CN116743713A - Remote online paperless conference method and device based on Internet of Things - Google Patents

Remote online paperless conference method and device based on Internet of Things Download PDF

Info

Publication number
CN116743713A
CN116743713A CN202310768862.8A CN202310768862A CN116743713A CN 116743713 A CN116743713 A CN 116743713A CN 202310768862 A CN202310768862 A CN 202310768862A CN 116743713 A CN116743713 A CN 116743713A
Authority
CN
China
Prior art keywords
conference
information
internet
things
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310768862.8A
Other languages
Chinese (zh)
Other versions
CN116743713B (en
Inventor
姚礼超
耿晓丽
耿瀟源
姚佩均
姚沛辰
姚婳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gibit Information Technology Co ltd
Original Assignee
Shenzhen Gibit Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gibit Information Technology Co ltd filed Critical Shenzhen Gibit Information Technology Co ltd
Priority to CN202310768862.8A priority Critical patent/CN116743713B/en
Priority claimed from CN202310768862.8A external-priority patent/CN116743713B/en
Publication of CN116743713A publication Critical patent/CN116743713A/en
Application granted granted Critical
Publication of CN116743713B publication Critical patent/CN116743713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1045Proxies, e.g. for session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Abstract

The application relates to an artificial intelligence technology, and discloses a remote online paperless conference method based on the Internet of things, which comprises the following steps: connecting the MQTT message proxy server with the Internet of things equipment to obtain connecting equipment, creating a conference theme and subscribing the conference theme; generating a random key of the conference material, and encrypting the conference material to obtain encrypted material; verifying the level information of the participants to obtain personnel information; when meeting time begins, acquiring face information, comparing the face information with personnel information, if the comparison fails, comparing again, and if the failure times exceed three times, sending a comparison result to meeting personnel at a management level in the level information; if the comparison is successful, the corresponding encrypted data is sent to be decrypted, so as to obtain conference data and develop an online conference. The application further provides a remote online paperless conference device based on the Internet of things. The application can save the cost of the conference and improve the efficiency of the conference.

Description

Remote online paperless conference method and device based on Internet of things
Technical Field
The application relates to the technical field of artificial intelligence, in particular to a remote online paperless conference method and device based on the Internet of things.
Background
With the development and popularization of information technology, more and more enterprises and organizations begin to communicate and cooperate in a remote paperless conference manner. In order to avoid the limitation of the traditional conference time and space and the waste of paper and the difficulty in management, a method for remotely controlling the paperless conference is needed, the conference efficiency and quality are improved, and the resource waste and the environmental pollution can be avoided.
Traditional conferences require all participants to arrive at the same location and begin at a particular time. This may result in participants having to travel long distances or adjust their own schedules, and traditional conferences also have to pay for land rentals, food and beverage costs, and traffic costs, among other related costs. In practical application, a great deal of time, effort and financial resources are consumed, so that the efficiency of holding a meeting is reduced.
Disclosure of Invention
The application provides a remote online paperless conference method and device based on the Internet of things, and mainly aims to solve the problem of low efficiency when a conference is held offline.
In order to achieve the above purpose, the application provides a remote online paperless conference method based on the internet of things, which comprises the following steps:
an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
Optionally, the connecting the MQTT message proxy server with a preset internet of things device to obtain a connection device includes:
setting an address and a port number of the MQTT proxy server in the Internet of things equipment;
determining a device identifier of the internet of things device, wherein the device identifier can uniquely determine and identify one internet of things device;
and connecting the equipment identifier with the address and the port number to obtain the connecting equipment.
Optionally, the subscribing to the conference theme by using preset account information of the participants includes:
associating the account information with the connection device;
and setting the subscription theme in the account information as a conference theme.
Optionally, the generating a random string by using a preset random number generator includes:
determining character requirements of the random character string;
generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
mapping the random sequence to the corresponding character in the character set, and splicing the mapped characters into a character string at any time.
Optionally, the encrypting the conference material by using the data encryption algorithm through the random key to obtain encrypted material includes:
performing key expansion on the random key to obtain a multi-round key;
converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
and performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data.
Optionally, the verifying the level information of the participants using an authentication technique includes:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
and if the verification is passed, searching corresponding level information in the manager database according to the account information of the participants by using the account information.
Optionally, the comparing the face information with the person information includes:
acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
and calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold.
Optionally, the calculating the similarity between the person feature and the facial feature one by one includes:
calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
wherein x is a person feature, y is a facial feature, S x Covariance matrix of human features, S y Is the covariance matrix of the facial features.
Optionally, the decrypting the encrypted data to obtain conference data includes:
determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
In order to solve the above problems, the present application further provides a remote online paperless conference device based on the internet of things, the device comprising:
deploying the agent module: an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
an encrypted data module: generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
and (3) an authentication information module: verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
and (5) comparing the information module: when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
and a comparison module: and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
According to the embodiment of the application, the MQTT message proxy server is connected with the Internet of things equipment to obtain the connection equipment, create a conference theme and subscribe the conference theme, and the MQTT message proxy server is connected with the preset Internet of things equipment, so that better communication and control mechanisms are conveniently provided, meanwhile, the complexity and cost of the whole system are reduced, participants can easily participate in the conference remotely through the Internet by using the MQTT message proxy server, the time and economic cost are reduced, and meanwhile, information can be sent and received in real time, communication can be rapidly carried out in the conference, and the communication efficiency is improved; generating a random key of the conference data, encrypting the conference data to obtain encrypted data, and using the random character string as the key can ensure the randomness and independence of the key, and simultaneously can ensure the reliability and safety of an encryption algorithm; verifying the level information of the participants, acquiring personnel information, and checking the identity and authority of each participant by an identity verification technology to determine the level information; when meeting time begins, facial information is acquired, the facial information is compared with personnel information, if comparison fails, comparison is carried out again, and if the failure times exceed three times, comparison results are sent to meeting personnel at management levels in the level information, and multiple times of comparison can also help to eliminate accidental errors and uncertainties and improve the confidence coefficient of matching; if the comparison is successful, the corresponding encrypted data is sent to be decrypted, so as to obtain conference data and develop an online conference. Therefore, the remote online paperless conference method and device based on the Internet of things can solve the problem that the online conference efficiency is too low.
Drawings
Fig. 1 is a schematic flow chart of a remote online paperless conference method based on the internet of things according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a connection obtaining device according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for generating a random string according to an embodiment of the present application;
fig. 4 is a functional block diagram of a remote online paperless conference device based on the internet of things according to an embodiment of the present application;
the achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The embodiment of the application provides a remote online paperless conference method based on the Internet of things. The execution main body of the remote online paperless conference method based on the Internet of things comprises at least one of electronic equipment, such as a server side, a terminal and the like, which can be configured to execute the method provided by the embodiment of the application. In other words, the remote online paperless conference method based on the internet of things can be executed by software or hardware installed in a terminal device or a server device, and the software can be a blockchain platform. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Referring to fig. 1, a flow chart of a remote online paperless conference method based on the internet of things according to an embodiment of the present application is shown. In this embodiment, the remote online paperless conference method based on the internet of things includes:
s1, an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
in the embodiment of the application, the MQTT message proxy server is middleware software which serves as an intermediary for message transmission between MQTT clients. It receives messages sent from publishers (publishers) and routes them to subscribers (subscribers) and may also process the messages for caching, filtering, conversion, and storage.
Since the MQTT communication protocol is a lightweight, flexible and reliable communication protocol, the MQTT message-proxy server can mediate, enabling internet-of-things devices to send and receive messages to each other without requiring direct connection to each other. Therefore, the MQTT message proxy server needs to be connected with preset internet of things equipment, so that better communication and control mechanisms are conveniently provided, and meanwhile, the complexity and cost of the whole system are reduced.
In the embodiment of the present application, referring to fig. 2, the connecting the MQTT message proxy server with a preset internet of things device to obtain a connection device includes:
s21, setting an address and a port number of the MQTT proxy server in the Internet of things equipment;
s22, determining the equipment identifier of the Internet of things equipment, wherein the equipment identifier can uniquely determine and identify one Internet of things equipment;
and S23, connecting the equipment identifier with the address and the port number to obtain the connecting equipment.
In the embodiment of the application, the conference theme is created in the connection device by sending a release request, and the theme name and other relevant parameters to be created need to be specified in the request. For example, creating a conference theme named "/meeting_room_1" requires the following creation code:
# connection to MQTT connection device
client=mqtt.Client()
client.connect("broker.example.com",1883,60)
Creating topic and posting message
client.publish("/meeting_room_1","Hello,world!")
In detail, the subscribing to the conference theme by using the preset account information of the participants includes:
associating the account information with the connection device;
and setting the subscription theme in the account information as a conference theme.
Specifically, when new meeting information is available, the MQTT server will send messages to all accounts of the participants who have subscribed to the meeting topic, and the participants can receive the messages using the internet of things device and participate in the communication and discussion in the remote paperless meeting.
In addition, by using the MQTT message proxy server, participants can easily participate in the conference remotely through the Internet without going to the site, so that the time and the economic cost are reduced, meanwhile, information can be sent and received in real time, communication can be quickly carried out in the conference, the communication efficiency is improved, and the problems can be solved and decisions can be made in time.
S2, generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
in order to improve the security of conference materials, the conference materials are prevented from being acquired by analyzing an encryption algorithm, cracking a secret key or by violent cracking, a random character string is needed to be generated by a random number generator, and the random character string is used as the secret key to ensure the randomness and the independence of the secret key and the reliability and the security of the encryption algorithm because the generation process of the random number generator is unpredictable and unclonable.
In the embodiment of the application, the random number generator is a computer program or hardware device for generating a random number sequence, and the random number is an unpredictable number sequence and is widely used in cryptography and security applications.
In an embodiment of the present application, referring to fig. 3, the generating a random string by using a preset random number generator includes:
s31, determining character requirements of the random character strings;
s32, generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
s33, mapping the random sequence to the corresponding character in the character set, and splicing the mapped characters into a character string at any time.
In detail, the character requirements include specific requirements of the random character string to be generated, such as a character string length, which characters are included, and the like.
Specifically, the random number generator includes a True Random Number Generator (TRNG) and a Pseudo Random Number Generator (PRNG), which is used in the embodiments of the present application, and PRNG is widely used in paperless conferences because it is fast, low-cost, and can be run on conventional hardware, and TRNG is relatively costly and relatively slow.
In the embodiment of the application, the data encryption algorithm is a computer security technology and is used for protecting the privacy and the integrity of information, and the sensitive information is converted into a form which is very difficult to understand and crack by carrying out mathematical transformation, so that the data security is improved. Common data encryption algorithms include, but are not limited to, DES, 3DES, AES, DSA, ECC, and the like.
In the embodiment of the present application, the encrypting the conference material by using the data encryption algorithm through the random key to obtain the encrypted material includes:
performing key expansion on the random key to obtain a multi-round key;
converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
and performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data.
In detail, the random key is subjected to key expansion to obtain a multi-round key, a Rijndael key scheduling algorithm can be used for generating a plurality of round keys, the random key is divided into a plurality of words, and a series of transformation operations are performed on each word to generate the multi-round key.
In particular, the preset S-box is a substitution table for encryption that can map some inputs to specific outputs. Typically, the S-box will divide the input into several groups of bits and then replace each group of bits, which results in an output.
Additionally, the S-box plays a very important role in cryptography, and can effectively obfuscate data, thereby enhancing security of encryption algorithms. The design of S-boxes needs to meet a wide variety of properties, including robustness, nonlinearity, uniformity, etc., to ensure that the encryption algorithm has sufficient strength to resist various attacks.
Further, the shifting the transformation matrix according to the rows and the column confusion transformation, wherein the shifting of the rows refers to shifting the transformation matrix according to the rows, for example, the first row is stationary, the second row is circularly moved to the left by one byte, the third row is circularly moved to the left by two bytes, and the fourth row is circularly moved to the left by three bytes. This may increase the randomness of the data and prevent certain attacks. The column confusion refers to that each column in the transformation matrix after the row shift is subjected to linear transformation, so that confusion and disturbance on data are realized.
S3, verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
in the embodiment of the application, the authentication technology refers to confirming the identity of a person or entity to ensure that certain resources are authorized to be accessed, certain places are accessed or certain actions are executed.
Through authentication techniques, the identity and rights of each participant can be checked to determine the level information. This may include classifying the participants as normal participants, presenter, audience, etc. Only authenticated and authorized personnel can obtain a specific level of access rights, so that access to sensitive information can be effectively restricted and security can be improved.
In the embodiment of the present application, the step of verifying the level information of the participants by using an authentication technique includes:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
and if the verification is passed, searching corresponding level information in the manager database according to the account information of the participants by using the account information.
In detail, the preset administrator account is encoded, for example, the administrator account is encoded with Base64, binary data is converted into ASCII character strings, and the Base64 encoding is generally used in occasions needing text transmission, such as e-mail, HTTP transmission, and the like, so that the data can be ensured not to be damaged or modified in the transmission process.
S4, when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for comparison again if comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
in the embodiment of the application, the face information of the participants is obtained through the internet of things equipment, the face image of the participants is obtained through the cameras on the internet of things equipment, and the face image is used as the face information of the participants.
In the embodiment of the present application, the comparing the face information with the personnel information includes:
acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
and calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold.
In detail, the calculating the similarity between the person feature and the face feature one by one includes:
calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
wherein x is a person feature, y is a facial feature, S x Covariance matrix of human features, S y Is the covariance matrix of the facial features.
In the embodiment of the application, if the comparison fails, the facial information is re-acquired for re-comparison, and because the facial information acquired through the Internet of things possibly has shooting errors, the facial information does not accord with the original characteristics of the participants, and therefore, when the comparison fails, the facial information is re-acquired for re-comparison.
In detail, if the failure times exceed three times, the comparison result is sent to the meeting participants of the management level in the level information, when the comparison times exceed three times, the comparison result is accurately described, and when the three times of equal comparison fail, the current meeting participants are not matched with the actual meeting participants, and the comparison result is sent to the meeting participants of the management level.
Specifically, as the accuracy of the face recognition technology is affected by a plurality of factors, such as illumination, expression, gesture and the like, multiple comparisons can reduce the interference of the factors on the result, so that a more accurate and reliable recognition result is obtained. In addition, multiple comparisons can also help to eliminate accidental errors and uncertainties and improve the confidence of matching. In summary, performing three facial comparisons can effectively improve the accuracy and reliability of the comparison results.
And S5, if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conference by using the conference data.
In an online conference, participants need to share some sensitive information, files or discussion contents, etc., and if these contents are not properly protected, they may be obtained by unauthorized persons, resulting in information leakage and security problems.
Therefore, in the embodiment of the application, the corresponding encryption data is required to be sent according to the level information, so that meeting data acquired by all participants are ensured to be in accordance with the level information, the safety and the privacy of the meeting information are ensured, and the meeting content is protected from unauthorized access and utilization.
In the embodiment of the present application, the decrypting the encrypted data to obtain conference data includes:
determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
In detail, the decryption tool is a computer program for restoring encrypted data to its original form. These tools typically use the corresponding decryption algorithm and the correct key to perform the decryption operation, common decryption tools include, but are not limited to OpenSSL, gnuPG, axCrypt, cryptomator, etc.
Specifically, the decryption tool for determining the corresponding decryption tool according to the encryption algorithm, for example, the decryption tool for the algorithm of AES encryption may be OpenSSL, and the decryption tool for the algorithm of Blowfish encryption may be bouncostle, cryptoplib, and the like.
Since encryption is used to protect sensitive information and secret data, unauthorized access is prevented. In order to obtain readable conference materials, the encrypted data needs to be decrypted, and the encrypted data is restored into a readable form such as characters.
Fig. 4 is a functional block diagram of a remote online paperless conference device based on the internet of things according to an embodiment of the present application.
The remote online paperless conference device 100 based on the internet of things can be installed in electronic equipment. According to the functions implemented, the remote online paperless conference device 100 based on the internet of things may include a deployment agent module 101, an encrypted data module 102, a verification information module 103, a comparison information module 104, and a comparison result module 105. The module of the application, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
the deployment agent module 101: an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
the keying material module 102: generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
the verification information module 103: verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
the comparison information module 104: when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
the comparison module 105: and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
In detail, each module in the remote online paperless conference device 100 based on the internet of things in the embodiment of the present application adopts the same technical means as the remote online paperless conference method based on the internet of things described in the above fig. 1 to 3 when in use, and can produce the same technical effects, which are not repeated here.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. Multiple units or means as set forth in the system embodiments may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present application and not for limiting the same, and although the present application has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present application without departing from the spirit and scope of the technical solution of the present application.

Claims (10)

1. The remote online paperless conference method based on the Internet of things is characterized by comprising the following steps of:
an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
2. The method for online remote paperless conferencing based on the internet of things of claim 1, wherein the connecting the MQTT message proxy server with a preset internet of things device to obtain a connection device comprises:
setting an address and a port number of the MQTT proxy server in the Internet of things equipment;
determining a device identifier of the internet of things device, wherein the device identifier can uniquely determine and identify one internet of things device;
and connecting the equipment identifier with the address and the port number to obtain the connecting equipment.
3. The method of claim 1, wherein subscribing to the conference theme by using preset account information of participants, comprises:
associating the account information with the connection device;
and setting the subscription theme in the account information as a conference theme.
4. The internet of things-based remote online paperless meeting method of claim 1, wherein the generating a random string using a preset random number generator comprises:
determining character requirements of the random character string;
generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
mapping the random sequence to the corresponding character in the character set, and splicing the mapped characters into a character string at any time.
5. The method for remotely online paperless conferencing based on the internet of things of claim 1, wherein encrypting the conference material with the random key using a data encryption algorithm to obtain encrypted material comprises:
performing key expansion on the random key to obtain a multi-round key;
converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
and performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data.
6. The internet of things-based remote online paperless conferencing method as claimed in claim 1 wherein said verifying said participant's level information using an authentication technique includes:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
and if the verification is passed, searching corresponding level information in the manager database according to the account information of the participants by using the account information.
7. The internet of things-based remote online paperless meeting method of claim 1, wherein the comparing the face information with the person information comprises:
acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
and calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold.
8. The internet of things-based remote online paperless meeting method of claim 7 wherein said computing similarity of said person features to said facial features one by one comprises:
calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
wherein x is a person feature, y is a facial feature, S x Covariance matrix of human features, S y Is the covariance matrix of the facial features.
9. The internet of things-based remote online paperless conferencing method in accordance with any one of claims 1-8, wherein decrypting the encrypted material to obtain the conference material includes:
determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
10. A remote online paperless conference device based on the internet of things, the device comprising:
deploying the agent module: an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
an encrypted data module: generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
and (3) an authentication information module: verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
and (5) comparing the information module: when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
and a comparison module: and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
CN202310768862.8A 2023-06-27 Remote online paperless conference method and device based on Internet of things Active CN116743713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310768862.8A CN116743713B (en) 2023-06-27 Remote online paperless conference method and device based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310768862.8A CN116743713B (en) 2023-06-27 Remote online paperless conference method and device based on Internet of things

Publications (2)

Publication Number Publication Date
CN116743713A true CN116743713A (en) 2023-09-12
CN116743713B CN116743713B (en) 2024-04-30

Family

ID=

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116961907A (en) * 2023-09-19 2023-10-27 广州市艾索技术有限公司 Distributed paperless conference data encryption transmission protection method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198536A (en) * 2009-02-27 2010-09-09 Brother Ind Ltd User authentication device, conference system, user authentication method, and user authentication program
KR101728638B1 (en) * 2016-08-29 2017-04-19 성균관대학교산학협력단 Adaptive messaging communication system and method for the internet of things using mqtt on wireless networks
CN110268690A (en) * 2017-02-06 2019-09-20 Pcms控股公司 Protect the equipment communication in Internet of Things
US20190341050A1 (en) * 2018-05-04 2019-11-07 Microsoft Technology Licensing, Llc Computerized intelligent assistant for conferences
CN113364671A (en) * 2021-06-28 2021-09-07 刘文平 Cross-platform office real-time communication system capable of saving flow and electric quantity
US20220138634A1 (en) * 2020-10-30 2022-05-05 International Business Machines Corporation Meeting room selection based on internet of things privacy level
CN114510703A (en) * 2022-04-20 2022-05-17 尚班(北京)网络科技有限公司 Identity authentication method and communication system of Internet of things equipment
US20220200816A1 (en) * 2020-11-24 2022-06-23 Beijing Boe Display Technology Co., Ltd. Conference system, and method and device of pushing conference information
CN115580700A (en) * 2022-09-15 2023-01-06 海南视联通信技术有限公司 Terminal quitting method and device, electronic equipment and storage medium
CN116248721A (en) * 2023-02-09 2023-06-09 深圳开鸿数字产业发展有限公司 Management method and device of Internet of things equipment, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198536A (en) * 2009-02-27 2010-09-09 Brother Ind Ltd User authentication device, conference system, user authentication method, and user authentication program
KR101728638B1 (en) * 2016-08-29 2017-04-19 성균관대학교산학협력단 Adaptive messaging communication system and method for the internet of things using mqtt on wireless networks
CN110268690A (en) * 2017-02-06 2019-09-20 Pcms控股公司 Protect the equipment communication in Internet of Things
US20190341050A1 (en) * 2018-05-04 2019-11-07 Microsoft Technology Licensing, Llc Computerized intelligent assistant for conferences
US20220138634A1 (en) * 2020-10-30 2022-05-05 International Business Machines Corporation Meeting room selection based on internet of things privacy level
US20220200816A1 (en) * 2020-11-24 2022-06-23 Beijing Boe Display Technology Co., Ltd. Conference system, and method and device of pushing conference information
CN113364671A (en) * 2021-06-28 2021-09-07 刘文平 Cross-platform office real-time communication system capable of saving flow and electric quantity
CN114510703A (en) * 2022-04-20 2022-05-17 尚班(北京)网络科技有限公司 Identity authentication method and communication system of Internet of things equipment
CN115580700A (en) * 2022-09-15 2023-01-06 海南视联通信技术有限公司 Terminal quitting method and device, electronic equipment and storage medium
CN116248721A (en) * 2023-02-09 2023-06-09 深圳开鸿数字产业发展有限公司 Management method and device of Internet of things equipment, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116961907A (en) * 2023-09-19 2023-10-27 广州市艾索技术有限公司 Distributed paperless conference data encryption transmission protection method
CN116961907B (en) * 2023-09-19 2023-12-29 广州市艾索技术有限公司 Distributed paperless conference data encryption transmission protection method

Similar Documents

Publication Publication Date Title
Zhao et al. Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
US7213147B2 (en) Methods and apparatus for managing secure collaborative transactions
CN113364576B (en) Data encryption evidence storing and sharing method based on block chain
CN101569132B (en) Systems and methods for distributing and securing data
US10630486B2 (en) Multiparty computation for approving digital transaction by utilizing groups of key shares
JPH0816104A (en) Method and device for verifying information security with dispersed collator
US10637670B2 (en) Multiparty computation of a digital signature of a transaction with advanced approval system
US10887110B2 (en) Method for digital signing with multiple devices operating multiparty computation with a split key
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
JP2023551458A (en) Key regeneration in blockchain networks via OPRF
CN112633884B (en) Local private key recovery method and device for transaction main body identity certificate
CN110266490B (en) Keyword ciphertext generation method and device of cloud storage data
US8914640B2 (en) System for exchanging data between at least one sender and one receiver
CN116743713B (en) Remote online paperless conference method and device based on Internet of things
CN116743713A (en) Remote online paperless conference method and device based on Internet of Things
Zhou et al. A survey of security aggregation
CN112637442A (en) Method and device for encrypting circulating image by cloud server and local end
JP2021148850A (en) Information processing system, information processing method, information processing program, secure computing system, secure computing method, and secure computing program
Babenko et al. Distributed E-voting system based on blind intermediaries using homomorphic encryption
Wu et al. Verified CSAC-based CP-ABE access control of cloud storage in SWIM
CN116506104B (en) Method and system for information security interaction of different departments based on cross-chain blockchain
RU2782153C2 (en) Method and system for organization of protected information exchange, using blockchain technology and distributed data storage systems
CN113746829B (en) Multi-source data association method, device, equipment and storage medium
Deng et al. Design of identity authentication scheme for dynamic service command system based on SM2 algorithm and blockchain technology
Zhu Research on Secure Storage of Network Data Based on Cloud Computing Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant