CN109040655B - 一种基于信息网络的视频会议系统 - Google Patents
一种基于信息网络的视频会议系统 Download PDFInfo
- Publication number
- CN109040655B CN109040655B CN201811023049.3A CN201811023049A CN109040655B CN 109040655 B CN109040655 B CN 109040655B CN 201811023049 A CN201811023049 A CN 201811023049A CN 109040655 B CN109040655 B CN 109040655B
- Authority
- CN
- China
- Prior art keywords
- threat
- information
- information network
- safety
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/15—Conference systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811023049.3A CN109040655B (zh) | 2018-09-03 | 2018-09-03 | 一种基于信息网络的视频会议系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811023049.3A CN109040655B (zh) | 2018-09-03 | 2018-09-03 | 一种基于信息网络的视频会议系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109040655A CN109040655A (zh) | 2018-12-18 |
CN109040655B true CN109040655B (zh) | 2021-03-23 |
Family
ID=64623145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811023049.3A Active CN109040655B (zh) | 2018-09-03 | 2018-09-03 | 一种基于信息网络的视频会议系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040655B (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204442535U (zh) * | 2015-03-31 | 2015-07-01 | 无锡中欧国际技术转移中心有限公司 | 视频会议系统 |
CN104965972A (zh) * | 2015-06-09 | 2015-10-07 | 南京联成科技发展有限公司 | 一种基于人工智能的信息系统安全风险评估与防护方法 |
CN105763562A (zh) * | 2016-04-15 | 2016-07-13 | 全球能源互联网研究院 | 一种面向电力cps风险评估的电力信息网络脆弱性威胁评估模型建立方法及基于该模型的评估系统 |
CN106230773A (zh) * | 2016-07-05 | 2016-12-14 | 杨林 | 基于模糊矩阵层次分析法的风险评估系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801739A (zh) * | 2012-08-25 | 2012-11-28 | 乐山师范学院 | 基于云计算环境的网络风险测定取证方法 |
US9749343B2 (en) * | 2014-04-03 | 2017-08-29 | Fireeye, Inc. | System and method of cyber threat structure mapping and application to cyber threat mitigation |
CN105721410B (zh) * | 2014-12-05 | 2020-05-01 | 北京奇虎科技有限公司 | 获取网络安全状况的方法与装置 |
CN105959111B (zh) * | 2016-07-01 | 2017-03-15 | 广西电网有限责任公司 | 基于云计算和可信计算的信息安全大数据资源访问控制系统 |
-
2018
- 2018-09-03 CN CN201811023049.3A patent/CN109040655B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204442535U (zh) * | 2015-03-31 | 2015-07-01 | 无锡中欧国际技术转移中心有限公司 | 视频会议系统 |
CN104965972A (zh) * | 2015-06-09 | 2015-10-07 | 南京联成科技发展有限公司 | 一种基于人工智能的信息系统安全风险评估与防护方法 |
CN105763562A (zh) * | 2016-04-15 | 2016-07-13 | 全球能源互联网研究院 | 一种面向电力cps风险评估的电力信息网络脆弱性威胁评估模型建立方法及基于该模型的评估系统 |
CN106230773A (zh) * | 2016-07-05 | 2016-12-14 | 杨林 | 基于模糊矩阵层次分析法的风险评估系统 |
Non-Patent Citations (1)
Title |
---|
信息安全风险多维动态管理模型及相关评估方法研究;葛海慧;《中国博士学位论文全文数据库信息科技辑》;20150815;第20-22、25、34、41-44页 * |
Also Published As
Publication number | Publication date |
---|---|
CN109040655A (zh) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11115434B2 (en) | Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format | |
Das et al. | SoK: a comprehensive reexamination of phishing research from the security perspective | |
CN109167786B (zh) | 一种信息安全风险管理系统 | |
CN104965972A (zh) | 一种基于人工智能的信息系统安全风险评估与防护方法 | |
CN109167832B (zh) | 一种基于云计算的电子商务系统 | |
Scott-Railton et al. | Catalangate: Extensive mercenary spyware operation against Catalans using Pegasus and Candiru | |
Shinde et al. | Securing AI‐based healthcare systems using blockchain technology: A state‐of‐the‐art systematic literature review and future research directions | |
Griffiths | Cyber security as an emerging challenge to South African national security | |
CN109040655B (zh) | 一种基于信息网络的视频会议系统 | |
Papathanasiou et al. | Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape | |
Protrka | Cybercrime | |
Nasser | Identification and prevention of expected cybersecurity threats during 2022 FIFA World Cup in Qatar | |
Moise | Some considerations on the phenomenon of cybercrime | |
Sandjojo et al. | The Effects of Fear of Cybercrime and Information Systems Security Policy on National Vigilance | |
Trivedi et al. | Analysis and impact of cyber threats on online social networks | |
Loganathan et al. | A Study on Cyber Crimes and protection | |
Ezeji et al. | The use of intelligence-led policing in combating technology-based crimes in South Africa | |
Butler et al. | The impact of the internet on terrorism and violent extremism | |
Rahman et al. | Information landscapes | |
Adu-Manu et al. | Phishing Attacks in Social Engineering: A Review. | |
Omand | The historical backdrop | |
US20240015176A1 (en) | Domain Age-Based Security System | |
OOGARAH-HANUMAN et al. | ASSESSING THE PREVALENCE OF CYBERCRIME IN MAURITIUS. | |
Dulay | The right to speak in code: A balancing of State Interest and the right to encrypted Speech | |
Zhao et al. | Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape-A Survey |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Qian Jing Inventor after: Zhao Hongzhi Inventor after: Wei Yutao Inventor after: Yin Hai Inventor after: Li Qinghong Inventor after: Xu Xingnian Inventor before: Xu Xingnian |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210301 Address after: Room 609-193, R & D center building, China (Hefei) international intelligent voice Industrial Park, 3333 Xiyou Road, high tech Zone, Hefei, Anhui 230000 Applicant after: HKUST Qianyan Technology Co.,Ltd. Address before: 510000 No.59, Qiaozi street, Fangcun, Liwan District, Guangzhou City, Guangdong Province Applicant before: Xu Xingnian |
|
GR01 | Patent grant | ||
GR01 | Patent grant |