or not and whether the decrypted MAC address information is consistent with the currently connected MAC address or not are verified.
Before transmitting the data packet, the transmitter verifies the integrity of the data packet, then performs sub-packet or packet combination according to the size of the data packet, and performs encryption transmission on the finally transmitted data packet.
When receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet.
And when the client is in the local area network or is connected with the chairman machine, the second offline data unit synchronizes to the first offline data unit.
The main business process is as follows:
1. preparation before meeting
Login management: the chairman machine realizes the authority control of background login and realizes the login management of a user name and a password.
And (3) agenda management: the chairman machine realizes the conference agenda editing.
Conference materials: conference material may be uploaded and copied to the chairman side.
Distributing files: and the chairman machine issues the conference materials to the client through operation.
2. In-meeting interaction and control
And (3) meeting information: the chairman displays the details of the list of participants (names and departments) and the subject of the current conference discussion.
And (3) conference files: the client displays and opens the conference file distributed by the administrator.
Subject material annotation: the client user annotates the meeting material.
3. Post meeting filing
And (3) archiving the conference: the chairman machine and the client machine can package and record the conference process file. Conference materials can be of two types: one is uploaded by the chairman, and one is received by the client (possibly with the addition of annotations and the like), and the two types of landings are stored locally and output to a path or a directory. The file needs to be stored safely, so that irrelevant persons can not access the file randomly and the user without authority can not see the file of other persons participating in the meeting (because the client is not bound to a specific individual, irrelevant persons cannot see the record of the meeting of other persons).
A chairman machine edition:
user management: the users can be added, deleted and changed, and the basic attributes of the users comprise user names, departments and passwords. The user-related information may be output as a configuration file (to be encrypted) for use by the client.
Department management: the departments can be added or deleted, and the basic attributes of the departments comprise the names of the departments and the relations of the departments (1: N tree).
Device management (client management): the device can be added or deleted, basic attributes of the device comprise name and MAC, and the registered client list is supported to be displayed. Terminals that do not register a MAC address are not allowed to access the chairman.
Conference management: the conference host can set conference information including conference time (time space selection), conference place (text box input), participants (adding search personnel name or checking/selecting corresponding personnel after listing the personnel according to department (tree representation)) through the chairman machine before the conference starts. After the basic information of the conference is set, the subject of the conference can be set in detail, including the subject name and the related subject material.
Subject material management: material uploading: the agenda may be copied or otherwise transferred to the chairman when the chairman sets the material for the issue. The material supports Word, Excel, PPT, PDF, audio and video and the like. Large documents are proposed to be stored and transmitted in compressed packages. Whether the subject material can be automatically destroyed and the automatic destruction time are set (the destruction means that a destruction time is assigned when the host issues the files, and the client automatically destroys the files issued by the conference after the time is exceeded). The subject material sets the separate storage space invisible to non-logged users.
History of meeting records: the chairman can record historical meetings and basic viewable attributes include meeting time, meeting location, meeting attendees, meeting agenda, synchronized clients, etc. And supporting inquiry according to dates and meeting keywords.
And (3) conference issuing: the conference host sends the conference related information including the topic directory and the materials of each topic by one key of the chairman before the conference starts. The clients receive synchronously in the power-on state. The transmission can adopt a Wifi hotspot mode, a currently connected client (in a list form, can be selected) can be selected for synchronization, and the client which synchronizes the conference and the materials is recorded.
Selecting an agenda:
the conference host can select the current discussion subject to start or end the current subject through the chairman when the conference is in progress.
Log management: and recording all operation logs of the chairman machine.
Client edition
Logging in: and logging in according to the user name and the password configured by the chairman machine.
And (4) participating in the conference: after the participants click to enter the conference, the conference can be started, and the conference process is started after the conference is started. The client will display in real time the topic currently being selected by the conference host at the client. The participants can view the subject and subject material.
And (3) synchronous meeting: and the conference issuing function corresponding to the chairman is used for synchronizing the conference agenda and the subject material of the conference between the client and the chairman before the conference. Wifi access modes and the like can be selected between the client and the chairman machine, and the client can be accessed and synchronized when approaching the chairman machine.
Material annotation: the participants can label the materials in the subjects, support the annotation of Word (convertible into PDF for processing), Excel (convertible into PDF for processing), PPT (convertible into PDF for processing) and PDF format materials, and add the annotation to the materials.
Log management: all oplogs of the client are recorded.
The chairman machine carries out encryption compression on selected materials according to the meeting establishment, the compression security level is set to be the highest 6 levels, a lossless data compression mechanism is used for compression, a string of arbitrary data is converted into data with the length of 1/2-1/5 according to a certain rule, and the data can be restored to an original data format according to the corresponding rule.
The realization principle is as follows:
taking a value in 256 possibilities according to a byte, repeated bytes are necessarily available, wherein some bytes are more frequently appeared, and some bytes are less frequently appeared, for example, in an ASCll file, some symbols are rarely used, letters and data are more used, the use frequencies of the letters are different, and a file stream with a small length is generated according to a rule, which is called a ZIP compression and decompression core algorithm; and an AES encryption and decryption mechanism is used in the compression process, so that the transmitted file is safer. The compressed file is converted into binary data, and 2048 bytes are transmitted each time by using a WebSocket transmission and packetization mode, so that the transmission speed is higher, the transmitted data is easy to monitor, and the transmitted data is safer.
And when the client is started, WebSocket interaction is used, and when the client is connected with the chairman machine, verification is carried out according to the MAC address, the authorized account and the password of the chairman machine. When the chairman machine automatically initiates a file synchronization command, the client machine automatically creates a new received file stream space after receiving the command, the received file streams are overlapped in the original file stream every time until the chairman machine initiates a finishing command, and the client machine performs packet combining processing to obtain a complete binary file stream and writes the complete binary file stream into a new local file. And according to the file encryption key, decrypting and decompressing the file received by the local computer according to a ZIP lossless data compression mechanism principle to obtain a final complete original file.
The invention has the beneficial effects that:
1. adopting a C/S architecture, multiple terminals under the same local area network can carry out conference and off-line conference at the same time, and the subject material file is transmitted after being encrypted and compressed by ZIP; under the conventional condition, one chairman machine and a plurality of clients are adopted, data are safely transmitted by using the same local area network, and the safety of the plurality of clients is controlled;
2. the receiving party needs to carry out ZIP decryption and decompression, the receiving party can obtain a complete data packet and display the conference topic and conference materials, the ZIP is utilized to carry out encryption compression and decryption decompression mechanisms through a secret key, the data packet is safe in the transmission process, and meanwhile, the ZIP is utilized to compress the packet and compress the document, the obtained transmission data packet is small, so that the transmission speed is higher, and the experience is better;
3. the method comprises the steps of encoding and sub-packaging transmission data, enabling a receiver to need to arrange data packets, decode and display the data packets, verifying the integrity of the data packets before transmitting the data packets through a WebSokct connection protocol and a data transmission protocol, then performing sub-packaging or packet-packaging according to the size of the data packets, and performing encryption transmission on the finally transmitted data packets. When receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet;
4. the method comprises the steps that account authorization is needed before a client is connected with a chairman machine, MAC is bound and associated after being encrypted by MD5, whether the client is in a valid local area network or not is checked, encryption is carried out according to the MAC address of the client, and binding and association are carried out with authorized account information. When the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account information is consistent or not and whether the encrypted MAC address information is consistent with the currently connected MAC address or not are verified. Preventing the client from illegally entering the conference system and using all functions in the system;
5. after encrypting the conference information and the conference materials through the MAC address, the chairman appoints to send a certain client, or the client actively synchronizes the conference information and the conference materials of the conference, so that the inconsistency of the conference information of the client with the conference information and the conference materials is prevented;
6. the method can provide the offline data packet of the laws and regulations and the offline data packet of the security materials, and when the client is not in the local area network or is not connected with the chairman machine, the client can normally inquire the laws and regulations and the security materials.
The above-described embodiments of the present invention are not intended to limit the scope of the present invention, and the embodiments of the present invention are not limited thereto, and various other modifications, substitutions and alterations can be made to the above-described structure of the present invention without departing from the basic technical concept of the present invention as described above, according to the common technical knowledge and conventional means in the field of the present invention.

Claims (10)

1. A paperless intelligent conference management system, comprising:
the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit;
the chairman machine and the client are interconnected by the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression.
2. The paperless intelligent conference management system of claim 1, wherein: the chairman end is composed of at least one chairman machine which adopts local area network transmission with the client.
3. The paperless intelligent conference management system of claim 2, wherein: the client consists of more than one client which is transmitted with the chairman machine by adopting a local area network.
4. The paperless intelligent conference management system of claim 1, wherein: the encryption unit is a ZIP encryption compression unit.
5. The paperless intelligent conference management system of claim 4, wherein: the decryption unit is a ZIP decryption decompression unit.
6. A paperless intelligent conference management method is characterized by comprising the following steps:
accessing at least one chairman machine and more than one client machine to the same local area network;
the data information between the chairman machine and the client machine is encrypted, compressed, decrypted and decompressed through a secret key;
the chairman machine is connected with the data transmission protocol through a WebSokct connection protocol;
and before the client is connected with the chairman machine, binding association is carried out after account data verification and MAC decryption verification.
7. The paperless intelligent conference management method according to claim 6, wherein: when the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account data information is consistent or not and whether the decrypted MAC address information is consistent with the currently connected MAC address or not are verified.
8. The paperless intelligent conference management method according to claim 6, wherein: before transmitting the data packet, the transmitter verifies the integrity of the data packet, then performs sub-packet or packet combination according to the size of the data packet, and performs encryption transmission on the finally transmitted data packet.
9. The paperless intelligent conference management method according to claim 8, wherein: when receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet.
10. The paperless intelligent conference management method according to claim 6, wherein: and when the client is in the local area network or is connected with the chairman machine, the second offline data unit synchronizes to the first offline data unit.
CN202010697198.9A 2020-07-20 2020-07-20 Paperless intelligent conference management system and method Pending CN111953658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010697198.9A CN111953658A (en) 2020-07-20 2020-07-20 Paperless intelligent conference management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010697198.9A CN111953658A (en) 2020-07-20 2020-07-20 Paperless intelligent conference management system and method

Publications (1)

Publication Number Publication Date
CN111953658A true CN111953658A (en) 2020-11-17

Family

ID=73341159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010697198.9A Pending CN111953658A (en) 2020-07-20 2020-07-20 Paperless intelligent conference management system and method

Country Status (1)

Country Link
CN (1) CN111953658A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596385A (en) * 2021-08-16 2021-11-02 上海精仪达智能科技有限公司 Interactive terminal based on multimedia paperless conference intelligent application
CN115001860A (en) * 2022-07-20 2022-09-02 广州市保伦电子有限公司 Safety management system for paperless digital conference

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007579A (en) * 2014-04-24 2015-10-28 中国移动通信集团广东有限公司 Wireless local area network access authentication method and terminal
US9270941B1 (en) * 2015-03-16 2016-02-23 Logitech Europe S.A. Smart video conferencing system
CN106254303A (en) * 2016-04-11 2016-12-21 上海建朗信息科技有限公司 It is prone to the intelligent conference system that combination is coordinated to control
CN108173667A (en) * 2018-01-11 2018-06-15 四川九洲电器集团有限责任公司 A kind of intelligent meeting system and implementation method
CN108206926A (en) * 2016-12-20 2018-06-26 北京视联动力国际信息技术有限公司 A kind of method and device of conference management client and exterior terminal state synchronized
CN109561107A (en) * 2019-01-04 2019-04-02 广东电网有限责任公司 A kind of secrecy conference system based on WIFI

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007579A (en) * 2014-04-24 2015-10-28 中国移动通信集团广东有限公司 Wireless local area network access authentication method and terminal
US9270941B1 (en) * 2015-03-16 2016-02-23 Logitech Europe S.A. Smart video conferencing system
CN106254303A (en) * 2016-04-11 2016-12-21 上海建朗信息科技有限公司 It is prone to the intelligent conference system that combination is coordinated to control
CN108206926A (en) * 2016-12-20 2018-06-26 北京视联动力国际信息技术有限公司 A kind of method and device of conference management client and exterior terminal state synchronized
CN108173667A (en) * 2018-01-11 2018-06-15 四川九洲电器集团有限责任公司 A kind of intelligent meeting system and implementation method
CN109561107A (en) * 2019-01-04 2019-04-02 广东电网有限责任公司 A kind of secrecy conference system based on WIFI

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596385A (en) * 2021-08-16 2021-11-02 上海精仪达智能科技有限公司 Interactive terminal based on multimedia paperless conference intelligent application
CN115001860A (en) * 2022-07-20 2022-09-02 广州市保伦电子有限公司 Safety management system for paperless digital conference

Similar Documents

Publication Publication Date Title
US10114969B1 (en) Ultra-secure blockchain-based electronic information transfer system
USRE45348E1 (en) Method and apparatus for intercepting events in a communication system
CN105051750B (en) System and method for encrypted file system layer
US10554394B1 (en) Toggle mute
US7080260B2 (en) System and computer based method to automatically archive and retrieve encrypted remote client data files
US20160241525A1 (en) Systems and methods of transmitting data
CN101796768B (en) Communication system, base station device, and terminal device
US20130283060A1 (en) Seamless Remote Synchronization and Sharing of Uniformly Encrypted Data for Diverse Platforms and Devices
US7392402B2 (en) Method and apparatus for data integration security
CA2837716A1 (en) Systems and methods for secure distributed storage
US9047478B2 (en) Electronic file access control system and method
CN110190962A (en) A kind of leakage-preventing file security sharing method
CN111953658A (en) Paperless intelligent conference management system and method
KR102399667B1 (en) Security system for data trading and data storage based on block chain and method therefor
US8645687B2 (en) Electronic file access control system and method
JP2009146450A (en) File access system, recording medium and computer program
WO2020036024A1 (en) System and method for secret sharing of files
WO2000062472A1 (en) System and method for transmission of encrypted files from a central server computer to a remote computer
CN108900869B (en) Communication group information encryption and decryption method and system
JPH11212850A (en) Encipherment common file transmission and reception system
KR101907986B1 (en) Secure information sharing method and system for remote consulting and collaboration
JP5995341B1 (en) Browsing file browsing method, browsing file browsing program, information sharing system, information sharing system server
JP2003016040A (en) Network system, apparatus for information processing, method therefor, recording medium and program
WO2022137779A1 (en) Data processing system
WO2006027968A1 (en) Live and on-demand broadcast system, delivering software, receiving software, transmission system, management system, live and on-demand broadcast method, and provider business method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117

RJ01 Rejection of invention patent application after publication