WO2022068066A1 - User authentication method, apparatus, and system for video conference - Google Patents

User authentication method, apparatus, and system for video conference Download PDF

Info

Publication number
WO2022068066A1
WO2022068066A1 PCT/CN2020/135586 CN2020135586W WO2022068066A1 WO 2022068066 A1 WO2022068066 A1 WO 2022068066A1 CN 2020135586 W CN2020135586 W CN 2020135586W WO 2022068066 A1 WO2022068066 A1 WO 2022068066A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
video conference
participating
real
edge
Prior art date
Application number
PCT/CN2020/135586
Other languages
French (fr)
Chinese (zh)
Inventor
陈志明
Original Assignee
常熟九城智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 常熟九城智能科技有限公司 filed Critical 常熟九城智能科技有限公司
Publication of WO2022068066A1 publication Critical patent/WO2022068066A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • H04N7/155Conference systems involving storage of or access to video conference sessions

Definitions

  • the present disclosure relates to the technical field of video conferences, and in particular, to a video conference user authentication method, device and system.
  • authorization is usually required, and the authorization method is generally based on the terminal used by the participating user.
  • the user applies for uploading the permission to participate in the conference through the terminal. You can use this terminal to conduct online video conferences.
  • users may lose the authorized terminal for some reasons, which will lead to other people using the authorized terminal to participate in the conference, which brings unnecessary risks and even causes users to suffer losses in severe cases. .
  • the purpose of the present disclosure is to provide a video conference user authentication method, device and system.
  • the present disclosure provides a video conference user authentication method for authenticating participants participating in a video conference, and the video conference user authentication method includes the following steps:
  • the device authorization information obtain the video conference level permission in the user participating terminal
  • the video conference level corresponding to each participant user is authorized according to the real-time image of the participant user.
  • an embodiment of the present disclosure provides a video conference user authentication device, the device comprising:
  • the authorization information acquisition module is used to acquire the device authorization information of the user participating terminal;
  • a video level analysis module configured to obtain the video conference level authority in the user participating terminal according to the device authorization information
  • the image authorization information acquisition module acquires the real-time image of each participating user in the user participating terminal;
  • the final authorization module authorizes the video conference level corresponding to each participant user according to the real-time image of the participant user.
  • an embodiment of the present disclosure further provides a video conference user authentication system
  • the system includes a video conference user authentication device and a cloud data server
  • the cloud data server includes a processor, a machine-readable storage medium, and a network interface
  • the machine-readable storage medium, the network interface and the processor are connected through a bus system
  • the network interface is used to communicate with at least one user terminal
  • the machine-readable storage medium is used to store A program, instruction or code
  • the processor is configured to execute the program, instruction or code in the machine-readable storage medium to execute the video conference user authentication method in the first aspect or any possible design of the first aspect .
  • embodiments of the present disclosure provide a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when executed, cause a computer to execute the first aspect or any possible design of the first aspect Video conference user authentication method in .
  • the present disclosure obtains the device authorization information of the user participating terminal; Real-time image of each participating user; authorize the video conference level corresponding to each participating user according to the real-time image of the participating user.
  • the dual authorization authentication of the device and the user's face image it can effectively avoid the possibility of other people participating in the conference by impersonating, and effectively protect the rights and interests of the participating users.
  • FIG. 1 is a schematic diagram of an application scenario of a video conference user authentication system provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart of a video conference user authentication method provided by an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of functional modules of a video conference user authentication device provided by an embodiment of the present disclosure
  • FIG. 4 is a schematic structural block diagram of a cloud data server for implementing the above-mentioned video conference user authentication method according to an embodiment of the present disclosure.
  • FIG. 1 is an interactive schematic diagram of a video conference user authentication system 10 provided by an embodiment of the present disclosure.
  • the video conference user authentication system 10 may include a cloud data server 100 and a user participating terminal 200 connected in communication with the cloud data server 100 .
  • the video conference user authentication system 10 shown in FIG. 1 is only a feasible example, and in other feasible embodiments, the video conference user authentication system 10 may also include only a part of the components shown in FIG. 1 or Other components may also be included.
  • the user participating terminal 200 may include a mobile device, a tablet computer, a laptop computer, etc., or any combination thereof.
  • mobile devices may include smart home devices, wearable devices, smart mobile devices, virtual reality devices, or augmented reality devices, etc., or any combination thereof.
  • the smart home devices may include control devices of smart electrical devices, smart monitoring devices, smart TVs, smart cameras, etc., or any combination thereof.
  • the wearable device may include a smart bracelet, smart shoelaces, smart glass, smart helmets, smart watches, smart clothing, smart backpacks, smart accessories, etc., or any combination thereof.
  • a smart mobile device may include a smartphone, a personal digital assistant, a gaming device, etc., or any combination thereof.
  • the virtual reality device and/or augmented reality device may include a virtual reality helmet, virtual reality glass, virtual reality patch, augmented reality helmet, augmented reality glass, or augmented reality patch, etc., or any combination thereof.
  • virtual reality devices and/or augmented reality devices may include various virtual reality products and the like.
  • the Internet of Things cloud data server 100 and the user participant terminal 200 in the video conference user authentication system 10 can cooperate to execute the video conference user authentication method described in the following method embodiments.
  • the cloud data server 100 and the user For part of the execution steps of the terminal 200 participating in the conference, reference may be made to the detailed description of the following method embodiments.
  • FIG. 2 is a schematic flowchart of a video conference user authentication method provided by an embodiment of the present disclosure.
  • the video conference user authentication method provided by this embodiment can be Executed by the server 100, the following describes the video conference user authentication method in detail.
  • Step S110 obtaining the device authorization information of the user participating terminal
  • Step S120 according to the device authorization information, obtain the video conference level authority in the user participating terminal;
  • Step S130 obtaining a real-time image of each participating user in the user participating terminal according to the video conference grade authority
  • Step S140 authorize the video conference level corresponding to each participant user according to the real-time image of the participant user.
  • step S130 further includes:
  • Step S131 obtaining the first edge of the real-time image of each of the participating users
  • Step S132 determining a face recognition area according to the first edge
  • Step S133 expanding the parallel edge of the face recognition area to obtain the second edge
  • Step S134 acquiring the second edge as the actual edge of the real-time image of the participating user.
  • step S131 further includes:
  • Step S1311 obtaining the parallel edge and the vertical edge in the real-time image of each participating user
  • Step S1312 Calculate the first edge of the real-time image of each participating user according to the parallel edge and the vertical edge.
  • the method includes:
  • Step S150 by traversing the authorization database, the video conference level authority of the user participating terminal is obtained.
  • step S150 further includes:
  • Step S151 obtaining authority data in the device authorization information
  • Step S152 establishing a search index according to the authority data
  • Step S153 traverse the authorization database according to the search index.
  • Step S154 if the search index exists in the authorization database, mark the user participating terminal as passed, and further prepare for image recognition.
  • Step S155 if the search index does not exist in the authorization database, send the search index to the management server, suspend the preparation for image recognition, mark the user participating terminal as failed, and feed back the result to the user to guide the process.
  • the user re-applies for registration.
  • FIG. 3 is a schematic diagram of functional modules of a video conference user authentication apparatus 300 according to an embodiment of the present disclosure.
  • the video conference user authentication apparatus 300 can be divided into functional modules according to the method embodiment performed by the cloud data server 100. , that is, the following functional modules corresponding to the video conference user authentication apparatus 300 can be used to execute the above-mentioned method embodiments executed by the cloud data server 100 .
  • the video conference user authentication device 300 may include an authorization information acquisition module 310, a video level analysis module 320, an image acquisition module 330 and a final authorization module 340. functions are explained in detail.
  • the authorization information acquisition module 310 may be configured to perform the above-mentioned step S110, that is, to acquire the device authorization information of the user participating terminal.
  • the video level analysis module 320 may be configured to perform the above step S120, that is, to obtain the video conference level permission in the user participating terminal according to the device authorization information.
  • the image acquisition module 330 may be configured to perform the above-mentioned step S130, that is, to acquire a real-time image of each user participating in the conference in the user participating terminal according to the video conference level authority.
  • the final authorization module 340 may be configured to perform the above step S140, that is, to authorize the video conference level corresponding to each participant user according to the real-time image of the participant user.
  • each module of the above apparatus is only a division of logical functions, and may be fully or partially integrated into a physical entity in actual implementation, or may be physically separated.
  • these modules can all be implemented in the form of software calling through processing elements; they can also all be implemented in hardware; some modules can also be implemented in the form of calling software through processing elements, and some modules can be implemented in hardware.
  • the authorization information acquisition module 310 may be a separately established processing element, or may be integrated into a certain chip of the above-mentioned device to be implemented, in addition, it may also be stored in the memory of the above-mentioned device in the form of program code, and is executed by a certain of the above-mentioned device.
  • a processing element invokes and executes the functions of the above authorization information acquisition module 310 .
  • the implementation of other modules is similar.
  • all or part of these modules can be integrated together, and can also be implemented independently.
  • the processing element described herein may be an integrated circuit with signal processing capabilities.
  • each step of the above-mentioned method or each of the above-mentioned modules can be completed by an integrated logic circuit of hardware in the processor element or an instruction in the form of software.
  • the above modules may be one or more integrated circuits configured to implement the above methods, such as one or more specific integrated circuits (application specific integrated circuit, ASIC), or, one or more microprocessors (digital signal processor, DSP), or, or, one or more field programmable gate arrays (field programmable gate array, FPGA) and so on.
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • FPGA field programmable gate array
  • the processing element may be a general-purpose processor, such as a central processing unit (central processing unit). unit, CPU) or other processor that can invoke program code.
  • these modules can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • SOC system-on-a-chip
  • FIG. 4 shows a schematic diagram of the hardware structure of a cloud data server 100 for implementing the above-mentioned control device provided by an embodiment of the present disclosure.
  • the cloud data server 100 may include a processor 110 and a machine-readable storage medium 120 , bus 130 and transceiver 140 .
  • At least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120 (for example, included in the video conference user authentication apparatus 300 shown in FIG. 3 ), so that the processor 110 can execute
  • the processor 110, the machine-readable storage medium 120 and the transceiver 140 are connected through the bus 130, and the processor 110 can be used to control the transceiver 140.
  • the aforementioned user-participating terminal 200 performs data transmission and reception.
  • the processor may be a central processing unit (English: Central Processing Unit, CPU), and may also be other general-purpose processors, digital signal processors (English: Digital Signal Processor, DSP), application-specific integrated circuits (English: Application Specific Integrated Circuit, ASIC) and so on.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in conjunction with the invention can be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
  • Machine-readable storage medium 120 may include high-speed RAM memory, and may also include non-volatile storage NVM, such as at least one disk storage.
  • the bus 130 may be an industry standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect (PCI) bus or Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus, etc.
  • ISA Industry Standard Architecture
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus 130 may be classified into an address bus, a data bus, a control bus, and the like.
  • the buses in the drawings of the present application are not limited to only one bus or one type of bus.
  • an embodiment of the present disclosure further provides a readable storage medium, where computer-executable instructions are stored in the readable storage medium, and when a processor executes the computer-executable instructions, the above video conference user authentication method is implemented.
  • the above-mentioned readable storage medium may be implemented by any type of volatile or non-volatile storage device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM) , Erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic Disk or Optical Disk.
  • SRAM Static Random Access Memory
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • EPROM Erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic Disk Magnetic Disk or Optical Disk.
  • a readable storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.

Abstract

The present invention provides a user authentication method, apparatus, and system for a video conference, used to authenticate conference participants. The method comprises the following steps: acquiring device authorization information of user terminals participating in a conference; acquiring, according to the device authorization information, respective video conference level permissions of the user terminals; acquiring, according to the video conference level permissions, real-time images of respective participating users from the user terminals; and authorizing, according to the real-time images of the participating users, a corresponding video conference level to each participating user. Two-factor authentication is performed via user devices and facial images, thereby effectively preventing an impostor from participating in a conference, and effectively protecting the rights and interests of participating users.

Description

一种视频会议用户鉴权方法、装置及系统A video conference user authentication method, device and system 技术领域technical field
本公开涉及视频会议技术领域,具体而言,涉及一种视频会议用户鉴权方法、装置及系统。The present disclosure relates to the technical field of video conferences, and in particular, to a video conference user authentication method, device and system.
背景技术Background technique
随着互联网技术的发展,视频会议的应用场景越来越多,由于其不受与会人员所处空间的影响,因此,视频会议的规模也越来越大。With the development of Internet technology, there are more and more application scenarios of video conferencing. Since it is not affected by the space where the participants are located, the scale of video conferencing is also increasing.
技术问题technical problem
现有技术中,当与会人员需要接入视频会议时,通常需要经过授权,而授权的方式一般以与会用户使用的终端为主,用户通过终端申请上传参会权限,在得到权限后,用户便可以使用该终端进行线上视频会议,然而,有时用户可能由于某些原因遗失授权终端,从而导致其他人员使用该授权终端参与会议,带来了不必要的风险,严重时甚至会让用户蒙受损失。In the prior art, when a participant needs to access a video conference, authorization is usually required, and the authorization method is generally based on the terminal used by the participating user. The user applies for uploading the permission to participate in the conference through the terminal. You can use this terminal to conduct online video conferences. However, sometimes users may lose the authorized terminal for some reasons, which will lead to other people using the authorized terminal to participate in the conference, which brings unnecessary risks and even causes users to suffer losses in severe cases. .
技术解决方案technical solutions
为了至少克服现有技术中的上述不足,本公开的目的在于提供一种视频会议用户鉴权方法、装置及系统。In order to at least overcome the above deficiencies in the prior art, the purpose of the present disclosure is to provide a video conference user authentication method, device and system.
第一方面,本公开提供一种视频会议用户鉴权方法,用于鉴权参与视频会议的与会人员,所述视频会议用户鉴权方法包括如下步骤:In a first aspect, the present disclosure provides a video conference user authentication method for authenticating participants participating in a video conference, and the video conference user authentication method includes the following steps:
获取用户与会终端的设备授权信息;Obtain the device authorization information of the user's participating terminal;
根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限;According to the device authorization information, obtain the video conference level permission in the user participating terminal;
根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像;Acquire a real-time image of each participating user in the user participating terminal according to the video conference grade authority;
根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。The video conference level corresponding to each participant user is authorized according to the real-time image of the participant user.
第二方面,本公开实施例提供一种视频会议用户鉴权装置,所述装置包括:In a second aspect, an embodiment of the present disclosure provides a video conference user authentication device, the device comprising:
授权信息获取模块,用于获取用户与会终端的设备授权信息;The authorization information acquisition module is used to acquire the device authorization information of the user participating terminal;
视频等级分析模块,用于根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限;a video level analysis module, configured to obtain the video conference level authority in the user participating terminal according to the device authorization information;
图像授权信息获取模块,根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像;The image authorization information acquisition module, according to the video conference grade authority, acquires the real-time image of each participating user in the user participating terminal;
最终授权模块,根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。The final authorization module authorizes the video conference level corresponding to each participant user according to the real-time image of the participant user.
第三方面,本公开实施例还提供一种视频会议用户鉴权系统,该系统包含视频会议用户鉴权装置和云数据服务器,所述云数据服务器包括处理器、机器可读存储介质和网络接口,所述机器可读存储介质、所述网络接口以及所述处理器之间通过总线系统相连,所述网络接口用于与至少一个用户与会终端通信连接,所述机器可读存储介质用于存储程序、指令或代码,所述处理器用于执行所述机器可读存储介质中的程序、指令或代码,以执行第一方面或者第一方面中任意一个可能的设计中的视频会议用户鉴权方法。In a third aspect, an embodiment of the present disclosure further provides a video conference user authentication system, the system includes a video conference user authentication device and a cloud data server, where the cloud data server includes a processor, a machine-readable storage medium, and a network interface , the machine-readable storage medium, the network interface and the processor are connected through a bus system, the network interface is used to communicate with at least one user terminal, and the machine-readable storage medium is used to store A program, instruction or code, the processor is configured to execute the program, instruction or code in the machine-readable storage medium to execute the video conference user authentication method in the first aspect or any possible design of the first aspect .
第四方面,本公开实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当其被执行时,使得计算机执行上述第一方面或者第一方面中任意一个可能的设计中的视频会议用户鉴权方法。In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when executed, cause a computer to execute the first aspect or any possible design of the first aspect Video conference user authentication method in .
有益效果beneficial effect
基于上述任意一个方面,本公开获取用户与会终端的设备授权信息;根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限;根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像;根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。通过设备和用户人脸图像的双重授权认证,能够有效避免其他人员冒名参加会议的可能,有效的保护了与会用户的权益。Based on any one of the above aspects, the present disclosure obtains the device authorization information of the user participating terminal; Real-time image of each participating user; authorize the video conference level corresponding to each participating user according to the real-time image of the participating user. Through the dual authorization authentication of the device and the user's face image, it can effectively avoid the possibility of other people participating in the conference by impersonating, and effectively protect the rights and interests of the participating users.
附图说明Description of drawings
图1为本公开实施例提供的视频会议用户鉴权系统的应用场景示意图;1 is a schematic diagram of an application scenario of a video conference user authentication system provided by an embodiment of the present disclosure;
图2为本公开实施例提供的视频会议用户鉴权方法的流程示意图;2 is a schematic flowchart of a video conference user authentication method provided by an embodiment of the present disclosure;
图3为本公开实施例提供的视频会议用户鉴权装置的功能模块示意图;3 is a schematic diagram of functional modules of a video conference user authentication device provided by an embodiment of the present disclosure;
图4为本公开实施例提供的用于实现上述的视频会议用户鉴权方法的云数据服务器的结构示意框图。FIG. 4 is a schematic structural block diagram of a cloud data server for implementing the above-mentioned video conference user authentication method according to an embodiment of the present disclosure.
本发明的实施方式Embodiments of the present invention
下面结合说明书附图对本公开进行具体说明,方法实施例中的具体操作方法也可以应用于装置实施例或系统实施例中。The present disclosure will be specifically described below with reference to the accompanying drawings in the specification, and the specific operation methods in the method embodiments may also be applied to the apparatus embodiments or the system embodiments.
图1是本公开一种实施例提供的视频会议用户鉴权系统10的交互示意图。视频会议用户鉴权系统10可以包括云数据服务器100以及与所述云数据服务器100通信连接的用户与会终端200。图1所示的视频会议用户鉴权系统10仅为一种可行的示例,在其它可行的实施例中,该视频会议用户鉴权系统10也可以仅包括图1所示组成部分的其中一部分或者还可以包括其它的组成部分。FIG. 1 is an interactive schematic diagram of a video conference user authentication system 10 provided by an embodiment of the present disclosure. The video conference user authentication system 10 may include a cloud data server 100 and a user participating terminal 200 connected in communication with the cloud data server 100 . The video conference user authentication system 10 shown in FIG. 1 is only a feasible example, and in other feasible embodiments, the video conference user authentication system 10 may also include only a part of the components shown in FIG. 1 or Other components may also be included.
本实施例中,用户与会终端200可以包括移动设备、平板计算机、膝上型计算机等或其任意组合。在一些实施例中,移动设备可以包括智能家居设备、可穿戴设备、智能移动设备、虚拟现实设备、或增强现实设备等,或其任意组合。在一些实施例中,智能家居设备可以包括智能电器设备的控制设备、智能监控设备、智能电视、智能摄像机等,或其任意组合。在一些实施例中,可穿戴设备可包括智能手环、智能鞋带、智能玻璃、智能头盔、智能手表、智能服装、智能背包、智能配件等,或其任何组合。在一些实施例中,智能移动设备可以包括智能手机、个人数字助理、游戏设备等,或其任意组合。在一些实施例中,虚拟现实设备和/或增强现实设备可以包括虚拟现实头盔、虚拟现实玻璃、虚拟现实贴片、增强现实头盔、增强现实玻璃、或增强现实贴片等,或其任意组合。例如,虚拟现实设备和/或增强现实设备可以包括各种虚拟现实产品等。In this embodiment, the user participating terminal 200 may include a mobile device, a tablet computer, a laptop computer, etc., or any combination thereof. In some embodiments, mobile devices may include smart home devices, wearable devices, smart mobile devices, virtual reality devices, or augmented reality devices, etc., or any combination thereof. In some embodiments, the smart home devices may include control devices of smart electrical devices, smart monitoring devices, smart TVs, smart cameras, etc., or any combination thereof. In some embodiments, the wearable device may include a smart bracelet, smart shoelaces, smart glass, smart helmets, smart watches, smart clothing, smart backpacks, smart accessories, etc., or any combination thereof. In some embodiments, a smart mobile device may include a smartphone, a personal digital assistant, a gaming device, etc., or any combination thereof. In some embodiments, the virtual reality device and/or augmented reality device may include a virtual reality helmet, virtual reality glass, virtual reality patch, augmented reality helmet, augmented reality glass, or augmented reality patch, etc., or any combination thereof. For example, virtual reality devices and/or augmented reality devices may include various virtual reality products and the like.
本实施例中,视频会议用户鉴权系统10中的物联网云云数据服务器100和用户与会终端200可以通过配合执行以下方法实施例所描述的视频会议用户鉴权方法,具体云数据服务器100和用户与会终端200的执行步骤部分可以参照以下方法实施例的详细描述。In this embodiment, the Internet of Things cloud data server 100 and the user participant terminal 200 in the video conference user authentication system 10 can cooperate to execute the video conference user authentication method described in the following method embodiments. Specifically, the cloud data server 100 and the user For part of the execution steps of the terminal 200 participating in the conference, reference may be made to the detailed description of the following method embodiments.
为了解决前述背景技术中的技术问题,图2为本公开实施例提供的视频会议用户鉴权方法的流程示意图,本实施例提供的视频会议用户鉴权方法可以由图1中所示的云数据服务器100执行,下面对该视频会议用户鉴权方法进行详细介绍。In order to solve the technical problems in the foregoing background technology, FIG. 2 is a schematic flowchart of a video conference user authentication method provided by an embodiment of the present disclosure. The video conference user authentication method provided by this embodiment can be Executed by the server 100, the following describes the video conference user authentication method in detail.
步骤S110,获取用户与会终端的设备授权信息;Step S110, obtaining the device authorization information of the user participating terminal;
步骤S120,根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限;Step S120, according to the device authorization information, obtain the video conference level authority in the user participating terminal;
步骤S130,根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像;Step S130, obtaining a real-time image of each participating user in the user participating terminal according to the video conference grade authority;
步骤S140,根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。Step S140, authorize the video conference level corresponding to each participant user according to the real-time image of the participant user.
在一个可能的实施例中,步骤S130进一步包括:In a possible embodiment, step S130 further includes:
步骤S131,获取每个所述与会用户的实时图像的第一边缘;Step S131, obtaining the first edge of the real-time image of each of the participating users;
步骤S132,根据所述第一边缘确定人脸识别区域;Step S132, determining a face recognition area according to the first edge;
步骤S133,对所述人脸识别区域的平行边缘进行扩展,以获取第二边缘;Step S133, expanding the parallel edge of the face recognition area to obtain the second edge;
步骤S134,获取所述第二边缘作为所述与会用户的实时图像的实际边缘。Step S134, acquiring the second edge as the actual edge of the real-time image of the participating user.
在一个可能的实施例中,步骤S131进一步包括:In a possible embodiment, step S131 further includes:
步骤S1311,获取每个与会用户的实时图像中的平行边缘和垂直边缘;Step S1311, obtaining the parallel edge and the vertical edge in the real-time image of each participating user;
步骤S1312,根据所述平行边缘和垂直边缘计算出每个与会用户的实时图像的所述第一边缘。Step S1312: Calculate the first edge of the real-time image of each participating user according to the parallel edge and the vertical edge.
在一个可能的实施例中,所述方法包括:In a possible embodiment, the method includes:
步骤S150,通过遍历授权数据库来实现获取所述用户与会终端中的视频会议等级权限。Step S150, by traversing the authorization database, the video conference level authority of the user participating terminal is obtained.
在一个可能的实施例中,步骤S150进一步包括:In a possible embodiment, step S150 further includes:
步骤S151,获取设备授权信息的中的权限数据;Step S151, obtaining authority data in the device authorization information;
步骤S152,根据所述权限数据建立搜索索引;Step S152, establishing a search index according to the authority data;
步骤S153,根据所述搜索索引,对所述授权数据库进行遍历。Step S153, traverse the authorization database according to the search index.
步骤S154,若所述授权数据库中存在该搜索索引,则将所述用户与会终端标识为通过,并进一步进行图像识别准备。Step S154, if the search index exists in the authorization database, mark the user participating terminal as passed, and further prepare for image recognition.
步骤S155,若所述授权数据库中不存在该搜索索引,则发送给搜索索引到管理服务器,中止进行图像识别准备,同时将所述用户与会终端标识为未通过,并将结果反馈给用户,指引用户重新进行申请注册。Step S155, if the search index does not exist in the authorization database, send the search index to the management server, suspend the preparation for image recognition, mark the user participating terminal as failed, and feed back the result to the user to guide the process. The user re-applies for registration.
图3为本公开实施例提供的视频会议用户鉴权装置300的功能模块示意图,本实施例可以根据上述云数据服务器100执行的方法实施例对该视频会议用户鉴权装置300进行功能模块的划分,也即该视频会议用户鉴权装置300所对应的以下各个功能模块可以用于执行上述云数据服务器100执行的各个方法实施例。其中,该视频会议用户鉴权装置300可以包括授权信息获取模块310、视频等级分析模块320、图像获取模块330和最终授权模块340,下面分别对该视频会议用户鉴权装置300的各个功能模块的功能进行详细阐述。FIG. 3 is a schematic diagram of functional modules of a video conference user authentication apparatus 300 according to an embodiment of the present disclosure. In this embodiment, the video conference user authentication apparatus 300 can be divided into functional modules according to the method embodiment performed by the cloud data server 100. , that is, the following functional modules corresponding to the video conference user authentication apparatus 300 can be used to execute the above-mentioned method embodiments executed by the cloud data server 100 . Wherein, the video conference user authentication device 300 may include an authorization information acquisition module 310, a video level analysis module 320, an image acquisition module 330 and a final authorization module 340. functions are explained in detail.
授权信息获取模块310可以用于执行上述的步骤S110,即用于获取用户与会终端的设备授权信息。The authorization information acquisition module 310 may be configured to perform the above-mentioned step S110, that is, to acquire the device authorization information of the user participating terminal.
视频等级分析模块320可以用于执行上述的步骤S120,即用于根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限。The video level analysis module 320 may be configured to perform the above step S120, that is, to obtain the video conference level permission in the user participating terminal according to the device authorization information.
图像获取模块330可以用于执行上述的步骤S130,即用于根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像。The image acquisition module 330 may be configured to perform the above-mentioned step S130, that is, to acquire a real-time image of each user participating in the conference in the user participating terminal according to the video conference level authority.
最终授权模块340可以用于执行上述的步骤S140,即根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。The final authorization module 340 may be configured to perform the above step S140, that is, to authorize the video conference level corresponding to each participant user according to the real-time image of the participant user.
需要说明的是,应理解以上装置的各个模块的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且这些模块可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分模块通过处理元件调用软件的形式实现,部分模块通过硬件的形式实现。例如,授权信息获取模块310可以为单独设立的处理元件,也可以集成在上述装置的某一个芯片中实现,此外,也可以以程序代码的形式存储于上述装置的存储器中,由上述装置的某一个处理元件调用并执行以上授权信息获取模块310的功能。其它模块的实现与之类似。此外这些模块全部或部分可以集成在一起,也可以独立实现。这里所描述的处理元件可以是一种集成电路,具有信号的处理能力。在实现过程中,上述方法的各步骤或以上各个模块可以通过处理器元件中的硬件的集成逻辑电路或者软件形式的指令完成。It should be noted that it should be understood that the division of each module of the above apparatus is only a division of logical functions, and may be fully or partially integrated into a physical entity in actual implementation, or may be physically separated. And these modules can all be implemented in the form of software calling through processing elements; they can also all be implemented in hardware; some modules can also be implemented in the form of calling software through processing elements, and some modules can be implemented in hardware. For example, the authorization information acquisition module 310 may be a separately established processing element, or may be integrated into a certain chip of the above-mentioned device to be implemented, in addition, it may also be stored in the memory of the above-mentioned device in the form of program code, and is executed by a certain of the above-mentioned device. A processing element invokes and executes the functions of the above authorization information acquisition module 310 . The implementation of other modules is similar. In addition, all or part of these modules can be integrated together, and can also be implemented independently. The processing element described herein may be an integrated circuit with signal processing capabilities. In the implementation process, each step of the above-mentioned method or each of the above-mentioned modules can be completed by an integrated logic circuit of hardware in the processor element or an instruction in the form of software.
例如,以上这些模块可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(application specific integrated circuit,ASIC),或,一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)等。再如,当以上某个模块通过处理元件调度程序代码的形式实现时,该处理元件可以是通用处理器,例如中央处理器(centralprocessing unit,CPU)或其它可以调用程序代码的处理器。再如,这些模块可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as one or more specific integrated circuits (application specific integrated circuit, ASIC), or, one or more microprocessors (digital signal processor, DSP), or, or, one or more field programmable gate arrays (field programmable gate array, FPGA) and so on. For another example, when one of the above modules is implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a central processing unit (central processing unit). unit, CPU) or other processor that can invoke program code. For another example, these modules can be integrated together and implemented in the form of a system-on-a-chip (SOC).
图4示出了本公开实施例提供的用于实现上述的控制设备的云数据服务器100的硬件结构示意图,如图4所示,云数据服务器100可包括处理器110、机器可读存储介质120、总线130以及收发器140。FIG. 4 shows a schematic diagram of the hardware structure of a cloud data server 100 for implementing the above-mentioned control device provided by an embodiment of the present disclosure. As shown in FIG. 4 , the cloud data server 100 may include a processor 110 and a machine-readable storage medium 120 , bus 130 and transceiver 140 .
在具体实现过程中,至少一个处理器110执行所述机器可读存储介质120存储的计算机执行指令(例如图3中所示的视频会议用户鉴权装置300包括的),使得处理器110可以执行如上方法实施例的视频会议用户鉴权方法,其中,处理器110、机器可读存储介质120以及收发器140通过总线130连接,处理器110可以用于控制收发器140的收发动作,从而可以与前述的用户与会终端200进行数据收发。In a specific implementation process, at least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120 (for example, included in the video conference user authentication apparatus 300 shown in FIG. 3 ), so that the processor 110 can execute In the video conference user authentication method according to the above method embodiment, the processor 110, the machine-readable storage medium 120 and the transceiver 140 are connected through the bus 130, and the processor 110 can be used to control the transceiver 140. The aforementioned user-participating terminal 200 performs data transmission and reception.
处理器110的具体实现过程可参见上述云数据服务器100执行的各个方法实施例,其实现原理和技术效果类似,本实施例此处不再赘述。For the specific implementation process of the processor 110, reference may be made to the various method embodiments executed by the cloud data server 100 above, and the implementation principles and technical effects thereof are similar, and are not described again in this embodiment.
在上述的图4所示的实施例中,应理解,处理器可以是中央处理单元(英文:Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(英文:Digital Signal Processor,DSP)、专用集成电路(英文:Application SpecificIntegrated Circuit,ASIC)等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合发明所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In the above-mentioned embodiment shown in FIG. 4 , it should be understood that the processor may be a central processing unit (English: Central Processing Unit, CPU), and may also be other general-purpose processors, digital signal processors (English: Digital Signal Processor, DSP), application-specific integrated circuits (English: Application Specific Integrated Circuit, ASIC) and so on. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in conjunction with the invention can be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor.
机器可读存储介质120可能包含高速RAM存储器,也可能还包括非易失性存储NVM,例如至少一个磁盘存储器。Machine-readable storage medium 120 may include high-speed RAM memory, and may also include non-volatile storage NVM, such as at least one disk storage.
总线130可以是工业标准体系结构(Industry Standard Architecture,ISA)总线、外部设备互连(Peripheral Component Interconnect,PCI)总线或扩展工业标准体系结构(Extended Industry Standard Architecture,EISA)总线等。总线130可以分为地址总线、数据总线、控制总线等。为便于表示,本申请附图中的总线并不限定仅有一根总线或一种类型的总线。The bus 130 may be an industry standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect (PCI) bus or Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus, etc. The bus 130 may be classified into an address bus, a data bus, a control bus, and the like. For convenience of representation, the buses in the drawings of the present application are not limited to only one bus or one type of bus.
此外,本公开实施例还提供一种可读存储介质,所述可读存储介质中存储有计算机执行指令,当处理器执行所述计算机执行指令时,实现如上视频会议用户鉴权方法。In addition, an embodiment of the present disclosure further provides a readable storage medium, where computer-executable instructions are stored in the readable storage medium, and when a processor executes the computer-executable instructions, the above video conference user authentication method is implemented.
上述的可读存储介质可以是由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。可读存储介质可以是通用或专用计算机能够存取的任何可用介质。The above-mentioned readable storage medium may be implemented by any type of volatile or non-volatile storage device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM) , Erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic Disk or Optical Disk. A readable storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.
最后应说明的是:以上各实施例仅用以说明本公开的技术方案,而非对其限制;尽管参照前述各实施例对本公开进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本公开各实施例技术方案的范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present disclosure, but not to limit them; although the present disclosure has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: The technical solutions described in the foregoing embodiments can still be modified, or some or all of the technical features thereof can be equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the technical solutions of the embodiments of the present disclosure. scope.

Claims (7)

  1. 一种视频会议用户鉴权方法,用于鉴权参与视频会议的与会人员,其特征在于,所述视频会议用户鉴权方法包括如下步骤:A video conference user authentication method for authenticating participants participating in a video conference, wherein the video conference user authentication method comprises the following steps:
    获取用户与会终端的设备授权信息;Obtain the device authorization information of the user's participating terminal;
    根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限;According to the device authorization information, obtain the video conference level permission in the user participating terminal;
    根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像;Acquire a real-time image of each participating user in the user participating terminal according to the video conference grade authority;
    根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。The video conference level corresponding to each participant user is authorized according to the real-time image of the participant user.
  2. 根据权利要求1所述的鉴权方法,其特征在于,所述根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像的步骤包括:The authentication method according to claim 1, wherein the step of acquiring the real-time image of each user participating in the conference in the user participating terminal according to the video conference grade authority comprises:
    获取每个所述与会用户的实时图像的第一边缘;obtaining the first edge of the real-time image of each of the participating users;
    根据所述第一边缘确定人脸识别区域;Determine a face recognition area according to the first edge;
    对所述人脸识别区域的平行边缘进行扩展,以获取第二边缘;Extending the parallel edges of the face recognition area to obtain a second edge;
    获取所述第二边缘作为所述与会用户的实时图像的实际边缘。The second edge is acquired as the actual edge of the real-time image of the participating users.
  3. 根据权利要求2所述的鉴权方法,其特征在于,所述获取每个与会用户的实时图像的第一边缘的步骤包括:The authentication method according to claim 2, wherein the step of obtaining the first edge of the real-time image of each participating user comprises:
    获取每个与会用户的实时图像中的平行边缘和垂直边缘;Obtain the parallel and vertical edges in the live image of each participating user;
    根据所述平行边缘和垂直边缘计算出每个与会用户的实时图像的所述第一边缘。The first edge of the real-time image of each participating user is calculated according to the parallel edge and the vertical edge.
  4. 根据权利要求1至3中任一项所述的鉴权方法,其特征在于,The authentication method according to any one of claims 1 to 3, wherein,
    通过遍历授权数据库来实现获取所述用户与会终端中的视频会议等级权限的步骤,遍历授权数据库的步骤包括:The step of obtaining the video conference level authority in the user participating terminal is realized by traversing the authorization database, and the step of traversing the authorization database includes:
    获取设备授权信息的中的权限数据;Obtain permission data in device authorization information;
    根据所述权限数据建立搜索索引;Establish a search index according to the permission data;
    根据所述搜索索引,对所述授权数据库进行遍历;traversing the authorization database according to the search index;
    若所述授权数据库中存在该搜索索引,则将所述用户与会终端标识为通过,并进一步进行图像识别准备;If the search index exists in the authorization database, the user participating terminal is identified as passed, and further image recognition preparations are performed;
    若所述授权数据库中不存在该搜索索引,则发送给搜索索引到管理服务器,中止进行图像识别准备,同时将所述用户与会终端标识为未通过,并将结果反馈给用户,指引用户重新进行申请注册。If the search index does not exist in the authorization database, send the search index to the management server, stop the preparation for image recognition, at the same time mark the user participating terminal as failed, and feed back the result to the user, instructing the user to repeat the process Apply for registration.
  5. 一种视频会议用户鉴权装置,其特征在于,所述装置包括:A video conference user authentication device, characterized in that the device comprises:
    授权信息获取模块,用于获取用户与会终端的设备授权信息;The authorization information acquisition module is used to acquire the device authorization information of the user participating terminal;
    视频等级分析模块,用于根据所述设备授权信息,获取所述用户与会终端中的视频会议等级权限;a video level analysis module, configured to obtain the video conference level authority in the user participating terminal according to the device authorization information;
    图像授权信息获取模块,用于根据所述视频会议等级权限,获取用户与会终端中每个与会用户的实时图像;an image authorization information acquisition module, configured to acquire a real-time image of each participant in the user participant terminal according to the video conference grade authority;
    最终授权模块,用于根据所述与会用户的实时图像授权每个与会用户对应的视频会议等级。The final authorization module is used to authorize the video conference level corresponding to each participant user according to the real-time image of the participant user.
  6. 一种视频会议用户鉴权系统,该系统包含视频会议用户鉴权装置和云数据服务器,其特征在于,所述云数据服务器包括处理器、机器可读存储介质和网络接口,所述机器可读存储介质、所述网络接口以及所述处理器之间通过总线系统相连,所述网络接口用于与至少一个用户与会终端通信连接,所述机器可读存储介质用于存储程序、指令或代码,所述处理器用于执行所述机器可读存储介质中的程序、指令或代码,以执行权利要求1-4中任意一项的视频会议用户鉴权方法。A video conference user authentication system, the system includes a video conference user authentication device and a cloud data server, wherein the cloud data server includes a processor, a machine-readable storage medium and a network interface, the machine-readable The storage medium, the network interface and the processor are connected through a bus system, the network interface is used for communicating with at least one user terminal, the machine-readable storage medium is used for storing programs, instructions or codes, The processor is configured to execute programs, instructions or codes in the machine-readable storage medium, so as to execute the video conference user authentication method of any one of claims 1-4.
  7. 一种计算机可读存储介质,用于存储指令/可执行代码,当所述指令/可执行代码被电子设备的处理器执行时,使得所述电子设备实现权利要求1-4中任一项所述的方法。A computer-readable storage medium for storing instructions/executable codes, when the instructions/executable codes are executed by a processor of an electronic device, the electronic device enables the electronic device to implement any one of claims 1-4. method described.
PCT/CN2020/135586 2020-09-30 2020-12-11 User authentication method, apparatus, and system for video conference WO2022068066A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011061849.1 2020-09-30
CN202011061849.1A CN113271428A (en) 2020-09-30 2020-09-30 Video conference user authentication method, device and system

Publications (1)

Publication Number Publication Date
WO2022068066A1 true WO2022068066A1 (en) 2022-04-07

Family

ID=77227740

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/135586 WO2022068066A1 (en) 2020-09-30 2020-12-11 User authentication method, apparatus, and system for video conference

Country Status (2)

Country Link
CN (1) CN113271428A (en)
WO (1) WO2022068066A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615461A (en) * 2022-05-12 2022-06-10 广州市保伦电子有限公司 Video conference remote interaction system with coexistence of multiple conferences
US11897862B2 (en) 2022-03-17 2024-02-13 Gilead Sciences, Inc. IKAROS zinc finger family degraders and uses thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766170A (en) * 2021-09-18 2021-12-07 苏州科天视创信息科技有限公司 Audio and video based on-line conference multi-terminal resource sharing method and system
CN114390240B (en) * 2021-12-09 2022-10-28 慧之安信息技术股份有限公司 Safety processing method and device for video conference

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004129071A (en) * 2002-10-04 2004-04-22 Sony Corp Two-way communication system
CN207543241U (en) * 2017-10-24 2018-06-26 北京蓝海华业工程技术有限公司 A kind of teleconference management system based on recognition of face
CN108664547A (en) * 2018-03-26 2018-10-16 平安科技(深圳)有限公司 The shared method of electronic device, committee paper and storage medium
CN109413362A (en) * 2018-11-27 2019-03-01 平安科技(深圳)有限公司 A kind of call voice access video-meeting method and device
US20190109846A1 (en) * 2017-10-09 2019-04-11 International Business Machines Corporation Enabling/disabling applications using face authentication
CN110519545A (en) * 2018-05-22 2019-11-29 中兴通讯股份有限公司 Meeting authority control method and system, server, terminal, storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101681321B1 (en) * 2009-11-17 2016-11-30 엘지전자 주식회사 Method for user authentication, video communication apparatus and display apparatus thereof
CN106209725B (en) * 2015-04-30 2019-11-15 中国电信股份有限公司 Method, video conference central server and system for video conference certification
CN110572607A (en) * 2019-08-20 2019-12-13 视联动力信息技术股份有限公司 Video conference method, system and device and storage medium
CN110708495A (en) * 2019-10-15 2020-01-17 广州国音智能科技有限公司 Video conference monitoring method, terminal and readable storage medium
CN111131752B (en) * 2019-12-25 2022-12-23 视联动力信息技术股份有限公司 Video conference control method, device, equipment and medium based on video networking
CN111556269B (en) * 2020-04-29 2021-06-04 从法信息科技有限公司 Remote meeting system, device and method based on identity authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004129071A (en) * 2002-10-04 2004-04-22 Sony Corp Two-way communication system
US20190109846A1 (en) * 2017-10-09 2019-04-11 International Business Machines Corporation Enabling/disabling applications using face authentication
CN207543241U (en) * 2017-10-24 2018-06-26 北京蓝海华业工程技术有限公司 A kind of teleconference management system based on recognition of face
CN108664547A (en) * 2018-03-26 2018-10-16 平安科技(深圳)有限公司 The shared method of electronic device, committee paper and storage medium
CN110519545A (en) * 2018-05-22 2019-11-29 中兴通讯股份有限公司 Meeting authority control method and system, server, terminal, storage medium
CN109413362A (en) * 2018-11-27 2019-03-01 平安科技(深圳)有限公司 A kind of call voice access video-meeting method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11897862B2 (en) 2022-03-17 2024-02-13 Gilead Sciences, Inc. IKAROS zinc finger family degraders and uses thereof
CN114615461A (en) * 2022-05-12 2022-06-10 广州市保伦电子有限公司 Video conference remote interaction system with coexistence of multiple conferences
CN114615461B (en) * 2022-05-12 2022-09-06 广州市保伦电子有限公司 Video conference remote interaction system with coexistence of multiple conferences

Also Published As

Publication number Publication date
CN113271428A (en) 2021-08-17

Similar Documents

Publication Publication Date Title
WO2022068066A1 (en) User authentication method, apparatus, and system for video conference
CN112052789A (en) Face recognition method and device, electronic equipment and storage medium
US11210541B2 (en) Liveness detection method, apparatus and computer-readable storage medium
WO2020038140A1 (en) Facial recognition method and device
US10855678B2 (en) Temporary biometric templates for maintaining a user authenticated state
KR20150103264A (en) Voice and/or facial recognition based service provision
US20110206244A1 (en) Systems and methods for enhanced biometric security
US11706219B1 (en) Secure session sharing between computing devices
US20190377934A1 (en) Face recognition system and method for enhancing face recognition
US20200322648A1 (en) Systems and methods of facilitating live streaming of content on multiple social media platforms
US8910260B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
US20160094547A1 (en) Image capture challenge access
CN111581622A (en) Information processing method and device and electronic equipment
CN113747109A (en) Video conference permission level determination method and system and video conference server
US20230360006A1 (en) Digital and physical asset transfers based on authentication
US20220046009A1 (en) Multi-person authentication
WO2022068067A1 (en) Video conference information processing method and apparatus, electronic device and system
CN113905203A (en) Video conference access method and device based on wireless network security and cloud server
WO2022082967A1 (en) Video conference information transmission method, apparatus and system
US20240129302A1 (en) System and method for using a validated card in a virtual environment
US20240022561A1 (en) Accessing a virtual sub-environment in a virtual environment
CN113905202A (en) Video conference access method and device and cloud conference server
US20230353579A1 (en) System and method for geotagging users for authentication
US20240005011A1 (en) Data security in virtual-world systems
US20230360044A1 (en) Digital asset transfers in a virtual environment based on a physical object

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20956083

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20956083

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/09/2023)