CN116132133A - Method, device and system for guaranteeing safety of meta-universe conference - Google Patents

Method, device and system for guaranteeing safety of meta-universe conference Download PDF

Info

Publication number
CN116132133A
CN116132133A CN202211719898.9A CN202211719898A CN116132133A CN 116132133 A CN116132133 A CN 116132133A CN 202211719898 A CN202211719898 A CN 202211719898A CN 116132133 A CN116132133 A CN 116132133A
Authority
CN
China
Prior art keywords
meeting
conference
participants
access operation
participant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211719898.9A
Other languages
Chinese (zh)
Inventor
马宇尘
杨腾霄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Niudun Technology Co ltd
Original Assignee
Shanghai Niudun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Niudun Technology Co ltd filed Critical Shanghai Niudun Technology Co ltd
Priority to CN202211719898.9A priority Critical patent/CN116132133A/en
Publication of CN116132133A publication Critical patent/CN116132133A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method, a device and a system for guaranteeing the safety of a metauniverse conference, and relates to the technical field of metauniverse conference safety. The processing method comprises the following steps: collecting meeting identity information of meeting participants in each stage of a meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information; acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage. The invention ensures the safety of the metauniverse conference and avoids the leakage of relevant information in the conference by adjusting the access operation rights of the participants in different conference stages in real time.

Description

Method, device and system for guaranteeing safety of meta-universe conference
Technical Field
The invention relates to the technical field of meta-cosmic conference safety, in particular to a method for guaranteeing the meta-cosmic conference safety.
Background
Web conferences have become an indispensable form of meeting today, by which people's demands for meeting can be satisfied. Conference security in web conferences becomes particularly important in this process. With the development of metauniverse (Metaverse), the influence and change of metauniverse on our life and various industries are also accompanied.
The conference is held in the meta-universe, which is a conference mode with very realistic and immersive feeling among a plurality of remote conference modes. The digital avatar of the participant can be used for speaking, and meanwhile, the participant can be matched with the body, the language and the micro-expression to transmit information.
The conference in the metauniverse can be based on a preset metauniverse conference model, the security level of each member in the metauniverse conference is determined, and the access operation authority of each node in the conference is adaptively adjusted. However, in the metauniverse conference, since the security environment where the metauniverse is located is more threatening, when a large number of anonymous users exist in the metauniverse, we need to consider whether the conference security is affected by the holding of the metauniverse conference, such as the conference content, the work arrangement of the participants, the personal privacy information, and the like are revealed.
For example, even if the access right is set to be high enough, other non-current meeting participants or hackers can obtain the same high access right, so that the meta-space meeting can be entered, and the meta-space meeting information can be obtained through video recording, audio recording, information stealing and other modes.
Meanwhile, in the process, if meeting internal personnel can exist, because the meeting internal personnel obtain high enough access operation authority, improper disclosure is carried out on meeting contents, thereby leading to leakage of meeting information, or when meeting personnel execute work tasks, hackers can determine strategic deployment of noble companies through big data analysis because of improper operation, such as data retrieval of meeting personnel on an external network relative to the company internal network; or, the devices of the participants (such as personal mobile phones and computers are subject to network attacks, thereby causing information to leak).
Therefore, the method, the device and the system for guaranteeing the safety of the metauniverse conference are technical problems which need to be solved currently.
Disclosure of Invention
The invention aims at: the invention can adjust the access operation authority of the participants on the held equipment, and avoid the leakage of the related information in the conference, thereby ensuring the safety of the metauniverse conference.
In order to solve the existing technical problems, the invention provides the following technical scheme:
a method of securing a metauniverse conference, the method comprising the steps of:
in the meta universe, according to meeting points and meeting participants information, setting equipment held by the meeting participants as nodes in a meeting participant composition structure, wherein the meeting participant composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information;
collecting meeting identity information of meeting participants in each stage of a meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information;
acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
Further, the conference gist includes at least one of conference keywords, conference summaries, conference recordings, conference content, conference audio, conference video, conference progress, conference flow, and conference topics.
Further, the nodes are set based on a conference personnel composition structure, and access operation authorities of all the nodes are preset; the access operation authority can be adjusted by monitoring the access operation behaviors of the participants on the held equipment, and the access operation authority comprises the access behaviors and the operation behaviors allowed by the nodes.
Further, the adjusting comprises the steps of:
identifying identity information of the participants, and determining access operation permission allowed to be executed by the participants through the identity information;
the access operation permission allowed to be executed by the participants in the conference key points is matched, and the access operation permission of the participants in the metauniverse conference is raised, maintained or reduced.
Further, the identifying includes:
counting access operation information related to the meeting key points executed by the participants in a preset meeting time;
judging whether the identities of the participants are forged or not according to the counted access operation information and the interaction information of the participants and other people; the interaction information comprises an acquisition path of the access operation information and a transmission path of information interaction;
if yes, the participant is identified as a pseudo participant, access operation authority of the pseudo participant in the meta-universe conference is limited, and access operation paths of the pseudo participant in the preset time are traced.
Further, the judging specifically includes: comparing interaction information of the participants and other people to judge whether abnormal operation behaviors exist in the participants; the abnormal operation behavior includes a proportion of access operation information related to the conference gist performed in the interaction information of the participant with other people.
Further, the method further comprises: and setting the duration of access operation permission under the matched meeting state on equipment held by the participants corresponding to the work task arranged by the participants.
A device for guaranteeing the safety of a meta-space conference comprises a structure:
the information generation unit is used for setting equipment held by the participants as nodes in a conference personnel composition structure according to conference key points and participant information in the meta universe, wherein the conference personnel composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information;
the information acquisition unit is used for acquiring meeting identity information of meeting participants in each stage of the meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information;
the information adjusting unit is used for acquiring the current stage of the conference and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
A system for securing a metauniverse conference, comprising:
a meta space node for receiving and transmitting data;
the meta-universe conference safety module is used for ensuring information safety when the participants interact;
the system server is connected with the meta universe node and the friend interaction module;
the system server is configured to set equipment held by a participant as a node in a conference personnel composition structure according to conference points and participant information in a meta universe, wherein the conference personnel composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information; collecting meeting identity information of meeting participants in each stage of a meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information; acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
A computer readable storage medium having stored therein a computer program which, when executed by a processor, performs the method steps of securing a metauniversal conference as described in any of the preceding claims.
Based on the advantages and positive effects, the invention has the following advantages: the access operation rights of the participants in different conference stages are adjusted in real time, so that the safety of the metauniverse conference is ensured, and the leakage of relevant information in the conference is avoided.
Drawings
Fig. 1 is a flowchart provided in an embodiment of the present invention.
Fig. 2a is a schematic diagram of a composition structure of conference personnel in a meta-universe user interface according to an embodiment of the present invention.
Fig. 2b is a schematic diagram of a composition structure of conference personnel in another meta-space user interface according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a system according to an embodiment of the present invention.
Reference numerals illustrate:
a meta-universe user interface 110;
the device 200, the information generating unit 201, the information acquisition unit 202, the information adjustment unit 203;
system 300, metacosmic node 301, metacosmic meeting security module 302, system server 303.
Detailed Description
The method, the device and the system for guaranteeing the safety of the metauniverse conference disclosed by the invention are further described in detail below with reference to the accompanying drawings and specific embodiments. It should be noted that the technical features or combinations of technical features described in the following embodiments should not be regarded as being isolated, and they may be combined with each other to achieve a better technical effect. In the drawings of the embodiments described below, like reference numerals appearing in the various drawings represent like features or components and are applicable to the various embodiments. Thus, once an item is defined in one drawing, no further discussion thereof is required in subsequent drawings.
It should be noted that the structures, proportions, sizes, etc. shown in the drawings are merely used in conjunction with the disclosure of the present specification, and are not intended to limit the applicable scope of the present invention, but rather to limit the scope of the present invention. The scope of the preferred embodiments of the present invention includes additional implementations in which functions may be performed out of the order described or discussed, including in a substantially simultaneous manner or in an order that is reverse, depending on the function involved, as would be understood by those of skill in the art to which embodiments of the present invention pertain.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but should be considered part of the specification where appropriate. In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of the exemplary embodiments may have different values.
Examples
Referring to fig. 1, a flowchart is provided for the present invention. The implementation step S100 of the method is as follows:
s101, in the meta universe, setting equipment held by a participant as a node in a conference personnel composition structure according to conference key points and participant information, wherein the conference personnel composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information.
The metauniverse is a digital living space which is constructed by human beings through digital technology, is mapped by or surpasses the real world, can interact with the real world and has a novel social system.
The conference key points comprise at least one of conference key words, conference abstracts, conference records, conference contents, conference audios, conference videos, conference processes, conference flows and conference topics.
The participants include necessary participants and unnecessary participants of the conference. The necessary participants may be the organizer, host, responsible person of the meeting, and other necessary participants. The unnecessary meeting participants may be bystanders of the meeting.
In any conference, the participants are required to be able to generate the minimum conference person composition structure of the current meta-cosmic conference.
The conference phases in the metauniversal conference can be divided according to the development of the metauniversal conference based on time, for example, the conference phases can be divided into a conference preparation phase, a conference proceeding phase and a conference ending phase.
The conference preparation phase, the conference proceeding phase and the conference ending phase can be further subdivided. Taking a meeting preparation as an example, for example, when the meeting preparation involves three sub-meeting phases, the meeting preparation includes a first meeting preparation, a second meeting preparation, and a third meeting preparation. Similarly, the conference proceeding phase and the conference ending phase may be subdivided, so that the conference proceeding phase includes a first conference proceeding phase, a second conference proceeding phase, and a third conference proceeding phase, and the conference ending phase includes a first conference ending phase, a second conference ending phase, and a third conference ending phase.
It should be further noted that, in each stage of the metauniverse conference, at least one of the organizer, the initiator, the recorder and the executor of the conference is corresponding, and when the identity of the participant is one or more of the organizer, the initiator, the recorder or the executor, the access operation rights of the devices held by the participant in the different stages are also different.
The access operation authority comprises access behaviors and operation behaviors which are allowed to be executed by the nodes.
The conference personnel composition structure is composed of a plurality of nodes, and different conference identity information is preset with fixed node positions in the conference personnel composition structure. The meeting personnel composition structure can adjust the positions of nodes of equipment held by each meeting personnel in the meeting personnel composition structure in real time according to meeting identities of the meeting personnel at each stage in the meta-universe meeting.
The meeting personnel information comprises meeting identity information of the meeting personnel in each meeting stage in the meta-space meeting.
The meeting identity may be the role of a meeting convener, a meeting host, a meeting participant, a presenter, a recorder, etc. in the meeting phase. The meeting identity can also be determined in combination with information about the level of the actual position of the meeting participant in the real world and the work item engaged in.
By way of example and not limitation, see the schematic view of the composition of conference personnel in the metauniverse user interface 110 shown in FIG. 2 a.
The conference personnel composition structure takes a conference stage in a conference main point as an example, and in the conference stage, a conference group is included, wherein 5 participants are in the conference group, and the participants 1, 2, 3, 4 and 5 are in the conference group.
The meeting participants 1 are organizers in the meeting stage and are responsible for leading other meeting participants to finish the work task of meeting arrangement; the participants 2 are conference recorders in the conference stage, record all conference contents in the conference theme, and realize electronic record documents of the conference contents, so that the conference contents are recorded in a company conference recording system; the participants 3, 4 and 5 are executives in the conference phase, and perform the work tasks scheduled by the participant 1, respectively.
In the conference stage, the access operation authority preset by the participants 1 is maximum, and the external network and/or the company internal network can be accessed on the equipment to which the participants belong according to the requirements so as to search the required materials. When the meeting involves content with a high company security coefficient, the access operation authority on the device to which the participant 1 belongs may be limited to searching for all the content related to the meeting topic 1 in the company intranet. At this time, the access operation authority of the attendee 1 may include accessing and/or operating all contents on the conference subject 1, and the operations may be copying, cutting, editing, downloading, and the like.
The meeting participants 2, 3, 4 and 5 set different access operation authorities according to their meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to different meeting identity information.
Considering that there may be different attendees in a conference session, there is still a participant group with 5 attendees in the participant group for example, under one conference session.
When the organizer under the conference subject adjusts from the attendee 1 to the attendee 5 without changing the roles of other attendees, referring to the schematic diagram of the meeting person composition structure in the meta-universe user interface 110 shown in fig. 2b, according to the foregoing changes of the meeting identity information of the attendee 1 and the attendee 5, only the positions of the nodes of the devices held by the attendee 1 and the attendee 5 in the meeting person composition structure are adjusted.
When the participant 5 is used as the organizer, the corresponding access operation authority is adjusted to the access operation authority of the previous participant 1 as the organizer according to the need, and the access operation authority of the participant 1 is adjusted to the access operation authority of the previous participant 5 as the executor according to the need.
S102, collecting meeting identity information of meeting participants in each stage of the meeting, and configuring access operation rights of the meeting participants in each stage of the meeting according to the meeting identity information.
S103, acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
The current stage of the conference corresponds to the real-time progress of the meta-space conference. In the meta-space conference, a plurality of conference phases are arranged, and the current conference phase of the meta-space conference held in real time can be determined according to the preset conference phase.
See a metauniverse conference, corresponding to a group of 5 participants. There are multiple conference phases in the meta-universal conference, including for example a first conference phase and a second conference phase, etc.
Wherein, the composition structure of conference personnel in the meta-universe user interface in the first conference stage is shown in fig. 2a, and the composition structure of conference personnel in the meta-universe user interface in the second conference stage is shown in fig. 2 b.
When the current stage of the meeting is the first meeting stage, the composition structure of meeting personnel in the meta-universe user interface is shown in fig. 2a, and different access operation authorities are set corresponding to meeting identity information of each meeting personnel in the meeting. Therefore, the meeting participants 1 are matched with the access operation rights of the organizer in the meeting stage, the meeting participants 2 are matched with the access operation rights of the meeting recorder in the meeting stage, and the meeting participants 3, 4 and 5 are respectively matched with the access operation rights of the executor in the meeting stage.
When the current stage of the conference is the second conference stage, the composition structure of conference personnel in the meta-universe user interface is shown in fig. 2b, and different access operation authorities are set corresponding to the conference identity information of each conference participant in the conference. Therefore, the meeting participants 5 are matched with the access operation rights of the organizer in the meeting stage, the meeting participants 2 are matched with the access operation rights of the meeting recorder in the meeting stage, and the meeting participants 3, 4 and 1 are respectively matched with the access operation rights of the executor in the meeting stage.
Optionally, the composition structure of the conference staff is monitored, and the communication relationship and the communication path between each conference staff and other users are obtained in each conference stage.
It should be further noted that, each node in the meeting personnel composition structure can be used as a meeting entrance of other meeting personnel, and the meeting entrance can be set as an invitation link, website information or password of the meeting of the relevant meeting personnel.
In addition, the access operation authority of the related participants in the metauniverse conference can be determined according to the participation entrance of the participants in the metauniverse conference.
Since the meeting personnel composition is determined by the structures of the meeting participants in the meeting, one meeting personnel composition is built by at least one organizer, with the exception that the organizer is subordinate to the organizer, which is often the secretary personnel of the organizer. The construction can be to send the meeting invitation of the meta-universe meeting to other participants by means of meeting initiation, timing notification and the like.
In this process, there are often situations in which other participants are invited to join a meta-cosmic meeting midway. This is often the case when peers and lower levels in the real world invite peers and lower levels matching their levels to join in the aforementioned metauniverse meeting. At this time, the positions of other participants invited by the participants in the conference personnel composition structure and the corresponding access operation authorities can be determined according to the positions of the participants in the conference personnel composition structure.
It should be noted that, in the real world, there is a case where an upper level in a department authorizes a lower level, an assistant and/or a secretary to hold a metauniverse meeting, and when a worker corresponds to the metauniverse meeting, the lower level, the assistant and/or the secretary can be used as a participant, and access operation authority is granted to the upper level as the participant to perform corresponding work.
In addition, in the real world, there are cases where one department delegates another department or associates another department to hold a meta-space meeting, and its staff can be associated with the meta-space meeting as a participant. The adjustment of the access operation authority of the participants refers to the situation that the upper level in the department authorizes the lower level, the assistant and/or the secretary to hold the meta-space conference, and is not described in detail herein.
Preferably, the conference key points comprise at least one of conference key words, conference abstract, conference record, conference content, conference audio, conference video, conference process, conference flow and conference topic.
Preferably, the nodes are based on a conference personnel composition structure, and access operation authorities of all the nodes are preset; the access operation authority can be adjusted by monitoring the access operation behaviors of the participants on the held equipment, and the access operation authority comprises the access behaviors and the operation behaviors allowed by the nodes.
Preferably, the adjusting comprises the steps of: identifying identity information of the participants, and determining access operation permission allowed to be executed by the participants through the identity information; the access operation permission allowed to be executed by the participants in the conference key points is matched, and the access operation permission of the participants in the metauniverse conference is raised, maintained or reduced.
The right raising means to raise the access operation right of the participants in the meta-cosmic conference, and the right lowering means to lower the access operation right of the participants in the meta-cosmic conference.
Preferably, the identifying includes: counting access operation information related to the meeting key points executed by the participants in a preset meeting time; judging whether the identities of the participants are forged or not according to the counted access operation information and the interaction information of the participants and other people; the interaction information comprises an acquisition path of the access operation information and a transmission path of information interaction; if yes, the participant is identified as a pseudo participant, access operation authority of the pseudo participant in the meta-universe conference is limited, and access operation paths of the pseudo participant in the preset time are traced.
In consideration of the security of the metauniverse conference, there may be a case where a hacker obtains the information of the participants and a case where the internal staff abuses the identities of the participants of other staff.
Based on the above, it is preferable to identify the identity of the participant in the metauniverse meeting in the real world. The method comprises the steps that access operation information related to meeting points is executed by meeting participants in a meta-universe meeting within a preset meeting time; and according to the counted access operation information and the interaction information of the participants and other people, the comprehensive analysis is performed to verify whether the participants are operated by the staff or hackers with forged identities, so as to judge whether the identities of the participants are forged.
Preferably, the judging specifically includes: comparing interaction information of the participants and other people to judge whether abnormal operation behaviors exist in the participants; the abnormal operation behavior includes a proportion of access operation information related to the conference gist performed in the interaction information of the participant with other people.
The meta-universal conference is provided with a preset threshold for evaluating abnormal operation behaviors, and the preset threshold is preferably a proportion threshold of access operation information related to conference points, which is executed in interaction information of the participants and other people. When the proportion of access operation information related to the meeting points, which is executed in the interaction information of the meeting participants and other people, exceeds a preset threshold, the operation behavior of the meeting participants can be regarded as abnormal, and at the moment, the meeting participants have abnormal operation behaviors. The abnormal operation behavior can be further corresponded, and abnormal prompts can be sent to each participant in the metacosmic conference, the metacosmic conference safety manager and/or the metacosmic conference safety management system.
Preferably, the method further comprises: and setting the duration of access operation permission under the matched meeting state on equipment held by the participants corresponding to the work task arranged by the participants.
When some work arrangements need to be maintained for a period of time after the meeting, the setting can ensure that the access operation authority of equipment held by the meeting participants can be limited within a certain period of time after the meeting is finished, so that the effect of keeping relevant meta-universe meeting information secret is achieved.
Optionally, the participants include necessary participants and unnecessary participants, and the participants joining in the meta-space conference are audited for the identities of the participants.
Optionally, the operation behavior includes a preceding operation behavior and/or a following operation behavior on a device held by the participant; when abnormal operation behaviors are detected, alarms corresponding to the abnormal operation behaviors can be reported to the metauniverse conference.
The reporting can be reported to a group meeting in the meeting, or correspondingly sent to an account where a member of the meeting is located, or an administrator of the group meeting.
The abnormal operation behavior may be, for example, data sent to the external network by the participants through the communication software in the metauniversal conference, for example, data related to the metauniversal conference, such as video, file, interaction information, and the like, of the metauniversal conference.
When the abnormal operation behavior is monitored, whether the abnormal operation behavior exists or not can be judged by accurately measuring a data chain of meta-universe communication, comparing the information quantity of external contact of a user and comparing the difference of the information quantity.
Other technical features are referred to the previous embodiments and will not be described here again.
Referring to fig. 3, the present invention also provides an embodiment, which provides an apparatus 200 for guaranteeing the security of a metauniverse conference, including the following structures:
an information generating unit 201, configured to set, in the meta-universe, equipment held by a participant as a node in a meeting participant composition structure according to a meeting point and participant information, where the meeting participant composition structure is displayed in a meta-universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information.
The information collection unit 202 is configured to collect meeting identity information of meeting participants in each stage of the meeting, and configure access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information.
The information adjustment unit 203 is configured to obtain a current stage of the conference, and adjust a current access operation authority of a participant according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
In addition, referring to fig. 4, the present invention also provides an embodiment, which provides a system 300 for guaranteeing the security of a metauniverse conference, including:
the meta space node 301 is used for transmitting and receiving data.
The meta-space conference safety module 302 is used for ensuring information safety during interaction of participants.
A system server 303, said system server 303 connecting the metauniverse node 301 and the friendly interaction module 302.
The system server 303 is configured to set equipment held by a participant as a node in a conference person composition structure according to conference points and participant information in a meta universe, wherein the conference person composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information; collecting meeting identity information of meeting participants in each stage of a meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information; acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
Other technical features are referred to the previous embodiments and will not be described here again.
In addition, the embodiment of the invention also provides a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium and is used in the device for guaranteeing the safety of the metauniverse meeting, and the computer program realizes the method steps for guaranteeing the safety of the metauniverse meeting when being executed by a processor.
Other technical features are referred to the previous embodiments and will not be described here again.
In the above description, the components may be selectively and operatively combined in any number within the scope of the present disclosure. In addition, terms like "comprising," "including," and "having" should be construed by default as inclusive or open-ended, rather than exclusive or closed-ended, unless expressly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Common terms found in dictionaries should not be too idealized or too unrealistically interpreted in the context of the relevant technical document unless the present disclosure explicitly defines them as such.
Although the exemplary aspects of the present disclosure have been described for illustrative purposes, those skilled in the art will appreciate that the foregoing description is merely illustrative of preferred embodiments of the invention and is not intended to limit the scope of the invention in any way, including additional implementations in which functions may be performed out of the order of presentation or discussion. Any alterations and modifications of the present invention, which are made by those of ordinary skill in the art based on the above disclosure, are intended to be within the scope of the appended claims.

Claims (10)

1. A method for securing a metauniverse conference, the method comprising the steps of:
in the meta universe, according to meeting points and meeting participants information, setting equipment held by the meeting participants as nodes in a meeting participant composition structure, wherein the meeting participant composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information;
collecting meeting identity information of meeting participants in each stage of a meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information;
acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
2. The method of claim 1, wherein the meeting point comprises at least one of a meeting keyword, a meeting summary, a meeting record, meeting content, meeting audio, meeting video, a meeting process, a meeting procedure, and a meeting topic.
3. The method according to claim 1, wherein the nodes are set based on a conference personnel composition structure, and access operation rights of the nodes are preset; the access operation authority can be adjusted by monitoring the access operation behaviors of the participants in the metauniverse conference, and the access operation authority comprises the access behaviors and the operation behaviors allowed by the nodes.
4. The method of claim 1, wherein the adjusting comprises the steps of:
identifying identity information of the participants, and determining access operation permission allowed to be executed by the participants through the identity information;
the access operation permission allowed to be executed by the participants in the conference key points is matched, and the access operation permission of the participants on the held equipment is raised, maintained or reduced.
5. The method of claim 4, wherein the identifying comprises:
counting access operation information related to the meeting key points executed by the participants in a preset meeting time;
judging whether the identities of the participants are forged or not according to the counted access operation information and the interaction information of the participants and other people; the interaction information comprises an acquisition path of the access operation information and a transmission path of information interaction;
if yes, the participant is identified as a pseudo participant, access operation authority of the pseudo participant in the meta-universe conference is limited, and access operation paths of the pseudo participant in the preset time are traced.
6. The method according to claim 5, wherein the determining specifically comprises:
comparing interaction information of the participants and other people to judge whether abnormal operation behaviors exist in the participants; the abnormal operation behavior includes a proportion of access operation information related to the conference gist performed in the interaction information of the participant with other people.
7. The method according to claim 1, wherein the method further comprises: and setting the duration of access operation permission under the matched meeting state on equipment held by the participants corresponding to the work task arranged by the participants.
8. An apparatus for securing a metauniverse conference, comprising the method of any one of claims 1-7, comprising the structure of:
the information generation unit is used for setting equipment held by the participants as nodes in a conference personnel composition structure according to conference key points and participant information in the meta universe, wherein the conference personnel composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information;
the information acquisition unit is used for acquiring meeting identity information of meeting participants in each stage of the meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information;
the information adjusting unit is used for acquiring the current stage of the conference and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
9. A system for securing a metauniverse conference, comprising:
a meta space node for receiving and transmitting data;
the meta-universe conference safety module is used for ensuring information safety when the participants interact;
the system server is connected with the meta universe node and the friend interaction module;
the system server is configured to set equipment held by a participant as a node in a conference personnel composition structure according to conference points and participant information in a meta universe, wherein the conference personnel composition structure is displayed in a meta universe user interface; the participant information comprises the conference identity information of the participants at each conference stage in the meta-universe conference; different access operation authorities are set corresponding to different meeting identity information, and fixed node positions are preset in the meeting personnel composition structure corresponding to the different meeting identity information; collecting meeting identity information of meeting participants in each stage of a meeting, and configuring access operation rights of each meeting participant in each stage of the meeting according to the meeting identity information; acquiring the current stage of the conference, and adjusting the current access operation authority of the participants according to the configured access operation authority; and adjusting the positions of the nodes of the equipment held by each participant in the conference personnel composition structure according to the conference identity information of the participant in the stage.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-7.
CN202211719898.9A 2022-12-30 2022-12-30 Method, device and system for guaranteeing safety of meta-universe conference Pending CN116132133A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211719898.9A CN116132133A (en) 2022-12-30 2022-12-30 Method, device and system for guaranteeing safety of meta-universe conference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211719898.9A CN116132133A (en) 2022-12-30 2022-12-30 Method, device and system for guaranteeing safety of meta-universe conference

Publications (1)

Publication Number Publication Date
CN116132133A true CN116132133A (en) 2023-05-16

Family

ID=86303981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211719898.9A Pending CN116132133A (en) 2022-12-30 2022-12-30 Method, device and system for guaranteeing safety of meta-universe conference

Country Status (1)

Country Link
CN (1) CN116132133A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117041468A (en) * 2023-07-20 2023-11-10 北京安盛祥元科技发展有限公司 Network communication method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117041468A (en) * 2023-07-20 2023-11-10 北京安盛祥元科技发展有限公司 Network communication method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
EP2074521B1 (en) Methods and apparatuses for managing resources within a virtual room
US6697840B1 (en) Presence awareness in collaborative systems
US11627140B2 (en) Automatic configuration and management of user permissions based on roles and user activity
US8214395B2 (en) Tracking and editing a resource in a real-time collaborative session
US7765257B2 (en) Methods and apparatuses for selectively providing privacy through a dynamic social network system
US20080201158A1 (en) System and method for visitation management in a controlled-access environment
US9756083B2 (en) System and method for context-aware participant management
US7921153B2 (en) Methods and apparatuses for selectively displaying information to an invited participant
US20070005698A1 (en) Method and apparatuses for locating an expert during a collaboration session
US20190303879A1 (en) Meeting recording software
US20080294992A1 (en) Methods and apparatuses for displaying and managing content during a collaboration session
US20080022369A1 (en) Methods and apparatuses for selecting privileges for use during a data collaboration session
US20230335284A1 (en) Electronic systems and methods for the assessment of emotional state
CN116132133A (en) Method, device and system for guaranteeing safety of meta-universe conference
US20070002367A1 (en) Methods and apparatuses for selectively controlling a remote device
AU2013224669A1 (en) A method and system for managing information for user participation
US20080021975A1 (en) Methods and apparatuses for accessing an application on a remote device
US7856475B1 (en) Method and system for facilitating communication between users
Tolley Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis
CN116405634A (en) Object recognition method, device, electronic equipment and computer readable storage medium
CN113784082A (en) Multifunctional video conference platform and system thereof
Johnson Between Friends: Support of Workgroup Communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination