CN113067767A - Guest invitation method of network conference - Google Patents

Guest invitation method of network conference Download PDF

Info

Publication number
CN113067767A
CN113067767A CN202110323052.2A CN202110323052A CN113067767A CN 113067767 A CN113067767 A CN 113067767A CN 202110323052 A CN202110323052 A CN 202110323052A CN 113067767 A CN113067767 A CN 113067767A
Authority
CN
China
Prior art keywords
conference
information
pushed
guest
enter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110323052.2A
Other languages
Chinese (zh)
Inventor
白宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Youmi Technology Shenzhen Co ltd
Original Assignee
Youmi Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Youmi Technology Shenzhen Co ltd filed Critical Youmi Technology Shenzhen Co ltd
Priority to CN202110323052.2A priority Critical patent/CN113067767A/en
Publication of CN113067767A publication Critical patent/CN113067767A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1818Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes

Abstract

The invention discloses a guest invitation method of a network conference, which comprises the following steps: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode. Step two: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed. Step three: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified. Step four: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary. Step five: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting. The conference process is very safe, the false interloper is avoided, and the safety and the confidentiality of the network conference are improved.

Description

Guest invitation method of network conference
Technical Field
The invention relates to the technical field of instant messaging, in particular to a guest invitation method for a network conference.
Background
With the continuous development of network technology, the traditional conference mode is gradually replaced by the network conference. The network conference refers to an instant messaging process initiated through a network and participated by a plurality of user terminals.
When a general network participant enters a conference through a network equipment terminal, only some simple parameter settings are set, the security is low, the probability of false entry is high, and a relative security risk exists.
Disclosure of Invention
An object of the present invention is to provide a guest invitation method for a web conference to solve the above-mentioned problems.
In order to achieve the purpose, the invention provides the following technical scheme: the method comprises the following steps: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode. Step two: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed. Step three: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified. Step four: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary. Step five: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting. The conference process is very safe, the false interloper is avoided, and the safety and the confidentiality of the network conference are improved.
Preferably, the conference initiator creates a database of participants that can only be attended by persons within the database.
Preferably, the conference information pushed by the conference initiator may be sent to the communication terminals of the invited guests by an email or a link.
Preferably, the two-dimensional code certificate pushed by the party initiator is an electronic invitation containing a two-dimensional code and is pushed to the mail only through system designation.
Compared with the prior art, the invention has the beneficial effects that: the invention not only improves the security and confidentiality of the network conference, but also has the information management characteristic of conference personnel, so that the conference participation situation is clear at a glance and the work statistics is convenient.
Drawings
Fig. 1 is a schematic flow chart of a guest invitation method of a web conference according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a method for inviting guests to a web conference, comprising:
s1: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode.
S2: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed.
S3: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified.
S4: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary.
S5: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting.
The conference initiator creates a database of participants that can only be attended by the persons in the database.
The conference information pushed by the conference initiator can be sent to the communication terminals of the invited guests in a mail or link mode.
The two-dimension code certificate pushed by the party initiator is an electronic invitation containing a two-dimension code and is pushed into a mail only through system designation.
More specifically, the conference initiator creates the temporary conference in the same software or APP mode, the participants of the conference need to meet the requirement of the conference initiator in the conference creation process, the number of the participants in the conference participant database created by the conference initiator determines the number of the real-time participants of the conference, the mistaken breakthrough of the participants in the conference process is avoided, and the orderly conference is guaranteed.
More specifically, the identity authentication, the voice authentication and the two-dimensional code certificate authentication are both performed by manually authenticating the participating guests, information recording and identification authentication are performed through information communication feedback, the authenticity of the participating guests is strictly controlled, and the security and confidentiality of the conference content are guaranteed.
In practical application, the communication terminals used by the participants and guests should be compatible with the information pushed by the mails, the links and the two-dimensional code certificates, and support to identify the information and check the information, so that manual information verification is realized by transferring, and in the verification process, the verification is compared through wireless communication transmission, and the automatic statistics and convenient information management can be carried out on the participants and guests.
It should be noted that, if one or several guests need to be added temporarily and the number of the conference people is full at this time, the conference initiator modifies the participant database and pushes the two-dimensional code certificate to the participant database, and the participant can enter the conference after the information verification is successful.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (4)

1. A guest invitation method of a network conference comprises the following steps:
s1: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode.
S2: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed.
S3: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified.
S4: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary.
S5: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting.
2. The guest invitation method of the network conference as claimed in claim 1, wherein: the conference initiator creates a database of participants that can only be attended by the persons in the database.
3. The guest invitation method of the network conference as claimed in claim 1, wherein: the conference information pushed by the conference initiator can be sent to the communication terminals of the invited guests in a mail or link mode.
4. The guest invitation method of the network conference as claimed in claim 1, wherein: the two-dimension code certificate pushed by the party initiator is an electronic invitation containing a two-dimension code and is pushed into a mail only through system designation.
CN202110323052.2A 2021-03-26 2021-03-26 Guest invitation method of network conference Pending CN113067767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110323052.2A CN113067767A (en) 2021-03-26 2021-03-26 Guest invitation method of network conference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110323052.2A CN113067767A (en) 2021-03-26 2021-03-26 Guest invitation method of network conference

Publications (1)

Publication Number Publication Date
CN113067767A true CN113067767A (en) 2021-07-02

Family

ID=76563739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110323052.2A Pending CN113067767A (en) 2021-03-26 2021-03-26 Guest invitation method of network conference

Country Status (1)

Country Link
CN (1) CN113067767A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596383A (en) * 2021-07-23 2021-11-02 中信银行股份有限公司 Method, device and equipment for managing participants of network conference
CN114979975A (en) * 2022-05-07 2022-08-30 深圳市灵镜技术有限公司 Cluster talkback access method and system based on big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506562A (en) * 2015-01-13 2015-04-08 东北大学 Two-dimension code and face recognition fused conference identity authentication device and method
CN108427979A (en) * 2018-04-20 2018-08-21 佛山欧神诺云商科技有限公司 A kind of flow management method and its device based on Quick Response Code
CN108933728A (en) * 2017-05-27 2018-12-04 湖南云控科技有限公司 A kind of wechat meeting registration and barcode scanning are registered management method
CN108986246A (en) * 2018-06-26 2018-12-11 成都市安迅和普科技有限公司 A kind of application method of meeting signature and guidance system based on recognition of face
CN109903411A (en) * 2019-01-26 2019-06-18 北方民族大学 A kind of meeting signature device and application method based on recognition of face

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506562A (en) * 2015-01-13 2015-04-08 东北大学 Two-dimension code and face recognition fused conference identity authentication device and method
CN108933728A (en) * 2017-05-27 2018-12-04 湖南云控科技有限公司 A kind of wechat meeting registration and barcode scanning are registered management method
CN108427979A (en) * 2018-04-20 2018-08-21 佛山欧神诺云商科技有限公司 A kind of flow management method and its device based on Quick Response Code
CN108986246A (en) * 2018-06-26 2018-12-11 成都市安迅和普科技有限公司 A kind of application method of meeting signature and guidance system based on recognition of face
CN109903411A (en) * 2019-01-26 2019-06-18 北方民族大学 A kind of meeting signature device and application method based on recognition of face

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
于晓君: "二维码信息技术在会议签到中的应用管理", 《通信管理与技术》 *
田永纯: "基于二维码与人脸识别的会议身份认证系统的设计与实现", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596383A (en) * 2021-07-23 2021-11-02 中信银行股份有限公司 Method, device and equipment for managing participants of network conference
CN113596383B (en) * 2021-07-23 2023-05-09 中信银行股份有限公司 Method, device and equipment for managing participants of network conference
CN114979975A (en) * 2022-05-07 2022-08-30 深圳市灵镜技术有限公司 Cluster talkback access method and system based on big data
CN114979975B (en) * 2022-05-07 2023-09-19 深圳市灵镜技术有限公司 Cluster talkback admittance method and system based on big data

Similar Documents

Publication Publication Date Title
CN109165944B (en) Multi-party signature authentication method, device, equipment and storage medium based on block chain
CN113067767A (en) Guest invitation method of network conference
US8950001B2 (en) Continual peer authentication
CN102483806B (en) Face recognition is used to set up AD HOC network
CN105468948B (en) A method of authentication is carried out by social networks
WO2016074534A1 (en) Method, device, and system for signing in to video conference
CN1522038A (en) Conference call facility
CN101313607A (en) Method, system and domain management center for subscribe mobile service
CN206301383U (en) Online Video interview exam system
CN103888413B (en) Realize the method and system of multimedia conferencing
CN109121124A (en) A kind of client-based bluetooth mesh equipment networking process implementation method
CN110910523A (en) Conference sign-in method, conference room operation terminal and computer storage medium
CN111163325A (en) Community live broadcast method and device and storage medium
CN104954151A (en) Conference summary extracting and pushing method based on network conference
CN112000744A (en) Signature method and related equipment
WO2000067143A3 (en) Transaction method and system for data networks
CN106851177A (en) A kind of method and system for automatically creating video conference
CN104469254B (en) Meeting roll-call processing method, device and conference system
CN112507300A (en) Electronic signature system based on eID and electronic signature verification method
EP1964042A1 (en) Method for the preparation of a chip card for electronic signature services
CN1992626A (en) Method for establishing universal discussion group in instant communication
CN103259766A (en) Service management method and system of group information
CN105516172A (en) Identity authentication terminal, identity authentication system and online affair handling platform
CN108711205A (en) A kind of conference system visitor Verification System
CN111757042A (en) Remote collaborative conference method and system based on face authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210702

RJ01 Rejection of invention patent application after publication