Method and terminal for preventing leakage of confidential meeting information

An information leakage and conference technology, applied in the field of video communication, can solve the problems of lax personnel access control, difficult management and control, long material life cycle, etc., to improve conference efficiency, prevent theft, and save labor costs.

Active Publication Date: 2018-07-13
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Disadvantages of using manual management of secret-related meetings: Improper material management and control: meetings often need to distribute a large amount of paper materials, from meeting materials confirmation, printing to data distribution, recycling, and destruction. Due to the long life cycle of materials, the possibility of leakage is high. This greatly increases security risks, and at the same time it is easy to cause extravagance and waste; lack of personnel control: in the process of holding confidential meetings, confidential personnel are required to participate in the whole process, which consumes a lot of manpower
Traditional secret-related meetings are purely manual management from meeting sign-in, meeting communication to post-meeting information collection. Sign-in time is long, personnel statistics are difficult, and the access control of the venue and related places is not strict, which is not conducive to the management of secret-related meetings; wireless communication Hidden dangers of equipment security: the use of unsafe wireless communication equipment in confidential meetings makes meeting information easy to be stolen
[0004] The disadvantages of using tablet computers for conferences are: the security of electronic documents cannot be guaranteed, and it is easy to cause leaks and theft; participants can copy files on tablet computers through wireless, Bluetooth, 2G / 3G, etc.; wireless device information is easy to be stolen; It is difficult to control, if the tablet is lost, there is a great risk of leakage; it is easy for the thief to invade the system, plant Trojan horses and other malicious software; it can be rooted to obtain the highest authority of the system, which endangers the security of confidential meetings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for preventing leakage of confidential meeting information
  • Method and terminal for preventing leakage of confidential meeting information
  • Method and terminal for preventing leakage of confidential meeting information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0036] The present invention is mainly composed of a distributed C / S system framework, a terminal based on an Android operating system, and a management device based on a confidential conference server. The above-mentioned terminal may be a PC, or a portable tablet computer or a mobile phone, which is not specifically limited in the present invention.

[0037] figure 1 A schematic flowchart showing a method for preventing leakage of confidential meeting information, as shown in figure 1 As shown, the method for preventing confidential meeting information leakage includes the following steps:

[0038] 101. The terminal receives a conference start message sent by the managem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and system for preventing leakage of confidential conference information. The method includes: a terminal receives a conference start message sent by a management device, so that participants can sign in to the conference according to the message; After the participants sign in, they receive the meeting materials sent by the management device, and encrypt the meeting materials; after receiving the meeting end message sent by the management device, the terminal deletes the meeting materials. In this method, the terminal encrypts the meeting materials, thereby realizing the security of the meeting materials during the meeting; after receiving the conference end message sent by the management device through the terminal, the conference materials are deleted, realizing the security of the meeting after the meeting is over. The possibility of preventing meeting materials from being stolen; this method also improves meeting efficiency and saves labor costs.

Description

technical field [0001] The invention relates to the technical field of video communication, in particular to a method and a terminal for preventing confidential conference information from leaking. Background technique [0002] At present, in the scenario of a confidential meeting, the main methods of the meeting system are: First, the meeting staff manually manages the meeting process and distributes meeting materials. The second is a tablet computer for conferences. The method of manual management by the conference staff is adopted, and the conference staff is responsible for meeting sign-in, conference material distribution, meeting process management, meeting discussion and voting, and meeting material recovery, which is currently the most important solution for confidential meetings. Using tablet computers dedicated to conferences, the management platform pushes conference materials to each tablet computer, and each tablet computer can realize conference screen synchro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 戎蓉冯维淼黄伟庆张艳芳张珠君张文凤
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products