Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device for conference system

An authentication method and technology of a conference system, applied in the field of authentication methods and devices of conference systems, can solve problems such as stealing the first conference, failing to confirm the conference terminal, leakage of the first conference information, etc.

Active Publication Date: 2017-09-15
SUZHOU KEDA TECH
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if figure 1 As shown, if another conference terminal F obtains the terminal ID of conference terminal D in advance, then conference terminal F can pretend to be conference terminal D to respond to conference terminal A’s confirmation request, thereby stealing the content of the first conference, causing the first conference information to Give way
[0005] It can be seen that the existing method can only confirm whether the first conference terminal has established data links with other conference terminals, but cannot confirm whether the conference terminal with which the data link has been established is the target conference terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for conference system
  • Authentication method and device for conference system
  • Authentication method and device for conference system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 2 A schematic diagram of an implementation environment of the authentication method of the conference system provided by the embodiment of the present invention is shown. Such as figure 2 As mentioned above, the conference system includes a conference server, a first conference terminal and a second conference terminal, and when the first conference terminal sends information to the second conference terminal, the information is forwarded by the conference server. Optionally, information is transmitted between the first conference terminal, the second conference terminal, and the conference server through SSL (Secure Sockets Layer, Secure Sockets Layer), so as to prevent information such as identification information or authentication results of the conference terminals from being modified.

[0036] image 3 Shows a flow chart of an authentication method for a conference system according to an embodiment of the present invention, for figure 2 The conference...

Embodiment 2

[0052] Figure 4 A flow chart showing another authentication method for a conference system according to an embodiment of the present invention, for Figure 5 The conference system shown, with figure 2 The difference of the conference system shown is that the conference server in the conference system is a plurality of cascaded conferences, and the multiple cascaded conference servers form a data link between the first conference terminal and the second conference terminal for Forward the code stream between the first conference terminal and the second conference terminal, for example Figure 5 The first conference server and the second conference server in . Optionally, information is transmitted between the first conference terminal and the first conference server, and between the second conference terminal and the second conference server through SSL (Secure Sockets Layer, Secure Sockets Layer), so as to prevent identification information or authentication of conference ...

Embodiment 3

[0071] Figure 6 It shows a flowchart of another authentication method for a conference system according to an embodiment of the present invention, which is used for Figure 7 The conference system shown, with figure 2 The difference of the conference system shown is that the conference system further includes an authentication server connected to the conference server and located outside the data link between the first conference terminal and the second conference terminal. Optionally, information is transmitted between the first conference terminal, the second conference terminal, and the conference server through SSL (Secure Sockets Layer, Secure Sockets Layer), so as to prevent information such as identification information or authentication results of the conference terminals from being modified. Information is transmitted between the conference server and the authentication server through the Radius protocol (a remote authentication protocol).

[0072] Such as Figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device for a conference system. The conference system comprises a conference server, a first conference terminal and a second conference terminal. The method comprises the following steps: the conference server receives a link acknowledgement request of the first conference terminal, wherein the link acknowledgement request carries identification information of the second conference terminal; the conference server forwards the link acknowledgement request to the second conference terminal; the conference server judges whether or not identity information sent by the second conference terminal is received; when the identity information is received, the conference server authenticates the second conference terminal according to the identity information; and the conference server sends an authentication result of the second conference terminal to the first conference terminal. According to the authentication method and device disclosed by the invention, when the first conference terminal does not establish a data link with other conference terminals or the conference terminal that establishes the data link with the first conference terminal is not a target conference terminal of the first conference terminal, the first conference terminal can also confirm the data link error.

Description

technical field [0001] The invention relates to the technical field of audio and video conference systems, in particular to an authentication method and device for a conference system. Background technique [0002] In the audio and video conferencing system, each conference terminal is connected to a conference server, and the code stream transfer between two conference terminals is realized through the conference server. When each conference terminal connects to the conference server, the conference server will authenticate it to confirm whether the conference terminal has permission to connect to the conference server. [0003] Before the first conference terminal intends to send the code stream to the target conference terminal, the conference server establishes a data link between the first conference terminal and the target conference terminal. However, if the conference server makes an error, it will cause the first conference terminal to send the code stream to the w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04N7/15
CPCH04L63/08H04N7/155
Inventor 王彦杰曾昭鸣顾振华顾志松
Owner SUZHOU KEDA TECH