Method for preventing confidential conference information from leakage and terminal

A technology of information leakage and meetings, applied in the field of video communication, can solve problems such as difficult management and control, loose control of personnel access, long material life cycle, etc., to prevent theft, improve meeting efficiency, and save labor costs.

Active Publication Date: 2015-04-29
INST OF INFORMATION ENG CAS
View PDF9 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Disadvantages of using manual management of secret-related meetings: Improper material management and control: meetings often need to distribute a large amount of paper materials, from meeting materials confirmation, printing to data distribution, recycling, and destruction. Due to the long life cycle of materials, the possibility of leakage is high. This greatly increases security risks, and at the same time it is easy to cause extravagance and waste; lack of personnel control: in the process of holding confidential meetings, confidential personnel are required to participate in the whole process, which consumes a lot of manpower
Traditional secret-related meetings are purely manual management from meeting sign-in, meeting communication to post-meeting information collection. Sign-in time is long, personnel statistics are difficult, and the access control of the venue and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing confidential conference information from leakage and terminal
  • Method for preventing confidential conference information from leakage and terminal
  • Method for preventing confidential conference information from leakage and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0036] The present invention is mainly composed of a distributed C / S system framework, a terminal based on an Android operating system, and a management device based on a confidential conference server. The above-mentioned terminal may be a PC, or a portable tablet computer or a mobile phone, which is not specifically limited in the present invention.

[0037] figure 1 A schematic flowchart showing a method for preventing leakage of confidential meeting information, as shown in figure 1 As shown, the method for preventing confidential meeting information leakage includes the following steps:

[0038] 101. The terminal receives a conference start message sent by the managem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for preventing confidential conference information from leakage. The method comprises the following steps that a terminal receives a conference start message sent by management equipment so as to enable participants to carry out conference sign-in according to the message; the terminal receives conference files sent by the management equipment after the participants complete sign-in and encrypts the conference files; after receiving a conference end message sent by the management equipment, the terminal deletes the conference files. According to the method, the conference files are encrypted by the terminal and safety of the conference files in the conference process is realized; after the conference end message sent by the management equipment is received by the terminal, the conference files are deleted, so that prevention on the possibility that the conference files are stolen after a conference is completed is realized; by the method, conference efficiency is also improved and labor cost is reduced.

Description

technical field [0001] The invention relates to the technical field of video communication, in particular to a method and a terminal for preventing confidential conference information from leaking. Background technique [0002] At present, in the scenario of a confidential meeting, the main methods of the meeting system are: First, the meeting staff manually manages the meeting process and distributes meeting materials. The second is a tablet computer for conferences. The method of manual management by the conference staff is adopted, and the conference staff is responsible for meeting sign-in, conference material distribution, meeting process management, meeting discussion and voting, and meeting material recovery, which is currently the most important solution for confidential meetings. Using tablet computers dedicated to conferences, the management platform pushes conference materials to each tablet computer, and each tablet computer can realize conference screen synchro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 戎蓉冯维淼黄伟庆张艳芳张珠君张文凤
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products