CN116743713B - Remote online paperless conference method and device based on Internet of things - Google Patents

Remote online paperless conference method and device based on Internet of things Download PDF

Info

Publication number
CN116743713B
CN116743713B CN202310768862.8A CN202310768862A CN116743713B CN 116743713 B CN116743713 B CN 116743713B CN 202310768862 A CN202310768862 A CN 202310768862A CN 116743713 B CN116743713 B CN 116743713B
Authority
CN
China
Prior art keywords
conference
information
preset
random
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310768862.8A
Other languages
Chinese (zh)
Other versions
CN116743713A (en
Inventor
姚礼超
耿晓丽
耿瀟源
姚佩均
姚沛辰
姚婳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gibit Information Technology Co ltd
Original Assignee
Shenzhen Gibit Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gibit Information Technology Co ltd filed Critical Shenzhen Gibit Information Technology Co ltd
Priority to CN202310768862.8A priority Critical patent/CN116743713B/en
Publication of CN116743713A publication Critical patent/CN116743713A/en
Application granted granted Critical
Publication of CN116743713B publication Critical patent/CN116743713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1045Proxies, e.g. for session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to an artificial intelligence technology, and discloses a remote online paperless conference method based on the Internet of things, which comprises the following steps: connecting the MQTT message proxy server with the Internet of things equipment to obtain connecting equipment, creating a conference theme and subscribing the conference theme; generating a random key of the conference material, and encrypting the conference material to obtain encrypted material; verifying the level information of the participants to obtain personnel information; when meeting time begins, acquiring face information, comparing the face information with personnel information, if the comparison fails, comparing again, and if the failure times exceed three times, sending a comparison result to meeting personnel at a management level in the level information; if the comparison is successful, the corresponding encrypted data is sent to be decrypted, so as to obtain conference data and develop an online conference. The invention further provides a remote online paperless conference device based on the Internet of things. The invention can save the cost of the conference and improve the efficiency of the conference.

Description

Remote online paperless conference method and device based on Internet of things
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a remote online paperless conference method and device based on the Internet of things.
Background
With the development and popularization of information technology, more and more enterprises and organizations begin to communicate and cooperate in a remote paperless conference manner. In order to avoid the limitation of the traditional conference time and space and the waste of paper and the difficulty in management, a method for remotely controlling the paperless conference is needed, the conference efficiency and quality are improved, and the resource waste and the environmental pollution can be avoided.
Traditional conferences require all participants to arrive at the same location and begin at a particular time. This may result in participants having to travel long distances or adjust their own schedules, and traditional conferences also have to pay for land rentals, food and beverage costs, and traffic costs, among other related costs. In practical application, a great deal of time, effort and financial resources are consumed, so that the efficiency of holding a meeting is reduced.
Disclosure of Invention
The invention provides a remote online paperless conference method and device based on the Internet of things, and mainly aims to solve the problem of low efficiency when a conference is held offline.
In order to achieve the above purpose, the invention provides a remote online paperless conference method based on the internet of things, which comprises the following steps:
An MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
Generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
Verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
Optionally, the connecting the MQTT message proxy server with a preset internet of things device to obtain a connection device includes:
Setting an address and a port number of the MQTT proxy server in the Internet of things equipment;
determining a device identifier of the internet of things device, wherein the device identifier can uniquely determine and identify one internet of things device;
and connecting the equipment identifier with the address and the port number to obtain the connecting equipment.
Optionally, the subscribing to the conference theme by using preset account information of the participants includes:
associating the account information with the connection device;
And setting the subscription theme in the account information as a conference theme.
Optionally, the generating a random string by using a preset random number generator includes:
Determining character requirements of the random character string;
Generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
Mapping the random sequence to the corresponding character in the character set, and splicing the mapped characters into a random character string.
Optionally, the encrypting the conference material by using the data encryption algorithm through the random key to obtain encrypted material includes:
performing key expansion on the random key to obtain a multi-round key;
Converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
And performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data.
Optionally, the verifying the level information of the participants using an authentication technique includes:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
And if the verification is passed, searching corresponding level information in the manager database according to the account information of the participants by using the account information.
Optionally, the comparing the face information with the person information includes:
Acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
And calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold.
Optionally, the calculating the similarity between the person feature and the facial feature one by one includes:
Calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
Where x is the person feature, y is the facial feature, S x is the covariance matrix of the person feature, and S y is the covariance matrix of the facial feature.
Optionally, the decrypting the encrypted data to obtain conference data includes:
Determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
In order to solve the above problems, the present invention further provides a remote online paperless conference device based on the internet of things, the device comprising:
Deploying the agent module: an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
an encrypted data module: generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
and (3) an authentication information module: verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
and (5) comparing the information module: when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
and a comparison module: and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
According to the embodiment of the invention, the MQTT message proxy server is connected with the Internet of things equipment to obtain the connection equipment, create a conference theme and subscribe the conference theme, and the MQTT message proxy server is connected with the preset Internet of things equipment, so that better communication and control mechanisms are conveniently provided, meanwhile, the complexity and cost of the whole system are reduced, participants can easily participate in the conference remotely through the Internet by using the MQTT message proxy server, the time and economic cost are reduced, and meanwhile, information can be sent and received in real time, communication can be rapidly carried out in the conference, and the communication efficiency is improved; generating a random key of the conference data, encrypting the conference data to obtain encrypted data, and using the random character string as the key can ensure the randomness and independence of the key, and simultaneously can ensure the reliability and safety of an encryption algorithm; verifying the level information of the participants, acquiring personnel information, and checking the identity and authority of each participant by an identity verification technology to determine the level information; when meeting time begins, facial information is acquired, the facial information is compared with personnel information, if comparison fails, comparison is carried out again, and if the failure times exceed three times, comparison results are sent to meeting personnel at management levels in the level information, and multiple times of comparison can also help to eliminate accidental errors and uncertainties and improve the confidence coefficient of matching; if the comparison is successful, the corresponding encrypted data is sent to be decrypted, so as to obtain conference data and develop an online conference. Therefore, the remote online paperless conference method and device based on the Internet of things can solve the problem that the online conference efficiency is too low.
Drawings
Fig. 1 is a schematic flow chart of a remote online paperless conference method based on the internet of things according to an embodiment of the present invention;
Fig. 2 is a schematic flow chart of a connection obtaining device according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for generating a random string according to an embodiment of the present invention;
Fig. 4 is a functional block diagram of a remote online paperless conference device based on the internet of things according to an embodiment of the present invention;
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the application provides a remote online paperless conference method based on the Internet of things. The execution main body of the remote online paperless conference method based on the Internet of things comprises at least one of electronic equipment, such as a server side, a terminal and the like, which can be configured to execute the method provided by the embodiment of the application. In other words, the remote online paperless conference method based on the internet of things can be executed by software or hardware installed in a terminal device or a server device, and the software can be a blockchain platform. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Referring to fig. 1, a flow chart of a remote online paperless conference method based on the internet of things according to an embodiment of the present invention is shown. In this embodiment, the remote online paperless conference method based on the internet of things includes:
s1, an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
In the embodiment of the invention, the MQTT message proxy server is middleware software which serves as an intermediary for message transmission between MQTT clients. It receives messages sent from publishers (Publisher) and routes them to subscribers (subscribers) while also buffering, filtering, converting, and storing the messages.
Since the MQTT communication protocol is a lightweight, flexible and reliable communication protocol, the MQTT message-proxy server can mediate, enabling internet-of-things devices to send and receive messages to each other without requiring direct connection to each other. Therefore, the MQTT message proxy server needs to be connected with preset internet of things equipment, so that better communication and control mechanisms are conveniently provided, and meanwhile, the complexity and cost of the whole system are reduced.
In the embodiment of the present invention, referring to fig. 2, the connecting the MQTT message proxy server with a preset internet of things device to obtain a connection device includes:
S21, setting an address and a port number of the MQTT proxy server in the Internet of things equipment;
S22, determining the equipment identifier of the Internet of things equipment, wherein the equipment identifier can uniquely determine and identify one Internet of things equipment;
And S23, connecting the equipment identifier with the address and the port number to obtain the connecting equipment.
In the embodiment of the invention, the conference theme is created in the connection device by sending a release request, and the theme name and other relevant parameters to be created need to be specified in the request. For example, creating a conference theme named "/meeting_room_1" requires the following creation code:
# connection to MQTT connection device
client=mqtt.Client()
client.connect("broker.example.com",1883,60)
Creating topic and posting message
client.publish("/meeting_room_1","Hello,world!")
In detail, the subscribing to the conference theme by using the preset account information of the participants includes:
associating the account information with the connection device;
And setting the subscription theme in the account information as a conference theme.
Specifically, when new meeting information is available, the MQTT server will send messages to all accounts of the participants who have subscribed to the meeting topic, and the participants can receive the messages using the internet of things device and participate in the communication and discussion in the remote paperless meeting.
In addition, by using the MQTT message proxy server, participants can easily participate in the conference remotely through the Internet without going to the site, so that the time and the economic cost are reduced, meanwhile, information can be sent and received in real time, communication can be quickly carried out in the conference, the communication efficiency is improved, and the problems can be solved and decisions can be made in time.
S2, generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
In order to improve the security of conference materials, the conference materials are prevented from being acquired by analyzing an encryption algorithm, cracking a secret key or by violent cracking, a random character string is needed to be generated by a random number generator, and the random character string is used as the secret key to ensure the randomness and the independence of the secret key and the reliability and the security of the encryption algorithm because the generation process of the random number generator is unpredictable and unclonable.
In the embodiment of the invention, the random number generator is a computer program or hardware device for generating a random number sequence, and the random number is an unpredictable number sequence and is widely used in cryptography and security applications.
In an embodiment of the present invention, referring to fig. 3, the generating a random string by using a preset random number generator includes:
S31, determining character requirements of the random character strings;
s32, generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
s33, mapping the random sequence to the corresponding character in the character set, and splicing the mapped characters into a random character string.
In detail, the character requirements include specific requirements of the random character string to be generated, such as a character string length, which characters are included, and the like.
Specifically, the random number generator includes a True Random Number Generator (TRNG) and a Pseudo Random Number Generator (PRNG), which is used in the embodiments of the present invention, and PRNG is widely used in paperless conferences because it is fast, low-cost, and can be run on conventional hardware, and TRNG is relatively costly and relatively slow.
In the embodiment of the invention, the data encryption algorithm is a computer security technology and is used for protecting the privacy and the integrity of information, and the sensitive information is converted into a form which is very difficult to understand and crack by carrying out mathematical transformation, so that the data security is improved. Common data encryption algorithms include, but are not limited to, DES, 3DES, AES, DSA, ECC, and the like.
In the embodiment of the present invention, the encrypting the conference material by using the data encryption algorithm through the random key to obtain the encrypted material includes:
performing key expansion on the random key to obtain a multi-round key;
Converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
And performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data.
In detail, the random key is subjected to key expansion to obtain a multi-round key, a Rijndael key scheduling algorithm can be used for generating a plurality of round keys, the random key is divided into a plurality of words, and a series of transformation operations are performed on each word to generate the multi-round key.
In particular, the preset S-box is a substitution table for encryption that can map some inputs to specific outputs. Typically, the S-box will divide the input into several groups of bits and then replace each group of bits, which results in an output.
Additionally, the S-box plays a very important role in cryptography, and can effectively obfuscate data, thereby enhancing security of encryption algorithms. The design of S-boxes needs to meet a wide variety of properties, including robustness, nonlinearity, uniformity, etc., to ensure that the encryption algorithm has sufficient strength to resist various attacks.
Further, the shifting the transformation matrix according to the rows and the column confusion transformation, wherein the shifting of the rows refers to shifting the transformation matrix according to the rows, for example, the first row is stationary, the second row is circularly moved to the left by one byte, the third row is circularly moved to the left by two bytes, and the fourth row is circularly moved to the left by three bytes. This may increase the randomness of the data and prevent certain attacks. The column confusion refers to that each column in the transformation matrix after the row shift is subjected to linear transformation, so that confusion and disturbance on data are realized.
S3, verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
In the embodiment of the invention, the authentication technology refers to confirming the identity of a person or entity to ensure that certain resources are authorized to be accessed, certain places are accessed or certain actions are executed.
Through authentication techniques, the identity and rights of each participant can be checked to determine the level information. This may include classifying the participants as normal participants, presenter, audience, etc. Only authenticated and authorized personnel can obtain a specific level of access rights, so that access to sensitive information can be effectively restricted and security can be improved.
In the embodiment of the present invention, the step of verifying the level information of the participants by using an authentication technique includes:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
And if the verification is passed, searching corresponding level information in the manager database according to the account information of the participants by using the account information.
In detail, the preset administrator account is encoded, for example, the administrator account is encoded with Base64, binary data is converted into ASCII character strings, and the Base64 encoding is generally used in occasions needing text transmission, such as e-mail, HTTP transmission, and the like, so that the data can be ensured not to be damaged or modified in the transmission process.
S4, when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for comparison again if comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
In the embodiment of the invention, the face information of the participants is obtained through the internet of things equipment, the face image of the participants is obtained through the cameras on the internet of things equipment, and the face image is used as the face information of the participants.
In the embodiment of the present invention, the comparing the face information with the personnel information includes:
Acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
And calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold.
In detail, the calculating the similarity between the person feature and the face feature one by one includes:
Calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
Where x is the person feature, y is the facial feature, S x is the covariance matrix of the person feature, and S y is the covariance matrix of the facial feature.
In the embodiment of the invention, if the comparison fails, the facial information is re-acquired for re-comparison, and because the facial information acquired through the Internet of things possibly has shooting errors, the facial information does not accord with the original characteristics of the participants, and therefore, when the comparison fails, the facial information is re-acquired for re-comparison.
In detail, if the failure times exceed three times, the comparison result is sent to the meeting participants of the management level in the level information, when the comparison times exceed three times, the comparison result is accurately described, and when the three times of equal comparison fail, the current meeting participants are not matched with the actual meeting participants, and the comparison result is sent to the meeting participants of the management level.
Specifically, as the accuracy of the face recognition technology is affected by a plurality of factors, such as illumination, expression, gesture and the like, multiple comparisons can reduce the interference of the factors on the result, so that a more accurate and reliable recognition result is obtained. In addition, multiple comparisons can also help to eliminate accidental errors and uncertainties and improve the confidence of matching. In summary, performing three facial comparisons can effectively improve the accuracy and reliability of the comparison results.
And S5, if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conference by using the conference data.
In an online conference, participants need to share some sensitive information, files or discussion contents, etc., and if these contents are not properly protected, they may be obtained by unauthorized persons, resulting in information leakage and security problems.
Therefore, in the embodiment of the invention, the corresponding encryption data is required to be sent according to the level information, so that meeting data acquired by all participants are ensured to be in accordance with the level information, the safety and the privacy of the meeting information are ensured, and the meeting content is protected from unauthorized access and utilization.
In the embodiment of the present invention, the decrypting the encrypted data to obtain conference data includes:
Determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
In detail, the decryption tool is a computer program for restoring encrypted data to its original form. These tools typically use the corresponding decryption algorithm and the correct key to perform the decryption operation, common decryption tools include, but are not limited to OpenSSL, gnuPG, axCrypt, cryptomator and the like.
Specifically, the decryption tool for determining the corresponding decryption tool according to the encryption algorithm, for example, the decryption tool for the algorithm of AES encryption may be OpenSSL, the decryption tool for the algorithm of Blowfish encryption may be BouncyCastle, cryptlib, and so on.
Since encryption is used to protect sensitive information and secret data, unauthorized access is prevented. In order to obtain readable conference materials, the encrypted data needs to be decrypted, and the encrypted data is restored into a readable form such as characters.
Fig. 4 is a functional block diagram of a remote online paperless conference device based on the internet of things according to an embodiment of the present invention.
The remote online paperless conference device 100 based on the internet of things can be installed in electronic equipment. According to the functions implemented, the remote online paperless conference device 100 based on the internet of things may include a deployment agent module 101, an encrypted data module 102, a verification information module 103, a comparison information module 104, and a comparison result module 105. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
The deployment agent module 101: an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
The keying material module 102: generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
the verification information module 103: verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
the comparison information module 104: when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
the comparison module 105: and if the comparison is successful, transmitting corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data.
In detail, each module in the remote online paperless conference device 100 based on the internet of things in the embodiment of the present invention adopts the same technical means as the remote online paperless conference method based on the internet of things described in the above fig. 1 to 3 when in use, and can produce the same technical effects, which are not repeated here.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The blockchain (Blockchain), essentially a de-centralized database, is a string of data blocks that are generated in association using cryptographic methods, each of which contains information from a batch of network transactions for verifying the validity (anti-counterfeit) of its information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Wherein artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) is the theory, method, technique, and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. Multiple units or means as set forth in the system embodiments may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (4)

1. The remote online paperless conference method based on the Internet of things is characterized by comprising the following steps of:
An MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
Generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
The generating a random character string by using a preset random number generator comprises the following steps:
Determining character requirements of the random character string;
Generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
mapping the random sequence to the corresponding character in the character set, and splicing the mapped character into a random character string;
the encrypting the conference material by the random key by using the data encryption algorithm to obtain encrypted material comprises the following steps:
performing key expansion on the random key to obtain a multi-round key;
Converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data;
Verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
The verifying the level information of the participants by using the identity verification technology comprises the following steps:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
if the verification is passed, searching corresponding level information in an administrator database according to account information of the participants by using the account information;
when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
the comparing the face information with the person information includes:
Acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold;
The step of calculating the similarity between the person feature and the facial feature one by one includes:
Calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
Wherein x is a person feature, y is a face feature, S x is a covariance matrix of the person feature, and S y is a covariance matrix of the face feature;
if the comparison is successful, sending corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data;
the decrypting the encrypted data to obtain conference data comprises the following steps:
Determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
2. The method for online remote paperless conferencing based on the internet of things of claim 1, wherein the connecting the MQTT message proxy server with a preset internet of things device to obtain a connection device comprises:
Setting an address and a port number of the MQTT proxy server in the Internet of things equipment;
determining a device identifier of the internet of things device, wherein the device identifier can uniquely determine and identify one internet of things device;
and connecting the equipment identifier with the address and the port number to obtain the connecting equipment.
3. The method of claim 1, wherein subscribing to the conference theme by using preset account information of participants, comprises:
associating the account information with the connection device;
And setting the subscription theme in the account information as a conference theme.
4. A remote online paperless conference device based on the internet of things, the device comprising:
Deploying the agent module: an MQTT message proxy server is deployed, the MQTT message proxy server is connected with preset Internet of things equipment to obtain connection equipment, a conference theme is created in the connection equipment, and the conference theme is subscribed by using account information of preset participants;
an encrypted data module: generating a random character string by using a preset random number generator, using the random character string as a random key of preset conference data, and encrypting the conference data by using a data encryption algorithm through the random key to obtain encrypted data;
The generating a random character string by using a preset random number generator comprises the following steps:
Determining character requirements of the random character string;
Generating a random sequence according to the character requirement by utilizing a random function in a random number generator, and determining a corresponding character set according to the random sequence;
mapping the random sequence to the corresponding character in the character set, and splicing the mapped character into a random character string;
the encrypting the conference material by the random key by using the data encryption algorithm to obtain encrypted material comprises the following steps:
performing key expansion on the random key to obtain a multi-round key;
Converting the conference data into a conference matrix, and converting the conference matrix into a transformation matrix by using a preset S box;
performing row shift and column confusion transformation on the transformation matrix to obtain an encryption matrix;
performing exclusive OR operation on matrix elements in the encryption matrix and the multi-round key to obtain encrypted data;
and (3) an authentication information module: verifying the level information of the participants by using an identity verification technology, and acquiring the personnel information of the participants corresponding to the level information;
The verifying the level information of the participants by using the identity verification technology comprises the following steps:
coding a preset manager account to obtain an account code;
the account code is sent to a server for verification through a preset transmission protocol;
if the verification is not passed, returning to the token with verification failure and returning to the step of coding the preset administrator account;
if the verification is passed, searching corresponding level information in an administrator database according to account information of the participants by using the account information;
and (5) comparing the information module: when meeting time begins, acquiring the face information of the meeting participants through the Internet of things equipment, comparing the face information with the personnel information, re-acquiring the face information for re-comparison if the comparison fails, and sending a comparison result to the meeting participants at the management level in the level information if the failure times exceed three times;
the comparing the face information with the person information includes:
Acquiring a person photo in the person information;
extracting feature vectors from the personnel photo and the facial information to obtain personnel features and facial features;
calculating the similarity between the personnel features and the facial features one by one, returning to failure in comparison if the similarity is smaller than a preset similarity threshold, and returning to success in comparison if the similarity is larger than the preset similarity threshold;
The step of calculating the similarity between the person feature and the facial feature one by one includes:
Calculating the similarity between the person feature and the facial feature one by using the following similarity formula:
Wherein x is a person feature, y is a face feature, S x is a covariance matrix of the person feature, and S y is a covariance matrix of the face feature;
And a comparison module: if the comparison is successful, sending corresponding encrypted data according to the level information, decrypting the encrypted data to obtain conference data, and carrying out online conferences by using the conference data;
the decrypting the encrypted data to obtain conference data comprises the following steps:
Determining an encryption algorithm when the encrypted data is encrypted;
determining a corresponding decryption tool according to the encryption algorithm, and inputting the encrypted data into the decryption tool;
and decrypting the encrypted data by using the multi-round key according to the prompt of the decryption tool to obtain conference data.
CN202310768862.8A 2023-06-27 2023-06-27 Remote online paperless conference method and device based on Internet of things Active CN116743713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310768862.8A CN116743713B (en) 2023-06-27 2023-06-27 Remote online paperless conference method and device based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310768862.8A CN116743713B (en) 2023-06-27 2023-06-27 Remote online paperless conference method and device based on Internet of things

Publications (2)

Publication Number Publication Date
CN116743713A CN116743713A (en) 2023-09-12
CN116743713B true CN116743713B (en) 2024-04-30

Family

ID=87913170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310768862.8A Active CN116743713B (en) 2023-06-27 2023-06-27 Remote online paperless conference method and device based on Internet of things

Country Status (1)

Country Link
CN (1) CN116743713B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116961907B (en) * 2023-09-19 2023-12-29 广州市艾索技术有限公司 Distributed paperless conference data encryption transmission protection method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198536A (en) * 2009-02-27 2010-09-09 Brother Ind Ltd User authentication device, conference system, user authentication method, and user authentication program
KR101728638B1 (en) * 2016-08-29 2017-04-19 성균관대학교산학협력단 Adaptive messaging communication system and method for the internet of things using mqtt on wireless networks
CN110268690A (en) * 2017-02-06 2019-09-20 Pcms控股公司 Protect the equipment communication in Internet of Things
CN113364671A (en) * 2021-06-28 2021-09-07 刘文平 Cross-platform office real-time communication system capable of saving flow and electric quantity
CN114510703A (en) * 2022-04-20 2022-05-17 尚班(北京)网络科技有限公司 Identity authentication method and communication system of Internet of things equipment
CN115580700A (en) * 2022-09-15 2023-01-06 海南视联通信技术有限公司 Terminal quitting method and device, electronic equipment and storage medium
CN116248721A (en) * 2023-02-09 2023-06-09 深圳开鸿数字产业发展有限公司 Management method and device of Internet of things equipment, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10867610B2 (en) * 2018-05-04 2020-12-15 Microsoft Technology Licensing, Llc Computerized intelligent assistant for conferences
US11727318B2 (en) * 2020-10-30 2023-08-15 International Business Machines Corporation Meeting room selection based on internet of things privacy level
CN114793483A (en) * 2020-11-24 2022-07-26 京东方科技集团股份有限公司 Conference system, conference information pushing method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198536A (en) * 2009-02-27 2010-09-09 Brother Ind Ltd User authentication device, conference system, user authentication method, and user authentication program
KR101728638B1 (en) * 2016-08-29 2017-04-19 성균관대학교산학협력단 Adaptive messaging communication system and method for the internet of things using mqtt on wireless networks
CN110268690A (en) * 2017-02-06 2019-09-20 Pcms控股公司 Protect the equipment communication in Internet of Things
CN113364671A (en) * 2021-06-28 2021-09-07 刘文平 Cross-platform office real-time communication system capable of saving flow and electric quantity
CN114510703A (en) * 2022-04-20 2022-05-17 尚班(北京)网络科技有限公司 Identity authentication method and communication system of Internet of things equipment
CN115580700A (en) * 2022-09-15 2023-01-06 海南视联通信技术有限公司 Terminal quitting method and device, electronic equipment and storage medium
CN116248721A (en) * 2023-02-09 2023-06-09 深圳开鸿数字产业发展有限公司 Management method and device of Internet of things equipment, computer equipment and storage medium

Also Published As

Publication number Publication date
CN116743713A (en) 2023-09-12

Similar Documents

Publication Publication Date Title
Zhao et al. Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
CN113364576B (en) Data encryption evidence storing and sharing method based on block chain
US7213147B2 (en) Methods and apparatus for managing secure collaborative transactions
US20190238340A1 (en) Method, apparatus, node, signature device and system for generating block of blockchain
US10630486B2 (en) Multiparty computation for approving digital transaction by utilizing groups of key shares
US10887110B2 (en) Method for digital signing with multiple devices operating multiparty computation with a split key
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
CN116743713B (en) Remote online paperless conference method and device based on Internet of things
CN114614994A (en) API interface data communication method, device, client and storage medium
JP2023551458A (en) Key regeneration in blockchain networks via OPRF
CN112633884B (en) Local private key recovery method and device for transaction main body identity certificate
CN113761578A (en) Document true checking method based on block chain
CN110266490B (en) Keyword ciphertext generation method and device of cloud storage data
CN114553557A (en) Key calling method, key calling device, computer equipment and storage medium
CN114244531A (en) Lightweight self-updating message authentication method based on strong PUF
CN113362065A (en) Online signature transaction implementation method based on distributed private key
CN113626848A (en) Sample data generation method and device, electronic equipment and computer readable medium
CN112637442A (en) Method and device for encrypting circulating image by cloud server and local end
JP2021148850A (en) Information processing system, information processing method, information processing program, secure computing system, secure computing method, and secure computing program
Wu et al. Verified CSAC-based CP-ABE access control of cloud storage in SWIM
CN117240479B (en) Multiparty quantum signature method, multiparty quantum signature device, computer equipment and storage medium
RU2782153C2 (en) Method and system for organization of protected information exchange, using blockchain technology and distributed data storage systems
CN116506227B (en) Data processing method, device, computer equipment and storage medium
CN113746829B (en) Multi-source data association method, device, equipment and storage medium
Zhu Research on Secure Storage of Network Data Based on Cloud Computing Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant