CN112822142B - Conference access method, server, conference terminal and storage medium - Google Patents
Conference access method, server, conference terminal and storage medium Download PDFInfo
- Publication number
- CN112822142B CN112822142B CN201911119396.0A CN201911119396A CN112822142B CN 112822142 B CN112822142 B CN 112822142B CN 201911119396 A CN201911119396 A CN 201911119396A CN 112822142 B CN112822142 B CN 112822142B
- Authority
- CN
- China
- Prior art keywords
- conference
- terminal
- meeting
- biological information
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1083—In-session procedures
- H04L65/1093—In-session procedures by adding participants; by removing participants
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1076—Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/403—Arrangements for multi-party communication, e.g. for conferences
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The embodiment of the invention relates to the field of communication and discloses a conference access method, a server, a conference terminal and a storage medium. The conference access method provided by the invention comprises the following steps: receiving a meeting access request sent by a first terminal, wherein the meeting access request comprises biological information, acquired by the first terminal, of a meeting participant; judging whether a target biological information exists in biological information of the participants who have created the conference, wherein the target biological information is matched with the biological information of the participants who request the conference; if the judgment result is that the meeting exists, the first terminal is accessed into the meeting where the meeting participants corresponding to the target biological information are located. The method enables the user to access the conference under any condition, and the conference can be quickly added without depending on MCU conference numbers, or terminal IP, or administrators.
Description
Technical Field
The embodiment of the invention relates to the field of communication, in particular to a conference access method, a server, a conference terminal and a storage medium.
Background
With the increasing development and widespread application of video conferencing technology, it has become very common for a multipoint MCU conference (in english, multi Control Unit, multipoint control unit, MCU conference generally refers to a conference in which a plurality of terminals are pulled into one attribute configured in advance at the same time), and in order to satisfy the situation that a conference cannot be entered on time for a special reason, the conference can be entered by calling in midway as long as the conference number of the MCU or the terminal IP (in english: internet Protocol, internet protocol address) is known.
MCU conferences are generally multi-place conferences, so that the temporal non-uniformity may cause some members to be unable to enter into the conference in time, and then the problem is just solved by allowing the members to enter into the conference in the middle. The prior art is to join the conference through the MCU conference number and the terminal IP, or to pull the terminal into the conference through an administrator.
However, the inventors of the present invention found that if the MCU conference number and the terminal IP were not remembered, it was difficult for the person involved or the administrator himself to quickly join the conference.
Disclosure of Invention
The invention aims to provide a conference access method, a server, a conference terminal and a storage medium, so that a user can quickly join a conference without depending on MCU conference numbers or terminal IP or an administrator.
In order to solve the above technical problems, an embodiment of the present invention provides a conference access method, which is applied to a server, and includes: receiving a meeting access request sent by a first terminal, wherein the meeting access request comprises biological information, acquired by the first terminal, of a meeting participant; judging whether a target biological information exists in biological information of the participants who have created the conference, wherein the target biological information is matched with the biological information of the participants who request the conference; if the judgment result is that the meeting exists, the first terminal is accessed into the meeting where the meeting participants corresponding to the target biological information are located.
The embodiment of the invention also provides a conference access method which is applied to the conference terminal and comprises the following steps: acquiring biological information of a person requesting access; transmitting a meeting access request containing biological information of the meeting participants to a server for the server to judge whether a target biological information exists in the biological information of the meeting participants who have established the meeting, wherein the target biological information is matched with the biological information of the meeting participants; and when the judgment result is that the target biological information exists, accessing the terminal into the meeting where the meeting participants corresponding to the target biological information are located.
The embodiment of the invention also provides a server, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the conference access method applied to the server.
The embodiment of the invention also provides a conference terminal, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the conference access method applied to the conference terminal.
The embodiment of the invention also provides a storage medium which stores a computer program, and the computer program realizes the conference access method when being executed by a processor.
Compared with the prior art, the method and the device have the advantages that the server receives the conference access request sent by the first terminal, and the conference access request comprises the biological information of the participants requested by the first terminal; judging whether biological information of the participants who have created the conference is matched with the biological information of the participants who request the conference; and allowing the terminal to access when the judging result is that the terminal exists. The method enables the user to access the conference under any condition, and the conference can be quickly added without depending on MCU conference numbers, or terminal IP, or administrators.
In addition, a conference access request sent by the first terminal is received, specifically: and receiving a conference access request sent by the first terminal in the conference proceeding stage. In the conference proceeding phase, the server determines whether to access the terminal by verifying the user biometric information, while in other phases the server may access by any means, for example by verifying the terminal IP. The server verification mode is flexible and changeable, and is suitable for various different scenes, and the user experience is better.
If the judgment result is that the meeting exists, the first terminal is accessed into the meeting where the meeting participants corresponding to the target biological information are located, and the method comprises the following steps: if the judgment result is that the meeting is present, whether the meeting-requesting person accesses the meeting through the second terminal is confirmed, and when the meeting-requesting person does not access the meeting through the second terminal, the first terminal is accessed to the meeting where the target biological information corresponds to the meeting-requesting person. The same user is prevented from accessing the conference through a plurality of terminals at the same time, and network resources are occupied.
In addition, when meeting participants are requested to access the meeting through the second terminal, confirming whether the meeting connection with the second terminal is disconnected or not to the first terminal; if the confirmation result is that the conference is disconnected, the conference connection with the second terminal is disconnected, and the first terminal is accessed to the conference where the target biological information corresponding to the participants is located; and if the confirmation result is that the first terminal is not disconnected, rejecting the first terminal to be accessed. Avoiding misjoining of participants.
And if the judgment result is that the access request is not available, sending a notification of the access request of the unknown user to a preset person. The manager is reminded of paying attention to the unknown user to request access, and the situation that the participants who do not enter information cannot join is avoided.
In addition, before receiving the conference access request sent by the first terminal, the method further comprises the following steps: creating a list of participants of the conference; before determining whether there is one target biological information in the biological information of the participants who have created the conference, the method further includes: screening the biological information of the participants who have created the meeting from a biological information base established in advance according to the list of the participants. Biological information of participants can be screened from a pre-stored information base, and the biological information is not required to be input every time a conference is established, so that time is saved and convenience is realized.
Drawings
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements, and in which the figures of the drawings are not to be taken in a limiting sense, unless otherwise indicated.
Fig. 1 is a flowchart of a conference access method in a first embodiment according to the present invention;
fig. 2 is a schematic diagram of interaction principle of a server and a terminal corresponding to a conference access method in a first embodiment of the present invention;
fig. 3 is a schematic view of a scenario in which a conference access method according to a second embodiment of the present invention is applied;
fig. 4 is a flowchart of a conference access method in a second embodiment according to the present invention;
fig. 5 is a flowchart of a conference access method in a third embodiment according to the present invention;
fig. 6 is a schematic view of a scenario in which a conference access method according to a third embodiment of the present invention is applied;
fig. 7 is a flowchart of a conference access method in a fourth embodiment according to the present invention;
fig. 8 is a schematic diagram of a structure of a server according to a fifth embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings. However, those of ordinary skill in the art will understand that in various embodiments of the present invention, numerous technical details have been set forth in order to provide a better understanding of the present application. However, the technical solutions claimed in the present application can be implemented without these technical details and with various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not be construed as limiting the specific implementation of the present invention, and the embodiments can be mutually combined and referred to without contradiction.
The first embodiment of the invention relates to a conference access method, which is applied to a server and comprises the following steps: receiving a meeting access request sent by a first terminal, wherein the meeting access request comprises biological information, acquired by the first terminal, of a meeting participant; judging whether a target biological information exists in biological information of the participants who have created the conference, wherein the target biological information is matched with the biological information of the participants who request the conference; if the judgment result is that the meeting exists, the first terminal is accessed into the meeting where the meeting participants corresponding to the target biological information are located. The method enables the user to access the conference under any condition, and the conference can be quickly added without depending on MCU conference numbers, or terminal IP, or administrators. The implementation details of the conference access method of the present embodiment are specifically described below, and the following is merely implementation details provided for convenience of understanding, and is not necessary to implement the present embodiment.
The implementation mode can be used for various scenes, for example, the implementation mode can be used for meeting at the beginning, a meeting room is established by a server, and each user accesses to the meeting through the method; the conference can also be accessed by the late meeting participants midway during the conference. As shown in fig. 1, the conference access method in this embodiment specifically includes:
step 101, a list of participants for the meeting is created.
Specifically, when the server creates conference information, the conference information needs to include a participant list for checking whether the requesting user is a participant later, and the server can add the participant to a preset conference control list. Further, the conference information may further include conference time, conference theme, etc., which is not limited by the present invention.
Step 102, receiving a conference access request sent by a first terminal, wherein the conference access request comprises biological information of a participant requested to be collected by the first terminal.
Specifically, the user sends a conference access request to the server through the first terminal, and the access request information carries biological information of the user requesting the conference, which is acquired by the first terminal, and the biological information can be face identification information of the user, or can be voice identification information, fingerprint identification information or other specific identification information of the user. Or the first terminal sends the access request first, and the server informs the first terminal to collect the biological information of the current participant according to the access request of the first terminal, and then receives the collected biological information sent by the first terminal.
It should be noted that, the first terminal may collect the biological information of the user through the camera, the microphone or the fingerprint collecting part, and may also collect the biological information of the user through the external camera device, the microphone or the fingerprint collecting device. In addition, an interface for opening or closing the access may be provided in the first terminal, for example, a switch for opening or closing the access is provided in the GUI interface or the WEB interface, and after the user opens the access switch, the first terminal starts to collect the biological information of the user, and after the user closes, the first terminal stops collecting the biological information of the user.
Step 103, screening the biological information of the participants who have created the meeting from a pre-established biological information base according to the list of the participants.
Specifically, a biological information base is arranged in the server, and the server can pre-store all user information and biological information of the target user in the biological information base stored in the server, wherein the user information and the biological information of the target user can be acquired through different conference terminals and sent to the server. "created meetings" refers to all meetings created by the server at the current time, which may correspond to virtual meeting rooms, attendees lists, meeting topics, and so forth. And screening the biological information of all participants corresponding to the created meeting from the biological information base.
Step 104, judging whether a target biological information exists in the biological information of the participants who have created the conference, wherein the target biological information is matched with the biological information of the participants who request the conference. If the judgment result is that the current state exists, the step 105 is entered; if the determination result is not present, the process proceeds to step 106.
Specifically, the server compares the acquired biological information of the meeting-requested person with the screened biological information of the meeting-requested person to see whether the biological information of one screened meeting-requested person is identical with the biological information of the current meeting-requested person. The specific comparison method can be used for identification comparison through image identification, sound wave identification or other corresponding identification algorithms. If the comparison result shows that all the screened biological information is not identical with the biological information of the meeting-requesting person, the meeting-requesting person is considered not to be in the meeting list, the meeting is refused, and the corresponding step 106 can be entered; otherwise, step 105 is entered.
In another example, the server may also directly record the biological information of each participant in advance each time a meeting is created in advance. During auditing, the biological information of the request user is directly compared with the biological information of the prestored participants who have created the meeting in sequence, and if the comparison result is identical with the biological information of the request user, step 105 is entered; if not, proceed to 106.
And 105, accessing the first terminal into a meeting where the participants corresponding to the target biological information are located.
Specifically, the meeting in which the attendees are is the meeting in which the attendees are currently requested to join. If the comparison result shows that the target biological information is identical with the biological information of the meeting-requested person, confirming that the meeting-requested person corresponding to the identical target biological information is in the meeting.
And 106, rejecting the first terminal from accessing, and sending a notification of requesting access by the unknown user to a preset person.
Specifically, if the comparison result shows that all the screened biological information is not identical with the biological information of the participating person, the current participating person does not have the participating condition, or the current participating person is one of the participating persons but the information is not recorded in the system, or the participating person is temporarily added. At this time, the conference manager can be informed that the unknown user requests access, so that the manager can confirm whether the current user needs to be directly pulled into the conference according to the actual situation.
As shown in fig. 2, in the conference access method in this embodiment, a schematic diagram of interaction principle between a server and a terminal is shown, where a user inputs an instruction for opening or closing access to the terminal through a GUI or a Web interface, and a service center module of the terminal controls an acquisition module to acquire biological information of a requesting user according to the received instruction. The acquisition module is a camera, a microphone or a fingerprint identifier and the like which are self-contained or externally connected to the terminal. The biological information of the target user acquired by the acquisition module can also be uploaded to a conference control center (MCU) of a server through the service center module, and a biological information base is arranged in the server and used for storing the biological information which is input in advance.
In this embodiment, the server determines whether or not to allow the terminal used by the user to access the corresponding conference by determining whether or not there is biometric information of the participant who has created the conference that matches the biometric information of the participant who is requesting. The method enables the user to access the conference under any condition, and the conference can be quickly added without depending on MCU conference numbers, or terminal IP, or administrators.
A second embodiment of the invention relates to a conference access method. The second embodiment is substantially the same as the first embodiment, and differs mainly in that: the conference access method in the second embodiment is applied to the server to access the terminal in the conference progress stage. As shown in fig. 3, the meeting has started and the participant A, B, C, D is already in the meeting, at which point the participant E is late to access the meeting while the meeting is in progress. As shown in fig. 4, the conference access method in this embodiment specifically includes:
step 201, a list of participants for a meeting is created.
Specifically, the server creates conference information, the conference information needs to include a participant list for checking whether the requesting user is a participant or not later, and the server can add the participant into a preset conference control list. Further, the conference information may further include conference time, conference theme, etc., which is not limited by the present invention.
Step 202, receiving a conference access request sent by a first terminal in a conference proceeding stage, wherein the conference access request comprises biological information of a participant requested to be collected by the first terminal.
And 203, screening the biological information of the participants who have created the conference from a pre-established biological information base according to the list of the participants.
Step 204, determining whether there is a target biological information in the biological information of the participants who have created the conference, the target biological information being identical to the biological information of the participants who have requested the conference. If the judgment result is that the current exists, the step 205 is entered; if the determination result is not present, the process proceeds to step 206.
Step 205, the first terminal is accessed to a meeting where the participants corresponding to the target biological information are located.
And step 206, rejecting the first terminal access, and sending a notification of the unknown user request access to a preset person.
Steps 201, 203, 204, 205, 206 in this embodiment are similar to steps 101, 103, 104, 105, 106 in the first embodiment, and are not described in detail herein, and differences are described below.
Step 202, receiving a conference access request sent by a first terminal in a conference proceeding stage.
Specifically, in this embodiment, a user may join a meeting in two ways, one of which is the prior art: before the meeting starts, the server pulls the terminals with the IP pre-stored in the meeting control list into the meeting, and the user accesses the meeting through the corresponding terminals. The other is the terminal where the user is accessed in the biological information identification mode disclosed by the invention. However, when the conference access request sent by the first terminal is received in the conference proceeding stage, the server will preferentially select whether to join the terminal requesting the participation by the biological information identification method. Because the server does not actively pull in the terminal to be attended in the meeting progress stage, the terminal needs to be pulled in by an administrator to be accessed into the meeting, and if meeting personnel frequently late in the meeting are added in the middle, the administrator and even other meeting personnel can be affected. Therefore, when the conference access request sent by the terminal is received in the conference proceeding stage, the server automatically enters into the biological information verification method. The server can optionally select the verification mode at other stages to judge whether the terminal is accessed to the conference.
In the process of meeting, the server determines whether the terminal used by the user is allowed to access the corresponding meeting by judging whether the biological information of the meeting participants who have created the meeting is matched with the biological information of the meeting participants. The method ensures that users can quickly join in the conference without depending on MCU conference numbers, terminal IP or administrators when accessing the conference in the conference process, thereby reducing the workload of conference administrators.
A third embodiment of the invention relates to a conference access method. The third embodiment is substantially the same as the second embodiment, and differs mainly in that: in this embodiment, when there is a target biological information matching with the biological information of the participant who has created the conference, it is further confirmed whether the requesting user has accessed the conference through another terminal, and when the participant has not accessed the conference through another terminal, the first terminal is accessed to the conference. The same user is prevented from accessing the conference through a plurality of terminals at the same time, and network resources are occupied. As shown in fig. 5, the conference access method in this embodiment specifically includes:
step 301, creating a list of participants of a conference;
step 302, receiving a conference access request sent by a first terminal in a conference proceeding stage, wherein the conference access request comprises biological information of a participant requested to be collected by the first terminal;
step 303, screening the biological information of the participants who have created the meeting from a pre-established biological information base according to the list of the participants.
Step 304, determining whether there is a target biological information in the biological information of the participants who have created the conference, the target biological information being identical to the biological information of the participants who have requested the conference. If the judgment result is that the current state exists, the step 306 is entered; if the determination result is not present, the process proceeds to step 305.
Step 305, rejecting the first terminal access, and sending a notification of the unknown user request access to a preset person.
Step 306, it is confirmed whether the requesting participant has accessed the conference through the second terminal. If the meeting participant is requested not to access the meeting through the second terminal, entering step 307; if the participant is requested to access the conference through the second terminal, step 308 is entered.
Step 307, the first terminal is accessed to the meeting where the target biological information corresponds to the meeting participants.
Step 308, confirming whether to disconnect the conference with the second terminal or not to the first terminal; if the result is not disconnected, go to step 309; if the result of the confirmation is off, step 310 is entered.
Step 309, the first terminal is denied access.
And 310, disconnecting the conference connection with the second terminal, and connecting the first terminal to the conference where the target biological information corresponding to the participants is located.
Steps 301 to 305 in this embodiment are similar to steps 201 to 205 in the second embodiment, and are not described in detail herein, and the differences are described below.
Step 306, it is confirmed whether the requesting participant has accessed the conference through the second terminal. If the meeting participant is requested not to access the meeting through the second terminal, entering step 307; if the participant is requested to access the conference through the second terminal, step 308 is entered.
Specifically, the application scenario of the present embodiment is also different from the second embodiment in that, in the present embodiment, a situation that a participant needs to replace one conference terminal to access a conference in the conference process is considered. As shown in fig. 6, the participants A, B, C, D are all in the meeting, and the participant a needs to replace one of the conference terminals to enter the meeting. Such as the presence of an abnormality in the original conference terminal microphone or sound, etc. At this time, if it is checked that the biometric information of the requesting user matches the biometric information of the participating person, it is necessary to further confirm whether the participating person corresponding to the biometric information has accessed the conference through another terminal.
Step 307, the first terminal is accessed to the meeting where the target biological information corresponds to the meeting participants.
Specifically, if the requesting user does not access the conference through the other terminal, the user may be directly allowed to access the conference through the current conference terminal.
Step 308 to step 310, specifically, when confirming that the requesting user has accessed the conference through the second terminal, the server may send a confirmation message to the first terminal, confirm whether to disconnect the second terminal, and confirm the terminal to the user. If the user confirms to disconnect the second terminal, disconnecting the second terminal and accessing the conference through the first terminal again; if the user confirms that the second terminal is not disconnected, the user continues to access the conference through the second terminal. Further, it may be set that when feedback of whether the first terminal disconnects the second terminal is not received all the time within a specific time, the first terminal may be directly denied access, so that the user continues to access the meeting instrument through the second terminal, and misoperation of the user is avoided.
In this embodiment, whether the participant is accessed in the conference is confirmed, in practical application, whether the participant is accessed to any conference may also be confirmed, if the participant is accessed in any conference, whether the participant is accessed again may also be confirmed according to practical conditions, and the invention is not limited.
In the meeting process, the server determines whether the biological information of the participants who have created the meeting is identical to the biological information of the participants who request the meeting, and determines whether to allow the terminal currently used by the user to access the corresponding meeting according to the current meeting state of the user. The method enables the user to access the conference under any condition, can quickly join the conference without depending on MCU conference numbers, or terminal IP, or administrators, and avoids the same user accessing the conference through a plurality of terminals at the same time, thereby occupying network resources.
The fourth embodiment of the invention provides a conference access method, which is applied to a conference terminal and comprises the following steps: acquiring biological information of a person requesting access; transmitting a meeting access request containing biological information of the meeting participants to a server for the server to judge whether a target biological information exists in the biological information of the meeting participants who have established the meeting, wherein the target biological information is matched with the biological information of the meeting participants; and when the judgment result is that the target biological information exists, accessing the terminal into the meeting where the meeting participants corresponding to the target biological information are located. As shown in fig. 7, the conference access method in this embodiment specifically includes:
in step 401, biometric information of the requesting access person is collected.
Specifically, the biometric information may be identification information specific to the user, such as face identification information of the user, voice identification information, or fingerprint identification information. The terminal can collect biological information of the user through the camera, the microphone or the fingerprint collecting part, and can collect biological information of the user through the external camera device, the microphone or the fingerprint collecting device. In addition, a corresponding interface for opening or closing the access may be provided in the terminal, for example, a switch for opening or closing the access is provided in the GUI interface or the WEB interface, and after the user opens the access switch, the terminal starts to collect the biological information of the user, and after the terminal closes, the terminal stops collecting the biological information.
Step 402, a meeting access request containing biological information of a meeting person requesting access is sent to a server, and the server judges whether a target biological information exists in the biological information of the meeting person who has created the meeting, wherein the target biological information is matched with the biological information of the meeting person requesting access; and when the judgment result is that the target biological information exists, accessing the terminal into the meeting where the meeting participants corresponding to the target biological information are located.
Specifically, the user sends a meeting access request to the server through the terminal, and the request information carries biological information of the user requesting the meeting, which is acquired by the terminal. The server compares the acquired biological information of the meeting-requested person with the biological information of the meeting-requested person who has created the meeting to see whether the biological information of one meeting-requested person is identical with the biological information of the current meeting-requested person. The specific comparison method can be used for identification comparison through image identification, sound wave identification or other corresponding identification algorithms.
In one example, a biological information base is set in the server, and the server can pre-store all the user information and biological information of the target user in the biological information base stored in the server, wherein the user information and the biological information of the target user can be collected and sent to the server through different conference terminals. "created meetings" refers to all meetings that the server has created at the current time, corresponding to virtual meeting rooms, attendees lists, meeting topics, and so forth. The server screens out the biological information of all the participants corresponding to the established meeting from the biological information base, compares the acquired biological information of the participants requesting meeting with the biological information of the screened participants, and checks whether the biological information of one screened participant is identical with the biological information of the current participants requesting meeting. The specific comparison method can be used for identification comparison through image identification, sound wave identification or other corresponding identification algorithms. And when the comparison result is that the meeting exists, the first terminal is accessed into the meeting where the meeting participants corresponding to the target biological information are located.
In another example, the server may also directly record the biological information of each participant in advance each time a meeting is created in advance. During auditing, the biological information of the request user is directly compared with the prestored biological information of the created consultant in sequence, and whether the biological information of the consultant is matched with the biological information of the request user is confirmed.
Further, the conference access method in the embodiment can be applied to the terminal access in the conference progress stage; the conference access request sent by the first terminal is received, specifically: and receiving a conference access request sent by the first terminal in the conference proceeding stage. In the conference proceeding stage, the user can quickly join the conference without depending on MCU conference number, terminal IP and manager, and avoid disturbing the manager's participation by the manager pulling the conference.
Further, if the judgment result is that the biological information matched with the biological information of the currently requested participant exists, the first terminal is accessed into the meeting where the participant corresponding to the target biological information is located, including: if the judgment result is that the meeting is present, whether the meeting-requesting person accesses the meeting through the second terminal is confirmed, and when the meeting-requesting person does not access the meeting through the second terminal, the first terminal is accessed to the meeting where the target biological information corresponds to the meeting-requesting person. When meeting participants are requested to access the meeting through the second terminal, confirming whether the meeting connection with the second terminal is disconnected or not to the first terminal; if the confirmation result is that the conference is disconnected, the conference connection with the second terminal is disconnected, and the first terminal is accessed to the conference where the target biological information corresponding to the participants is located; and if the confirmation result is that the first terminal is not disconnected, rejecting the first terminal to be accessed. The same user is prevented from accessing the conference through a plurality of terminals at the same time, network resources are occupied, and misaccess of participants is avoided.
Further, if the judgment result is that the biological information matched with the biological information of the current participant requesting is not available, a notification of the access request of the unknown user is sent to the preset personnel. The manager is reminded of paying attention to the fact that unknown users request access, and the situation that participating persons who do not enter information cannot join is avoided.
In one example, before receiving the conference access request sent by the first terminal, the method further includes: creating a list of participants of the conference; before determining whether there is one target biological information in the biological information of the participants who have created the conference, the method further includes: screening the biological information of the participants who have created the meeting from a biological information base established in advance according to the list of the participants. Biological information of participants can be screened from a pre-stored information base, and the biological information is not required to be input every time a conference is established, so that time is saved and convenience is realized.
In this embodiment, the terminal determines, through the server, whether or not there is biometric information of the participant who has created the conference, which matches with the biometric information of the participant who has requested the conference, and determines whether or not to allow the terminal used by the user to access. The method enables the user to access the conference under any condition, and the conference can be quickly added without depending on MCU conference numbers, or terminal IP, or administrators.
The above steps of the methods are divided, for clarity of description, and may be combined into one step or split into multiple steps when implemented, so long as they include the same logic relationship, and they are all within the protection scope of this patent; it is within the scope of this patent to add insignificant modifications to the algorithm or flow or introduce insignificant designs, but not to alter the core design of its algorithm and flow.
A fifth embodiment of the invention relates to a server, as shown in fig. 8, comprising at least one processor 501; and a memory 502 communicatively coupled to the at least one processor 501; the memory 502 stores instructions executable by the at least one processor 501, and the instructions are executed by the at least one processor 501, so that the at least one processor 501 can execute the conference access method in the first, second and third embodiments.
Where the memory 502 and the processor 501 are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting the various circuits of the one or more processors 501 and the memory 502. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 501 is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor 501.
The processor 501 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 502 may be used to store data used by processor 501 in performing operations.
A sixth embodiment of the invention is directed to a conference terminal comprising at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the conference access method of the fourth embodiment. This embodiment is similar to the fifth embodiment, and will not be described again.
A seventh embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program implements the above-described method embodiments when executed by a processor.
That is, it will be understood by those skilled in the art that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, where the program includes several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps in the methods of the embodiments described herein. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples of carrying out the invention and that various changes in form and details may be made therein without departing from the spirit and scope of the invention.
Claims (10)
1. A conference access method, wherein the conference access method is applied to a server, and the conference access method comprises:
receiving a conference access request sent by a first terminal, wherein the conference access request comprises biological information of a participant requested to be collected by the first terminal;
when receiving a meeting access request sent by a first terminal in a meeting progress stage, judging whether target biological information exists in biological information of participants who have created the meeting, wherein the target biological information is identical with the biological information of the participants who request the meeting;
if the judgment result is that the meeting exists, after confirming that the meeting-requested person accesses the meeting where the meeting-requested person corresponding to the target biological information is located through the second terminal, accessing the first terminal to the meeting where the meeting-requested person corresponding to the target biological information is located according to the instruction of disconnecting the second terminal, which is output by the first terminal in a specific time;
if the conference access request is not the presence, determining that the conference access request is an unknown user access request, and accessing the first terminal to the conference after a preset manager receives the preset manager and determines that the current user corresponding to the first terminal is a conference access person according to the unknown user access request;
when receiving a conference access request sent by the first terminal in other phases, the conference access method further comprises the following steps:
and pulling the terminal with the IP pre-stored in the conference control list into the created conference so as to enable the first terminal corresponding to the terminal in the conference control list to be accessed into the created conference, wherein the other phases refer to any phase except the conference proceeding phase.
2. The conference access method according to claim 1, wherein the receiving the conference access request sent by the first terminal specifically includes: and receiving a conference access request sent by the first terminal in the conference proceeding stage.
3. The conference access method according to claim 1, wherein if the determination result is that there is a conference, accessing the first terminal to the conference where the participant corresponding to the target biological information is located, comprises: if the judgment result is that the conference is present, confirming whether the conference requesting personnel access the conference through the second terminal; and when the meeting-requested personnel do not access the meeting through the second terminal, accessing the first terminal to the meeting where the target biological information corresponding to the meeting-requested personnel is located.
4. A conference access method according to claim 3, wherein when the requesting participant has accessed a conference through a second terminal, confirming to the first terminal whether to disconnect the conference connection with the second terminal; if the result is determined to be disconnection, disconnecting the conference connection with the second terminal, and connecting the first terminal to the conference where the target biological information corresponding to the participants is located; and if the confirmation result is that the first terminal is not disconnected, rejecting the first terminal to be accessed.
5. The conference access method according to claim 1, wherein if the determination result is that there is no existence, a notification of an unknown user requesting access is sent to a preset person.
6. The conference access method according to claim 1, further comprising, prior to said receiving the conference access request sent by the first terminal:
creating a list of participants of the conference;
before the step of judging whether the biological information of the participants who have created the conference has the target biological information, the method further comprises the steps of: and screening the biological information of the participants of the created meeting from a pre-established biological information base according to the list of the participants.
7. A conference access method, wherein the conference access method is applied to a first terminal in conference terminals, the conference access method comprising:
collecting biological information of a participant;
transmitting a meeting access request containing biological information of the meeting-requested person to a server, and judging whether target biological information exists in the biological information of the meeting-requested person who has created the meeting when the server receives the meeting access request transmitted by the first terminal in the meeting progress stage, wherein the target biological information is identical with the biological information of the meeting-requested person;
the server is further configured to, if the judgment result is that the second terminal exists, access the first terminal to the meeting where the meeting participant corresponding to the target biological information is located according to the instruction of disconnecting the second terminal output by the first terminal in a specific time after confirming that the meeting participant is accessed to the meeting where the meeting participant corresponding to the target biological information is located by the second terminal;
the server is further configured to determine that the conference access request is an unknown user access request if the judging result is not present, and access the first terminal to the conference after receiving a preset administrator and determining that a current user corresponding to the first terminal is a conference access person according to the unknown user access request;
the conference access method further comprises the following steps:
and sending a conference access request containing biological information of the participants to a server, and when the server receives the conference access request sent by the first terminal in other stages, pulling the terminal with the IP pre-stored in a conference control list into the created conference to access the first terminal corresponding to the terminal in the conference control list into the created conference, wherein the other stages refer to any stage except the conference proceeding stage.
8. A server, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the conference access method of any one of claims 1 to 6.
9. A conference terminal, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the conference access method of claim 7.
10. A storage medium storing a computer program, wherein the computer program when executed by a processor implements the conference access method of any one of claims 1 to 6; alternatively, the computer program, when executed by a processor, implements the conference access method as claimed in claim 7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911119396.0A CN112822142B (en) | 2019-11-15 | 2019-11-15 | Conference access method, server, conference terminal and storage medium |
PCT/CN2020/128444 WO2021093819A1 (en) | 2019-11-15 | 2020-11-12 | Conference access method, server, conference terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911119396.0A CN112822142B (en) | 2019-11-15 | 2019-11-15 | Conference access method, server, conference terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112822142A CN112822142A (en) | 2021-05-18 |
CN112822142B true CN112822142B (en) | 2023-07-21 |
Family
ID=75851653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911119396.0A Active CN112822142B (en) | 2019-11-15 | 2019-11-15 | Conference access method, server, conference terminal and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112822142B (en) |
WO (1) | WO2021093819A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI824249B (en) * | 2021-05-26 | 2023-12-01 | 陳立新 | Method of creating virtual office in remote work |
CN113596383B (en) * | 2021-07-23 | 2023-05-09 | 中信银行股份有限公司 | Method, device and equipment for managing participants of network conference |
CN114553442B (en) * | 2022-04-24 | 2022-09-16 | 安徽云知科技有限公司 | Enterprise internal remote conference method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101047534A (en) * | 2007-04-09 | 2007-10-03 | 华为技术有限公司 | Method, device and system for customer active joining conference |
CN107920173A (en) * | 2017-12-28 | 2018-04-17 | 携程旅游信息技术(上海)有限公司 | Videoconference initiating method, system, equipment and the storage medium of multi-party call |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102630004B (en) * | 2012-04-12 | 2015-03-11 | 华为技术有限公司 | Authentication method for video conference and related device |
CN104601835A (en) * | 2015-01-16 | 2015-05-06 | 四川联友电讯技术有限公司 | Face recognition based teleconference and conventioneer identification system and method |
CN104573460A (en) * | 2015-01-16 | 2015-04-29 | 四川联友电讯技术有限公司 | Fingerprint recognition based teleconference and participant identity recognition system and method |
US9955316B2 (en) * | 2015-07-20 | 2018-04-24 | Blackberry Limited | Indoor positioning systems and meeting room occupancy |
CN105681058A (en) * | 2016-04-25 | 2016-06-15 | 四川联友电讯技术有限公司 | Conventioneer identity verification method for fragmentized asynchronous conference system |
CN105915356A (en) * | 2016-04-25 | 2016-08-31 | 四川联友电讯技术有限公司 | Attending and withdrawing method for conference members of fragmented asynchronous conference system |
CN108933673B (en) * | 2017-05-25 | 2023-04-07 | 中兴通讯股份有限公司 | Video conference implementation method, terminal, server and storage medium |
-
2019
- 2019-11-15 CN CN201911119396.0A patent/CN112822142B/en active Active
-
2020
- 2020-11-12 WO PCT/CN2020/128444 patent/WO2021093819A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101047534A (en) * | 2007-04-09 | 2007-10-03 | 华为技术有限公司 | Method, device and system for customer active joining conference |
CN107920173A (en) * | 2017-12-28 | 2018-04-17 | 携程旅游信息技术(上海)有限公司 | Videoconference initiating method, system, equipment and the storage medium of multi-party call |
Also Published As
Publication number | Publication date |
---|---|
CN112822142A (en) | 2021-05-18 |
WO2021093819A1 (en) | 2021-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11816382B2 (en) | Collaboration systems with managed screen sharing | |
US6466252B1 (en) | Video conference system, and its reservation server, control unit, video conference terminal equipment, and storage medium stored therein program thereof | |
CN112822142B (en) | Conference access method, server, conference terminal and storage medium | |
US8452838B2 (en) | Multimodal service session establishing and providing method, and multimodal service session establishing and providing system, and control program for same | |
US8264520B2 (en) | Communication system, connection controller, terminal, and control method | |
JP3128680B2 (en) | Multipoint video conference system | |
CN109413362A (en) | A kind of call voice access video-meeting method and device | |
CN102893573B (en) | A kind of method and system of preset conference | |
CN109194906B (en) | Video conference authentication system, method, device and storage medium | |
NO322875B1 (en) | System and procedure for including participants in a conference call | |
CN102739668B (en) | Method for controlling external terminal to attend video conference | |
CN111263103A (en) | Teleconference method and system | |
US20110173263A1 (en) | Directing An Attendee Of A Collaboration Event To An Endpoint | |
KR20140098573A (en) | Apparatus and Methd for Providing Video Conference | |
CN112565665A (en) | Video conference control method and device, electronic equipment and storage medium | |
US8037170B2 (en) | Integrated application management system, apparatus and program, and integrated session management server, system, program and server chassis, and communication system, session management server and integration application server | |
US20140146128A1 (en) | System and method for providing video conference service | |
JPH10164240A (en) | Multi-point connection control system | |
US8015272B2 (en) | Integrated application management system, apparatus and program, and integrated session management server, system, program, and apparatus | |
US20220391452A1 (en) | Method for conducting an audio and/or video conference | |
US20100095223A1 (en) | Reconfiguring a collaboration event | |
CN112804267B (en) | Hierarchical conference processing method and device, electronic equipment and storage medium | |
CN116193062A (en) | Conference interconnection method and device, electronic equipment and storage medium | |
KR100283148B1 (en) | Multipoint Video Conferencing System via Multipoint Video Conferencing Terminal | |
CN114567747A (en) | Conference data transmission method and conference system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |