CN112887105B - Conference security monitoring method and device, electronic equipment and storage medium - Google Patents

Conference security monitoring method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112887105B
CN112887105B CN202110029674.4A CN202110029674A CN112887105B CN 112887105 B CN112887105 B CN 112887105B CN 202110029674 A CN202110029674 A CN 202110029674A CN 112887105 B CN112887105 B CN 112887105B
Authority
CN
China
Prior art keywords
conference
level
user
participating
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110029674.4A
Other languages
Chinese (zh)
Other versions
CN112887105A (en
Inventor
邱勤
张峰
胡铁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aspire Technologies Shenzhen Ltd
Original Assignee
Aspire Technologies Shenzhen Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aspire Technologies Shenzhen Ltd filed Critical Aspire Technologies Shenzhen Ltd
Priority to CN202110029674.4A priority Critical patent/CN112887105B/en
Publication of CN112887105A publication Critical patent/CN112887105A/en
Application granted granted Critical
Publication of CN112887105B publication Critical patent/CN112887105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a conference safety monitoring method, a device, electronic equipment and a storage medium, and relates to the technical field of internet, wherein the conference safety monitoring method comprises the following steps: acquiring a service operation request of a participating user, wherein the service operation request comprises: the conference information of the conference participating users; acquiring a target conference level; analyzing the conference participating information according to the target conference level to obtain a risk level corresponding to the conference participating user; and permitting the participating users to execute the business operation corresponding to the business operation request based on the risk level. The conference safety monitoring method can monitor the participating users in real time, effectively prevent the safety risk of each link of the online conference, and meet the requirement of safety control strategy of the online conference.

Description

Conference security monitoring method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a conference security monitoring method and apparatus, an electronic device, and a storage medium.
Background
The online conference generally adopts a mode of open conference link (matched login password) to share conference entries, and faces multiple risks that conference objects are uncontrollable, behaviors of participants cannot be effectively restricted, and the like. Currently more and more conferences are being switched off-line to on-line, and therefore necessary security control measures need to be taken for on-line conferences.
At present, some security authentication technologies are introduced only in partial links (for example, user registration and conference entry) of an online conference, a complete conference security management and control mechanism cannot be formed, key business operation links (such as speaking, video sharing, chat message sending and the like) of the online conference cannot be covered, and the requirement of flexibly monitoring the online conference cannot be met.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the embodiment of the invention provides a conference safety monitoring method, which can monitor the conference users in real time, effectively prevent the safety risk of each link of the online conference, and meet the requirement of safety control and routing of the online conference.
The embodiment of the invention also provides a conference safety monitoring device.
The embodiment of the invention also provides the electronic equipment.
The embodiment of the invention also provides a computer readable storage medium.
The conference security monitoring method according to the embodiment of the first aspect of the invention comprises the following steps:
acquiring a service operation request of a participating user, wherein the service operation request comprises: meeting information of the meeting participating users;
acquiring a target conference level;
analyzing the conference participating information according to the target conference level to obtain a risk level corresponding to the conference participating user;
and permitting the participating users to execute the business operation corresponding to the business operation request based on the risk level.
The conference security monitoring method according to the embodiment of the first aspect of the invention has at least the following beneficial effects: firstly, acquiring a service operation request of a participating user, wherein the service operation request comprises: meeting information of the meeting participating users; secondly, acquiring a target conference level; then, analyzing the meeting participation information according to the target meeting level to obtain a risk level corresponding to the service operation request; and finally, the participating users are permitted to execute the business operation corresponding to the business operation request based on the risk level, the participating users can be monitored in real time, the safety risk of each link of the online conference is effectively prevented, and the requirement of the safety control strategy of the online conference is met.
According to some embodiments of the invention, the target meeting level comprises: a first level; analyzing the meeting information according to the target meeting level to obtain a risk level corresponding to the meeting user, wherein the risk level comprises the following steps: and if the target conference level is a first level, analyzing the conference participation information according to the first level to obtain a risk level corresponding to the conference participation user.
According to some embodiments of the invention, the target meeting level comprises: a second level; the method further comprises the following steps: and if the target conference level is the second level, the participating users are permitted to execute the business operation corresponding to the business operation request.
According to some embodiments of the invention, the risk classification comprises: a first risk level; the permitting of the participating users to execute the business operation corresponding to the business operation request based on the risk level comprises: and if the risk level is a first risk level, the participating user is permitted to execute the business operation.
According to some embodiments of the invention, the risk classification comprises: a second risk level; the permitting of the participating user to execute the business operation corresponding to the business operation request based on the risk level further comprises: if the risk level is a second risk level, generating an audit prompt, wherein the audit prompt is used for indicating to carry out safety audit on the business operation request; and if the security audit is passed, the participating user is permitted to execute the business operation.
According to some embodiments of the invention, the method further comprises: and if the security audit is not passed, generating a prompt for refusing to execute.
The conference security monitoring apparatus according to the embodiment of the second aspect of the present invention includes:
a first obtaining module, configured to obtain a service operation request of a participating user, where the service operation request includes: the conference information of the conference participating users;
the second acquisition module is used for acquiring the target conference level;
the analysis module is used for analyzing the conference participating information according to the target conference level to obtain a risk level corresponding to the conference participating user;
and the monitoring module is used for permitting the participating users to execute the business operation corresponding to the business operation request based on the risk level.
The conference safety monitoring device according to the embodiment of the second aspect of the invention has at least the following beneficial effects: by executing the conference safety monitoring method of the embodiment of the first aspect of the invention, the conference users can be monitored in real time, the safety risk of each link of the online conference is effectively prevented, and the requirement of safety control strategy of the online conference is met.
An electronic device according to an embodiment of the third aspect of the invention includes: at least one processor, and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions that are executed by the at least one processor, so that the at least one processor, when executing the instructions, implements the conference security monitoring method of the first aspect.
According to the electronic device of the embodiment of the third aspect of the invention, at least the following beneficial effects are achieved: by executing the conference safety monitoring method of the embodiment of the first aspect of the invention, the conference users can be monitored in real time, the safety risk of each link of the online conference is effectively prevented, and the requirement of safety control strategy of the online conference is met.
According to a fourth aspect of the present invention, there is provided a computer-readable storage medium storing computer-executable instructions for causing a computer to perform the conference security monitoring method of the first aspect.
The computer-readable storage medium according to the fourth aspect of the present invention has at least the following advantages: by executing the conference safety monitoring method in the embodiment of the first aspect of the invention, the conference users can be monitored in real time, the safety risk of each link of the online conference is effectively prevented, and the requirement of the safety control policy of the online conference is met.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a conference security monitoring method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a conference security monitoring apparatus according to an embodiment of the present invention;
fig. 3 is a functional block diagram of an electronic device according to an embodiment of the invention.
Reference numerals:
the system comprises a first acquisition module 200, a second acquisition module 210, an analysis module 220, a monitoring module 230, a processor 300, a memory 310, a data transmission module 320, a camera 330 and a display screen 340.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
In the description of the present invention, unless otherwise specifically limited, terms such as set, installation, connection and the like should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above terms in the present invention by combining the specific contents of the technical solutions.
First, several terms referred to in the present application are resolved:
1. IMEI: the International Mobile Equipment Identity is an abbreviation of an International Mobile Equipment Identity, is used for identifying each independent Mobile phone in a GSM Mobile network, and is equivalent to an Identity number of the Mobile phone.
2. MAC: the Media Access Control or Medium Access Control address is translated into a Media Access Control, or a physical address or a hardware address, which defines the location of the network device.
3. IP address: IP Address, full name: internet Protocol Address, which is an Internet Protocol Address, is also translated into an Internet Protocol Address. The IP address is a uniform address format provided by the IP protocol, and it allocates a logical address to each network and each host on the internet, so as to mask the difference of physical addresses.
At present, some security authentication technologies are introduced only in partial links of an online conference (for example, user registration and conference entry), a complete conference security management and control mechanism cannot be formed, key business operation links of the online conference (such as speaking, video sharing, chat message sending and the like) cannot be covered, and the requirement for flexibly monitoring the online conference cannot be met.
Based on this, the embodiment of the invention provides a conference security monitoring method and device, an electronic device and a storage medium, which can monitor participating users in real time, effectively prevent security risks of each link of an online conference, and meet the requirement of security control and routing of the online conference.
Referring to fig. 1, a conference security monitoring method according to an embodiment of the first aspect of the present invention includes:
step S100, obtaining a service operation request of a participating user, wherein the service operation request comprises: meeting information of the meeting participating users.
The conference participating users can be users participating in the online conference, and specifically, the conference participating users can be users meeting the conference admission requirement; the service operation request may include: a speaking request, a video sharing request, a chat message sending request and the like; the participation information may include: user terminal information (IMEI/MAC address and the like), user environment information (IP address), user history records, evaluation results after the user participates and the like. Optionally, when the online conference starts, the participating user may apply to execute the corresponding service operation, so that the service operation request may be generated. The service operation request may include: user terminal information (IMEI/MAC address and the like), user environment information, user identity information and the like of the participating users.
And step S110, acquiring the target conference level.
Wherein, the target conference level may be a security level of the current online conference. Optionally, conferences with different security levels can be set according to different users, and only conferences with medium and low security levels are reserved for common users; for real-name users, high, medium and low security level meetings can be reserved, so that the security level of the online meeting is obtained. The security level of the online conference can be set according to the requirement, that is, the target conference level can be obtained, for example, the target conference level is high, and the target conference level can also be intermediate or low.
And step S120, analyzing the conference participation information according to the target conference level to obtain a risk level corresponding to the conference participation user request.
Wherein the risk classes may include high risk, medium risk and low risk. Optionally, when the target conference level is high, or when the target conference is medium and the security requirement of the medium online conference is high, risk assessment needs to be performed on the participating users. The conference participating information can be analyzed according to the credit rating of the conference participating user; and the conference participation information can also be extracted for analysis, and the risk level of the conference participation user is judged, so that the risk assessment of the conference participation user can be realized. For example, the participating information may be analyzed according to a predetermined rule, a preset blacklist feature library, a blacklist IP library, a preset user security information library, and other criteria, and specifically, it may be determined whether the user terminal information in the participating information hits the blacklist feature library (including a user blacklist, an IP blacklist, and an equipment blacklist, and may be analyzed by collecting a history log of behavior of the participating user, perform entity behavior analysis (UEBA) based on the participating user, determine and mine a user account, an IP, and a terminal device that have an abnormality, generate an abnormal alarm, be manually checked by the security administrator, and add the abnormal user account, IP, and terminal device to the blacklist feature library, the blacklist feature library may be managed by the security administrator, perform operations such as query, export, addition, modification, deletion, and the like according to a requirement), if the user terminal information hits the blacklist feature library, the risk level of the participating user can be determined to be high risk; and comprehensive analysis can be performed by combining user login equipment, user login environment, user identity information, user historical behaviors, user after-consultation evaluation results and the like in the participation information, whether the participation user is a high-risk user, a medium-risk user or a low-risk user is judged, and the risk level of the participation user is obtained, for example, the risk level of the participation user is obtained to be low risk.
And step S130, the participating users are permitted to execute the business operation corresponding to the business operation request based on the risk level.
If the service operation request is a speech request, a video sharing request, and a chat message sending request, the service operation may be speech, video sharing, and chat message sending, and the service operation corresponds to the service operation request one to one. Optionally, it may be determined whether the service operation request of the participating user has a risk of interfering with the conference according to the risk level of the participating user, and if the risk level of the participating user is low, it may be determined that the service operation request of the participating user does not have a risk of interfering with the conference, so that the participating user may be directly permitted to perform a service operation, for example, the participating user may be directly permitted to speak, share a video, and send chat information. Optionally, if the risk level of the participating user is medium/high, it may be determined that the service operation request of the participating user has a risk of interfering with the conference, and therefore the service operation request of the participating user needs to be checked, and after it is determined that the service operation request of the participating user does not have the risk of interfering with the conference, the participating user may be permitted to perform the service operation, for example, the participating user is permitted to perform operations such as speaking, sharing video, sending chat information, and the like.
Firstly, a service operation request of a participant is obtained, wherein the service operation request comprises: meeting information of the meeting users; secondly, acquiring a target conference level; then, analyzing the meeting participation information according to the target meeting level to obtain a risk level corresponding to the service operation request; and finally, the participating users are permitted to execute the business operation corresponding to the business operation request based on the risk level, the participating users can be monitored in real time, the safety risk of each link of the online conference is effectively prevented, and the requirement of the safety control strategy of the online conference is met.
In some embodiments of the invention, the target conference level comprises: a first level. Alternatively, the target conference level may include a high level, a medium level, and a low level. The high level is assumed to be the first level, or the high level and the medium level meeting the preset requirement are assumed to be the first level, wherein the preset requirement can be a safety requirement, and the medium level meeting the preset requirement can be a medium conference with higher safety requirement or needing risk assessment for the participating users.
Analyzing the conference participation information according to the target conference level to obtain the risk level corresponding to the conference participation user, wherein the risk level comprises the following steps:
and if the target conference level is the first level, analyzing the conference participation information according to the first level to obtain the risk level corresponding to the conference participation user. Optionally, assuming that the first level is high, when the target conference level is high, it may be determined that the security level of the current online conference is high, and therefore, when the target conference level is high, the service operation request of the participating user needs to be monitored in real time, the participating information is analyzed, and the risk level of the participating user is determined. Optionally, assuming that the first level is a high level and a medium level requiring risk assessment for the participating users, it may be determined that the security level of the current online conference is high, and therefore, when the target conference level is the high level/the medium level requiring risk assessment for the participating users, the participating information may be analyzed to obtain the risk level corresponding to the participating users. When the target conference level is the first level, in order to ensure the safety control of the online conference, the conference participation information needs to be analyzed to obtain the risk level corresponding to the conference participation user, and the safety risk of each link of the online conference is effectively prevented.
In some embodiments of the invention, the target conference level comprises: a second level. Alternatively, the target conference level may include a high level, a medium level, and a low level. The low level is assumed to be the second level, or the low level and the intermediate level that does not meet the preset requirement are assumed to be the second level, wherein the preset requirement can be a safety requirement, and the intermediate level that does not meet the preset requirement can be an intermediate conference with lower safety requirement or without risk assessment for the participating users.
The method for analyzing the conference participating information according to the target conference level to obtain the risk level corresponding to the conference participating user further comprises the following steps:
and if the target conference level is the second level, the participating users are permitted to execute the business operation corresponding to the business operation request. Optionally, assuming that the second level is a low level, when the target conference level is a low level, it may be determined that the security level of the current online conference is low, and the risk assessment is not required for the participating user, so that the participating user may be permitted to perform the business operation, for example, directly permitting the participating user to speak, share a video, and send chat information, without performing real-time monitoring on the business operation request of the participating user. Optionally, assuming that the second level is a low level and a medium level which does not need to perform risk assessment on the participating users, when the target conference level is the low level and the medium level which does not need to perform risk assessment on the participating users, it may be determined that the current online conference security level is low, and risk assessment is not needed for the participating users, so that the participating users may be permitted to perform business operations such as speaking, sharing video, sending chat information, and the like without monitoring business operation requests of the participating users in real time. When the target conference level is the second level, in order to ensure the safe management and control and smooth proceeding of the online conference, the participating users can be directly permitted to execute the business operation corresponding to the business operation request, and the requirement of the safety management and control strategy of the online conference is met.
In some embodiments of the invention, the risk classes include: a first risk level. Optionally, the risk level may include a high risk, a medium risk, and a low risk, and the low risk may be set as the first risk level according to the requirement, thereby obtaining the first risk level.
And permitting the participating users to execute the business operation corresponding to the business operation request based on the risk level, wherein the business operation comprises the following steps:
and if the risk level is the first risk level, the participating user is permitted to execute the business operation. Optionally, assuming that the first risk level is low risk, when the risk level of the participating user is low risk, for example, the user terminal information in the participating information does not hit the blacklist feature library, the user IP does not hit the blacklist IP library, and the terminal/IP attribution is consistent with the terminal/IP attribution commonly used by the historical conference of the participating user, it may be determined that the risk level of the participating user is low risk, and the participating user with a low risk level may be directly permitted to perform corresponding business operations, for example, the participating user with a low risk level may be directly permitted to speak, share a video, send chat information, and the like. And if and only if the risk level of the participating user is the first risk level, the participating user can be permitted to execute business operation, so that the real-time monitoring of the participating user and the intelligent wind control of the online conference are realized.
In some embodiments of the invention, the risk classes include: a second risk level. Optionally, the risk levels may include a high risk, a medium risk, and a low risk, and the high risk and the medium risk may be set as a second risk level according to the demand, thereby obtaining the second risk level.
And permitting the participating users to execute the business operation corresponding to the business operation request based on the risk level, and further comprising:
and if the risk level is the second risk level, generating an audit prompt, wherein the audit prompt is used for indicating the safety audit of the business operation request. Alternatively, assuming the second risk level is high risk and moderate risk, when the risk level of the participating user is high risk and moderate risk, for example, the user terminal information in the meeting information hits the blacklist feature library (high risk), the user IP hits the blacklist IP library (high risk), the user account hits the blacklist user library (high risk), the terminal/IP attribution is inconsistent with the terminal/IP attribution commonly used by the historical meeting of the meeting user (medium risk), the risk level of the participating user can be judged to be high risk or medium risk, and for the participating user with high risk or medium risk, an audit prompt can be generated, the auditing prompt can prompt the participant user to be audited, and simultaneously prompt the host of the conference that the risk level of the participant user is high risk/medium risk, and instruct the host to manually audit the safety of the service operation request of the participant user.
And if the security audit is passed, the participating users are permitted to execute the business operation. Optionally, if the result of the security audit performed on the service operation request audit by the host according to the audit prompt is that the audit is passed, the participating user may be permitted to perform service operations such as speaking, sharing video, sending chat information, and the like. And when the risk level of the participant user is the second risk level, generating an audit prompt, simultaneously auditing the business operation request of the participant user, and permitting the participant user to execute the business operation only when the audit is passed, thereby realizing the real-time monitoring of the participant user and the intelligent wind control of the online conference.
In some embodiments of the present invention, the granting permission to the participating user to execute the business operation corresponding to the business operation request based on the risk level further includes:
and if the security audit is not passed, generating a prompt for refusing to execute. Wherein, the execution refusal prompt can be used for prompting the auditing failure information to the participant user. Optionally, if the result of the safe audit performed by the host on the service operation request of the participant user is that the audit is not passed, the participant user cannot be permitted to perform service operations such as service speaking, video sharing or chat information sending, and meanwhile, an execution refusing prompt may be generated to prompt the participant user of the information that the audit is not passed. And when the auditing is not passed, the participating users cannot be permitted to execute the business operation, and an execution refusing prompt is generated to prompt the participating users of auditing failure information, so that the participating users can be monitored in real time and intelligent wind control over the online conference is realized.
Analyzing the conference participation information according to the target conference level to obtain the risk level corresponding to the conference participation user, wherein the risk level comprises the following steps:
and analyzing the conference participation information according to the target conference level to obtain the credit level of the conference participation user. Wherein the credit rating may be a credit point rating of the participating user. Optionally, when the target conference level is high, the conference information of the participating users needs to be analyzed to obtain the credit levels of the participating users. The credit rating can be obtained by comprehensive calculation according to the conference credit point evaluation result of each time of the participating users. Specifically, the conference to be evaluated can be selected from the historical conference record list, and the performance (whether to share maliciously, whether to swipe a screen maliciously, whether to make noise maliciously, etc.) of the conference user in the current conference is extracted from the multiple conferences to be evaluated to perform conference credit score evaluation, so as to obtain the credit level of the conference user.
And determining the risk level corresponding to the service operation request according to the credit level. Optionally, the risk level corresponding to the service operation request of the participating user may be determined according to the credit level, for example, a threshold corresponding to the credit level of the participating user may be set, for example, a first threshold and a second threshold are set, and the second threshold is greater than the first threshold, and it may be determined that: if the credit level is less than the first threshold, the credit level of the participating user can be judged to be low, and the risk level corresponding to the business operation request of the participating user can be determined to be high risk; if the credit level is greater than the first threshold and less than the second threshold, the credit level of the participating user can be judged to be medium, and the risk level corresponding to the service operation request of the participating user can be determined to be medium risk; if the credit level is greater than the second threshold, it may be determined that the credit level of the participating user is higher, and it may be determined that the risk level corresponding to the service operation request of the participating user is a low risk. In some specific embodiments, the conference users with the credit level being a negative value and the credit level being less than the first threshold (i.e. the high-risk participant users) may be listed in the blacklist user library, and when the conference is next performed, if the participant user initiates a participation request again or initiates a service operation request, an audit prompt is generated to instruct the conference host to perform security audit on the participation request or the service operation request. The conference participation information is analyzed according to the target conference level to obtain the credit level of the conference participation user, so that the risk level corresponding to the service operation request can be determined according to the credit level, meanwhile, the conference participation user with lower credit level can be listed in a blacklist user library, the whole service process of the online conference can be covered, the safety risk of each link of the online conference is effectively prevented, and the online conference service scenes with different safety requirements are met.
Referring to fig. 2, a conference security monitoring apparatus according to an embodiment of the second aspect of the present invention includes:
a first obtaining module 200, configured to obtain a service operation request of a participating user, where the service operation request includes: meeting information of the meeting participating users;
a second obtaining module 210, configured to obtain a target conference level;
the analysis module 220 is configured to analyze the conference participation information according to the target conference level to obtain a risk level corresponding to the conference participation user;
and the monitoring module 230 is configured to grant the participating user to execute the business operation corresponding to the business operation request based on the risk level.
By executing the conference security monitoring method of the embodiment of the first aspect of the invention, the conference security monitoring device can monitor the participating users in real time, effectively prevent the security risk of each link of the online conference, and meet the requirement of security control policy of the online conference.
Referring to fig. 3, an embodiment of the third aspect of the present invention further provides a functional module diagram of an electronic device, including: at least one processor 300, and a memory 310 communicatively coupled to the at least one processor 300; the system also comprises a data transmission module 320, a camera 330 and a display screen 340.
The processor 300 is configured to execute the conference security control method in the first embodiment by calling a computer program stored in the memory 310.
The memory, as a non-transitory storage medium, may be used to store a non-transitory software program and a non-transitory computer-executable program, such as the conference security control method in the embodiment of the first aspect of the present invention. The processor implements the conference security control method in the above-described first embodiment by executing a non-transitory software program and instructions stored in the memory.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store and execute the conference security control method in the embodiment of the first aspect. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and these remote memories may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The non-transitory software programs and instructions required to implement the conference security control method in the first aspect embodiment described above are stored in a memory and, when executed by one or more processors, perform the conference security control method in the first aspect embodiment described above.
Embodiments of the fourth aspect of the present invention also provide a computer-readable storage medium storing computer-executable instructions for: the conference security control method in the embodiment of the first aspect is performed.
In some embodiments, the storage medium stores computer-executable instructions, which are executed by one or more control processors, for example, by one of the processors in the electronic device of the third aspect, and may cause the one or more processors to execute the conference security control method in the first aspect.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.
The above described embodiments of the apparatus are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example," or "some examples" or the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (6)

1. The conference security monitoring method is characterized by comprising the following steps:
obtaining a service operation request of a participant user, wherein the participant user is a user who participates in the online conference, and the service operation request comprises: the conference information of the conference participating user, the service operation request further includes: at least one of a speaking request, a video sharing request and a chat message sending request;
acquiring a target conference level;
analyzing the conference participating information according to the target conference level to obtain a risk level corresponding to the conference participating user; if the target conference level is a first level, analyzing the conference participation information according to the first level to obtain a risk level corresponding to the conference participation user; if the target conference level is a second level, the participating users are permitted to execute the business operation corresponding to the business operation request;
permitting the participating users to execute business operations corresponding to the business operation requests based on the risk levels; wherein if the risk level is a first risk level, the participating user is permitted to execute the business operation; if the risk level is a second risk level, generating an audit prompt, wherein the audit prompt is used for indicating to carry out safety audit on the business operation request; and if the security audit is passed, the participating user is permitted to execute the service operation.
2. The method of claim 1, further comprising:
and if the security audit is not passed, generating a prompt for refusing to execute.
3. The method of claim 1, wherein the analyzing the conferencing information according to the target conferencing level to obtain a risk level corresponding to the conferencing user comprises:
analyzing the conference participating information according to the target conference level to obtain the credit level of the conference participating user;
and determining the risk level corresponding to the service operation request according to the credit level.
4. Conference security monitoring apparatus, comprising:
a first obtaining module, configured to obtain a service operation request of a participating user, where the participating user is a user who has participated in the online conference, and the service operation request includes: the conference information of the conference participating user, the service operation request further includes: at least one of a speaking request, a video sharing request and a chat message sending request;
the second acquisition module is used for acquiring the target conference level;
the analysis module is used for analyzing the conference participating information according to the target conference level to obtain a risk level corresponding to the conference participating user; if the target conference level is a first level, analyzing the conference participation information according to the first level to obtain a risk level corresponding to the conference participation user; if the target conference level is a second level, the participating users are permitted to execute the business operation corresponding to the business operation request;
the monitoring module is used for permitting the participating users to execute the business operation corresponding to the business operation request based on the risk level; wherein if the risk level is a first risk level, the participating user is permitted to execute the business operation; if the risk level is a second risk level, generating an audit prompt, wherein the audit prompt is used for indicating to carry out safety audit on the business operation request; and if the security audit is passed, the participating user is permitted to execute the business operation.
5. An electronic device, comprising:
at least one processor, and,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions for execution by the at least one processor to cause the at least one processor, when executing the instructions, to implement the conference security monitoring method of any one of claims 1 to 3.
6. A computer-readable storage medium, characterized in that the storage medium stores computer-executable instructions for causing a computer to perform the conference security monitoring method according to any one of claims 1 to 3.
CN202110029674.4A 2021-01-11 2021-01-11 Conference security monitoring method and device, electronic equipment and storage medium Active CN112887105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110029674.4A CN112887105B (en) 2021-01-11 2021-01-11 Conference security monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110029674.4A CN112887105B (en) 2021-01-11 2021-01-11 Conference security monitoring method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112887105A CN112887105A (en) 2021-06-01
CN112887105B true CN112887105B (en) 2022-09-06

Family

ID=76047700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110029674.4A Active CN112887105B (en) 2021-01-11 2021-01-11 Conference security monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112887105B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612743A (en) * 2021-07-23 2021-11-05 上海万昆信息科技发展有限公司 Remote office management method and system
CN114979975B (en) * 2022-05-07 2023-09-19 深圳市灵镜技术有限公司 Cluster talkback admittance method and system based on big data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159779A (en) * 2007-10-16 2008-04-09 北京佳讯飞鸿电气股份有限公司 Method of implementing user speaking in command dispatching communication system control dispatching conference

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010083754A1 (en) * 2009-01-22 2010-07-29 华为终端有限公司 Conference control method, control equipment and management equipment
US8755507B2 (en) * 2009-01-27 2014-06-17 International Business Machines Corporation Providing multilevel conference call participants
JP2010198536A (en) * 2009-02-27 2010-09-09 Brother Ind Ltd User authentication device, conference system, user authentication method, and user authentication program
CN104993939A (en) * 2015-07-03 2015-10-21 马岩 Conference organization reminding method and system
CN108933675B (en) * 2017-05-25 2022-03-04 中兴通讯股份有限公司 Conference resource allocation method, device and storage medium
CN111681004A (en) * 2020-04-24 2020-09-18 厦门美柚股份有限公司 Business wind control method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159779A (en) * 2007-10-16 2008-04-09 北京佳讯飞鸿电气股份有限公司 Method of implementing user speaking in command dispatching communication system control dispatching conference

Also Published As

Publication number Publication date
CN112887105A (en) 2021-06-01

Similar Documents

Publication Publication Date Title
CN109861985B (en) IP wind control method, device, equipment and storage medium based on risk grade division
RU2510982C2 (en) User evaluation system and method for message filtering
US7779465B2 (en) Distributed peer attack alerting
CN112887105B (en) Conference security monitoring method and device, electronic equipment and storage medium
CN111131310B (en) Access control method, device, system, computer device and storage medium
US20060235932A1 (en) Chat server mute capability
CN102769549A (en) Network security monitoring method and device
CN109819053B (en) Springboard machine system applied to mixed cloud environment and control method thereof
CN114268957B (en) Abnormal business data processing method, device, server and storage medium
CN105847277A (en) Service account share management method and system used for third party application
CN109495378A (en) Detect method, apparatus, server and the storage medium of abnormal account number
CN108123961A (en) Information processing method, apparatus and system
CN108881929B (en) Method and device for setting login prompt of live broadcast room
CN112804230B (en) Monitoring method, system, equipment and storage medium for distributed denial of service attack
CN111600871B (en) Attack prevention method and device
CN106254375B (en) A kind of recognition methods of hotspot equipment and device
CN115811428A (en) Defense method, system, equipment and storage medium for resisting DDoS attack
CN112929347B (en) Frequency limiting method, device, equipment and medium
CN115022008A (en) Access risk assessment method, device, equipment and medium
CN115242494A (en) Method, system, device and medium for controlling equipment access
CN113329204A (en) Data security transmission method and system based on terminal trust management
CN111932290A (en) Request processing method, device, equipment and storage medium
KR101160903B1 (en) Blacklist extracting system and method thereof
CN111405348A (en) Method, apparatus and computer storage medium for media playback
CN114884692B (en) Network access control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant