CN111953658A - Paperless intelligent conference management system and method - Google Patents
Paperless intelligent conference management system and method Download PDFInfo
- Publication number
- CN111953658A CN111953658A CN202010697198.9A CN202010697198A CN111953658A CN 111953658 A CN111953658 A CN 111953658A CN 202010697198 A CN202010697198 A CN 202010697198A CN 111953658 A CN111953658 A CN 111953658A
- Authority
- CN
- China
- Prior art keywords
- client
- data
- chairman
- machine
- conference management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
- H04L69/162—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
Abstract
The invention discloses a paperless intelligent conference management system and a paperless intelligent conference management method, wherein the paperless intelligent conference management system comprises the following steps: the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit; the chairman machine and the client are interconnected by adopting the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression; the paperless intelligent conference management system is high in reliability and confidentiality.
Description
Technical Field
The invention relates to a paperless intelligent conference management system and a paperless intelligent conference management method.
Background
In recent years, wireless conference system products such as wireless conference discussion systems and wireless voting systems have appeared. The wireless system can bring great convenience to the equipment installation of engineering technicians and the use and operation of users (for example, because no equipment is connected, some system equipment can not be fixedly installed any more, and therefore, the users can conveniently adjust the system configuration according to the conference scale, and the like). The main drawback of wireless conferencing systems is the relatively low reliability and privacy.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a paperless intelligent conference management system and method with higher reliability and confidentiality.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a paperless intelligent conference management system, comprising:
the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit;
the chairman machine and the client are interconnected by the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression.
Preferably, the chairman end is composed of at least one chairman machine which transmits with the client by adopting a local area network.
Furthermore, the client consists of more than one client which transmits with the chairman machine by adopting a local area network.
Preferably, the encryption unit is a ZIP encryption compression unit.
Further, the decryption unit is a ZIP decryption decompression unit.
Another technical problem to be solved by the present invention is to provide a conference management method, including:
accessing at least one chairman machine and more than one client machine to the same local area network;
the data information between the chairman machine and the client machine is encrypted, compressed, decrypted and decompressed through a secret key;
the chairman machine is connected with the data transmission protocol through a WebSokct connection protocol;
and before the client is connected with the chairman machine, binding association is carried out after account data verification and MAC decryption verification.
Preferably, when the client is actively connected with the chairman, the chairman verifies whether the MAC address of the currently connected client is in the same local area network, and simultaneously verifies whether the data information of the current authorized account number is consistent and whether the decrypted MAC address information is consistent with the MAC address of the currently connected client.
Preferably, before transmitting the data packet, the transmitting party verifies the integrity of the data packet, then performs packetization or packetization according to the size of the data packet, and performs encryption transmission on the finally transmitted data packet.
Further, when receiving the data packet, the receiving party firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet.
Preferably, the conference material is downloaded via the second offline data unit when the client is not in the local area network or is not connected to the chairman, and the second offline data unit is synchronized to the first offline data unit when the client is in the local area network or is connected to the chairman.
Description of the principle:
the chairman machine inputs data such as account number data information and MAC address information in a first database, when a client requests to be connected with the chairman machine, the client encrypts and compresses the account number data information and the MAC address information and then sends the encrypted and compressed account number data information and MAC address information to the chairman machine, the chairman machine decrypts and decompresses the encrypted and decompressed account number data information and MAC address information and compares the obtained account number data information and MAC address information with the account number data information and MAC address information stored in the first database, when the comparison is consistent, verification is passed, the client is prevented from illegally entering a conference system, when the chairman machine sends data information to a registered client, the MAC address is directly sent to the corresponding client
The invention has the beneficial effects that:
1. adopting a C/S architecture, multiple terminals under the same local area network can carry out conference and off-line conference at the same time, and the subject material file is transmitted after being encrypted and compressed by ZIP; under the conventional condition, one chairman machine and a plurality of clients are adopted, data are safely transmitted by using the same local area network, and the safety of the plurality of clients is controlled;
2. the receiving party needs to carry out ZIP decryption and decompression, the receiving party can obtain a complete data packet and display the conference topic and conference materials, the ZIP is utilized to carry out encryption compression and decryption decompression mechanisms through a secret key, the data packet is safe in the transmission process, and meanwhile, the ZIP is utilized to compress the packet and compress the document, the obtained transmission data packet is small, so that the transmission speed is higher, and the experience is better;
3. the method comprises the steps of encoding and sub-packaging transmission data, enabling a receiver to need to arrange data packets, decode and display the data packets, verifying the integrity of the data packets before transmitting the data packets through a WebSokct connection protocol and a data transmission protocol, then performing sub-packaging or packet-packaging according to the size of the data packets, and performing encryption transmission on the finally transmitted data packets. When receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet;
4. the method comprises the steps that account authorization is needed before a client is connected with a chairman machine, MAC is bound and associated after being encrypted by MD5, whether the client is in a valid local area network or not is checked, encryption is carried out according to the MAC address of the client, and binding and association are carried out with authorized account information. When the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account information is consistent or not and whether the encrypted MAC address information is consistent with the currently connected MAC address or not are verified. Preventing the client from illegally entering the conference system and using all functions in the system;
5. after encrypting the conference information and the conference materials through the MAC address, the chairman appoints to send a certain client, or the client actively synchronizes the conference information and the conference materials of the conference, so that the inconsistency of the conference information of the client with the conference information and the conference materials is prevented;
6. the method can provide the offline data packet of the laws and regulations and the offline data packet of the security materials, and when the client is not in the local area network or is not connected with the chairman machine, the client can normally inquire the laws and regulations and the security materials.
Drawings
Fig. 1 is a schematic diagram of a paperless intelligent conference management system according to the present invention.
Detailed Description
The present invention is further described with reference to the following drawings and specific examples so that those skilled in the art can better understand the present invention and can practice the present invention, but the examples are not intended to limit the present invention.
Examples
Referring to fig. 1, a paperless intelligent conference management system includes:
the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit;
the chairman machine and the client are interconnected by the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression.
The chairman end is composed of at least one chairman machine which adopts local area network transmission with the client.
The client consists of more than one client which is transmitted with the chairman machine by adopting a local area network.
The encryption unit is a ZIP encryption compression unit.
The decryption unit is a ZIP decryption decompression unit.
A conference management method, comprising:
accessing at least one chairman machine and more than one client machine to the same local area network;
the data information between the chairman machine and the client machine is encrypted, compressed, decrypted and decompressed through a secret key;
the chairman machine is connected with the data transmission protocol through a WebSokct connection protocol;
and before the client is connected with the chairman machine, binding association is carried out after account data verification and MAC decryption verification.
When the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account data information is consistent or not and whether the decrypted MAC address information is consistent with the currently connected MAC address or not are verified.
Before transmitting the data packet, the transmitter verifies the integrity of the data packet, then performs sub-packet or packet combination according to the size of the data packet, and performs encryption transmission on the finally transmitted data packet.
When receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet.
And when the client is in the local area network or is connected with the chairman machine, the second offline data unit synchronizes to the first offline data unit.
The main business process is as follows:
1. preparation before meeting
Login management: the chairman machine realizes the authority control of background login and realizes the login management of a user name and a password.
And (3) agenda management: the chairman machine realizes the conference agenda editing.
Conference materials: conference material may be uploaded and copied to the chairman side.
Distributing files: and the chairman machine issues the conference materials to the client through operation.
2. In-meeting interaction and control
And (3) meeting information: the chairman displays the details of the list of participants (names and departments) and the subject of the current conference discussion.
And (3) conference files: the client displays and opens the conference file distributed by the administrator.
Subject material annotation: the client user annotates the meeting material.
3. Post meeting filing
And (3) archiving the conference: the chairman machine and the client machine can package and record the conference process file. Conference materials can be of two types: one is uploaded by the chairman, and one is received by the client (possibly with the addition of annotations and the like), and the two types of landings are stored locally and output to a path or a directory. The file needs to be stored safely, so that irrelevant persons can not access the file randomly and the user without authority can not see the file of other persons participating in the meeting (because the client is not bound to a specific individual, irrelevant persons cannot see the record of the meeting of other persons).
A chairman machine edition:
user management: the users can be added, deleted and changed, and the basic attributes of the users comprise user names, departments and passwords. The user-related information may be output as a configuration file (to be encrypted) for use by the client.
Department management: the departments can be added or deleted, and the basic attributes of the departments comprise the names of the departments and the relations of the departments (1: N tree).
Device management (client management): the device can be added or deleted, basic attributes of the device comprise name and MAC, and the registered client list is supported to be displayed. Terminals that do not register a MAC address are not allowed to access the chairman.
Conference management: the conference host can set conference information including conference time (time space selection), conference place (text box input), participants (adding search personnel name or checking/selecting corresponding personnel after listing the personnel according to department (tree representation)) through the chairman machine before the conference starts. After the basic information of the conference is set, the subject of the conference can be set in detail, including the subject name and the related subject material.
Subject material management: material uploading: the agenda may be copied or otherwise transferred to the chairman when the chairman sets the material for the issue. The material supports Word, Excel, PPT, PDF, audio and video and the like. Large documents are proposed to be stored and transmitted in compressed packages. Whether the subject material can be automatically destroyed and the automatic destruction time are set (the destruction means that a destruction time is assigned when the host issues the files, and the client automatically destroys the files issued by the conference after the time is exceeded). The subject material sets the separate storage space invisible to non-logged users.
History of meeting records: the chairman can record historical meetings and basic viewable attributes include meeting time, meeting location, meeting attendees, meeting agenda, synchronized clients, etc. And supporting inquiry according to dates and meeting keywords.
And (3) conference issuing: the conference host sends the conference related information including the topic directory and the materials of each topic by one key of the chairman before the conference starts. The clients receive synchronously in the power-on state. The transmission can adopt a Wifi hotspot mode, a currently connected client (in a list form, can be selected) can be selected for synchronization, and the client which synchronizes the conference and the materials is recorded.
Selecting an agenda:
the conference host can select the current discussion subject to start or end the current subject through the chairman when the conference is in progress.
Log management: and recording all operation logs of the chairman machine.
Client edition
Logging in: and logging in according to the user name and the password configured by the chairman machine.
And (4) participating in the conference: after the participants click to enter the conference, the conference can be started, and the conference process is started after the conference is started. The client will display in real time the topic currently being selected by the conference host at the client. The participants can view the subject and subject material.
And (3) synchronous meeting: and the conference issuing function corresponding to the chairman is used for synchronizing the conference agenda and the subject material of the conference between the client and the chairman before the conference. Wifi access modes and the like can be selected between the client and the chairman machine, and the client can be accessed and synchronized when approaching the chairman machine.
Material annotation: the participants can label the materials in the subjects, support the annotation of Word (convertible into PDF for processing), Excel (convertible into PDF for processing), PPT (convertible into PDF for processing) and PDF format materials, and add the annotation to the materials.
Log management: all oplogs of the client are recorded.
The chairman machine carries out encryption compression on selected materials according to the meeting establishment, the compression security level is set to be the highest 6 levels, a lossless data compression mechanism is used for compression, a string of arbitrary data is converted into data with the length of 1/2-1/5 according to a certain rule, and the data can be restored to an original data format according to the corresponding rule.
The realization principle is as follows:
taking a value in 256 possibilities according to a byte, repeated bytes are necessarily available, wherein some bytes are more frequently appeared, and some bytes are less frequently appeared, for example, in an ASCll file, some symbols are rarely used, letters and data are more used, the use frequencies of the letters are different, and a file stream with a small length is generated according to a rule, which is called a ZIP compression and decompression core algorithm; and an AES encryption and decryption mechanism is used in the compression process, so that the transmitted file is safer. The compressed file is converted into binary data, and 2048 bytes are transmitted each time by using a WebSocket transmission and packetization mode, so that the transmission speed is higher, the transmitted data is easy to monitor, and the transmitted data is safer.
And when the client is started, WebSocket interaction is used, and when the client is connected with the chairman machine, verification is carried out according to the MAC address, the authorized account and the password of the chairman machine. When the chairman machine automatically initiates a file synchronization command, the client machine automatically creates a new received file stream space after receiving the command, the received file streams are overlapped in the original file stream every time until the chairman machine initiates a finishing command, and the client machine performs packet combining processing to obtain a complete binary file stream and writes the complete binary file stream into a new local file. And according to the file encryption key, decrypting and decompressing the file received by the local computer according to a ZIP lossless data compression mechanism principle to obtain a final complete original file.
The invention has the beneficial effects that:
1. adopting a C/S architecture, multiple terminals under the same local area network can carry out conference and off-line conference at the same time, and the subject material file is transmitted after being encrypted and compressed by ZIP; under the conventional condition, one chairman machine and a plurality of clients are adopted, data are safely transmitted by using the same local area network, and the safety of the plurality of clients is controlled;
2. the receiving party needs to carry out ZIP decryption and decompression, the receiving party can obtain a complete data packet and display the conference topic and conference materials, the ZIP is utilized to carry out encryption compression and decryption decompression mechanisms through a secret key, the data packet is safe in the transmission process, and meanwhile, the ZIP is utilized to compress the packet and compress the document, the obtained transmission data packet is small, so that the transmission speed is higher, and the experience is better;
3. the method comprises the steps of encoding and sub-packaging transmission data, enabling a receiver to need to arrange data packets, decode and display the data packets, verifying the integrity of the data packets before transmitting the data packets through a WebSokct connection protocol and a data transmission protocol, then performing sub-packaging or packet-packaging according to the size of the data packets, and performing encryption transmission on the finally transmitted data packets. When receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet;
4. the method comprises the steps that account authorization is needed before a client is connected with a chairman machine, MAC is bound and associated after being encrypted by MD5, whether the client is in a valid local area network or not is checked, encryption is carried out according to the MAC address of the client, and binding and association are carried out with authorized account information. When the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account information is consistent or not and whether the encrypted MAC address information is consistent with the currently connected MAC address or not are verified. Preventing the client from illegally entering the conference system and using all functions in the system;
5. after encrypting the conference information and the conference materials through the MAC address, the chairman appoints to send a certain client, or the client actively synchronizes the conference information and the conference materials of the conference, so that the inconsistency of the conference information of the client with the conference information and the conference materials is prevented;
6. the method can provide the offline data packet of the laws and regulations and the offline data packet of the security materials, and when the client is not in the local area network or is not connected with the chairman machine, the client can normally inquire the laws and regulations and the security materials.
The above-described embodiments of the present invention are not intended to limit the scope of the present invention, and the embodiments of the present invention are not limited thereto, and various other modifications, substitutions and alterations can be made to the above-described structure of the present invention without departing from the basic technical concept of the present invention as described above, according to the common technical knowledge and conventional means in the field of the present invention.
Claims (10)
1. A paperless intelligent conference management system, comprising:
the chairman end is used for receiving and sending data information and accessing verification and comprises a first database, an encryption unit and a first offline data unit; the client is used for receiving and sending data information and comprises a second database, a decryption unit and a second off-line data unit;
the chairman machine and the client are interconnected by the same local area network, first account data and first MAC address data are stored in the first database, second account data and second MAC address data are stored in the second database, and data information between the chairman machine and the client is transmitted by encryption and compression.
2. The paperless intelligent conference management system of claim 1, wherein: the chairman end is composed of at least one chairman machine which adopts local area network transmission with the client.
3. The paperless intelligent conference management system of claim 2, wherein: the client consists of more than one client which is transmitted with the chairman machine by adopting a local area network.
4. The paperless intelligent conference management system of claim 1, wherein: the encryption unit is a ZIP encryption compression unit.
5. The paperless intelligent conference management system of claim 4, wherein: the decryption unit is a ZIP decryption decompression unit.
6. A paperless intelligent conference management method is characterized by comprising the following steps:
accessing at least one chairman machine and more than one client machine to the same local area network;
the data information between the chairman machine and the client machine is encrypted, compressed, decrypted and decompressed through a secret key;
the chairman machine is connected with the data transmission protocol through a WebSokct connection protocol;
and before the client is connected with the chairman machine, binding association is carried out after account data verification and MAC decryption verification.
7. The paperless intelligent conference management method according to claim 6, wherein: when the client is actively connected with the chairman machine, the chairman machine verifies whether the MAC address of the currently connected client is in the same local area network, and meanwhile, whether the current authorized account data information is consistent or not and whether the decrypted MAC address information is consistent with the currently connected MAC address or not are verified.
8. The paperless intelligent conference management method according to claim 6, wherein: before transmitting the data packet, the transmitter verifies the integrity of the data packet, then performs sub-packet or packet combination according to the size of the data packet, and performs encryption transmission on the finally transmitted data packet.
9. The paperless intelligent conference management method according to claim 8, wherein: when receiving the data packet, the receiver firstly checks the integrity of the data packet, and then adopts a secret key decoding mode to decode to obtain the complete data packet.
10. The paperless intelligent conference management method according to claim 6, wherein: and when the client is in the local area network or is connected with the chairman machine, the second offline data unit synchronizes to the first offline data unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010697198.9A CN111953658A (en) | 2020-07-20 | 2020-07-20 | Paperless intelligent conference management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010697198.9A CN111953658A (en) | 2020-07-20 | 2020-07-20 | Paperless intelligent conference management system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111953658A true CN111953658A (en) | 2020-11-17 |
Family
ID=73341159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010697198.9A Pending CN111953658A (en) | 2020-07-20 | 2020-07-20 | Paperless intelligent conference management system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111953658A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596385A (en) * | 2021-08-16 | 2021-11-02 | 上海精仪达智能科技有限公司 | Interactive terminal based on multimedia paperless conference intelligent application |
CN115001860A (en) * | 2022-07-20 | 2022-09-02 | 广州市保伦电子有限公司 | Safety management system for paperless digital conference |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105007579A (en) * | 2014-04-24 | 2015-10-28 | 中国移动通信集团广东有限公司 | Wireless local area network access authentication method and terminal |
US9270941B1 (en) * | 2015-03-16 | 2016-02-23 | Logitech Europe S.A. | Smart video conferencing system |
CN106254303A (en) * | 2016-04-11 | 2016-12-21 | 上海建朗信息科技有限公司 | It is prone to the intelligent conference system that combination is coordinated to control |
CN108173667A (en) * | 2018-01-11 | 2018-06-15 | 四川九洲电器集团有限责任公司 | A kind of intelligent meeting system and implementation method |
CN108206926A (en) * | 2016-12-20 | 2018-06-26 | 北京视联动力国际信息技术有限公司 | A kind of method and device of conference management client and exterior terminal state synchronized |
CN109561107A (en) * | 2019-01-04 | 2019-04-02 | 广东电网有限责任公司 | A kind of secrecy conference system based on WIFI |
-
2020
- 2020-07-20 CN CN202010697198.9A patent/CN111953658A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105007579A (en) * | 2014-04-24 | 2015-10-28 | 中国移动通信集团广东有限公司 | Wireless local area network access authentication method and terminal |
US9270941B1 (en) * | 2015-03-16 | 2016-02-23 | Logitech Europe S.A. | Smart video conferencing system |
CN106254303A (en) * | 2016-04-11 | 2016-12-21 | 上海建朗信息科技有限公司 | It is prone to the intelligent conference system that combination is coordinated to control |
CN108206926A (en) * | 2016-12-20 | 2018-06-26 | 北京视联动力国际信息技术有限公司 | A kind of method and device of conference management client and exterior terminal state synchronized |
CN108173667A (en) * | 2018-01-11 | 2018-06-15 | 四川九洲电器集团有限责任公司 | A kind of intelligent meeting system and implementation method |
CN109561107A (en) * | 2019-01-04 | 2019-04-02 | 广东电网有限责任公司 | A kind of secrecy conference system based on WIFI |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596385A (en) * | 2021-08-16 | 2021-11-02 | 上海精仪达智能科技有限公司 | Interactive terminal based on multimedia paperless conference intelligent application |
CN115001860A (en) * | 2022-07-20 | 2022-09-02 | 广州市保伦电子有限公司 | Safety management system for paperless digital conference |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10114969B1 (en) | Ultra-secure blockchain-based electronic information transfer system | |
USRE45348E1 (en) | Method and apparatus for intercepting events in a communication system | |
CN105051750B (en) | System and method for encrypted file system layer | |
US10554394B1 (en) | Toggle mute | |
US7080260B2 (en) | System and computer based method to automatically archive and retrieve encrypted remote client data files | |
US20160241525A1 (en) | Systems and methods of transmitting data | |
CN101796768B (en) | Communication system, base station device, and terminal device | |
US20130283060A1 (en) | Seamless Remote Synchronization and Sharing of Uniformly Encrypted Data for Diverse Platforms and Devices | |
US7392402B2 (en) | Method and apparatus for data integration security | |
CA2837716A1 (en) | Systems and methods for secure distributed storage | |
US9047478B2 (en) | Electronic file access control system and method | |
CN110190962A (en) | A kind of leakage-preventing file security sharing method | |
CN111953658A (en) | Paperless intelligent conference management system and method | |
KR102399667B1 (en) | Security system for data trading and data storage based on block chain and method therefor | |
US8645687B2 (en) | Electronic file access control system and method | |
JP2009146450A (en) | File access system, recording medium and computer program | |
WO2020036024A1 (en) | System and method for secret sharing of files | |
WO2000062472A1 (en) | System and method for transmission of encrypted files from a central server computer to a remote computer | |
CN108900869B (en) | Communication group information encryption and decryption method and system | |
JPH11212850A (en) | Encipherment common file transmission and reception system | |
KR101907986B1 (en) | Secure information sharing method and system for remote consulting and collaboration | |
JP5995341B1 (en) | Browsing file browsing method, browsing file browsing program, information sharing system, information sharing system server | |
JP2003016040A (en) | Network system, apparatus for information processing, method therefor, recording medium and program | |
WO2022137779A1 (en) | Data processing system | |
WO2006027968A1 (en) | Live and on-demand broadcast system, delivering software, receiving software, transmission system, management system, live and on-demand broadcast method, and provider business method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201117 |
|
RJ01 | Rejection of invention patent application after publication |