CN112668059A - Conference authorization control method, device, electronic equipment, system and storage medium - Google Patents

Conference authorization control method, device, electronic equipment, system and storage medium Download PDF

Info

Publication number
CN112668059A
CN112668059A CN202110278444.1A CN202110278444A CN112668059A CN 112668059 A CN112668059 A CN 112668059A CN 202110278444 A CN202110278444 A CN 202110278444A CN 112668059 A CN112668059 A CN 112668059A
Authority
CN
China
Prior art keywords
authorization information
authorization
conference
terminal
conference terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110278444.1A
Other languages
Chinese (zh)
Inventor
林敏�
王克彦
曹亚曦
吕少卿
俞鸣园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Huachuang Video Signal Technology Co Ltd
Original Assignee
Zhejiang Huachuang Video Signal Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Huachuang Video Signal Technology Co Ltd filed Critical Zhejiang Huachuang Video Signal Technology Co Ltd
Priority to CN202110278444.1A priority Critical patent/CN112668059A/en
Publication of CN112668059A publication Critical patent/CN112668059A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses a conference authorization control method, a conference authorization control device, electronic equipment, a conference authorization control system and a computer readable storage medium. According to the method, one of a plurality of distributed peer nodes in a conference authorization control system directly obtains authorization information from an authorization information system so as to process an authorization verification request sent by a conference terminal, and before authorization verification, the validity of the authorization information is detected so as to ensure the timeliness and reliability of the authorization information. Therefore, the reliability and the safety of authorization control can be further ensured while the authorization control processing capacity is improved by processing the authorization verification request in a distributed manner.

Description

Conference authorization control method, device, electronic equipment, system and storage medium
Technical Field
The present application relates to the field of information processing, and in particular, to a conference authorization control method, apparatus, electronic device, system, and computer-readable storage medium.
Background
With the development and progress of communication and internet technologies, web conferencing becomes an important way for people to communicate remotely among multiple parties.
In a conventional network conference system, authorization control is usually performed through a central node, and whenever there is a service demand, for example, a conference is created, a conference is added, a conference is deleted, and a conference is exited, authorization is verified by the central node, and security of the authorization information is ensured by the central node, which causes a very large processing pressure on the central node, and once the central node goes down, authorization cannot be performed any more, so that the entire system cannot be used.
For this reason, the inventor of the present application tries to decentralize the authorization control, and a plurality of edge nodes perform distributed authorization control to share the processing pressure of the central node, but since these edge nodes may be installed in a system maintained by the user, there is a risk that the authorization information captured locally in the authorization control process is tampered.
Therefore, how to ensure the validity and security of the authorization information in the process of performing distributed authorization control becomes a technical problem yet to be solved.
Disclosure of Invention
The applicant creatively provides a conference authorization control method, a conference authorization control device, an electronic device, a conference authorization control system and a computer-readable storage medium.
According to a first aspect of embodiments of the present application, there is provided a conference authorization control method, including: receiving an authorization verification request sent by a conference terminal; acquiring authorization information corresponding to a conference terminal from an authorization information system through a first node to obtain first authorization information, wherein the first node is one of a plurality of distributed peer-to-peer nodes in the conference authorization control system, and the authorization information system is shared by the plurality of peer-to-peer nodes; and detecting whether the first authorization information is valid, if not, requesting the conference service to update the authorization information system, acquiring the updated authorization information to obtain second authorization information, and processing the authorization verification request according to the second authorization information to obtain an authorization result.
According to an embodiment of the present application, after detecting whether the first authorization information is valid, the method further includes: and if so, processing the authorization verification request according to the first authorization information to obtain an authorization result.
According to an embodiment of the present application, before receiving an authorization verification request sent by a conference terminal, the method further includes: acquiring terminal data of a conference terminal; creating first authorization information corresponding to the conference terminal according to the terminal data; and storing the first authorization information to an authorization information system.
According to an embodiment of the present application, the method further includes setting a validity period of the authorization information, and accordingly, detecting whether the first authorization information is valid includes: and detecting whether the first authorization information is in the validity period or not according to the validity period of the authorization information.
According to an embodiment of the present application, the method further comprises: acquiring terminal data of a conference terminal; and determining whether authorization information corresponding to the conference terminal exists according to the terminal data, if not, removing the conference terminal from the conference, if so, updating the authorization information corresponding to the conference terminal according to the terminal data, and prolonging the validity period of the authorization information of the terminal data to obtain second authorization information.
According to an embodiment of the present application, the method further includes setting signature information of the authorization information, and accordingly, the detecting whether the first authorization information is valid includes: and detecting whether the signature information of the first authorization information is valid.
According to an embodiment of the present application, the method further comprises: acquiring authorization information corresponding to the conference terminal to obtain third authorization information; and determining whether the third authorization information is correct according to the authorization information maintained by the system, and if not, updating the authorization information corresponding to the conference terminal.
According to a second aspect of the embodiments of the present application, a conference authorization control apparatus includes: the request receiving module is used for receiving an authorization verification request sent by the conference terminal; the authorization information acquisition module is used for acquiring authorization information corresponding to the conference terminal from an authorization information system through a first node to obtain first authorization information, wherein the first node is one of a plurality of distributed peer-to-peer nodes in the conference authorization control system, and the authorization information system is shared by the plurality of peer-to-peer nodes; and the authorization information detection module is used for detecting whether the first authorization information is valid, if not, requesting the conference service to update the authorization information system, acquiring the updated authorization information to obtain second authorization information, and processing the authorization verification request according to the second authorization information to obtain an authorization result.
According to an embodiment of the application, the authorization information detection module is further configured to detect whether the first authorization information is valid, and if so, process the authorization verification request according to the first authorization information to obtain an authorization result.
According to an embodiment of the present application, the apparatus further comprises: the terminal data acquisition module is used for acquiring terminal data of the conference terminal; the authorization information creating module is used for creating first authorization information corresponding to the conference terminal according to the terminal data; and the authorization information storage module is used for storing the first authorization information to the authorization information system.
According to an embodiment of the application, the device further comprises an authorization information validity period setting module, which is used for setting the validity period of the authorization information; correspondingly, the authorization information detection module is specifically configured to detect whether the first authorization information is within the validity period according to the validity period of the authorization information.
According to an embodiment of the present application, the apparatus further comprises: the authorization information inquiry submodule is used for determining whether authorization information corresponding to the conference terminal exists or not according to the terminal data; the conference terminal removing submodule is used for removing the conference terminal from the conference; and the authorization information validity period prolonging submodule is used for updating the authorization information corresponding to the conference terminal according to the terminal data and prolonging the validity period of the authorization information of the terminal data to obtain second authorization information.
According to an embodiment of the present application, the apparatus further comprises: the authorization information signing module is used for setting the signature information of the authorization information; correspondingly, the authorization information detection module is specifically configured to detect whether signature information of the first authorization information is valid.
According to an embodiment of the application, the authorization information obtaining module is further configured to obtain authorization information corresponding to the conference terminal to obtain third authorization information; the device also comprises an authorization information checking module which is used for determining whether the third authorization information is correct according to the authorization information maintained by the system, and if not, updating the authorization information corresponding to the conference terminal.
According to a third aspect of the embodiments of the present application, there is provided an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus; a memory for storing a computer program; a processor for implementing the method steps of any of the above-described conference authorization control methods when executing the program stored in the memory.
According to a fourth aspect of the embodiments of the present application, there is provided a conference authorization control system, including: the authorization information system is used for storing authorization information; a conference service for creating or updating the authorization information to the authorization information system; the conference terminal is used for sending an authorization verification request; and each of the plurality of peer nodes is used for executing the method steps of any one of the conference authorization control methods to process the authorization verification request sent by the conference terminal.
According to a fifth aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored therein a computer program, which when executed by a processor, implements the method steps of any one of the above-mentioned conference authorization control methods.
The embodiment of the application provides a conference authorization control method and device, electronic equipment and a computer readable storage medium. According to the method, one of a plurality of distributed peer-to-peer nodes in a distributed conference authorization control system directly obtains authorization information to process an authorization verification request sent by a conference terminal, and before authorization verification, validity of the authorization information is detected to ensure timeliness and reliability of the authorization information. Therefore, the reliability and the safety of authorization control can be further ensured while the authorization control processing capacity is improved by processing the authorization verification request in a distributed manner.
It is to be understood that the implementation of the present application does not require all of the above-described advantages to be achieved, but rather that certain technical solutions may achieve certain technical effects, and that other embodiments of the present application may also achieve other advantages not mentioned above.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present application will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the present application are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Fig. 1 is a schematic view of an application scenario of a conference authorization control method according to an embodiment of the present application;
fig. 2 is a schematic view of an implementation flow of a conference authorization control method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a specific implementation flow of an application of a conference authorization control method according to an embodiment of the present application;
fig. 4 is a second schematic flow chart illustrating an implementation of a first conference authorization control method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a conference authorization control apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 shows one of application scenarios of a conference authorization control method according to an embodiment of the present application. In the application scenario shown in fig. 1, a plurality of edge nodes (e.g., the server 20, the server 30, and the server 40) are deployed, each edge node accesses a plurality of conference terminals (e.g., the server 20 accesses the conference terminal 201, the conference terminal 202, the conference terminal 203, and the like), authorization information is stored in the authorization information system 10, and each edge node is capable of connecting to and accessing the authorization information system 10. When the conference terminal 201 initiates a service request and requires authorization control, the server 20 receives the request, directly connects and accesses the authorization information system 10, processes the authorization verification request according to the authorization information stored therein to obtain an authorization result, and returns the authorization result to the conference terminal 201.
When a certain edge node goes down, the conference terminal in butt joint with the edge node can establish access relations with other connectable edge nodes again to carry out conference authorization control.
Therefore, by the conference authorization control method, the authorization verification requests can be sent to the edge nodes in a scattered manner, the load can be balanced through the edge nodes, the processing bottleneck can not be generated, the processing capacity of the authorization control requests of the whole conference system is greatly improved, and the reliability and the high availability of the system are also improved.
However, in this deployment, since the edge node is also capable of connecting to and accessing the authorization information system 10, and the edge node is likely to be deployed in the enterprise user's internal network and maintained by the enterprise user, there is a possibility that it will be utilized by unauthorized users and tamper with the data in the authorization information system 10 through the edge node. Therefore, the conference authorization control method can detect the validity of the authorization information cached at the edge node at regular time, update the authorization information in the cache in time, and check the authorization data in the authorization information system at regular time by the conference service 60, so that the authorization control processing capacity is improved, and the reliability and the safety of the authorization control can be further ensured.
Fig. 2 shows an implementation flow of a conference authorization control method according to an embodiment of the present application. Referring to fig. 1, the method includes: operation 210, receiving an authorization verification request sent by a conference terminal; operation 220, obtaining authorization information corresponding to the conference terminal from an authorization information system through a first node to obtain first authorization information, where the first node is one of a plurality of distributed peer-to-peer nodes in the conference authorization control system, and the authorization information system is shared by the plurality of peer-to-peer nodes; operation 230, detecting whether the first authorization information is valid, if not, requesting the conference service to update the authorization information system, obtaining the updated authorization information to obtain the second authorization information, and processing the authorization verification request according to the second authorization information to obtain the authorization result.
In operation 210, the conference terminal mainly refers to a terminal device for initiating a conference, participating in the conference and managing the conference, and may be a mobile phone, a wearable device, a tablet computer, a desktop computer, an audiovisual device, and so on.
The authorization verification request is typically an authorization verification request resulting from a conference operation, such as creating a conference, joining a conference, deleting a conference, exiting a conference, and the like.
In operation 220, the first node is one of a plurality of peer nodes distributed in the conference authorization control system, instead of a central node used in the conventional authorization control method, such as the server 20, the server 30, and the server 40 shown in fig. 1, and may also be an edge node deployed in an internal network of an enterprise user. Therefore, the concurrency and the processing timeliness for processing the authorization verification request can be improved, the possibility that the authorization verification request becomes a system bottleneck in processing is greatly reduced, and the reliability and the stability of the whole conference system are further improved.
The authorization information refers to various information for performing authorization verification, such as the total number of persons that the conference may be permitted to enter a conference, the permitted time duration and time period of the conference, the conference resources that the conference may be permitted to access, the user roles of the conference terminals, and the permitted operations of each user role, and the like. The authorization information is typically created by a conferencing service (e.g., conferencing service 60 shown in fig. 1) at the time the conference or conference is created, stored in some persistent, sharable authorization information system (e.g., authorization information system 10 shown in fig. 1), and stored in the memory of the conferencing service during the course of the conference. The authorization information system may be any suitable data storage system such as a database, LDAP server, shared file system or configuration service system, etc. The authorization information corresponding to the conference terminal includes information corresponding to the current conference (e.g., the total number of persons that can be admitted to the conference, the time length and time period allowed by the current conference, and the conference resources that can be allowed to be accessed by the current conference), and information corresponding to the current user (e.g., the conference role of the current user, and the operations and conference resources allowed to be accessed by the current user, etc.).
The first node typically obtains authorization information corresponding to the conference terminal from an authorization information system, which is shared by the respective nodes. For a large conference system with a larger user concurrency ratio, a database with higher access performance can be selected as a slave authorization information system, for example, Redis, so as to improve the processing speed and throughput of authorization control.
In operation 230, the validity of the authorization information mainly refers to timeliness and reliability. The timeliness refers to that the authorization information is valid only within a specified validity period, and the shorter the validity period is set, the less the authorization information is tampered. In addition, for some systems which use cache data to improve access efficiency, the setting of the validity period can also ensure the updating and synchronization of the authorization information and ensure the real-time performance of the authorization information; reliability refers to the authenticity and accuracy of data, which can be guaranteed by comparing local authorization information with authorization information maintained by the system at regular time.
The authorization information maintained by the system refers to real-time real authorization information created during a meeting or updated by the system, and is usually stored in a memory of the meeting service, and because the authorization information stored in the memory is difficult to be tampered, the authorization information maintained by the system can be used as a comparison baseline of the authorization information.
For the invalid authorization information, the conference service can be requested to update the authorization information system, and the updated authorization information is obtained, so that a valid authorization information, namely the second authorization information, is obtained again to process the authorization verification request.
After receiving the request for updating the authorization information system, the conference service can acquire the authorization information corresponding to the conference terminal from the internal memory of the conference service, update the authorization information to the authorization information storage system again, and notify the first node of the update result. Then, the first node may retrieve the second authorization information corresponding to the conference terminal from the authorization information system.
Therefore, the reliability and the safety of authorization control can be further ensured while the authorization control processing capacity is improved by processing the authorization verification request in a distributed manner.
It should be noted that the embodiment shown in fig. 2 is only one basic embodiment of the invention authorized to control the present application, and further refinements and extensions can be made on the basis of the embodiment.
According to an embodiment of the present application, after detecting whether the first authorization information is valid, the method further includes: and if so, processing the authorization verification request according to the first authorization information to obtain an authorization result.
In this embodiment, if the first authorization information is detected to be valid, it is apparent that the authorization information is reliable and can be directly used for conference authorization control. Especially for the conference system which caches the authorization information locally, the implementation mode can greatly save network flow, further shorten the processing time of authorization control and provide the authorization result more quickly.
According to an embodiment of the present application, before receiving an authorization verification request sent by a conference terminal, the method further includes: acquiring terminal data of a conference terminal; creating first authorization information corresponding to the conference terminal according to the terminal data; and storing the first authorization information to an authorization information system.
The terminal data of the conference terminal comprises a conference terminal identifier, a current conference associated with the conference terminal, a current user associated with the conference terminal and the like.
First authorization information corresponding to the conference terminal is created according to the terminal data, and an association relation can be established between the conference terminal and the authorization information related to the conference terminal. Therefore, when the follow-up processing is needed, the authorization information related to the conference terminal can be quickly positioned directly according to the conference terminal data.
In this embodiment, the first authorization information corresponding to the conference terminal is typically created and stored at the time of the conference entry.
The first authorization information is stored in an authorization information system accessible to each node, and when a certain node goes down, other nodes perform authority control according to the authorization information stored in the authorization information system.
According to an embodiment of the present application, the method further includes setting a validity period of the authorization information, and accordingly, detecting whether the first authorization information is valid includes: and detecting whether the first authorization information is in the validity period or not according to the validity period of the authorization information.
The validity period of the authorization information is set, so that timeliness of the authorization information can be guaranteed, and the probability of tampering the authorization information is greatly reduced through controlling timeliness through the validity period.
The validity period of the authorization information can be a general validity period for all authorization information, can also be a validity period for different conferences, and can also be a validity period for different conference terminals, and an implementer can flexibly make the validity period according to specific implementation conditions and implementation requirements.
Detecting whether the first authorization information is in the validity period, setting a timestamp of valid start time in the authorization information, and calculating a time interval between the current time and the valid start time to determine whether the time interval exceeds the valid duration; or setting expiration time in the authorization information, and comparing whether the current time exceeds the expiration time to determine whether the first authorization information is within the validity period; it may be any other suitable method for determining whether the first authorization information is within the validity period.
According to an embodiment of the present application, the method further comprises: acquiring terminal data of a conference terminal; and determining whether authorization information corresponding to the conference terminal exists according to the terminal data, if not, removing the conference terminal from the conference, if so, updating the authorization information corresponding to the conference terminal according to the terminal data, and prolonging the validity period of the authorization information of the terminal data to obtain second authorization information.
In the present embodiment, in order to ensure the validity of the authorization information, the validity period of the authorization information corresponding to the conference terminal is periodically updated, and this operation is usually performed by the conference service. The conference service can periodically detect each conference terminal, acquire conference terminal data and detect whether an authorization information system stores authorization information corresponding to the conference terminal, if not, the conference terminal is very suspicious and possibly illegally accessed to the conference terminal of the conference, and at the moment, the conference terminal can be removed from the conference; if the authorization information exists, the authorization information in the authorization information system can be updated by the authorization information maintained by the system, and the validity period of the authorization information of the terminal data is prolonged. The validity period of the authorization information of the terminal data is prolonged, and the valid starting time of the authorization information can be reset; the expiration time of the authorization information can be modified; but also by any other suitable method.
According to an embodiment of the present application, the method further includes setting signature information of the authorization information, and accordingly, the detecting whether the first authorization information is valid includes: and detecting whether the signature information of the first authorization information is valid.
Besides verifying whether the authorization information is in the valid period, the signature information of the first authorization information can be detected to be valid. When the authorization information is stored in the authorization information system, system signature information can be set, so that lawbreakers can be immediately found after tampering the authorization information and cannot function.
According to an embodiment of the present application, the method further comprises: acquiring authorization information corresponding to the conference terminal to obtain third authorization information; and determining whether the third authorization information is correct according to the authorization information maintained by the system, and if not, updating the authorization information corresponding to the conference terminal.
In this embodiment, in order to ensure the validity of the authorization information, the authorization information corresponding to the conference terminal is also updated periodically, and this operation is usually performed by a conference service that can obtain the authorization information in the memory. In order to ensure that the authorization information in the authorization information storage system is not tampered, the conference service periodically detects whether the authorization information stored in the authorization information system is consistent with the authorization information maintained by the system, and if not, the authorization information in the authorization information system is updated to be consistent with the authorization information maintained by the system, so that the authorization information obtained by each node is ensured to be effective.
The following describes a specific implementation process of performing authorization control by using the conference authorization control method provided by the present application when a conference terminal applies for a meeting with reference to fig. 3 and 4.
First, the conference system uses a distributed authorization control architecture as shown in fig. 1. User a creates a conference as an initiator of the conference, and sets authorization information of the conference in the process of creating the conference, for example: allowing a maximum of 10 conference terminals to enter a conference; allowing the use of video, audio and conference chat functions; the conference host may share a desktop; conference participants can raise hands and ask questions; the conference participants may switch to a presentation mode sharing desktop, etc. At this time, the conference service stores the above-mentioned authorization information into an authorization information system, and a Redis database is used in this application.
After the conference is successfully created, the user B initiates a conference entry request using the conference terminal, and accordingly generates an authorization verification request corresponding to the conference entry request, where the request is processed by one of a plurality of nodes distributed in a conference authorization control system, as shown in fig. 3, this process mainly includes:
step 3010, receiving a conference terminal conference entering request;
step 3020, checking whether the obtained authorization information is valid, if yes, continuing to step 3030, and if not, continuing to step 3040;
it should be noted that, the authorization information here is obtained from the Redis database when it is obtained for the first time, but may be cached locally later to further shorten the processing time of authorization control.
Step 3030, checking whether the number of the current conference participants in the redis database allows new users to join, if so, continuing step 3050, and if not, continuing step 3060;
step 3040, if the authorization information is invalid, updating the authorization information;
in the embodiment, the method is realized by updating the authorization information in the Redis database according to the authorization information maintained by the system and prolonging the validity period of the authorization information of the conference terminal;
and step 3050, updating the number of the participants of the current conference in the Redis database, adding one to the number of the participants, and authorizing the conference terminal to successfully participate in the conference.
In step 3060, the new user is not allowed to join and the conference endpoint fails to join.
Then, the conference service may periodically detect whether the authorization information of each conference terminal is valid and extend the validity period of the valid authorization information, as shown in fig. 4, including:
step 4010, the conference service acquires data of a certain conference terminal;
step 4020, detecting whether conference entering terminal data exist in a Redis database, if so, continuing the step 4030, and if not, continuing the step 4040;
step 4030, conference terminal data is stored in the Redis database, which indicates that the conference terminal is legal, and the validity period of the authorization information corresponding to the conference terminal in the Redis database is prolonged;
step 4040, if the conference terminal data does not exist in the Redis database, which indicates that the conference terminal is illegal, the conference terminal is removed from the conference, and the corresponding conference resource is recovered or closed.
Therefore, the legality of each conference terminal and the timeliness of the authorization information during the conference can be ensured. Therefore, even if a lawbreaker tampers with the data in the Redis database, the data can be quickly covered by the real authorization information maintained by the system.
It should be noted that the applications shown in fig. 3 and fig. 4 are only exemplary illustrations of the conference authorization control method according to the embodiment of the present application and are not limited to the implementation and application scenarios of the conference authorization control method according to the embodiment of the present application. The implementer can adopt any applicable implementation mode and be applied to any applicable application scene according to specific implementation conditions.
Further, according to an embodiment of the present application, there is also provided a conference authorization control apparatus, as shown in fig. 5, the apparatus 50 includes: a request receiving module 501, configured to receive an authorization verification request sent by a conference terminal; an authorization information obtaining module 502, configured to obtain, by a first node, authorization information corresponding to a conference terminal from an authorization information system to obtain first authorization information, where the first node is one of a plurality of distributed peer nodes in a conference authorization control system, and the authorization information system is shared by the plurality of peer nodes; the authorization information detection module 503 is configured to detect whether the first authorization information is valid, and if not, request the conference service to update the authorization information system, obtain the updated authorization information to obtain second authorization information, and process the authorization verification request according to the second authorization information to obtain an authorization result.
According to an embodiment of the present application, the authorization information detection module 503 is further configured to detect whether the first authorization information is valid, and if so, process the authorization verification request according to the first authorization information to obtain an authorization result.
According to an embodiment of the present application, the apparatus 50 further comprises: the terminal data acquisition module is used for acquiring terminal data of the conference terminal; the authorization information creating module is used for creating first authorization information corresponding to the conference terminal according to the terminal data; and the authorization information storage module is used for storing the first authorization information to the authorization information system.
According to an embodiment of the present application, the apparatus 50 further includes an authorization information validity period setting module, configured to set a validity period of the authorization information; accordingly, the authorization information detection module 503 is specifically configured to detect whether the first authorization information is within the validity period according to the validity period of the authorization information.
According to an embodiment of the present application, the apparatus further comprises: the authorization information inquiry submodule is used for determining whether authorization information corresponding to the conference terminal exists or not according to the terminal data; the conference terminal removing submodule is used for removing the conference terminal from the conference; and the authorization information validity period prolonging submodule is used for updating the authorization information corresponding to the conference terminal according to the terminal data and prolonging the validity period of the authorization information of the terminal data to obtain second authorization information.
According to an embodiment of the present application, the apparatus 50 further comprises: the authorization information signing module is used for setting the signature information of the authorization information; accordingly, the authorization information detection module 503 is specifically configured to detect whether signature information of the first authorization information is valid.
According to an embodiment of the present application, the authorization information obtaining module 501 is further configured to obtain authorization information corresponding to the conference terminal to obtain third authorization information; the apparatus 50 further comprises: and the authorization information checking module is used for determining whether the third authorization information is correct according to the terminal data, and if not, updating the authorization information corresponding to the conference terminal.
According to a third aspect of the embodiments of the present application, there is provided an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus; a memory for storing a computer program; a processor for implementing the method steps of any of the above-described conference authorization control methods when executing the program stored in the memory.
According to a fourth aspect of the embodiments of the present application, there is provided a conference authorization control system, including: the authorization information system is used for storing authorization information; a conference service for creating or updating the authorization information to the authorization information system; the conference terminal is used for sending an authorization verification request; and each of the plurality of peer nodes is used for executing the method steps of any one of the conference authorization control methods to process the authorization verification request sent by the conference terminal.
According to a fifth aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored therein a computer program, which when executed by a processor, implements the method steps of any one of the above-mentioned conference authorization control methods.
Here, it should be noted that: the above description on the embodiment of the conference authorization control apparatus, the above description on the embodiment of the electronic device, the above description on the conference authorization control system, and the above description on the embodiment of the computer-readable storage medium are similar to the description on the foregoing method embodiment, and have similar beneficial effects to the foregoing method embodiment, and therefore, no further description is given. For technical details that have not been disclosed yet in the description of the embodiment of the conference authorization control apparatus, the description of the embodiment of the electronic device, the description of the conference authorization control system, and the description of the embodiment of the computer-readable storage medium, please refer to the description of the foregoing method embodiments of the present application for understanding, and therefore, for brevity, will not be repeated.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of a unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage medium, a Read Only Memory (ROM), a magnetic disk, and an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof that contribute to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a removable storage medium, a ROM, a magnetic disk, an optical disk, or the like, which can store the program code.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. A conference authorization control method, the method comprising:
receiving an authorization verification request sent by a conference terminal;
acquiring authorization information corresponding to the conference terminal from an authorization information system through a first node to obtain first authorization information, wherein the first node is one of a plurality of distributed peer-to-peer nodes in a conference authorization control system, and the authorization information system is shared by the plurality of peer-to-peer nodes;
and detecting whether the first authorization information is valid, if not, requesting the conference service to update an authorization information system, acquiring updated authorization information to obtain second authorization information, and processing the authorization verification request according to the second authorization information to obtain an authorization result.
2. The method of claim 1, wherein after the detecting whether the first authorization information is valid, the method further comprises:
and if so, processing the authorization verification request according to the first authorization information to obtain an authorization result.
3. The method according to claim 1, wherein before the receiving the authorization verification request sent by the conference terminal, the method further comprises:
acquiring terminal data of the conference terminal;
creating first authorization information corresponding to the conference terminal according to the terminal data;
and storing the first authorization information to the authorization information system.
4. The method of claim 1, further comprising setting a validity period of the authorization information, and accordingly, the detecting whether the first authorization information is valid comprises:
and detecting whether the first authorization information is in the validity period or not according to the validity period of the authorization information.
5. The method of claim 4, further comprising:
acquiring terminal data of the conference terminal;
and determining whether authorization information corresponding to the conference terminal exists according to the terminal data, if not, removing the conference terminal from the conference, if so, updating the authorization information corresponding to the conference terminal according to the terminal data, and prolonging the validity period of the authorization information of the terminal data to obtain second authorization information.
6. The method of claim 1, further comprising setting signature information of authorization information, and accordingly, the detecting whether the first authorization information is valid comprises:
and detecting whether the signature information of the first authorization information is valid.
7. The method of claim 1, further comprising:
obtaining authorization information corresponding to the conference terminal to obtain third authorization information;
and determining whether the third authorization information is correct according to authorization information maintained by the system, and if not, updating the authorization information corresponding to the conference terminal.
8. A conference authorization control apparatus, characterized in that the apparatus comprises:
the request receiving module is used for receiving an authorization verification request sent by the conference terminal;
the conference authorization control system comprises an authorization information acquisition module, a first authorization information acquisition module and a second authorization information acquisition module, wherein the authorization information acquisition module is used for acquiring authorization information corresponding to the conference terminal from an authorization information system through a first node to obtain first authorization information, the first node is one of a plurality of distributed peer-to-peer nodes in the conference authorization control system, and the authorization information system is shared by the plurality of peer-to-peer nodes;
and the authorization information detection module is used for detecting whether the first authorization information is valid, if not, requesting the conference service to update the authorization information system, acquiring the updated authorization information to obtain second authorization information, and processing the authorization verification request according to the second authorization information to obtain an authorization result.
9. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus; a memory for storing a computer program; a processor for implementing the method steps of any one of claims 1 to 7 when executing a program stored in the memory.
10. A conference authorization control system, the conference authorization control system comprising:
the authorization information system is used for storing authorization information;
a conference service for creating or updating the authorization information to the authorization information system;
the conference terminal is used for sending an authorization verification request;
a distributed plurality of peer nodes, each of the plurality of peer nodes configured to perform the method steps of any of claims 1-7 to process an authorization verification request sent by the conference terminal.
11. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1 to 7.
CN202110278444.1A 2021-03-16 2021-03-16 Conference authorization control method, device, electronic equipment, system and storage medium Pending CN112668059A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110278444.1A CN112668059A (en) 2021-03-16 2021-03-16 Conference authorization control method, device, electronic equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110278444.1A CN112668059A (en) 2021-03-16 2021-03-16 Conference authorization control method, device, electronic equipment, system and storage medium

Publications (1)

Publication Number Publication Date
CN112668059A true CN112668059A (en) 2021-04-16

Family

ID=75399426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110278444.1A Pending CN112668059A (en) 2021-03-16 2021-03-16 Conference authorization control method, device, electronic equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN112668059A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815099A (en) * 2017-01-19 2017-06-09 腾讯科技(深圳)有限公司 Right discriminating system and method
CN107332819A (en) * 2017-05-25 2017-11-07 苏州科达科技股份有限公司 A kind of method for authenticating and device for conference system
CN109120614A (en) * 2018-08-10 2019-01-01 北京奇虎科技有限公司 Method for processing business and device based on distributed system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815099A (en) * 2017-01-19 2017-06-09 腾讯科技(深圳)有限公司 Right discriminating system and method
CN107332819A (en) * 2017-05-25 2017-11-07 苏州科达科技股份有限公司 A kind of method for authenticating and device for conference system
CN109120614A (en) * 2018-08-10 2019-01-01 北京奇虎科技有限公司 Method for processing business and device based on distributed system

Similar Documents

Publication Publication Date Title
CN109583184B (en) Identity verification method and device and electronic equipment
CN108140031B (en) Peer-to-peer synchronizable storage system
EP2706719B1 (en) File synchronization method and device
US8813185B2 (en) Ad-hoc user account creation
US20130205372A1 (en) Authorization of device access to network services
CN109756337B (en) Secure access method and device for service interface
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
CN101356773A (en) Ad-hoc creation of group based on contextual information
CN110690972B (en) Token authentication method and device, electronic equipment and storage medium
CN112261172B (en) Service addressing access method, device, system, equipment and medium
CN105915494A (en) Anti-stealing-link method and system
CN111414647A (en) Tamper-proof data sharing system and method based on block chain technology
US20110154448A1 (en) Server, client, license management system, and license management method
CN110708327B (en) Method and device for constructing hidden channel based on ZeroNet
CN110347750B (en) Block chain-based data processing method and device
CN111541649A (en) Password resetting method, device, server and storage medium
CN112668059A (en) Conference authorization control method, device, electronic equipment, system and storage medium
US11962697B2 (en) Systems and methods for tracking chain of custody of body worn cameras
CN113590711A (en) High-elasticity extensible multi-chain data hierarchical shared storage system and method
CN112948804A (en) Program control method, device and computer readable storage medium
KR100630072B1 (en) Server alerted synchronization method for clients capable of connecting a network
CN116049860B (en) Access control method, device, computer equipment and storage medium
CN117040930B (en) Resource processing method, device, product, equipment and medium of block chain network
CN113810426B (en) Access system, method and device of instant messaging service
CN112770143B (en) Interactive video playing system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210416

RJ01 Rejection of invention patent application after publication