Search

CN-122001603-A - System privatization method and device, privatization deployment system, device and medium

CN122001603ACN 122001603 ACN122001603 ACN 122001603ACN-122001603-A

Abstract

The application discloses a system privatization method, a device, a privatization deployment system, equipment and a medium. The method is applied to a server corresponding to a first client, the first client requests system deployment permission to a management end of a system, and the method comprises the steps of receiving a system deployment instruction sent by the management end when the management end verifies that the server meets system deployment conditions, carrying out privately deployment on the system based on the system deployment instruction, receiving a system access request sent by a second client, responding to the system access request, carrying out system access permission verification on the second client by using a license authentication service unit of a media service module in the system, and allowing the second client to access the system when the second client passes the system access permission verification, so that privately deployment and privately access of the system are realized, and the use safety of the system is improved.

Inventors

  • LIU PENGKUN
  • LI MIN
  • LIU YANQING
  • LIU XIANQI

Assignees

  • 北京三六零智领科技有限公司

Dates

Publication Date
20260508
Application Date
20241107

Claims (10)

  1. 1. A system privatization method is characterized in that the system comprises a media service module, the media service module comprises a license authentication service unit, the method is applied to a server corresponding to a first client, the first client is a client which requests the system deployment authority from a management end of the system, and the method comprises the following steps: Receiving a system deployment instruction sent by the management end under the condition that the management end verifies that the server accords with the system deployment condition; performing privatization deployment on the system based on the system deployment instruction; receiving a system access request sent by a second client; responding to the system access request, and verifying the system access authority of the second client by utilizing the license authentication service unit; And allowing the second client to access the system under the condition that the second client is verified by the system access authority.
  2. 2. The method of claim 1, wherein the system deployment instruction carries an authorization license corresponding to the first client, the authorization license being encrypted by the management end for a first physical address of the first client, a first system lifetime, and a first client identification code, the first client identification code being generated by the management end for a user identity of the first client; the verifying the system access right of the second client by using the license authentication service unit comprises the following steps: decrypting the authorized license by using the license authentication service unit to obtain a first physical address of the first client, a first system lifetime and a first client identification code; Verifying whether the second physical address is consistent with the first physical address; Verifying whether the second customer identification code is consistent with the first customer identification code; Verifying whether the current moment is within the service life of the first system; And determining that the second client passes system access authority verification under the condition that the second physical address is consistent with the first physical address, the second client identification code is consistent with the first client identification code and the current moment is within the service life of the first system.
  3. 3. The method of claim 1, wherein the system further comprises a business service module, the method further comprising: receiving user registration information sent by the second client under the condition that the system access authority of the second client passes verification; Searching whether historical registration information which is the same as the user registration information exists in a database corresponding to the system by utilizing the business service module; If not, checking whether the user registration information accords with a preset condition by using the business service module, wherein the preset condition is used for verifying the authenticity and the integrity of the user registration information; And if the preset condition is met, storing the user registration information in a database corresponding to the system.
  4. 4. The method of claim 1, wherein the system is a video conference system, the media service module further comprises a data forwarding service unit and a data storage service unit, the data storage service unit comprises a database corresponding to the system and is used for storing business data and supporting information communication functions of publishing and/or subscribing, the business data comprises at least one of audio and video data, data subscription information and data publishing information, and the method further comprises: receiving target audio and video data sent by the second client in the process of using the video conference system under the condition that the system access authority of the second client passes verification; And forwarding the target audio and video data by utilizing the data forwarding service unit according to target data subscription information stored in the data storage service unit, wherein the target data subscription information is corresponding data subscription information when the second client uses the video conference system this time.
  5. 5. The method of claim 1, wherein the system is a video conferencing system, the media service module further comprises a video recording service unit and a data storage service unit, the data storage service unit comprises a database corresponding to the system and used for storing business data and supporting information communication functions of publishing and/or subscribing, the business data comprises at least one of audio and video data, data subscription information and data publishing information, and the method further comprises: Receiving a video recording instruction sent by the second client under the condition that the system access authority of the second client passes verification and the second client is using the video conference system to participate in a target video conference; And responding to the video recording instruction, and calling the video recording service unit to record the audio and video data released by the participant in the target video conference according to the release information of the target data stored in the data storage service unit.
  6. 6. The method of claim 1, wherein the media service module further comprises a conference monitoring service unit, the method further comprising: In the process of accessing the system by the second client, periodically grabbing background operation data of the system by using the conference monitoring service unit; and sending out alarm information under the condition that the background operation data is abnormal.
  7. 7. A privately-allocated system comprises a first client, a server corresponding to the first client and a management end corresponding to a system to be allocated; The first client sends a system deployment request to a management end corresponding to the system to be deployed; The management end responds to the system deployment request and verifies whether the server accords with the system deployment condition; Under the condition that the server accords with the system deployment condition, the management end sends a system deployment instruction to the server; and the server privately deploys the system to be deployed based on the system deployment instruction.
  8. 8. The system privatization device is characterized in that the system comprises a media service module, the media service module comprises a license authentication service unit, the method is applied to a server corresponding to a first client, the first client is a client which requests the system deployment authority from a management end of the system, and the system privatization device comprises: The first receiving module is used for receiving a system deployment instruction sent by the management end under the condition that the management end verifies that the server accords with the system deployment condition; The deployment module is used for privating and deploying the system based on the system deployment instruction; the second receiving module is used for receiving a system access request sent by a second client; The verification module is used for responding to the system access request and verifying the system access authority of the second client by utilizing the license authentication service unit; and the access module is used for allowing the second client to access the system under the condition that the second client passes the verification of the system access authority.
  9. 9. An electronic device comprising a processor and a memory, wherein the memory stores executable program code, and wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the method of any of claims 1-6.
  10. 10. A computer storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the method steps of any of claims 1-6.

Description

System privatization method and device, privatization deployment system, device and medium Technical Field The present application relates to the field of software development technologies, and in particular, to a system privatization method, device, privatization deployment system, device, and medium. Background The video conference system is a platform for people in different places to communicate in real time through audio and video equipment by using a communication technology. It mainly depends on network communication technology, multimedia technology, codec technology, etc. With the development of the internet and mobile communication technology, the video conference system has become an important tool for enterprises and organizations to improve communication efficiency and reduce cost. Whether teleworking, national conferences or team daily communications, the video conferencing system provides an efficient and convenient solution for the enterprise. Especially in the face of the current global complex and changeable business environment, the rapid response and adaptation to changes are of vital importance to enterprises. For enterprises with high demands for industrial upgrading and technological advancement, the video conference system is not only a communication tool, but also an important means for improving efficiency and competitiveness. However, most video conference system solutions in the market are based on public cloud service modes, but such modes are prone to problems in terms of security, privacy protection, stability and the like. Disclosure of Invention The embodiment of the application provides a system privatization method, a device, a privatization deployment system, equipment and a medium, the system privatization method realizes the privatization deployment and the privatization access of the system, and improves the use safety of the system. In a first aspect, an embodiment of the present application provides a system privatization method, where the system includes a media service module, where the media service module includes a license authentication service unit, where the method is applied to a server corresponding to a first client, where the first client is a client that requests, to a management end of the system, deployment rights of the system, and where the method includes: The method comprises the steps of receiving a system deployment instruction sent by a management end when the management end verifies that the server meets a system deployment condition, privating the system based on the system deployment instruction, receiving a system access request sent by a second client, responding to the system access request, verifying the system access right of the second client by using the license authentication service unit, and allowing the second client to access the system when the second client passes the system access right verification. In one possible implementation manner, the system deployment instruction carries an authorization license corresponding to the first client; the authorization license is obtained by encrypting a first physical address, a first system service life and a first client identification code of the first client by the management end, wherein the first client identification code is generated by the management end aiming at the user identity of the first client; The system access right verification of the second client by using the license authentication service unit comprises decrypting the authorized license by using the license authentication service unit to obtain a first physical address, a first system service life and a first client identification code of the first client, verifying whether the second physical address is consistent with the first physical address, verifying whether the second client identification code is consistent with the first client identification code, verifying whether the current time is within the first system service life, and determining that the second client passes the system access right verification when the second physical address is consistent with the first physical address, the second client identification code is consistent with the first client identification code and the current time is within the first system service life. In one possible implementation manner, the system further comprises a service module, the method further comprises the steps of receiving user registration information sent by the second client when the system access authority of the second client is verified, conducting encryption transmission on the user registration information through an encryption algorithm, searching whether historical registration information identical to the user registration information exists in a database corresponding to the system by using the service module, checking whether the user registration information meets preset conditions by using the service module if the historical registration infor