Method and system for authenticating network conference

A network conference and authentication method technology, applied in the field of network conference certification, can solve the problem of personal information theft, achieve the effect of meeting member certification and ensuring security

Inactive Publication Date: 2013-04-17
SUZHOU YIBEI INFORMATION TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this dual or even multiple approach is often fixed, and it is also easy to be targeted for personal information theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating network conference
  • Method and system for authenticating network conference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0011] figure 1 Shown is a flow chart of a method for network conference authentication provided according to a preferred embodiment of the present invention. like figure 1 As shown, the network conference authentication method provided by the preferred embodiment of the present invention includes steps 101-104.

[0012] In step 101, the conference members send a web conference login request to the web conference server through the corresponding client, wherein the web conference login request carries the information of the conference members participating in the conference and the conference confidentiality information. Here, the conference member information includes, for example, conference mem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for authenticating a network conference. The method comprises the following steps that: conference members send network conference login requests to a network conference server through corresponding clients; the network conference server receives the network conference login requests sent by the conference members, and determines corresponding authentication ways of the conference members according to the levels of the conference members and an authentication way comparison table; the conference members enter network conferences of corresponding confidentiality levels after being authenticated according to the authentication ways; and during network conference switching, the conference members send network conference switching requests to a strategy selection server and the network conference server through corresponding clients, the strategy selection server determines the conference confidentiality levels and authentication ways of target network conferences according to the received network conference switching requests and informs the network conference server of an authentication switching strategy, and the network conference server informs the conference members of the target network conferences of performing corresponding authentication according to an authentication switching strategy.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to a method and system for network conference authentication. Background technique [0002] With the rapid development of network technology, people's personal information is more and more easy to be stolen. Nowadays, people often use double or even multiple authentication methods to ensure the security of personal information. However, this double or even multiple method is often fixed, and it is easy to be targeted and personal information stolen. Contents of the invention [0003] The present invention provides a method and system for network conference authentication to solve the above problems. [0004] The invention provides a network conference authentication method. The above method includes the following steps: the meeting members send a network meeting login request to the network meeting server through the corresponding client, wherein the network meeting login ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20H04L12/1822H04L63/08H04L63/105
Inventor 谢静宇
Owner SUZHOU YIBEI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products