Authentication method and device for conference system
An authentication method and technology of a conference system, applied in the field of authentication methods and devices of conference systems, can solve problems such as stealing the first conference, failing to confirm the conference terminal, leakage of the first conference information, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] figure 2 A schematic diagram of an implementation environment of the authentication method of the conference system provided by the embodiment of the present invention is shown. Such as figure 2 As mentioned above, the conference system includes a conference server, a first conference terminal and a second conference terminal, and when the first conference terminal sends information to the second conference terminal, the information is forwarded by the conference server. Optionally, information is transmitted between the first conference terminal, the second conference terminal, and the conference server through SSL (Secure Sockets Layer, Secure Sockets Layer), so as to prevent information such as identification information or authentication results of the conference terminals from being modified.
[0036] image 3 Shows a flow chart of an authentication method for a conference system according to an embodiment of the present invention, for figure 2 The conference...
Embodiment 2
[0052] Figure 4 A flow chart showing another authentication method for a conference system according to an embodiment of the present invention, for Figure 5 The conference system shown, with figure 2 The difference of the conference system shown is that the conference server in the conference system is a plurality of cascaded conferences, and the multiple cascaded conference servers form a data link between the first conference terminal and the second conference terminal for Forward the code stream between the first conference terminal and the second conference terminal, for example Figure 5 The first conference server and the second conference server in . Optionally, information is transmitted between the first conference terminal and the first conference server, and between the second conference terminal and the second conference server through SSL (Secure Sockets Layer, Secure Sockets Layer), so as to prevent identification information or authentication of conference ...
Embodiment 3
[0071] Figure 6 It shows a flowchart of another authentication method for a conference system according to an embodiment of the present invention, which is used for Figure 7 The conference system shown, with figure 2 The difference of the conference system shown is that the conference system further includes an authentication server connected to the conference server and located outside the data link between the first conference terminal and the second conference terminal. Optionally, information is transmitted between the first conference terminal, the second conference terminal, and the conference server through SSL (Secure Sockets Layer, Secure Sockets Layer), so as to prevent information such as identification information or authentication results of the conference terminals from being modified. Information is transmitted between the conference server and the authentication server through the Radius protocol (a remote authentication protocol).
[0072] Such as Figur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


