CN114553442B - Enterprise internal remote conference method and system - Google Patents

Enterprise internal remote conference method and system Download PDF

Info

Publication number
CN114553442B
CN114553442B CN202210435467.3A CN202210435467A CN114553442B CN 114553442 B CN114553442 B CN 114553442B CN 202210435467 A CN202210435467 A CN 202210435467A CN 114553442 B CN114553442 B CN 114553442B
Authority
CN
China
Prior art keywords
password
conference
face
information
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210435467.3A
Other languages
Chinese (zh)
Other versions
CN114553442A (en
Inventor
朱维伟
陆晓飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Yunzhi Technology Co ltd
Original Assignee
Anhui Yunzhi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Yunzhi Technology Co ltd filed Critical Anhui Yunzhi Technology Co ltd
Priority to CN202210435467.3A priority Critical patent/CN114553442B/en
Publication of CN114553442A publication Critical patent/CN114553442A/en
Application granted granted Critical
Publication of CN114553442B publication Critical patent/CN114553442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The invention relates to the technical field of enterprise security management, in particular to a method and a system for remote conference in an enterprise. The invention generates the conference password firstly and informs the predicted participants of the conference password; acquiring the face information of the expected participants as the expected participant faces; when a user inputs a conference password on a conference terminal, acquiring a pre-conference image in front of a screen of the conference terminal; and then, identifying the face in the image before meeting, marking the identified face information as an actual meeting face, identifying actual participants, matching the actual meeting face with the expected meeting face, and if the actual meeting face is not successfully matched with the expected meeting face, indicating that the actual meeting participants are not in the list of the expected meeting participants, sending out early warning of password leakage of the meeting participants. By the method, even if the conference password is leaked, unintended participants can not enter the teleconference, leakage of internal information of the enterprise can be avoided, and safety in the enterprise management process is improved.

Description

Enterprise internal remote conference method and system
Technical Field
The invention relates to the technical field of enterprise security management, in particular to a method and a system for remote conference in an enterprise.
Background
The remote conference aims to realize the purpose of holding a conference across areas by using a modern communication means. To conduct a teleconference, a communication line, a teleconference system, is generally required. Especially in a large enterprise with many branches or offices, the management of employees in various regions through a teleconference system is an important part in enterprise management, so that the operation cost of the enterprise can be reduced, and the internal communication efficiency can be improved.
Often, enterprises need to rely on third-party service providers to implement teleconferencing functions within the enterprise, such as Tencent conferences, Zoom, etc.
However, the third-party service provider generally needs to have higher universality, so that identity authentication is performed by basically adopting a single and simple conference password, and the high security requirement of an enterprise cannot be met in terms of security. For example, if the conference password is leaked, the information of the conference participants cannot be confirmed without checking the conference participants by using a camera, so that outsiders enter the conference, and the risk of information leakage inside the enterprise is increased.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a method and a system for teleconferencing in an enterprise, which solve the problem of low security of a teleconferencing function provided by a third party.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme:
in a first aspect, a method for remote conference in an enterprise is provided, the method including:
generating an access password and informing expected participants of the access password;
acquiring face information of expected participants as expected participant faces;
when the conference password is input on the conference terminal, acquiring a pre-conference image in front of a screen of the conference terminal;
identifying the face in the image before meeting, and marking the identified face information as the actual face participating in the meeting;
and matching the actual face of the participant with the expected face of the participant, and if the actual face of the participant is not successfully matched with the expected face of the participant, sending out early warning of the leakage of the conference entering password.
Further, the generating an access password includes:
acquiring corresponding typing frequency information based on predicted participants;
based oniGenerating typing frequency information of each expected participantn i A digit of an access code, whereiniI,And isIRepresenting the total number of expected participants.
Further, the conference entering password is a pure digital password, and the obtaining of the corresponding typing frequency information based on the predicted participant comprises:
before generating the conference password, acquiring the current input equipment information, and acquiring and storing the current input equipment information in real timeiKeyboard input information of each intended participant; the keyboard input information comprises: sample input device information, input character type information and input time information; and the input character types include English, number and symbol;
screening out the continuousNumber of input numeric characters exceedskAnd calculating the average input frequency based on the number of the digital characters and the input time interval to obtain the typing frequency information.
Further, the base is based oniGenerating typing frequency information of each expected participantn i A bit session password comprising:
generating a containmentkA pad segment cipher of digit numbers; and iskIs a preset value;
generating a containment based on response delay and typing frequency informationn i1 A first buffer cipher of digit numbers; the response delay is the time required from the start of input to the start of facial recognition;
generating a container based on facial recognition required duration and typing frequency informationn i2 A second buffer cipher of digit numbers;
combining the first buffer segment password, the second buffer segment password and the filling segment password to obtainn i The access code of the bit is encrypted,n i =n i1+ n i2+ k
further, the notifying the intended participant of the conference password comprises: and pushing the conference entering password to an online communication software account of the expected participant.
In a second aspect, there is provided an intra-enterprise teleconferencing system, comprising:
the conference joining password generating module is used for generating a conference joining password and informing expected participants of the conference joining password;
the expected participant face acquisition module is used for acquiring the face information of expected participants as an expected participant face;
the system comprises a pre-meeting image acquisition module, a meeting password input module and a meeting password input module, wherein the pre-meeting image acquisition module is used for acquiring a pre-meeting image in front of a screen of a meeting terminal when a meeting password is input on the meeting terminal;
the actual participating face marking module is used for identifying the face in the image before meeting and marking the identified face information as the actual participating face;
and the conference safety early warning module is used for matching the actual face of the participant with the expected face of the participant, and if the actual face of the participant is not matched successfully, sending out a password leakage early warning of the participant.
Further, the conference password generation module includes:
the typing frequency information acquisition unit is used for acquiring corresponding typing frequency information based on predicted participants;
a password generation unit for generating a password based oniGenerating typing frequency information of each expected participantn i A digit of an access code, whereiniIAnd is andIrepresenting the total number of expected participants;
and the conference password notification unit is used for notifying the expected participants of the conference password.
Further, the conference entering password is a pure digital password, and the obtaining of the corresponding typing frequency information based on the expected participant comprises:
before generating the conference password, acquiring the current input equipment information, and acquiring and storing the current input equipment information in real timeiKeyboard input information of each expected participant; the keyboard input information comprises: sample input device information, input character type information, and input time information; and the input character types include English, number and symbol;
filtering out the number of continuously input numeric characters exceedingkAnd calculating the average input frequency based on the number of the digital characters and the input time interval to obtain the typing frequency information.
Further, the base is based oniGenerating typing frequency information of expected participantn i A bit session password comprising:
generating a containmentkA pad segment cipher of digit numbers; and iskIs a preset value;
generating an envelope based on response delay and typing frequency informationn i1 A first buffer cipher of digit numbers; the response delay is outputEntering the time required from the beginning to the beginning of face recognition;
generating an envelope based on facial recognition duration and typing frequency informationn i2 A second buffer cipher of digit numbers;
combining the first buffer segment password, the second buffer segment password and the filling segment password to obtainn i The access code of the bit is encrypted,n i =n i1+ n i2+ k
further, the notifying the intended participant of the conference password comprises: and pushing the conference entering password to an online communication software account of the expected participant.
(III) advantageous effects
The invention generates the conference password firstly and informs the predicted participants of the conference password; acquiring the face information of the expected participant as the expected participant face; when a user inputs a conference password on a conference terminal, acquiring a pre-conference image in front of a screen of the conference terminal; and then, identifying the face in the image before meeting, marking the identified face information as an actual meeting face, identifying actual participants, matching the actual meeting face with the expected meeting face, and if the actual meeting face is not successfully matched with the expected meeting face, indicating that the actual meeting participants are not in the list of the expected meeting participants, sending out early warning of password leakage of the meeting participants. By the method, even if the conference password is leaked, unintended participants can not enter the teleconference, leakage of internal information of the enterprise can be avoided, and safety in the enterprise management process is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of the present invention;
fig. 2 is a system block diagram of an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described, and it is obvious that the described embodiments are a part of the embodiments of the present invention, but not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The embodiment of the application provides an enterprise internal teleconference method, and solves the problem that the existing teleconference function provided by a third party is not high in safety.
In order to solve the technical problems, the general idea of the embodiment of the application is as follows:
when the conference entering password is input, images before the conference are collected before the screen of the conference participating end so as to determine the personnel who actually input the conference entering password, and then the images are compared with the expected personnel information, if the images are not matched, the conference entering password is indicated to be leaked, and safety risk exists.
In order to better understand the technical scheme, the technical scheme is described in detail in the following with reference to the attached drawings of the specification and specific embodiments.
Example 1:
the embodiment of the invention provides an enterprise internal remote conference method, which is shown in a figure 1 and comprises the following steps:
generating an access password and informing expected participants of the access password;
acquiring face information of expected participants as expected participant faces;
when a conference entering password is input on a conference participating terminal, acquiring a pre-conference image in front of a conference participating terminal screen;
identifying the face in the image before meeting, and marking the identified face information as the actual face participating in the meeting;
and matching the actual face of the participant with the expected face of the participant, and if the actual face of the participant is not successfully matched with the expected face of the participant, sending out early warning of the leakage of the conference entering password.
Further, the generating an access password includes:
acquiring corresponding typing frequency information based on predicted participants;
based on the firstiGenerating typing frequency information of each expected participantn i A digit of an access code, whereiniI,And isIRepresenting the total number of expected participants.
Further, the conference entering password is a pure digital password, and the obtaining of the corresponding typing frequency information based on the expected participant comprises:
before generating the conference password, acquiring the current input equipment information, and acquiring and storing the current input equipment information in real timeiKeyboard input information of each expected participant; the keyboard input information comprises: sample input device information, input character type information, and input time information; and the input character types include English, number and symbol;
filtering out the number of continuously input numeric characters exceedingkAnd calculating the average input frequency based on the number of the digital characters and the input time interval to obtain the typing frequency information.
Further, the base is based oniGenerating typing frequency information of each expected participantn i A bit session password comprising:
generating a containmentkA pad segment cipher of digit numbers; and iskIs a preset value;
generating an envelope based on response delay and typing frequency informationn i1 A first buffer cipher of digit numbers; the response delay is the time required from the start of input to the start of facial recognition;
generating a container based on facial recognition required duration and typing frequency informationn i2 A second buffer cipher of digit numbers;
the first buffer segment password, the second buffer segment password and the filling segment passwordAre combined to obtainn i The access code of the bit is encrypted,n i =n i1+ n i2+ k
further, the informing of the intended participant of the conference entering password comprises: and pushing the conference entering password to an online communication software account of the expected participant.
The following describes the implementation process of the present embodiment in detail:
and S1, generating the conference entrance password and informing the expected participants of the conference entrance password.
Because follow-up needs gather facial information when inputing the income password, consequently, the length of inputing the password needs reasonable setting, if the setting of income password is too short for the user input time is too short, and then in the short time, can't be fine carry out facial discernment, influences follow-up facial matching process, and the convenience then can be reduced to the income password of overlength.
In order to set a reasonable-length session password, specifically, generating the session password includes the following steps:
s1.1, acquiring corresponding typing frequency information based on predicted participants;
specifically, assuming that the session password is a pure digital password, the method for acquiring the typing frequency information includes the following steps:
s1.1.1, before generating the conference password, acquiring the information of the current input equipment,
s1.1.2, before generating the conference password, collecting and storing the password in real timeiThe keyboard of the individual intended participant enters the information.
Wherein the keyboard input information comprises: sample input device information, input character type information, and input time information; and the input character types include english, numerals, and symbols.
In specific implementation, the collection of the keyboard input information can be performed at ordinary times, for example, when an employee is on duty, after a computer is started, an input method software account provided by a company is logged in, and the keyboard input information is obtained through an input method. Each keypad entry may be a ternary data, for example (00-03-47-F6-68-31, english, 2020.01.01.16.23), indicating the mac address of the input device, the type of character entered, and the time point of entry, respectively.
Suppose that text entered by a user at a certain time is collectedtFor sda12346316sda123, a total of 17 characters will generate the corresponding 17 aforementioned keyboard input information sets in turn, i.e. a chinese charactert 1 t 2 ,…,t 17 And continuously collecting a large amount of keyboard input information.
However, the collected keyboard input information may be very noisy, and not all data is suitable for subsequent analysis and calculation, so that the collected keyboard input information needs to be classified and extracted.
S1.1.3, screening out the number of continuous input numeric characters exceedingkKeyboard input information that matches the current input device information and the sample input device information.
Wherein the content of the first and second substances,kthe default value is mainly to avoid the password being shorter than the cipher code due to the conferencekThe bit-induced decipherability of the incoming cipher is increased. For examplekAnd (6). Matching the current input device information with the sample input device information primarily takes into account differences in typing frequencies caused by different input devices. For example: the virtual keyboard typing speed and the physical keyboard typing speed on the touch screen equipment are greatly different, and whether the physical keyboard comprises a digital area or not is influenced to a certain degree.
Taking the input text "sda 12346316sda 123" as an example,kwhen =6, only the set of digits "12346316" needs to be retained, the preceding and following "sda" being discarded because the character type is not a digit, while the following "123" being discarded because the length is less than 6.
Of course, noise reduction may be further achieved, for example, by discarding more frequently appearing combinations of digits based on keyboard input information, because more frequently appearing combinations of digits may be a common account number or password, and typing may be faster than entering a password.
S1.1.4, calculating average input frequency based on the number of numeric characters and the input time interval as typing frequency information.
As described in the above example, after the screening, the group of numbers "12346316" is obtained, and the time Δ required for inputting the group of numbers can be calculated from the input time information in the keyboard input information corresponding to the group of numberstAnd calculating the input frequency corresponding to the text segment according to the number of the charactersfThe average typing frequency can be further calculated through a large amount of texts and used as typing frequency information.
S1.2, based oniGenerating typing frequency information of each expected participantn i A digit of an access code, whereiniI,And isIRepresenting the total number of expected participants. I.e. the password for each intended participant is generated independently.
In order to set the length more accurately when generating the session password, the influence of different hardware and software environments, such as response delay between the input start and the start of face recognition, which mainly includes input delay and program running delay, can be further considered, and the input delay refers to the time when the user inputs to the device response, which is influenced by hardware and software. The program running delay refers to the time from starting to running of the facial recognition program, which is mainly influenced by the facial recognition algorithm and the hardware environment for the algorithm running and needs to be measured and acquired in advance.
Meanwhile, the video length of the face recognition needs to be kept for a certain time, and the value of the video length is influenced by different hardware environments, and is assumed to be 2 seconds. This time needs to be taken into account when setting the password.
Thus, the base is based oniGenerating typing frequency information of each expected participantn i A bit session password comprising:
s1.2.1, generating an inclusionkA pad segment cipher of digit numbers; and iskIs a preset value; can be directly generated randomly.
S1.2.2 generating a package based on response delay and typing frequency informationn i1 A first buffer cipher of digit numbers; the response delay is the time required from the start of input to the start of face recognition. The first buffer is obtained by multiplicationAnd the length of the section of the password is punched, and the password with the corresponding length is randomly generated to be used as the first buffer section password.
S1.2.3 generating a package based on facial recognition duration and typing frequency informationn i2 A second buffer of digit codes. The length of the second buffer section password can be obtained by multiplication, and then the password with the corresponding length is randomly generated to be used as the second buffer section password.
Combining the first buffer segment password, the second buffer segment password and the filling segment password to obtainn i The access code of the bit is encrypted,n i =n i1+ n i2+ k
after the conference-entering password is generated, the corresponding predicted conference participants can be notified of the conference-entering password, and the specific method can be that the conference-entering password is pushed to online communication software accounts of the predicted conference participants.
And S2, acquiring the face information of the expected participant as the expected participant face.
In specific implementation, the face recognition attendance system of a company can be accessed, and the expected face of the participant can be imported through manual selection. Facial information for each employee may also be collected independently.
And S3, when the conference password is input on the participant terminal, acquiring the image before the conference in front of the screen of the participant terminal.
In specific implementation, the participating terminal can be a computer, a mobile phone, a tablet and other equipment provided with teleconferencing software for executing the method, so that the image before meeting can be acquired through a camera device connected with the equipment.
And S4, recognizing the face in the image before meeting, and marking the recognized face information as the actual meeting face.
In particular, the face recognition process may be performed at the participant terminal.
And S5, matching the actual face of the participant with the expected face of the participant, and if the actual face of the participant is not successfully matched with the expected face of the participant, indicating that the person who inputs the conference password does not belong to the expected participant, so that a warning for leakage of the conference password is given. The specific early warning method can be a mode of canceling the authority, closing the conference, notifying a manager and the like.
Example 2:
in a second aspect, there is provided an intra-enterprise teleconferencing system, as described with reference to fig. 2, comprising:
the conference joining password generating module is used for generating a conference joining password and informing expected participants of the conference joining password;
the expected participant face acquisition module is used for acquiring the face information of expected participants as an expected participant face;
the system comprises a pre-meeting image acquisition module, a meeting password input module and a meeting password input module, wherein the pre-meeting image acquisition module is used for acquiring a pre-meeting image in front of a screen of a meeting terminal when a meeting password is input on the meeting terminal;
the actual participating face marking module is used for identifying the face in the image before meeting and marking the identified face information as the actual participating face;
and the conference safety early warning module is used for matching the actual face of the participant with the expected face of the participant, and if the actual face of the participant is not matched successfully, sending out a password leakage early warning of the participant.
Further, the conference password generation module includes:
the typing frequency information acquisition unit is used for acquiring corresponding typing frequency information based on predicted participants;
a password generation unit for generating a password based oniGenerating typing frequency information of expected participantn i A digit of an access code, whereiniI,And isIRepresenting the total number of expected participants;
and the conference password notification unit is used for notifying the expected participants of the conference password.
It can be understood that the enterprise internal teleconference system provided by the embodiment of the present invention corresponds to the enterprise internal teleconference method, and the explanation, examples, beneficial effects and other parts of the relevant contents may refer to the corresponding contents in the enterprise internal teleconference method, which is not described herein again.
In summary, compared with the prior art, the method has the following beneficial effects:
1. the embodiment of the invention generates the conference password firstly and informs the predicted participants of the conference password; acquiring the face information of the expected participants as the expected participant faces; when a user inputs a conference password on a conference terminal, acquiring a pre-conference image in front of a screen of the conference terminal; and then, identifying the face in the image before meeting, marking the identified face information as an actual meeting face, identifying actual participants, matching the actual meeting face with the expected meeting face, and if the actual meeting face is not successfully matched with the expected meeting face, indicating that the actual meeting participants are not in the list of the expected meeting participants, sending out early warning of password leakage of the meeting participants. By the method, even if the conference password is leaked, unintended participants can not enter the teleconference, leakage of internal information of an enterprise can be avoided, and safety in the enterprise management process is improved.
2. The embodiment of the invention also provides a method for generating the conference-entering password, which comprises the steps of firstly obtaining corresponding typing frequency information based on predicted participants; based oniGenerating typing frequency information of each expected participantn i The incoming code of the bit. And the conference-in password is obtained by combining a first buffer password generated based on the response delay and the typing frequency information, a second buffer password generated based on the time length required for facial recognition and the typing frequency information, and a pad password generated by fixed-digit numbers. Therefore, each participant can distribute different conference entering passwords suitable for the current equipment environment, the success rate of facial sampling can be ensured, and meanwhile, the leakage reasons can be positioned. The security of the teleconference is further improved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above examples are only intended to illustrate the technical solution of the present invention, and not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (6)

1. An intra-enterprise teleconferencing method, comprising:
generating an access password and informing expected participants of the access password;
acquiring face information of expected participants as expected participant faces;
when the conference password is input on the conference terminal, acquiring a pre-conference image in front of a screen of the conference terminal;
identifying the face in the image before meeting, and marking the identified face information as the actual face participating in the meeting;
matching the actual face of the participant with the expected face of the participant, and if the actual face of the participant is not successfully matched with the expected face of the participant, sending out early warning of the leakage of the conference entering password;
the generating of the session password comprises the following steps:
acquiring corresponding typing frequency information based on predicted participants;
generating n based on the typing frequency information of the ith predicted participant i A session password of bits, wherein I belongs to I, and I represents the total number of expected participants;
and generating n based on the typing frequency information of the ith predicted participant i A bit session password comprising:
generating a stuffing segment cipher comprising k digits; and k is a preset value;
generating a content n based on response delay and typing frequency information i1 A first buffer cipher of digit numbers; the response delay is the time required from the start of input to the start of facial recognition;
generating a content n based on facial recognition required duration and typing frequency information i2 A second buffer cipher of digit numbers;
combining the first buffer segment password, the second buffer segment password and the filling segment password to obtain n i Bit entry cipher, n i =n i1 +n i2 +k。
2. The method of claim 1, wherein the conference entry code is a pure numeric code, and the obtaining of the corresponding typing frequency information based on the expected participant comprises:
before generating the conference entering password, acquiring current input equipment information, and acquiring and storing keyboard input information of the ith predicted participant in real time; the keyboard input information comprises: sample input device information, input character type information, and input time information; and the input character types include English, number and symbol;
and screening out the keyboard input information of which the number of the continuous input digital characters exceeds k and the current input equipment information is matched with the sample input equipment information, and calculating to obtain the average input frequency as typing frequency information based on the number of the digital characters and the input time interval.
3. The method of claim 1, wherein notifying intended participants of the conference entry code comprises: and pushing the conference entering password to an online communication software account of the expected participant.
4. An intra-enterprise teleconferencing system, comprising:
the conference joining password generating module is used for generating a conference joining password and informing expected participants of the conference joining password;
the expected participant face acquisition module is used for acquiring the face information of expected participants as an expected participant face;
the system comprises a pre-meeting image acquisition module, a meeting password input module and a meeting password input module, wherein the pre-meeting image acquisition module is used for acquiring a pre-meeting image in front of a screen of a meeting terminal when a meeting password is input on the meeting terminal;
the actual participating face marking module is used for identifying the face in the image before meeting and marking the identified face information as the actual participating face;
the conference security early warning module is used for matching the actual conference participating face with the expected conference participating face, and if the actual conference participating face is not successfully matched with the expected conference participating face, sending out a conference entering password leakage early warning;
the conference password generation module comprises:
the typing frequency information acquisition unit is used for acquiring corresponding typing frequency information based on predicted participants;
a password generation unit for generating n based on the typing frequency information of the ith predicted participant i A session password of bits, wherein I belongs to I, and I represents the total number of expected participants;
the conference password notification unit is used for notifying predicted participants of the conference password;
and generating n based on the typing frequency information of the ith predicted participant i A bit session password comprising:
generating a stuffing segment cipher comprising k digits; and k is a preset value;
generating a content n based on response delay and typing frequency information i1 A first buffer cipher of digit numbers; the response delay is the time required from the start of input to the start of facial recognition;
generating a content n based on facial recognition required duration and typing frequency information i2 A second buffer cipher of digit numbers;
combining the first buffer segment password, the second buffer segment password and the filling segment password to obtain n i Digit of the conference password, n i =n i1 +n i2 +k。
5. The system of claim 4, wherein the conference entry code is a pure numeric code, and the obtaining of corresponding typing frequency information based on the intended participants comprises:
before generating the conference entering password, acquiring current input equipment information, and acquiring and storing keyboard input information of the ith predicted participant in real time; the keyboard input information comprises: sample input device information, input character type information, and input time information; and the input character types include English, number and symbol;
and screening out the keyboard input information of which the number of the continuous input digital characters exceeds k and the current input equipment information is matched with the sample input equipment information, and calculating to obtain the average input frequency as typing frequency information based on the number of the digital characters and the input time interval.
6. The system of claim 4, wherein notifying intended participants of the conference password comprises: and pushing the conference entering password to an online communication software account of the expected participant.
CN202210435467.3A 2022-04-24 2022-04-24 Enterprise internal remote conference method and system Active CN114553442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210435467.3A CN114553442B (en) 2022-04-24 2022-04-24 Enterprise internal remote conference method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210435467.3A CN114553442B (en) 2022-04-24 2022-04-24 Enterprise internal remote conference method and system

Publications (2)

Publication Number Publication Date
CN114553442A CN114553442A (en) 2022-05-27
CN114553442B true CN114553442B (en) 2022-09-16

Family

ID=81667528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210435467.3A Active CN114553442B (en) 2022-04-24 2022-04-24 Enterprise internal remote conference method and system

Country Status (1)

Country Link
CN (1) CN114553442B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011054718A1 (en) * 2009-11-06 2011-05-12 Psylock Gmbh Method and apparatus for avoiding manipulations in authentication and/or identification systems by means of typing behaviour
CN108733225A (en) * 2018-05-28 2018-11-02 苏州创存数字科技有限公司 A kind of keyboard based on fingerprint recognition uses correction system and method
CN109413362A (en) * 2018-11-27 2019-03-01 平安科技(深圳)有限公司 A kind of call voice access video-meeting method and device
CN111757042A (en) * 2020-06-28 2020-10-09 深圳市闪联信息技术有限公司 Remote collaborative conference method and system based on face authentication
WO2021093819A1 (en) * 2019-11-15 2021-05-20 中兴通讯股份有限公司 Conference access method, server, conference terminal and storage medium
CN113901011A (en) * 2021-10-19 2022-01-07 广东互视达电子科技有限公司 Paperless intelligent conference management method and system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198536A (en) * 2009-02-27 2010-09-09 Brother Ind Ltd User authentication device, conference system, user authentication method, and user authentication program
CN102227107A (en) * 2011-06-16 2011-10-26 江苏物泰信息科技有限公司 Dynamic password acquisition apparatus with additional radio frequency identification (RFID)
US9280545B2 (en) * 2011-11-09 2016-03-08 Microsoft Technology Licensing, Llc Generating and updating event-based playback experiences
US8565689B1 (en) * 2012-06-13 2013-10-22 All Purpose Networks LLC Optimized broadband wireless network performance through base station application server
CN104753872B (en) * 2013-12-30 2018-10-12 中国移动通信集团公司 Authentication method, authentication platform, business platform, network element and system
US10235507B1 (en) * 2015-04-20 2019-03-19 Intensity Analytics Corporation Authentication via typing cadence, gestures, and QR codes
CN105812595A (en) * 2016-04-25 2016-07-27 四川联友电讯技术有限公司 Method for sending and receiving image information of telephone conference based on identity authentication
CN105827616A (en) * 2016-04-25 2016-08-03 四川联友电讯技术有限公司 Video information secure sending and receiving method of fragment asynchronous conference
CN109194900A (en) * 2018-09-07 2019-01-11 马鞍山嘉德丽雅信息技术有限公司 A kind of integral type meeting office system and office procedure based on electronic whiteboard
CN111756672A (en) * 2019-03-26 2020-10-09 阿里巴巴集团控股有限公司 Conference content saving and acquiring method, conference system, conference equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011054718A1 (en) * 2009-11-06 2011-05-12 Psylock Gmbh Method and apparatus for avoiding manipulations in authentication and/or identification systems by means of typing behaviour
CN108733225A (en) * 2018-05-28 2018-11-02 苏州创存数字科技有限公司 A kind of keyboard based on fingerprint recognition uses correction system and method
CN109413362A (en) * 2018-11-27 2019-03-01 平安科技(深圳)有限公司 A kind of call voice access video-meeting method and device
WO2021093819A1 (en) * 2019-11-15 2021-05-20 中兴通讯股份有限公司 Conference access method, server, conference terminal and storage medium
CN111757042A (en) * 2020-06-28 2020-10-09 深圳市闪联信息技术有限公司 Remote collaborative conference method and system based on face authentication
CN113901011A (en) * 2021-10-19 2022-01-07 广东互视达电子科技有限公司 Paperless intelligent conference management method and system

Also Published As

Publication number Publication date
CN114553442A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
US8931071B2 (en) Biometric authentication for video communication sessions
CN112134787B (en) Communication method, client and system in network security level protection
WO2004109657A2 (en) Speaker recognition in a multi-speaker environment and comparison of several voice prints to many
CN109450777B (en) Session information extraction method, device, equipment and medium
US10855679B2 (en) Automated scalable identity-proofing and authentication process
CN111049731B (en) Instant chat application monitoring method and system
US6937702B1 (en) Method, apparatus, and computer readable media for minimizing the risk of fraudulent access to call center resources
CN114268461B (en) User identity authentication method, device, server, terminal and storage medium
KR101306074B1 (en) Method and system to prevent phishing
CN112560815B (en) File calling method, device, medium and electronic equipment
CN114553442B (en) Enterprise internal remote conference method and system
KR100617677B1 (en) Method for processing the instant massage in wireless terminal
CN109729303A (en) Meeting provides the connection terminal variation in device and described device
CN111669744A (en) Information processing method and device and electronic equipment
US10182349B1 (en) System and method for user identification and authentication
CN106332011B (en) Short message encryption communication method and terminal
CN114727276A (en) Method and system for determining account information in user non-login state
CN112785312A (en) Information sharing method and device, electronic equipment and readable storage medium
CN106936840B (en) Information prompting method and device
Sgaras et al. Forensics Acquisition and Analysis of instant messaging and VoIP applications
CN110751033A (en) Offline login method and related product
Le-Khac et al. Forensic acquisition and analysis of Tango VoIP
US9791942B2 (en) Dynamic collaborative adjustable keyboard
CN116777023B (en) Intelligent conference reservation method, device, equipment and storage medium
CN112788016B (en) Illegal user identification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant