CN113067767A - Guest invitation method of network conference - Google Patents
Guest invitation method of network conference Download PDFInfo
- Publication number
- CN113067767A CN113067767A CN202110323052.2A CN202110323052A CN113067767A CN 113067767 A CN113067767 A CN 113067767A CN 202110323052 A CN202110323052 A CN 202110323052A CN 113067767 A CN113067767 A CN 113067767A
- Authority
- CN
- China
- Prior art keywords
- conference
- information
- pushed
- guest
- enter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1818—Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
Abstract
The invention discloses a guest invitation method of a network conference, which comprises the following steps: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode. Step two: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed. Step three: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified. Step four: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary. Step five: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting. The conference process is very safe, the false interloper is avoided, and the safety and the confidentiality of the network conference are improved.
Description
Technical Field
The invention relates to the technical field of instant messaging, in particular to a guest invitation method for a network conference.
Background
With the continuous development of network technology, the traditional conference mode is gradually replaced by the network conference. The network conference refers to an instant messaging process initiated through a network and participated by a plurality of user terminals.
When a general network participant enters a conference through a network equipment terminal, only some simple parameter settings are set, the security is low, the probability of false entry is high, and a relative security risk exists.
Disclosure of Invention
An object of the present invention is to provide a guest invitation method for a web conference to solve the above-mentioned problems.
In order to achieve the purpose, the invention provides the following technical scheme: the method comprises the following steps: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode. Step two: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed. Step three: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified. Step four: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary. Step five: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting. The conference process is very safe, the false interloper is avoided, and the safety and the confidentiality of the network conference are improved.
Preferably, the conference initiator creates a database of participants that can only be attended by persons within the database.
Preferably, the conference information pushed by the conference initiator may be sent to the communication terminals of the invited guests by an email or a link.
Preferably, the two-dimensional code certificate pushed by the party initiator is an electronic invitation containing a two-dimensional code and is pushed to the mail only through system designation.
Compared with the prior art, the invention has the beneficial effects that: the invention not only improves the security and confidentiality of the network conference, but also has the information management characteristic of conference personnel, so that the conference participation situation is clear at a glance and the work statistics is convenient.
Drawings
Fig. 1 is a schematic flow chart of a guest invitation method of a web conference according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a method for inviting guests to a web conference, comprising:
s1: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode.
S2: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed.
S3: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified.
S4: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary.
S5: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting.
The conference initiator creates a database of participants that can only be attended by the persons in the database.
The conference information pushed by the conference initiator can be sent to the communication terminals of the invited guests in a mail or link mode.
The two-dimension code certificate pushed by the party initiator is an electronic invitation containing a two-dimension code and is pushed into a mail only through system designation.
More specifically, the conference initiator creates the temporary conference in the same software or APP mode, the participants of the conference need to meet the requirement of the conference initiator in the conference creation process, the number of the participants in the conference participant database created by the conference initiator determines the number of the real-time participants of the conference, the mistaken breakthrough of the participants in the conference process is avoided, and the orderly conference is guaranteed.
More specifically, the identity authentication, the voice authentication and the two-dimensional code certificate authentication are both performed by manually authenticating the participating guests, information recording and identification authentication are performed through information communication feedback, the authenticity of the participating guests is strictly controlled, and the security and confidentiality of the conference content are guaranteed.
In practical application, the communication terminals used by the participants and guests should be compatible with the information pushed by the mails, the links and the two-dimensional code certificates, and support to identify the information and check the information, so that manual information verification is realized by transferring, and in the verification process, the verification is compared through wireless communication transmission, and the automatic statistics and convenient information management can be carried out on the participants and guests.
It should be noted that, if one or several guests need to be added temporarily and the number of the conference people is full at this time, the conference initiator modifies the participant database and pushes the two-dimensional code certificate to the participant database, and the participant can enter the conference after the information verification is successful.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (4)
1. A guest invitation method of a network conference comprises the following steps:
s1: and the conference initiator creates a participant database and pushes conference holding time and content in a group mode.
S2: the pushed participants of the conference are invited into the conference, and before entering the conference, identity authentication and voice authentication are required, and information is further confirmed.
S3: and the pushed guest information is signed into the system before the conference starts, and the participation state of each guest is verified and verified.
S4: and the participants who do not enter the conference after the conference starts cannot enter the conference through the invited information, and can only enter the conference through the two-dimensional code credential pushed by the conference initiator if necessary.
S5: the two-dimensional code certificate contains various information verification characteristics, including position, personal information, voice and identity recognition verification, and completely accords with the information and can enter a meeting.
2. The guest invitation method of the network conference as claimed in claim 1, wherein: the conference initiator creates a database of participants that can only be attended by the persons in the database.
3. The guest invitation method of the network conference as claimed in claim 1, wherein: the conference information pushed by the conference initiator can be sent to the communication terminals of the invited guests in a mail or link mode.
4. The guest invitation method of the network conference as claimed in claim 1, wherein: the two-dimension code certificate pushed by the party initiator is an electronic invitation containing a two-dimension code and is pushed into a mail only through system designation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110323052.2A CN113067767A (en) | 2021-03-26 | 2021-03-26 | Guest invitation method of network conference |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110323052.2A CN113067767A (en) | 2021-03-26 | 2021-03-26 | Guest invitation method of network conference |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113067767A true CN113067767A (en) | 2021-07-02 |
Family
ID=76563739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110323052.2A Pending CN113067767A (en) | 2021-03-26 | 2021-03-26 | Guest invitation method of network conference |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113067767A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596383A (en) * | 2021-07-23 | 2021-11-02 | 中信银行股份有限公司 | Method, device and equipment for managing participants of network conference |
CN114979975A (en) * | 2022-05-07 | 2022-08-30 | 深圳市灵镜技术有限公司 | Cluster talkback access method and system based on big data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506562A (en) * | 2015-01-13 | 2015-04-08 | 东北大学 | Two-dimension code and face recognition fused conference identity authentication device and method |
CN108427979A (en) * | 2018-04-20 | 2018-08-21 | 佛山欧神诺云商科技有限公司 | A kind of flow management method and its device based on Quick Response Code |
CN108933728A (en) * | 2017-05-27 | 2018-12-04 | 湖南云控科技有限公司 | A kind of wechat meeting registration and barcode scanning are registered management method |
CN108986246A (en) * | 2018-06-26 | 2018-12-11 | 成都市安迅和普科技有限公司 | A kind of application method of meeting signature and guidance system based on recognition of face |
CN109903411A (en) * | 2019-01-26 | 2019-06-18 | 北方民族大学 | A kind of meeting signature device and application method based on recognition of face |
-
2021
- 2021-03-26 CN CN202110323052.2A patent/CN113067767A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506562A (en) * | 2015-01-13 | 2015-04-08 | 东北大学 | Two-dimension code and face recognition fused conference identity authentication device and method |
CN108933728A (en) * | 2017-05-27 | 2018-12-04 | 湖南云控科技有限公司 | A kind of wechat meeting registration and barcode scanning are registered management method |
CN108427979A (en) * | 2018-04-20 | 2018-08-21 | 佛山欧神诺云商科技有限公司 | A kind of flow management method and its device based on Quick Response Code |
CN108986246A (en) * | 2018-06-26 | 2018-12-11 | 成都市安迅和普科技有限公司 | A kind of application method of meeting signature and guidance system based on recognition of face |
CN109903411A (en) * | 2019-01-26 | 2019-06-18 | 北方民族大学 | A kind of meeting signature device and application method based on recognition of face |
Non-Patent Citations (2)
Title |
---|
于晓君: "二维码信息技术在会议签到中的应用管理", 《通信管理与技术》 * |
田永纯: "基于二维码与人脸识别的会议身份认证系统的设计与实现", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596383A (en) * | 2021-07-23 | 2021-11-02 | 中信银行股份有限公司 | Method, device and equipment for managing participants of network conference |
CN113596383B (en) * | 2021-07-23 | 2023-05-09 | 中信银行股份有限公司 | Method, device and equipment for managing participants of network conference |
CN114979975A (en) * | 2022-05-07 | 2022-08-30 | 深圳市灵镜技术有限公司 | Cluster talkback access method and system based on big data |
CN114979975B (en) * | 2022-05-07 | 2023-09-19 | 深圳市灵镜技术有限公司 | Cluster talkback admittance method and system based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109165944B (en) | Multi-party signature authentication method, device, equipment and storage medium based on block chain | |
CN113067767A (en) | Guest invitation method of network conference | |
US8950001B2 (en) | Continual peer authentication | |
CN102483806B (en) | Face recognition is used to set up AD HOC network | |
CN105468948B (en) | A method of authentication is carried out by social networks | |
WO2016074534A1 (en) | Method, device, and system for signing in to video conference | |
CN1522038A (en) | Conference call facility | |
CN101313607A (en) | Method, system and domain management center for subscribe mobile service | |
CN206301383U (en) | Online Video interview exam system | |
CN103888413B (en) | Realize the method and system of multimedia conferencing | |
CN109121124A (en) | A kind of client-based bluetooth mesh equipment networking process implementation method | |
CN110910523A (en) | Conference sign-in method, conference room operation terminal and computer storage medium | |
CN111163325A (en) | Community live broadcast method and device and storage medium | |
CN104954151A (en) | Conference summary extracting and pushing method based on network conference | |
CN112000744A (en) | Signature method and related equipment | |
WO2000067143A3 (en) | Transaction method and system for data networks | |
CN106851177A (en) | A kind of method and system for automatically creating video conference | |
CN104469254B (en) | Meeting roll-call processing method, device and conference system | |
CN112507300A (en) | Electronic signature system based on eID and electronic signature verification method | |
EP1964042A1 (en) | Method for the preparation of a chip card for electronic signature services | |
CN1992626A (en) | Method for establishing universal discussion group in instant communication | |
CN103259766A (en) | Service management method and system of group information | |
CN105516172A (en) | Identity authentication terminal, identity authentication system and online affair handling platform | |
CN108711205A (en) | A kind of conference system visitor Verification System | |
CN111757042A (en) | Remote collaborative conference method and system based on face authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210702 |
|
RJ01 | Rejection of invention patent application after publication |