CN114598562A - Asset securitization security conference management method and device, conference platform and medium - Google Patents

Asset securitization security conference management method and device, conference platform and medium Download PDF

Info

Publication number
CN114598562A
CN114598562A CN202210265299.8A CN202210265299A CN114598562A CN 114598562 A CN114598562 A CN 114598562A CN 202210265299 A CN202210265299 A CN 202210265299A CN 114598562 A CN114598562 A CN 114598562A
Authority
CN
China
Prior art keywords
conference
user terminal
platform
account
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210265299.8A
Other languages
Chinese (zh)
Inventor
段军伟
朱智玲
王广霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hwforever Information System Technology Co ltd
Original Assignee
Beijing Hwforever Information System Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hwforever Information System Technology Co ltd filed Critical Beijing Hwforever Information System Technology Co ltd
Priority to CN202210265299.8A priority Critical patent/CN114598562A/en
Publication of CN114598562A publication Critical patent/CN114598562A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1818Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1804Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for stock exchange and similar applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to an asset securitization security conference management method, a device, a conference platform and a medium, wherein the method is applied to the conference platform and comprises the following steps: acquiring a contact way of a user based on a registration request sent by a user terminal, allocating a platform account to the user, and storing the allocated platform account into a database; comparing platform accounts of all users participating in the conference in a conference room application request sent by a user terminal of a conference initiator with platform accounts in a database; if the social contact information is the same as the social contact information, sending the conference information to social contact software of all users participating in the conference according to the contact information corresponding to the platform account; opening a conference room to the user terminal based on the conference information sent by the user terminal; receiving a meeting room dismissal request sent by a user terminal of a meeting initiator, and dismissing a meeting room; and acquiring the information deletion authority of the social software, and clearing the meeting information sent to the social software. The method and the device have the effect of guaranteeing the confidentiality of the asset securitization conference.

Description

Asset securitization security conference management method and device, conference platform and medium
Technical Field
The application relates to the technical field of asset securitization, in particular to an asset securitization security conference management method, an asset securitization security conference management device, a conference platform and a medium.
Background
Asset securitization is a financing form in which a negotiable security is issued with a specific Asset portfolio or a specific cash flow as a support, and refers to a process of issuing Asset-backed Securities (ABS) on the basis of credit enhancement by a structured design with a cash flow generated in the future of a basic Asset as a support for reimbursement.
Participating entities in the securitization of assets include mainly promoters, credit rating agencies, underwriters, facilitators, and acceptors, among others, who often need to conduct conference discussions. To ensure the confidentiality of the conference, the conference modality is usually chosen offline, but offline conferences require participants to move around and are costly for the host of the conference. Therefore, there is a need for an asset securitization security conference management method for online conference of participants in asset securitization and ensuring the security of the conference.
Disclosure of Invention
In order to guarantee the security of the asset securitization conference, the application provides a method, a device, a conference platform and a medium for managing the asset securitization conference.
In a first aspect, the present application provides a method for managing an asset securitization security conference, which adopts the following technical scheme:
an asset securitization security conference management method is applied to a conference platform and comprises the following steps:
receiving a registration request sent by a user terminal, acquiring a contact way of a user based on the registration request, allocating a platform account to the user, and storing the allocated platform account into a database;
receiving a conference room application request sent by a user terminal of a conference initiator, and comparing platform accounts of all users participating in a conference in the conference room application request with platform accounts in the database;
if the number of the users is the same as the number of the platform account, sending meeting information to social software of all the users participating in the meeting according to the contact way corresponding to the platform account; the social software at least comprises one of a short message platform, a WeChat and a QQ mailbox, and the conference information at least comprises a conference link, a conference account and a login password;
receiving a conference account and a login password sent by a user terminal, and opening a conference room to the user terminal based on the received conference account and the login password;
receiving a meeting room dismissal request sent by a user terminal of a meeting initiator, and dismissing a meeting room; and acquiring the information deletion permission of the social software, and clearing the meeting information sent to the social software.
By adopting the technical scheme, which users participate in the conference are determined in advance, and then the conference information is only sent to the users participating in the conference based on the platform account number, so that the condition that people who are not allowed to participate in the conference cannot enter the conference is ensured, and the method can ensure that assets securitized participants are audited, thereby ensuring that the conference can be smoothly carried out; after the conference is finished, the conference information which is sent to the user before is deleted and recycled, so that the probability that the user reuses the conference information is reduced, and the confidentiality of the asset securitization conference is ensured.
Preferably, a conference room application request sent by a user terminal of a conference initiator is received, and platform accounts of all users participating in a conference in the conference room application request are compared with the platform accounts in the database;
and if not, sending an account number sending error prompt to the user terminal of the conference initiator.
Preferably, after the sending of the meeting information to the social software of all users participating in the meeting according to the contact information corresponding to the platform account, the method further includes:
receiving a file encryption request sent by a user terminal, and encrypting an original file uploaded by a user;
after the receiving the conference account and the login password sent by the user terminal and opening the conference room to the user terminal based on the received conference account and the login password, the method further comprises the following steps:
receiving a file editing request sent by a user terminal, and editing an original file on line;
receiving a file storage request sent by a user terminal, and storing an original file after online editing;
after the receiving a conference room dismissal request sent by a user terminal of a conference initiator, and dismissing a conference room, the method further includes:
and taking the original file stored for the last time as an editing file, encrypting and sending the editing file to a user terminal uploading the original file, and removing the file use trace.
By adopting the technical scheme, the encryption of uploading the original file and the encryption of downloading the edited file can enhance the security effect of the file; the conference platform clears the file use trace of the conference platform, so that not only can the secrecy effect of the file be further enhanced, but also the trust of the user on the conference platform can be improved, and the user can approve the secrecy effect of the conference platform on the asset securitization conference.
Preferably, after receiving the conference account and the login password sent by the user terminal, and opening a conference room to the user terminal based on the received conference account and the login password, the method further includes:
acquiring a video shot by a camera of each user terminal;
detecting whether a microphone of a user terminal is sounding;
if yes, dividing a plurality of windows in the conference interface, wherein the windows comprise a main window and at least one secondary window;
and displaying videos shot by the cameras of the user terminals corresponding to the sounding microphones in the main window, and respectively displaying videos shot by the cameras of the other user terminals in the secondary window.
Preferably, after the displaying the video shot by the camera of the user terminal corresponding to the microphone that is producing sound in the main window and the displaying the videos shot by the cameras of the other user terminals in the secondary window, the method further includes:
the method comprises the steps of receiving a file display request sent by a user terminal, dividing a window corresponding to the user terminal sending the file display request into a file window and a video window, displaying an original file in the file window, and displaying a video shot by a camera of the user terminal uploading the original file in the video window.
Preferably, after receiving the conference account and the login password sent by the user terminal, and opening a conference room to the user terminal based on the received conference account and the login password, the method further includes:
detecting whether two or more than two microphones of the user terminal sound simultaneously;
if so, acquiring the quantity value of the microphones which sound at the same time, and dividing the main window into two or more parallel windows based on the quantity value;
and respectively displaying videos shot by the cameras of the user terminals corresponding to the microphone which is producing sound in the parallel windows, and respectively displaying videos shot by the cameras of the other user terminals in the secondary windows.
Preferably, after the displaying the videos captured by the cameras of the user terminals corresponding to the microphone that is generating sound in the parallel windows and the displaying the videos captured by the cameras of the other user terminals in the sub-windows, respectively, the method further includes:
the method comprises the steps of receiving a file display request sent by a user terminal, dividing a parallel window or a sub-window corresponding to the user terminal sending the file display request into a file window and a video window, displaying an original file in the file window, and displaying a video shot by a camera of the user terminal uploading the original file in the video window.
In a second aspect, the present application provides an asset securitization security conference management device, which adopts the following technical scheme:
an asset securitization security conference management device comprises,
the distribution module is used for receiving a registration request sent by a user terminal, acquiring the contact information of a user based on the registration request, distributing a platform account to the user, and storing the distributed platform account into a database;
the comparison module is used for receiving a conference room application request sent by a user terminal of a conference initiator and comparing platform accounts of all users participating in a conference in the conference room application request with the platform accounts in the database; if the data are the same, transferring to a sending module;
the sending module is used for sending the conference information to the social software of all the users participating in the conference according to the contact information corresponding to the platform account; the social software at least comprises one of a short message platform, a WeChat and a QQ mailbox, and the conference information at least comprises a conference link, a conference account and a login password;
the opening module is used for receiving a conference account and a login password sent by the user terminal and opening a conference room to the user terminal based on the received conference account and the received login password; and the number of the first and second groups,
the clearing module is used for receiving a conference room dismissal request sent by a user terminal of a conference initiator and dismissing the conference room; and acquiring the information deletion permission of the social software, and clearing the meeting information sent to the social software.
In a third aspect, the present application provides a conference platform, which adopts the following technical solutions:
a conferencing platform comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that implements a method of asset securitization conference management as claimed in any one of the first aspects.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium storing a computer program that can be loaded by a processor and executes a method for asset securitization conference management according to any one of the first aspect.
Drawings
Fig. 1 is a schematic flow chart of an asset securitization security conference management method provided in an embodiment of the present application.
Fig. 2 is a schematic display interface diagram of a primary window and a secondary window provided in an embodiment of the present application.
Fig. 3 is a schematic view of a display interface of a parallel window and a secondary window provided in an embodiment of the present application.
Fig. 4 is a schematic display interface diagram of a file window and a video window provided in an embodiment of the present application.
Fig. 5 is a schematic view of another display interface of a file window and a video window provided in an embodiment of the present application.
Fig. 6 is a schematic diagram of another display interface of a file window and a video window provided in an embodiment of the present application.
Fig. 7 is a block diagram of an asset securitization security conference management apparatus according to an embodiment of the present application.
Fig. 8 is a schematic structural diagram of a conference platform provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
The embodiment provides an asset securitization security conference management method, which is applied to a conference platform, and as shown in fig. 1, the main flow of the method is described as follows (steps S101 to S105):
step S101: receiving a registration request sent by a user terminal, acquiring a contact way of a user based on the registration request, allocating a platform account to the user, and storing the allocated platform account into a database.
In this embodiment, a user sends a registration request to a conference platform through a user terminal, and the conference platform receives the registration request and performs real-name authentication on the user based on the registration request.
Acquiring the personnel identity and the contact way of a user in the real-name authentication process; the personnel identity at least comprises a main body, a name of a company, a name and an identity card number, the contact mode can be a mobile phone number, a WeChat account or a mailbox account, and the mailbox account can be a QQ mailbox account or a 126 mailbox account; the main body comprises an initiator, a credit increasing mechanism, a credit rating mechanism, an underwriter, a service provider, a consignee and the like.
After the real-name authentication is passed, a platform account and a user account are distributed to a user.
The conference system comprises a conference platform, a user terminal and a plurality of users, wherein platform accounts allocated to each user are different, user accounts are different, the platform accounts correspond to the user accounts one by one, the user accounts are used for the users to log in the conference platform, the users set user passwords according to own requirements, and the users log in the conference platform by inputting the user accounts and the user passwords into the user terminal; the platform account is used for verifying the identity of the personnel participating in the conference by the conference platform in the later period.
Step S102: receiving a conference room application request sent by a user terminal of a conference initiator, and comparing platform accounts of all users participating in a conference in the conference room application request with platform accounts in a database; if the result is the same, the process proceeds to step S103.
In this embodiment, after a user includes a conference initiator and an invitee, the conference initiator logs in a conference platform, and wants to organize a conference with assets in security, the conference room application request may be initiated through a user terminal, and a specific method of initiating the conference room application request is that the conference initiator applies for a conference room through the user terminal, and inputs a conference subject and platform accounts of all users participating in the conference on a related interface, where the input platform accounts include their own platform accounts and platform accounts of the invitee, and of course, a conference description may also be input for specifically describing details such as a purpose of making a conference, and then a "confirm" button is clicked, thereby completing sending of the conference room application request.
Step S103: according to the contact way corresponding to the platform account, sending meeting information to social software of all users participating in the meeting; the social software at least comprises one of a short message platform, a WeChat and a QQ mailbox, and the conference information at least comprises a conference link, a conference account and a login password.
In the embodiment, a conference platform receives a conference room application request, and platform accounts of all users participating in a conference in the conference room application request are compared with platform accounts in a database; if the number of the conference information is the same as the number of the platform account, sending the conference information to the social software according to the contact way corresponding to the platform account; and if the platform account number is different from the platform account number, sending an account number sending error prompt to the user terminal of the conference initiator, wherein the account number sending error prompt is used for indicating which platform account number the conference initiator has an error.
If the contact way is a mobile phone number, transmitting the conference information to the user in a way of sending a short message to the short message platform; if the contact way is a WeChat account, transmitting the meeting information to the user in a way of sending notification information to the WeChat; and if the contact way is the QQ mailbox account, transmitting the meeting information to the user in a way of sending a mail to the QQ mailbox.
Furthermore, when a user initiates a meeting room application request, predicted meeting time is input in a related interface; and after receiving the meeting room application request, the meeting platform obtains the predicted meeting time.
Sending confirmation information to social software of the conference initiator through the contact way of the conference initiator at a first preset time (for example, 30 minutes before the expected conference time) before the expected conference time; after the conference initiator sees the confirmation information, the conference initiator can send feedback information to the conference platform through social software; wherein the feedback information is one of first feedback information, second feedback information and third feedback information.
The conference platform judges whether first feedback information is received or not; if so, the conference is started according to the predicted conference time, and the conference information is sent to the social software of all the users participating in the conference; if not, judging whether second feedback information is received or not; if yes, indicating that the predicted meeting time needs to be changed, acquiring new predicted meeting time based on second feedback information, returning to first preset time before the predicted meeting time, and sending confirmation information to social software of a meeting initiator through a contact way of the meeting initiator; if not, judging whether third feedback information is received or not; if yes, indicating that the conference is cancelled, recovering the conference room, and sending conference cancellation information to the social software of all users originally expected to participate in the conference; if not, sending confirmation information to the social software of the conference initiator again at a second preset time (for example, 15 minutes before the expected conference time) before the expected conference time through the contact way of the conference initiator, and further repeatedly judging whether the first feedback information, the second feedback information and the third feedback information are received; if any one of the first feedback information, the second feedback information and the third feedback information is not received, sending confirmation information to social software of the conference initiator again through the contact way of the conference initiator at the expected conference time, and further repeatedly judging whether the first feedback information, the second feedback information and the third feedback information are received or not; if any one of the first feedback information, the second feedback information and the third feedback information is not received yet at a third preset time (for example, 30 minutes after the expected meeting time) after the expected meeting time, the meeting room is recovered, and meeting cancellation information is sent to social software of all users originally expected to participate in the meeting. And the second preset time is less than the first preset time.
The meeting information may further include a meeting subject, a meeting description, and an expected meeting time.
Step S104: and receiving the conference account and the login password sent by the user terminal, and opening a conference room to the user terminal based on the received conference account and the login password.
In this embodiment, after receiving the conference information, the user enters an account and password input interface of the user terminal through the conference link, inputs a conference account and a login password on the account and password input interface, and the user terminal sends the conference account and the login password input by the user to the conference platform. And the conference platform audits the conference account and the login password sent by the user terminal, if the conference account and the login password are both correct, the audit is successful, and a conference room is opened to the user terminal.
Step S105: receiving a meeting room dismissal request sent by a user terminal of a meeting initiator, and dismissing a meeting room; and acquiring the information deletion authority of the social software, and clearing the meeting information sent to the social software.
In this embodiment, after the conference is ended, the conference initiator clicks the "end conference" button on the conference interface, and the user terminal of the conference initiator sends a conference room dismissal request to the conference platform. And the conference platform receives the conference room dismissal request and dismisses the conference room. The conference platform acquires the information deletion permission of the social software in advance, and clears the conference information sent to the social software after the conference room is disassembled.
Before the user terminal of the conference initiator sends the conference room dismissal request to the conference platform, all users can click a button of 'leave the conference' on the conference interface, and then the user terminal sends the request of leaving the conference to the conference platform. And the conference platform receives the request of leaving the conference, does not open a conference room to the user terminal sending the request of leaving the conference any more, and kicks out the conference room from the user requesting to leave the conference.
Further, before the conference starts, if conference information is sent to the social software of all users participating in the conference and a conference staff deletion request sent by a user terminal is received, the database is queried for the contact information of the user corresponding to the platform account in the conference staff deletion request, and the conference information about the conference in the social software corresponding to the contact information is cleared based on the queried contact information.
Further, after the conference information is sent to the social software of the users participating in the conference, the users can send file encryption requests to the conference platform through the user terminals, corresponding original files are uploaded at the same time, the conference platform receives the file encryption requests, the original files uploaded by the users are encrypted, after encryption is completed, first file passwords are sent to the user terminals sending the file encryption requests, and the users can check the first file passwords through the user terminals.
After a user enters a conference room, a file display request can be sent to a conference platform through a user terminal, a first password is input in a corresponding interface, and the user terminal sends the first password and the file display request to the conference platform.
After receiving the file display request, the conference platform compares the received first password with a first file password sent to the user terminal; and if the file is the same, allowing the user to display the original file on line.
The user can also send a file editing request to the conference platform through the user terminal. And after receiving the file editing request, the conference platform allows a user to edit the original file on line.
After the user finishes editing each time, the user can send a file saving request to the conference platform; the specific way of sending the file saving request may be that the user clicks a "save" button on the file browsing software of the user terminal. And the conference platform stores the original file each time the conference platform receives the file storage request.
After the meeting is finished, the original file saved for the last time is used as an editing file, the editing file is encrypted, the editing file and the second file password are sent to a user terminal uploading the original file, after the sending is finished, in order to carry out better confidentiality on the file in the asset securitization meeting, the meeting platform clears the file use trace of the meeting platform, and the original file and the editing file saved by the meeting platform are deleted.
The user can download the edited file and view the second file password through the user terminal. The user needs to input the second password into the file browsing software when the user wants to view the edited file, and the user can view the edited file only under the condition that the second password is the same as the second file password.
It should be noted that, if the user uploads the corresponding original file and does not send a file encryption request to the conference platform through the user terminal, the conference platform does not encrypt the original file uploaded by the user. But after the original file is edited on line to obtain the edited file, the edited file is still encrypted, and the edited file and the second file password are sent to the user terminal which uploads the original file.
Further, when a conference room is opened to the user terminal, the conference platform acquires the authority of a camera and a microphone of the user terminal, acquires a video shot by the camera, and detects whether the microphone is producing sound; and if so, dividing a plurality of windows in the conference interface according to the number of the users entering the conference room, wherein the windows comprise a main window and at least one secondary window.
And displaying videos shot by the cameras of the user terminals corresponding to the sounding microphones in the main window, and respectively displaying videos shot by the cameras of the other user terminals in the secondary windows.
For example, as shown in fig. 2, if there are 4 users entering a conference room, where 1 person is speaking, 1 main window and 3 sub-windows are divided in the conference interface, the video of the speaking user shot by the camera is displayed in the main window, and the videos of the other 3 users shot are displayed in the 3 sub-windows respectively; the display interface of the main window is much larger than that of the secondary window.
Of course, there are also cases where multiple users speak at the same time, and therefore it is detected whether or not two or more microphones of the user terminals sound at the same time; if so, acquiring the quantity value of the microphones which sound simultaneously, and dividing the main window into two or more parallel windows based on the quantity value of the microphones which sound simultaneously; the number value of the parallel window is the same as that of the microphone which makes sound at the same time.
And respectively displaying videos shot by the cameras of the user terminals corresponding to the microphones which are sounding in the parallel windows, and respectively displaying videos shot by the cameras of the other user terminals in the secondary windows.
For example, as shown in fig. 3, if there are 5 users entering a conference room, and 3 of them are speaking, 1 main window and 2 sub-windows are divided in the conference interface, and the main window is divided into 3 parallel windows, videos of the 3 speaking users shot by the camera are respectively displayed in the 3 parallel windows, and videos of the other 2 users are respectively displayed in the 2 sub-windows.
When 1 person stops speaking out of 3 persons who are speaking, the main window is divided into 2 parallel windows again, and the number of the secondary windows is changed into 3. Similarly, if only 1 person is speaking again, the main window is no longer divided into two or more parallel windows, the video of the speaking user shot by the camera occupies the whole main window, and the number of the secondary windows is 4.
If the condition that the microphones are not speaking is detected, namely no user is speaking, a plurality of secondary windows are only divided in the conference interface, the main window is not divided, the number value of the secondary windows is equal to the number of users participating in the conference, videos of all users are respectively displayed in the secondary windows, and one secondary window only displays the video of one user.
When a user wants to display an original file, the user sends a file display request to the conference platform through the user terminal, and the specific mode can be that a 'file display' button on a conference interface is clicked, and the original file required to be displayed is selected.
The conference platform receives a file display request sent by a user terminal, divides a window corresponding to the user terminal sending the file display request into a file window and a video window, displays an original file in the file window, and displays a video shot by a camera of the user terminal uploading the original file in the video window.
As shown in fig. 4, a scenario in which only 1 user sends a file presentation request to a conference platform and the user is speaking is shown, and at this time, only the main window is divided into a file window and a video window. As shown in fig. 5, a scenario is shown in which 3 users are speaking and 2 users send a file presentation request to the conference platform. As shown in fig. 6, a scenario is shown in which only 1 user sends a file presentation request to the conference platform, but no user is speaking. Fig. 4, 5 and 6 all show that 5 users are participating in the conference.
Further, the user sends a file fixed display request to the conference platform through the user terminal, and the specific mode may be to click a "file fixed display" button on the conference interface.
The conference platform receives a file fixed display request sent by a user terminal, and continuously displays an original file uploaded by the user in a file window of a main window and continuously displays a video shot by a camera of the user terminal sending the file fixed display request in a video window of the main window no matter whether the fact that the user is monitoring to speak is monitored.
In order to better implement the above method, the present application further provides an asset securitization conference management apparatus, which may be specifically integrated in a conference platform, for example, a terminal or a server, where the terminal may include, but is not limited to, a mobile phone, a tablet computer, or a desktop computer.
Fig. 7 is a block diagram of a structure of an asset securitization security conference management apparatus according to an embodiment of the present application, and as shown in fig. 7, the apparatus mainly includes:
the distribution module 201 is configured to receive a registration request sent by a user terminal, acquire a contact information of a user based on the registration request, distribute a platform account to the user, and store the distributed platform account in a database;
the comparison module 202 is configured to receive a conference room application request sent by a user terminal of a conference initiator, and compare platform accounts of all users participating in a conference in the conference room application request with platform accounts in the database; if the data are the same, transferring to a sending module;
the sending module 203 is configured to send conference information to social software of all users participating in a conference according to a contact manner corresponding to the platform account; the social software at least comprises one of a short message platform, a WeChat and a QQ mailbox, and the conference information at least comprises a conference link, a conference account and a login password;
the opening module 204 is configured to receive a conference account and a login password sent by a user terminal, and open a conference room to the user terminal based on the received conference account and the login password; and (c) a second step of,
a clearing module 205, configured to receive a meeting room dismissal request sent by a user terminal of a meeting initiator, and dismiss a meeting room; and acquiring the information deletion authority of the social software, and clearing the meeting information sent to the social software.
Various changes and specific examples in the method provided by the above embodiment are also applicable to the asset securitization security conference management device of the embodiment, and through the foregoing detailed description of the asset securitization security conference management method, those skilled in the art can clearly know the implementation method of the asset securitization security conference management device in the embodiment, and for the sake of brevity of the description, detailed description is omitted here.
In order to better execute the program of the method, the embodiment of the present application further provides a conference platform, as shown in fig. 8, the conference platform 300 includes a memory 301 and a processor 302.
Conference platform 300 may be implemented in a variety of forms including devices such as cell phones, tablets, palmtops, laptops, and desktop computers.
The memory 301 may be used to store, among other things, instructions, programs, code sets, or instruction sets. The memory 301 may include a storage program area and a storage data area, wherein the storage program area may store instructions for implementing an operating system, instructions for at least one function (such as assigning a platform account to a user, etc.), instructions for implementing the asset securitization security conference management method provided by the above embodiments, and the like; the storage data area can store data and the like involved in the asset securitization security conference management method provided by the embodiment.
Processor 302 may include one or more processing cores. The processor 302 may invoke the data stored in the memory 301 by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 301 to perform the various functions of the present application and to process the data. The Processor 302 may be at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Central Processing Unit (CPU), a controller, a microcontroller, and a microprocessor. It is understood that the electronic devices for implementing the functions of the processor 302 may be other devices, and the embodiments of the present application are not limited thereto.
An embodiment of the present application provides a computer-readable storage medium, including: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. The computer readable storage medium stores a computer program that can be loaded by a processor and executes the asset securitization security conference management method of the above embodiment.
The specific embodiments are merely illustrative and not restrictive, and various modifications that do not materially contribute to the embodiments may be made by those skilled in the art after reading this specification as required, but are protected by patent laws within the scope of the claims of this application.

Claims (10)

1. An asset securitization security conference management method is applied to a conference platform and comprises the following steps:
receiving a registration request sent by a user terminal, acquiring a contact way of a user based on the registration request, allocating a platform account to the user, and storing the allocated platform account into a database;
receiving a conference room application request sent by a user terminal of a conference initiator, and comparing platform accounts of all users participating in a conference in the conference room application request with platform accounts in the database;
if the number of the users is the same as the number of the platform account, sending meeting information to social software of all the users participating in the meeting according to the contact way corresponding to the platform account; the social software at least comprises one of a short message platform, a WeChat and a QQ mailbox, and the conference information at least comprises a conference link, a conference account and a login password;
receiving a conference account and a login password sent by a user terminal, and opening a conference room to the user terminal based on the received conference account and the login password;
receiving a meeting room dismissal request sent by a user terminal of a meeting initiator, and dismissing a meeting room; and acquiring the information deletion permission of the social software, and clearing the meeting information sent to the social software.
2. The method according to claim 1, characterized by receiving a meeting room application request sent by a user terminal of a meeting initiator, and comparing platform accounts of all users participating in a meeting in the meeting room application request with platform accounts in the database;
and if not, sending an account sending error prompt to the user terminal of the conference initiator.
3. The method of claim 1, after sending meeting information to social software of all users participating in a meeting according to the contact information corresponding to the platform account, further comprising:
receiving a file encryption request sent by a user terminal, and encrypting an original file uploaded by a user;
after the receiving the conference account and the login password sent by the user terminal and opening the conference room to the user terminal based on the received conference account and the login password, the method further comprises the following steps:
receiving a file editing request sent by a user terminal, and editing an original file on line;
receiving a file storage request sent by a user terminal, and storing an original file after online editing;
after the receiving a conference room dismissal request sent by a user terminal of a conference initiator, and dismissing a conference room, the method further includes:
and taking the original file stored for the last time as an editing file, encrypting and sending the editing file to a user terminal uploading the original file, and removing the use trace of the file.
4. The method according to claim 3, further comprising, after receiving the conference account and the login password sent by the user terminal, and opening a conference room to the user terminal based on the received conference account and the login password, the method further comprising:
acquiring a video shot by a camera of each user terminal;
detecting whether a microphone of a user terminal is sounding;
if so, dividing a plurality of windows in the conference interface, wherein the windows comprise a main window and at least one secondary window;
and displaying videos shot by the cameras of the user terminals corresponding to the sounding microphones in the main window, and respectively displaying videos shot by the cameras of the other user terminals in the secondary window.
5. The method according to claim 4, wherein after the displaying the videos captured by the cameras of the user terminals corresponding to the microphones that are sounding in the primary window and the displaying the videos captured by the cameras of the remaining user terminals in the secondary window respectively, further comprising:
the method comprises the steps of receiving a file display request sent by a user terminal, dividing a window corresponding to the user terminal sending the file display request into a file window and a video window, displaying an original file in the file window, and displaying a video shot by a camera of the user terminal uploading the original file in the video window.
6. The method of claim 4, further comprising, after the receiving the conference account and the login password sent by the user terminal, and based on the received conference account and the login password, opening a conference room to the user terminal:
detecting whether two or more than two microphones of the user terminal sound simultaneously;
if so, acquiring the numerical value of the microphones which sound at the same time, and dividing the main window into two or more parallel windows based on the numerical value;
and respectively displaying videos shot by the cameras of the user terminals corresponding to the microphone which is producing sound in the parallel windows, and respectively displaying videos shot by the cameras of the other user terminals in the secondary windows.
7. The method according to claim 6, wherein after the displaying the videos captured by the cameras of the user terminals corresponding to the microphones that are speaking in the parallel windows and the videos captured by the cameras of the other user terminals in the sub-windows respectively, further comprises:
the method comprises the steps of receiving a file display request sent by a user terminal, dividing a parallel window or a sub-window corresponding to the user terminal sending the file display request into a file window and a video window, displaying an original file in the file window, and displaying a video shot by a camera of the user terminal uploading the original file in the video window.
8. An asset securitization security conference management device is characterized by comprising,
the distribution module is used for receiving a registration request sent by a user terminal, acquiring the contact information of a user based on the registration request, distributing a platform account to the user, and storing the distributed platform account into a database;
the comparison module is used for receiving a conference room application request sent by a user terminal of a conference initiator and comparing platform accounts of all users participating in a conference in the conference room application request with the platform accounts in the database; if the data are the same, transferring to a sending module;
the sending module is used for sending the conference information to the social software of all users participating in the conference according to the contact information corresponding to the platform account; the social software at least comprises one of a short message platform, a WeChat and a QQ mailbox, and the conference information at least comprises a conference link, a conference account and a login password;
the opening module is used for receiving a conference account and a login password sent by the user terminal and opening a conference room to the user terminal based on the received conference account and the received login password; and the number of the first and second groups,
the clearing module is used for receiving a conference room dismissal request sent by a user terminal of a conference initiator and dismissing the conference room; and acquiring the information deletion permission of the social software, and clearing the meeting information sent to the social software.
9. A conferencing platform, comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that performs the method of any of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 7.
CN202210265299.8A 2022-03-17 2022-03-17 Asset securitization security conference management method and device, conference platform and medium Pending CN114598562A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210265299.8A CN114598562A (en) 2022-03-17 2022-03-17 Asset securitization security conference management method and device, conference platform and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210265299.8A CN114598562A (en) 2022-03-17 2022-03-17 Asset securitization security conference management method and device, conference platform and medium

Publications (1)

Publication Number Publication Date
CN114598562A true CN114598562A (en) 2022-06-07

Family

ID=81818996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210265299.8A Pending CN114598562A (en) 2022-03-17 2022-03-17 Asset securitization security conference management method and device, conference platform and medium

Country Status (1)

Country Link
CN (1) CN114598562A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220417006A1 (en) * 2021-06-29 2022-12-29 International Business Machines Corporation Secure conference system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109976617A (en) * 2019-04-03 2019-07-05 腾讯科技(深圳)有限公司 Document display method and apparatus
WO2020140822A1 (en) * 2019-01-02 2020-07-09 京东方科技集团股份有限公司 Network conference management method and apparatus and storage medium, and network conference platform and system
CN111522604A (en) * 2020-04-26 2020-08-11 腾讯科技(深圳)有限公司 Application data processing method and device and computer readable storage medium
CN113067711A (en) * 2021-03-15 2021-07-02 京东数字科技控股股份有限公司 Conference participating method and device of teleconference, storage medium and electronic device
CN113285814A (en) * 2021-05-18 2021-08-20 维沃移动通信有限公司 Path generation method and device for online conference and electronic equipment
CN113901011A (en) * 2021-10-19 2022-01-07 广东互视达电子科技有限公司 Paperless intelligent conference management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020140822A1 (en) * 2019-01-02 2020-07-09 京东方科技集团股份有限公司 Network conference management method and apparatus and storage medium, and network conference platform and system
CN109976617A (en) * 2019-04-03 2019-07-05 腾讯科技(深圳)有限公司 Document display method and apparatus
CN111522604A (en) * 2020-04-26 2020-08-11 腾讯科技(深圳)有限公司 Application data processing method and device and computer readable storage medium
CN113067711A (en) * 2021-03-15 2021-07-02 京东数字科技控股股份有限公司 Conference participating method and device of teleconference, storage medium and electronic device
CN113285814A (en) * 2021-05-18 2021-08-20 维沃移动通信有限公司 Path generation method and device for online conference and electronic equipment
CN113901011A (en) * 2021-10-19 2022-01-07 广东互视达电子科技有限公司 Paperless intelligent conference management method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220417006A1 (en) * 2021-06-29 2022-12-29 International Business Machines Corporation Secure conference system
US11652623B2 (en) * 2021-06-29 2023-05-16 International Business Machines Corporation Secure conference system

Similar Documents

Publication Publication Date Title
US11127088B2 (en) Cross-blockchain interaction method, system, computer device, and storage medium
US20210224938A1 (en) System and method for electronically providing legal instrument
US9984242B2 (en) Attestation for electronic signatures
US20160191484A1 (en) Secure Inmate Digital Storage
WO2020167620A1 (en) Cryptoasset custodial system with different cryptographic keys controlling access to separate groups of private keys
US20210243037A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US11349841B2 (en) Managing user access to restricted content through intelligent content redaction
TWI746399B (en) Information reading and writing method and device based on blockchain
US9531545B2 (en) Tracking and notification of fulfillment events
US20190294804A1 (en) Encrypted recordings of meetings between individuals
US20200304630A1 (en) System and Method for Communicating With Inmates in a Privileged Communication
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
US11240232B2 (en) Multi-level authentication for a fire control system
CN114598562A (en) Asset securitization security conference management method and device, conference platform and medium
US20220230177A1 (en) Identity verification and service provision platform and method
CN114663550A (en) Conference management method, device, conference platform and medium for online signature
CN114615098A (en) Method, device, conference platform and medium for realizing backtracking function of conference process
US10728254B2 (en) Management system, communication system, and management method
US10990563B2 (en) Information read/write method and apparatus based on blockchain
CN111209546A (en) Online multi-person identity authentication method, system and device and identity authentication equipment
TW202023237A (en) Online conference service system and method capable of satisfying the requirement of convenience for users and ensuring the security of the conference to improve the processing efficiency of financial services
JP2019191717A (en) Information processing unit and information processing program
US12126936B2 (en) Information processing apparatus and computer readable medium
US20220256117A1 (en) Information processing apparatus and computer readable medium
US20160110827A1 (en) Methods and Systems for Exchanging Electronic Documents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220607