CN115767003A - Method for protecting correct participants in online conference - Google Patents

Method for protecting correct participants in online conference Download PDF

Info

Publication number
CN115767003A
CN115767003A CN202211495267.3A CN202211495267A CN115767003A CN 115767003 A CN115767003 A CN 115767003A CN 202211495267 A CN202211495267 A CN 202211495267A CN 115767003 A CN115767003 A CN 115767003A
Authority
CN
China
Prior art keywords
conference
person
background
current
background image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211495267.3A
Other languages
Chinese (zh)
Inventor
高伟凡
韦红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lingyan Technology Co ltd
Original Assignee
Beijing Lingyan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lingyan Technology Co ltd filed Critical Beijing Lingyan Technology Co ltd
Priority to CN202211495267.3A priority Critical patent/CN115767003A/en
Publication of CN115767003A publication Critical patent/CN115767003A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to a method for protecting a correct participant in an online conference, which comprises the steps of carrying out primary identity authentication on a current participant before entering the conference, obtaining a face characteristic value of the current participant, binding the face characteristic value with a current ID of a login person of the online conference, confirming the identity ID of online conference software subjected to identity authentication for the second time when entering the conference, carrying out face characteristic comparison of a current video and the identity authentication ID in real time in the conference, setting a non-face area as a background image, and taking the non-conference person as a background when entering the video area and not blocking the face of the video person; when the participants are shielded, the whole screen is automatically set as a background image, so that the current participants of the online conference are ensured to be correct participants, the background image is opened or closed after the right participants are authenticated, encryption is performed through an SM4 encryption algorithm for background protection, the background of non-conference participants is protected from being cracked by a malicious attacker, and real background data is obtained.

Description

Method for protecting correct participants in online conference
Technical Field
The invention relates to the technical field of online conferences, in particular to a method for protecting correct participants in an online conference.
Background
The online conference is also called a network conference or remote cooperative office, a user utilizes the internet to realize data sharing of a plurality of users at different places, and a plurality of purposes such as online sale, remote client support, IT technical support, remote training, online market activity and the like are realized through the online conference.
In the existing online conference scheme, each person participating in a conference is connected to a conference server of the internet through a personal computer or a mobile phone and other terminals, the personal computer or the mobile phone becomes a conference terminal participating in the conference at the moment, the conference terminals are gathered together through the conference server, and the participants can conveniently use the respective conference terminals to discuss and communicate various items online, in the whole online conference process, the conference server at the cloud end is responsible for identity authentication of the conference terminals, conference document processing and mutual data interaction, in the online conference process, a head portrait and background data of a current person can be obtained through a camera or a mobile phone camera of the personal computer, a user can open and close the camera at any time, and a background image is set in online conference software to shield the environment where the current person is located.
However, when another person or persons appear in the video and the camera is not turned off in time, the person or persons may appear in the video, which may interfere with the normal operation of the online conference or may not protect the privacy of the current conferee, including: personal environment information, surrounding people information, the problem that present scheme exists:
1, the background setting can only shield environment information, such as in a coffee shop, at home, and the like, and cannot shield dynamic people or animals;
2, the background content has no data protection, and a malicious attacker can acquire specific content in the background after stealing communication data and analyzing the graphic image.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a method for protecting correct participants in an online conference, which effectively solves the problems that people irrelevant to the conference cannot be shielded and background content is not protected in the prior art.
The technical scheme for solving the problem is that the method comprises the following steps:
firstly, performing identity authentication on a current participant before entering a conference;
acquiring a face characteristic value of a current person after passing authentication, and binding the face characteristic value with a current ID of a login person of the online conference;
step three, when entering the conference, secondarily confirming the identity ID of the online conference software subjected to identity authentication;
step four, in the conference, the facial features of the current video and the identity authentication ID are compared in real time, and whether the human is interfered is judged;
and step five, on the basis of the step four, no person interferes, a meeting is normally carried out, the non-face area is set as a background image, when the non-meeting person enters the video area and does not block the face of the video person, the non-meeting person becomes a background, and when the meeting person is blocked, the whole screen is automatically set as the background image.
Preferably, the background image is any one image selected by a user;
after the right participant is authenticated, the background image is opened or closed;
and encrypting the background image by an SM4 encryption algorithm for background protection.
Preferably, the step of encrypting the data of background image with SM4 encryption algorithm includes:
s1, generating an SM4 encryption key;
s2, after the registration and the identity verification of the conference person are successful, the conference system generates a secret key, binds the secret key with the identity ID and stores the secret key and the identity ID in a database;
s3, searching the secret key through the ID of the identity when the secret key is called, and loading the secret key into a server memory for real-time encryption;
and S4, after the conference is finished, the conference service unbinds the key from the database to the conference person and deletes the key.
And S5, after the encryption keys in the database are used, applying for a batch of keys again in batch and storing the keys in the server.
The invention has the beneficial effects that: the method comprises the steps that 1, before a conference is entered, identity authentication is carried out on a current participant for one time, a face characteristic value of the current participant is obtained and is bound with a current ID of a login person of an online conference, when the conference is entered, the identity ID of online conference software subjected to identity authentication is confirmed for the second time, in the conference, face characteristic comparison of a current video and the identity authentication ID is carried out in real time, a non-face area is set as a background image, and when the non-conference person enters the video area and does not block the face of a video person, the non-face area becomes a background; when the participants are shielded, the whole screen is automatically set as a background image, so that the current participants of the online conference are ensured to be correct participants;
2. after the background image is authenticated by a correct participant, the background is opened or closed, encryption is performed through an SM4 encryption algorithm for background protection, and after the encryption key is used, a batch of keys are applied in batches again and stored in the server, so that the background of the non-conference participant is protected from being cracked by a malicious attacker, and real background data is obtained.
Drawings
FIG. 1 is a flow chart of the overall steps of the present invention.
Fig. 2 is a background protection flowchart of the present invention.
Detailed Description
The foregoing and other technical and other features and advantages of the invention will be apparent from the following detailed description of the embodiments, which proceeds with reference to figures 1-2. The structural contents mentioned in the following embodiments are all referred to the attached drawings of the specification.
Exemplary embodiments of the present invention will be described below with reference to the accompanying drawings.
A method of protecting correct participants in an online meeting, comprising the steps of: step one, before entering a conference, a user logs in and carries out identity authentication (for example, face recognition) on a current participant once;
acquiring a face characteristic value of a current person after passing authentication, and binding the face characteristic value with a current ID of a login person of the online conference;
step three, when entering the conference, secondarily confirming the identity ID of the online conference software subjected to identity authentication;
step four, in the conference, the facial features of the current video and the identity authentication ID are compared in real time, and whether the human is interfered is judged;
and step five, on the basis of the step four, no person interferes, a meeting is normally carried out, a non-face area is set as a background image, when non-meeting persons enter the video area and do not block the face of the video person, the non-meeting persons become a background, when the meeting persons are blocked, the whole screen can be automatically set as the background image, if the original background image is a virtual study room background, a row of bookshelves are arranged behind the meeting persons, and when all the meeting persons are the background images, only the study room background can be seen, no person appears, and all the persons appearing in front of the camera are blocked by the background.
In a second embodiment, on the basis of the first embodiment, the background image is any one image selected by a user;
after the right participant is authenticated, the background image is opened or closed;
the background image is encrypted through an SM4 encryption algorithm to carry out background protection, and real data after the background cannot be acquired even if instant data in the video is intercepted by a malicious person.
In a third embodiment, on the basis of the second embodiment, the step of encrypting the data for background protection of the background image by using the SM4 encryption algorithm includes:
s1, generating an SM4 encryption key, wherein the SM4 encryption key can be generated in a hardware encryption machine or can be generated in cloud encryption machine service;
s2, after the registration and the identity verification of the conference person are successful, the conference system generates a secret key, binds the secret key with the identity ID and stores the secret key and the identity ID in a database;
s3, searching the secret key through the ID of the identity when the secret key is called, and loading the secret key into a server memory for real-time encryption;
and S4, after the conference is finished, the conference service unbinds the key from the database to the conference person and deletes the key.
And S5, after the encryption key in the database is used, applying for a batch of keys to be stored in the server again in batch, so that the protection key of one conference is ensured to be used only once, and the risk of key leakage or key utilization is as low as possible.
When the online conference software is used, before entering a conference, a user logs in, primary identity authentication (for example, face recognition) is carried out on a current participant, a face characteristic value of the current participant is obtained after the authentication is passed, the face characteristic value is bound with a current ID of a login person of the online conference, when the online conference software enters the conference, the identity ID of the online conference software subjected to the identity authentication is confirmed for the second time, in the conference, the face characteristic comparison of a current video and the identity authentication ID is carried out in real time, whether the current video is interfered by a person or not is judged, the person is not interfered, the normal conference is carried out, a non-face area is set as a background image, when the non-conference person enters the area and the face of the video person is not blocked, when the participant is blocked, the whole screen is automatically set as the background image, the background image is encrypted through an SM4 encryption algorithm to carry out background protection, and real video data after the background cannot be obtained by a malicious person even when the instant data in the video is intercepted.

Claims (3)

1. A method for protecting correct participants in an online conference, comprising the steps of: firstly, performing identity authentication on a current participant before entering a conference;
acquiring a face characteristic value of a current person after passing authentication, and binding the face characteristic value with a current ID of a login person of the online conference;
step three, when entering the conference, secondarily confirming the identity ID of the online conference software subjected to identity authentication;
step four, in the conference, the facial features of the current video and the identity authentication ID are compared in real time, and whether the human is interfered is judged;
and step five, on the basis of the step four, no person interferes, a meeting is normally carried out, the non-face area is set as a background image, when the non-meeting person enters the video area and does not block the face of the video person, the non-meeting person becomes a background, and when the meeting person is blocked, the whole screen is automatically set as the background image.
2. The method for protecting correct participants in online meeting as claimed in claim 1, wherein said background image is an arbitrary image selected by user;
after the right participant is authenticated, the background image is opened or closed;
and encrypting the background image by an SM4 encryption algorithm for background protection.
3. The method for protecting correct participants in online conferences according to claim 2, wherein the background-protected data of the background image is encrypted by SM4 encryption algorithm by the steps of:
s1, generating an SM4 encryption key;
s2, after the conference person is successfully registered and authenticated, the conference system generates a secret key, binds the secret key with the identity ID and stores the secret key in a database;
s3, searching the secret key through the ID of the identity when the secret key is called, and loading the secret key into a server memory for real-time encryption;
s4, after the meeting is finished, the meeting service unbinds the secret key from the database to the meeting person and deletes the secret key;
and S5, after the encryption keys in the database are used, applying for a batch of keys again in batch and storing the keys in the server.
CN202211495267.3A 2022-11-26 2022-11-26 Method for protecting correct participants in online conference Pending CN115767003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211495267.3A CN115767003A (en) 2022-11-26 2022-11-26 Method for protecting correct participants in online conference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211495267.3A CN115767003A (en) 2022-11-26 2022-11-26 Method for protecting correct participants in online conference

Publications (1)

Publication Number Publication Date
CN115767003A true CN115767003A (en) 2023-03-07

Family

ID=85338548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211495267.3A Pending CN115767003A (en) 2022-11-26 2022-11-26 Method for protecting correct participants in online conference

Country Status (1)

Country Link
CN (1) CN115767003A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240990A (en) * 2023-11-15 2023-12-15 辽宁牧龙科技有限公司 Communication method and terminal equipment for video conference

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240990A (en) * 2023-11-15 2023-12-15 辽宁牧龙科技有限公司 Communication method and terminal equipment for video conference
CN117240990B (en) * 2023-11-15 2024-02-20 辽宁牧龙科技有限公司 Communication method and terminal equipment for video conference

Similar Documents

Publication Publication Date Title
US8931071B2 (en) Biometric authentication for video communication sessions
US9712526B2 (en) User authentication for social networks
Adler Sample images can be independently restored from face recognition templates
CN104184705B (en) Verification method, device, server, subscriber data center and system
US20190349358A1 (en) System and method for facilitating multi-connection-based authentication
US20070112775A1 (en) Method for user biometric artifical authentication
CN104463011B (en) Picture inspection method and equipment
US10594690B2 (en) Authenticating access to a computing resource using facial recognition based on involuntary facial movement
US10885525B1 (en) Method and system for employing biometric data to authorize cloud-based transactions
CN115767003A (en) Method for protecting correct participants in online conference
CN108989736B (en) Multimedia resource encryption method, device, system, storage medium and processor
US9674195B1 (en) Use of highly authenticated operations to detect network address translation
CN115758398A (en) Access control data processing method and device, access control system and storage medium
CN112329004A (en) Method and device for face recognition and face password
Carta et al. Video injection attacks on remote digital identity verification solution using face recognition
CN110738499A (en) User identity authentication method and device, computer equipment and storage medium
KR20180116628A (en) User access authentication system based on personal image
US20220350928A1 (en) Information processing system, information processing method, program, and user interface
Nahar et al. An enhanced one-time password with biometric authentication for mixed reality surgical Tele-presence
Sethuraman et al. Metakey: A Novel and Seamless Passwordless Multifactor Authentication for Metaverse
CN115114557B (en) Page data acquisition method and device based on block chain
US20240160704A1 (en) Entity authenticator in augmented or virtual reality computing environments
CN113630403B (en) Online conference system and method for community owner
WO2022202955A1 (en) Meeting recording processing device and security assurance method for meeting recording
CN110162942B (en) Identity verification method, device, equipment and storage medium based on time stamp

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination