Internet-based secure conference encryption method and readable storage medium

A technology of the Internet and confidentiality methods, applied in the Internet field, can solve problems such as leaked files, file leaks, and confidential file leaks, and achieve the effect of ensuring confidentiality and preventing malicious leaks

Active Publication Date: 2019-07-02
方赞皓 +4
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In practice, it is common for multiple teams to rent the same meeting room or to use the same meeting room for different departments in the same enterprise. However, after using the display files, they often forget to delete or delete them incompletely, resulting in confidential documents Leakage of files, or the malicious leakage of files by individuals in the team may also cause the leakage of files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-based secure conference encryption method and readable storage medium
  • Internet-based secure conference encryption method and readable storage medium
  • Internet-based secure conference encryption method and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present application will be further introduced below in conjunction with the accompanying drawings and embodiments.

[0043] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. In the following description, different "one embodiment" or "embodiment" do not necessarily refer to the same embodiment. In addition, the drawings described below are only some embodiments of the present invention, and different embodiments can be replaced or combined. Figures obtain other drawings, and obtain other implementations.

[0044] like Figure 1-6 shown, see figure 1 , the embodiment of the present invention provides an Internet-based meeting security method, comprising the following steps:

[0045] The server generates a first string according to the identification code of the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of Internet, and in order to solve the problem that at present the conference files are easy to disclose, the invention provides an Internet-based secure conference encryption method and a readable storage medium. The method is characterized by comprising the following steps of using a server to generate a first character string according to an identification code of a team member, wherein the first character string is used for unlocking a file, and the number of the team members is N; when the file is opened, searching the identification code in the meeting area, and generating a matching string according to the searched identification code, wherein the number of participants is M; at the beginning of the meeting, matching the matching string with the first string, wherein the coincidence degree of the matching string and the first string is Q; if 0.5 <= Q=M / N, unlocking the file; if Q<M / N, sending an unlocking request, and by the team member, receiving the unlocking request and feeding back. The method of the invention has the advantage of high confidentiality.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an Internet-based meeting security method and a readable storage medium. Background technique [0002] The description of the background technology of the present invention belongs to the relevant technology related to the present invention, and is only used to illustrate and facilitate the understanding of the content of the present invention. prior art on the filing date. [0003] Relevant materials need to be displayed in the meeting, and the meeting is generally used to discuss important issues of the team. Therefore, the materials displayed in the meeting are often confidential documents for the team. [0004] In practice, it is common for multiple teams to rent the same meeting room or to use the same meeting room for different departments in the same enterprise. However, after using the display files, they often forget to delete or delete them incompletely, resulting...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/31
CPCG06F21/31G06F21/602G06F21/6209G06F2221/2107
Inventor 肖寅金其他发明人请求不公开姓名
Owner 方赞皓
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products