Sign In to Follow Application
View All Documents & Correspondence

Video Conferencing System And A Method To Operate The Same

Abstract: A video-conferencing system is disclosed. The video-conferencing system includes a processing subsystem which includes an authentication module (40) which obtains an Internet Protocol address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user and authenticates an identity of the user based on a comparison of the Internet Protocol address obtained with pre-registered Internet Protocol(s) in real-time. The processing subsystem also includes a conference access control module (50) which performs a first predefined operation based on the authentication. The processing system also includes a graded access control module (60) which extracts multiple user details upon detecting a conference joining activity and restricts an access to predefined feature(s) of the predefined videoconference based on analysis of parameter(s) associated with at least one of the multiple user details using an artificial intelligence-based technique. FIG. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
10 August 2021
Publication Number
06/2023
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
filings@ipflair.com
Parent Application

Applicants

ASTI INFOTECH PRIVATE LIMITED
NO 90, MANJUNATH KANNIKA (MANKA), GROUND FLOOR, 2ND MAIN, ELECTRONIC CITY PHASE 1, BANGALORE, 560100, KARNATAKA, INDIA

Inventors

1. MAHENDRA PRATAP CHOUDHARY
VENI- 201, SJR VERITY, KASAVANAHALLI, HOSA ROAD, BENGALURU RURAL, 560035, KARNATAKA, INDIA
2. MANDEEP SINGH
HOUSE NO. 73, WARD NO.-6, NEAR HANUMAN MANDIR, DUGAL KALAN, PATRAN, PATIALA, 147105, PUNJAB, INDIA
3. SONAL MALHOTRA
HOUSE NO. 208, WARD NO. 14, PREMNAGAR, PATHAKHEDA, BETUL, 460449, MADHYA PRADESH INDIA
4. NAVIN MISTRY
E-904, WESTERNHILLS PHASE 2. S.N. 45/1, NEAR BELA CASA, BANER-SUS, PUNE, 411021, MAHARASHTRA, INDIA

Specification

Claims:1. A video-conferencing system (10), wherein the video-conferencing system (10) comprises:
a processing subsystem (20) hosted on a server (30), and configured to execute on a network to control bidirectional communications among a plurality of modules comprising:
an authentication module (40) configured to:
obtain an Internet Protocol address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference; and
authenticate an identity of the user based on a comparison of the Internet Protocol address obtained with one or more pre-registered Internet Protocol addresses in real-time;
a conference access control module (50) operatively coupled to the authentication module (40), wherein the conference access control module (50) is configured to perform a first predefined operation corresponding to accessing of the predefined videoconference, based on the authentication of the identity of the user; and
a graded access control module (60) operatively coupled to the conference access control module (50), wherein the graded access control module (60) is configured to:
extract a plurality of user details associated with the corresponding user from a database (100) associated with the processing subsystem (20) upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module (50); and
restrict an access to one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence-based technique.
2. The video-conferencing system (10) as claimed in claim 1, wherein the first predefined operation comprises at least one of permitting the user to join the predefined videoconference, restricting the user from joining the predefined videoconference, adding the user in a preferred list, adding the user in a block list, and allotting one or more permissions to the user.
3. The video-conferencing system (10) as claimed in claim 1, wherein the one or more parameters comprises at least one of one or more pre-allotted permissions, a category of a designation of the user, a count of one or more devices registered by the user, and a category of the one or more devices.
4. The video-conferencing system (10) as claimed in claim 1, wherein the processing subsystem (20) comprises an anomaly detection module (120) operatively coupled to the graded access control module (60), wherein the anomaly detection is configured to:
identify one or more suspicious activities being performed on the Internet Protocol address of the user when the user is accessing the predefined videoconference using an artificial intelligence-based technique; and
perform a second predefined operation corresponding to the accessing of the predefined videoconference, based on the identification of the one or more suspicious activities.
5. The video-conferencing system (10) as claimed in claim 4, wherein the second predefined operation comprises at least one of disconnecting the user from the videoconference, adding the user in a block list, alerting an host of the videoconference regarding the identification of the one or more suspicious activities, and taking a preventive action for protection purpose.
6. The video-conferencing system (10) as claimed in claim 4, wherein the processing subsystem (20) comprises an alert generation module (140) operatively coupled to the anomaly detection module (120), wherein the alert generation module (140) is configured to generate an alert based on at least one of the identification of the one or more suspicious activities, the authentication of the user, the first predefined operation, and the second predefined operation.
7. A method (190) for the video-conferencing system, wherein the method (190) comprises:
obtaining, by an authentication module (40), an Internet Protocol address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference; (200)
authenticating, by the authentication module (40), an identity of the user based on a comparison of the Internet Protocol address obtained with one or more pre-registered Internet Protocol addresses in real-time; (210)
performing, by a conference access control module (50), a first predefined operation corresponding to accessing of the predefined videoconference, based on the authentication of the identity of the user; (220)
extracting, by a graded access control module (60), a plurality of user details associated with the corresponding user from a database associated with the processing subsystem upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module; and (230)
restricting, by the graded access control module (60), an access to one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence-based technique (240).
8. The method (190) as claimed in claim 7, comprises identifying, by an anomaly detection module (120), one or more suspicious activities being performed on the Internet Protocol of the user when the user is accessing the predefined videoconference using an artificial intelligence-based technique.
9. The method (190) as claimed in claim 8, comprises performing, by the anomaly detection module (120), a second predefined operation corresponding to the accessing of the predefined videoconference, based on the identification of the one or more suspicious activities.
10. The method (190) as claimed in claim 9, comprises generating, by an alert generation module (140), an alert based on at least one of the identification of the one or more suspicious activities, the authentication of the user, the first predefined operation, and the second predefined operation.

Dated this 10th day of August 2021

Signature

Harish Naidu
Patent Agent (IN/PA-2896)
Agent for the Applicant
, Description:FIELD OF INVENTION
[0001] Embodiments of a present disclosure relate to video conferencing, and more particularly to a video-conferencing system and a method to operate the same.
BACKGROUND
[0002] Video-conferencing refers to telecommunication in the form of a videoconference. Videoconference refers to a conference in which participants in different locations are able to communicate with each other in sound and vision. Such a videoconference is conducted on a video-conferencing platform, and whomsoever is accessing the corresponding video-conferencing platform, gets access to all of the one or more features of the video-conferencing platform. There are multiple approaches implemented for conducting and improving video-conferencing experiences. However, such multiple approaches are less secure because whosoever has a link to joining the videoconference can join without any identity verification, thereby leaking confidential data that may be associated with an organization that is hosting the videoconference. Also, random people may join the videoconference and disturb the communication by randomly passing inappropriate comments, thereby leading to diverting or hampering the concentration of genuine participants of the videoconference, and hence causing wastage of time and energy of not only the host but also of the genuine participants. This leads to reducing the importance of conducting such videoconferences as people may lose interest if such an interruption keeps happening every time the videoconference has been conducted.
[0003] Hence, there is a need for an improved video-conferencing system and a method to operate the same which addresses the aforementioned issues.
BRIEF DESCRIPTION
[0004] In accordance with one embodiment of the disclosure, a video-conferencing system is provided. The video-conferencing system includes a processing subsystem hosted on a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes an authentication module. The authentication module is configured to obtain an Internet Protocol address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference. The authentication module is also configured to authenticate an identity of the user based on a comparison of the Internet Protocol address obtained with one or more pre-registered Internet Protocol addresses in real-time. The processing subsystem also includes a conference access control module operatively coupled to the authentication module. The conference access control module is configured to perform a first predefined operation corresponding to accessing the predefined videoconference, based on the authentication of the identity of the user. Further, the processing system also includes a graded access control module operatively coupled to the conference access control module. The graded access control module is configured to extract a plurality of user details associated with the corresponding user from a database associated with the processing subsystem upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module. The graded access control module is also configured to restrict an access to one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence-based technique.
[0005] In accordance with another embodiment, a method for the video-conferencing system is provided. The method includes obtaining an Internet Protocol address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference. The method also includes authenticating an identity of the user based on a comparison of the Internet Protocol address obtained with one or more pre-registered Internet Protocol addresses in real-time. Further, the method also includes performing a first predefined operation corresponding to accessing the predefined videoconference, based on the authentication of the identity of the user. Furthermore, the method also includes extracting a plurality of user details associated with the corresponding user from a database associated with the processing subsystem upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module. Furthermore, the method also includes restricting an access to one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence-based technique.
[0006] To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
[0007] FIG. 1 is a block diagram representation of a video-conferencing system in accordance with an embodiment of the present disclosure;
[0008] FIG. 2 is a block diagram representation of an exemplary embodiment of the video-conferencing system of FIG. 1 in accordance with an embodiment of the present disclosure;
[0009] FIG. 3 is a block diagram of a video-conferencing computer or a video-conferencing server in accordance with an embodiment of the present disclosure; and
[0010] FIG. 4 is a flow chart representing steps involved in a method for the video-conferencing system in accordance with an embodiment of the present disclosure.
[0011] Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
[0012] For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
[0013] The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or sub-systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
[0014] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
[0015] In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
[0016] Embodiments of the present disclosure relate to a video-conferencing system. As used herein, the term “video-conferencing” refers to telecommunication in the form of a videoconference. Videoconference refers to a conference in which participants in different locations are able to communicate with each other in sound and vision. Thus, the video-conferencing system described hereafter in FIG. 1 is the system for conducting and supporting video conferencing.
[0017] FIG. 1 is a block diagram representation of a video-conferencing system (10) in accordance with an embodiment of the present disclosure. The video-conferencing system (10) includes a processing subsystem (20) hosted on a server (30). In one embodiment, the server (30) may include a cloud server. In another embodiment, the server (30) may include a local server. The processing subsystem (20) is configured to execute on a network (not shown in FIG. 1) to control bidirectional communications among a plurality of modules. In one embodiment, the network may include a wired network such as a local area network (LAN). In another embodiment, the network may include a wireless network such as wireless fidelity (Wi-Fi), Bluetooth, Zigbee, near field communication (NFC), infra-red communication (RFID), or the like.
[0018] Basically, in an embodiment, maintaining a confidentiality and taking care of a security of a videoconference is a challenging task. Thus, the video-conferencing system (10) proposed in the present disclosure may be used to achieve the same. Further, for a user to be able to use the video-conferencing system (10), the user may have to be registered on the video-conferencing system (10). Thus, in one embodiment, the processing subsystem (20) may include a registration module (as shown in FIG. 2). The registration module is configured to register the user on the video-conferencing system (10) upon receiving a plurality of user details via a user device. In one embodiment, the user may include at least one of a host of the videoconference, an organizer of the videoconference, a participant of the videoconference, a subject expert, a client, and the like. Also, in an embodiment, the plurality of user details may include at least one of a username, a designation, an education, a qualification, an expertise level, one or more contact details, a reason for hosting or accessing the videoconference, and the like. In one embodiment, the plurality of user details may be stored in a database (as shown in FIG. 2) associated with the processing subsystem (20). In such embodiment, the database may include a local database or a cloud database. Moreover, in one exemplary embodiment, the user device may include a mobile phone, a tablet, a laptop, or the like.
[0019] Upon registration, in an embodiment, the user may also register one or more Internet Protocol (IP) addresses via the registration module, based on a predefined network to which the user device of the user may be connected at different time intervals. The predefined network may enable the user device to establish a connection between a device, a platform, or a server (30) where the videoconference may be hosted. In one exemplary embodiment, the predefined network may include a personal mobile data connection network, a personal Wi-Fi network, a personalized office space network, a personalized institution space network, a home network, a public space network, or the like. Further, upon registering the one or more IP addresses associated with the user, one or more pre-registered IP addresses may be updated in the database. Later, the user may be able to use the video-conferencing system (10) either to host or organize the videoconference or access the videoconference hosted using the video-conferencing system (10). Basically, in an embodiment, the user may have a hyperlink for accessing the videoconference, and upon clicking the corresponding hyperlink, the user may be redirected to a platform on which the videoconference is been conducted. In such embodiment, the hyperlink may be shared by the host of the videoconference via at least one communication means. In one exemplary embodiment, the at least one communication means may include a text message, an e-mail, a post on one or more social platforms, a post on one or more professional platforms, or the like. However, an identity of the user may have to be authenticated before letting the user access the videoconference hosted using the video-conferencing system (10).
[0020] Thus, the processing subsystem (20) also includes an authentication module (40). The authentication module (40) may be operatively coupled to the registration module. The authentication module (40) is configured to obtain an IP address corresponding to the user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference. Suppose the predefined videoconference has been initiated on a predefined day and at a predefined time. Further, when the user who has the hyperlink for accessing the predefined videoconference clicks on the corresponding hyperlink, then the conference accessing request may be received by the authentication module (40). Then, the IP address associated with the user device may have to be obtained and checked if the IP address is registered on the processing subsystem (20). Thus, upon obtaining the IP address, the authentication module (40) is also configured to authenticate the identity of the user based on a comparison of the IP address obtained with the one or more pre-registered IP addresses in real-time. In one embodiment, the predefined interval of obtaining the IP address may include continuous, after every minute, after every fifteen minutes, after every thirty minutes, after every hour, or the like before completion of the predefined videoconference being conducted.
[0021] In one exemplary embodiment, the identity of the user may be authenticated to be genuine when the IP address matches with the one or more pre-registered IP addresses. In another exemplary embodiment, the identity of the user may fail to get authenticated when the IP address mismatches with the one or more pre-registered IP addresses. Thus, based on the authentication of the identity of the user, certain action may have to be taken either by the video-conferencing system (10) or the host of the predefined videoconference. Therefore, the processing subsystem (20) also includes a conference access control module (50) operatively coupled to the authentication module (40). The conference access control module (50) is configured to perform a first predefined operation corresponding to accessing the predefined videoconference, based on the authentication of the identity of the user. In one embodiment, the first predefined operation may include at least one of permitting the user to join the predefined videoconference, restricting the user from joining the predefined videoconference, adding the user in a preferred list, adding the user in a block list, allotting one or more permissions to the user, and the like.
[0022] Thus, in an embodiment, the user may be permitted to join and access the predefined videoconference when the identity of the user may be authenticated to be genuine. In such embodiment, the user may be added to the preferred list upon permitting the user to access the predefined videoconference. In such another embodiment, the user may be allotted the one or more permissions upon permitting the user to access the predefined videoconference. In one exemplary embodiment, the one or more permissions may include a permission to chat by sending a message during the predefined videoconference, a permission to join with a video and an audio being activated for the user, a permission to edit a document being shared via screen-sharing, a permission to record the predefined videoconference, a permission to share the hyperlink of the predefined videoconference, a permission to add people to the predefined videoconference, or the like.
[0023] In another embodiment, the user may be restricted from joining the predefined videoconference when the identity of the user may fail to get authenticated. In such embodiment, the user may be added to the block list upon restricting the user from joining the predefined videoconference. In such another embodiment, the host of the predefined videoconference may be alerted about the failure of the authentication of the identity of the user upon restricting the user from joining the predefined videoconference.
[0024] Later, upon authenticating the identity of the user is genuine, the user may join the predefined videoconference. Upon letting the user join the predefined videoconference, the one or more predefined features of the predefined videoconference which the user may be permitted to access may have to be decided by the videoconferencing system. Thus, the processing subsystem (20) also includes a graded access control module (60) operatively coupled to the conference access control module (50). The graded access control module (60) is configured to extract the plurality of user details associated with the corresponding user from the database associated with the processing subsystem (20). The graded access control module (60) may extract the plurality of user details upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module (50). The graded access control module (60) is also configured to restrict an access to the one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence (AI)-based technique.
[0025] In one exemplary embodiment, the one or more predefined features may include a chatting feature, a video-audio activating-deactivating feature, a sharing content via screen-sharing feature, requesting to edit content shared via the screen-sharing feature, a recording feature, an adding participants feature, and the like. Moreover, in an embodiment, the one or more parameters may include at least one of a category of the predefined network of the IP address, one or more pre-allotted permissions, a category of a designation of the user, a count of one or more devices registered by the user, a category of the one or more devices, and the like. In one embodiment, the category of the predefined network may include a private, a public, a protected, an unprotected, or the like. In one embodiment, the designation of the user may include a fresher, a manager, an organizer of the predefined videoconference, a subject expert, a client, a student, or the like. Thus, in an embodiment, the category of the designation may correspond to a less privileged category, a highly privileged category, a moderately privileged category, or the like. In one exemplary embodiment, the less privileged category may include the designation such as, but not limited to, the fresher, the client, the student, a person outside of a network of an organization of the host of the predefined videoconference, or the like. Also, in one embodiment, the more privileged category may include the designation such as, but not limited to, the manager, the organizer, the host, or the like. Similarly, in a specific embodiment, the moderately privileged category may include the designation such as, but not limited, to the subject expert, an employee, an employer, a teacher, a person inside of the network of the organization of the host of the predefined videoconference, or the like.
[0026] Subsequently, in an embodiment, the count of the one or more devices that the user may be allowed to register with the video-conferencing system (10) may also be restricted for safety purposes. Also, in an embodiment, the category of the one or more devices may be considered, as the category may correspond to the one or more devices being a mobile device, a static device, an office-provided device, a personalized device, or the like. For example, the mobile device such as mobile phones, smartphones, tablets, or the like may be the one or more devices which are not allowed to use for joining the predefined videoconference. Thus, in one embodiment, the one or more devices may include a mobile phone, a tablet, a laptop, or the like. Also, as the one or more parameters are analyzed using the AI-based technique, as used herein, the term “artificial intelligence” is defined as the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment. In an embodiment, the AI-based technique used may basically analyze the one or more parameters by identifying the one or more parameters that are associated with the plurality of user details and understanding the same. Then, based on the understanding obtained regarding the corresponding one or more parameters, a decision may be taken regarding the restriction of the one or more predefined features upon mapping the one or more parameters with the one or more predefined features in real-time.
[0027] Basically, the graded access control module (60) may generate a first learning model using the AI-based technique regarding the mapping between the one or more parameters and the one or more predefined features of the predefined videoconference in real-time. Later, the first learning model may be used to take the decision regarding the restriction on the access to the one or more predefined features in real-time. Suppose during the predefined videoconference, one or more of the plurality of user details may change and hence the one or more parameters associated with the corresponding plurality of user details may also vary. Thus, in an embodiment, the first learning model is also trained to understand the change in the corresponding one or more parameters and accordingly perform the mapping with the corresponding one or more predefined features in real-time. Then, based on the mapping, the graded access control module (60) may update the restriction on the access of the one or more predefined features accordingly.
[0028] In addition, in an embodiment, the processing subsystem (20) may also include an anomaly detection module (as shown in FIG. 2) operatively coupled to the graded access control module (60). The anomaly detection may be configured to identify one or more suspicious activities being performed on the IP address of the user when the user is accessing the predefined videoconference using an AI-based technique. The anomaly detection module may also be configured to perform a second predefined operation corresponding to the accessing of the predefined videoconference, based on the identification of the one or more suspicious activities. Basically, the anomaly detection module may generate a second learning model trained with an exhaustive dataset of the one or more suspicious activities that can be performed on the IP address. Thus, the learning model may be used to understand the one or more suspicious activities upon the occurrence of the same on the IP address. Further, in an embodiment, every un-recognizable activity by the anomaly detection module may be classified under the one or more suspicious activities upon using the second learning model, as the second learning model is also trained for the same.
[0029] In one embodiment, the one or more suspicious activities may include at least one of spyware infections associated with the IP address, receiving a high level of spam from the corresponding IP address, receiving viruses from the corresponding IP address, changing the IP address from a protected network to an un-protected network, changing of the IP address from a private network to a public network, the IP address being associated with a device that is swarmed with a malware, and the like. Further, in one exemplary embodiment, the second predefined operation may include at least one of disconnecting the user from the videoconference, adding the user to the block list, alerting the host of the videoconference regarding the identification of the one or more suspicious activities, taking a preventive action for protection purpose, and the like. In one embodiment, the preventive action may include finding out a source or cause of the spyware infections which are associated with the IP address, deleting the viruses received from the corresponding IP address, notifying the user to change from the un-protected network to the protected network, notifying the user to change from the public network to the private network, notifying the user regarding the device being swarmed with malware, or the like.
[0030] Additionally, in an embodiment, the processing subsystem (20) may also include an alert generation module (as shown in FIG. 2) operatively coupled to the anomaly detection module. The alert generation module may be configured to generate an alert based on at least one of the identification of the one or more suspicious activities, the authentication of the user, the first predefined operation, the second predefined operation, and the like. In one exemplary embodiment, the alert may be generated in one or more forms such as, but not limited to, a text message, an email, a pop-up notification on a dashboard of the user device of the user, an audio alert, and the like.
[0031] FIG. 2 is a block diagram representation of an exemplary embodiment of the video-conferencing system (10) of FIG. 1 in accordance with an embodiment of the present disclosure. Suppose a company ‘A’ (70) is using the video-conferencing system (10) proposed in the present disclosure for conducting one or more videoconferences for one or more official purposes. Therefore, initially, the company ‘A’ (70) may register one or more users (80) such as, but not limited to, one or more employees, one or more employers, one or more old clients, and the like, on the video-conferencing system (10) via the registration module (90) using a company laptop (95) as the company ‘A’ (70) already possess the plurality of user details pre-stored in the database (100). Later, the company ‘A’ (70) also requests the one or more users (80) to register the IP address associated with the predefined network which the one or more users (80) may be using. Thus, the one or more users (80) register the IP address associated with the predefined network which one or more mobile phones (105) of the one or more users (80) are using. Once the registration is done, the one or more pre-registered IP addresses may be updated in the database (100). Also, as and when the one or more users (80) such as the one or more new clients get added to a known circle of the company ‘A’ (70), the one or more new clients along the respective IP address may be registered via the registration module (90).
[0032] Suppose the company ‘A’ (70) is hosting a knowledge-sharing conference using the video-conferencing system (10) for all of the one or more users (80) of the company ‘A’ (70). Then, the hyperlink for the corresponding knowledge-sharing conference may be shared with the corresponding one or more users (80) through an email. During the time of the start of the knowledge-sharing conference, when the one or more users (80) click on the hyperlink received, the video-conferencing system (10) receives the conference accessing request from the corresponding one or more users (80) via the authentication module (40). Upon receiving the conference accessing request, the authentication module (40) also extracts or obtains the IP address corresponding to the corresponding one or more users (80). Then, compares the IP address with the one or more pre-registered IP addresses. The one or more users (80) whose IP address matches with the one or more pre-registered IP addresses, is permitted to access the knowledge-sharing conference via the conference access control module (50). Later, upon detecting the conference joining activity being performed by the one or more users (80), the plurality of user details is extracted via the graded access control module (60). Then, the one or more parameters associated with the plurality of user details are analyzed using the AI-based technique to restrict the access to the one or more predefined features of the knowledge-sharing conference via the graded access control module (60).
[0033] Suppose a competitor company ‘B’ (110) somehow receives the hyperlink for the knowledge-sharing conference hosted by the company ‘A’ (70). The competitor company ‘B’ (110) can either try to join the knowledge-sharing conference via a company device (115) and listen to the discussion and get to know secret strategies of the company ‘A’ (70) or try to insert viruses or spyware to hack the knowledge-sharing conference so that content of the knowledge-sharing conference may get leaked to the competitor company ‘B’ (110). In either case, the video-conferencing system (10) identifies such activities as the one or more suspicious activities via the anomaly detection module (120) using the AI-based technique. Upon detecting the one or more suspicious activities, a suspicious IP address trying to join the knowledge sharing conference may be blocked or the viruses and the spyware may be deleted and the source of the viruses and the spyware may be obtained via the anomaly detection module (120). Later, a host ‘H’ (130) of the knowledge-sharing conference held by the company ‘A’ (70) for the one or more users (80) of the company ‘A’ (70) may be alerted through an email sent via the alert generation module (140). Upon receiving the alert, the company ‘A’ (70) may plan to take certain severe actions against the competitor company ‘B’ (110) if identified, may host such knowledge-sharing conferences nest time in a more secure manner, or the like.
[0034] FIG. 3 is a block diagram of a video-conferencing computer (150) or a video-conferencing server (150) in accordance with an embodiment of the present disclosure. The video-conferencing server (150) includes a processor(s) (160), and memory (170) operatively coupled to a bus (180). The processor(s) (160), as used herein, means any type of computational circuit, such as, but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
[0035] Computer memory elements may include any suitable memory device(s) for storing data and executable program, such as read only memory, random access memory, erasable programmable read only memory, electrically erasable programmable read only memory, hard drive, removable media drive for handling memory cards, and the like. Embodiments of the present subject matter may be implemented in conjunction with program modules, including functions, procedures, data structures, and application programs, for performing tasks, or defining abstract data types or low-level hardware contexts. Executable program stored on any of the above-mentioned storage media may be executable by the processor(s) (250).
[0036] The memory (170) includes a plurality of subsystems stored in the form of executable program which instructs the processor(s) (160) to perform method steps illustrated in FIG. 4. The memory (170) includes a processing subsystem (20) of FIG 1. The processing subsystem (20) further has following modules: an authentication module (40), a conference access control module (50), and a graded access control module (60).
[0037] The authentication module (40) is configured to obtain an Internet Protocol address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference. The authentication module (40) is also configured to authenticate an identity of the user based on a comparison of the Internet Protocol address obtained with one or more pre-registered Internet Protocol addresses in real-time. The conference access control module (50) is configured to perform a first predefined operation corresponding to accessing the predefined videoconference, based on the authentication of the identity of the user.
[0038] The graded access control module (60) is configured to extract a plurality of user details associated with the corresponding user from a database (100) associated with the processing subsystem (20) upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module (50). The graded access control module (60) is also configured to restrict an access to one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence-based technique.
[0039] The bus (180) as used herein refers to be internal memory channels or computer network that is used to connect computer components and transfer data between them. The bus (180) includes a serial bus or a parallel bus, wherein the serial bus transmits data in a bit-serial format and the parallel bus transmits data across multiple wires. The bus (180) as used herein, may include but not limited to, a system bus, an internal bus, an external bus, an expansion bus, a frontside bus, a backside bus, and the like.
[0040] FIG. 4 is a flow chart representing steps involved in a method (190) for the video-conferencing system in accordance with an embodiment of the present disclosure. The method (190) includes obtaining an Internet Protocol (IP) address corresponding to a user at a predefined time interval upon receiving a conference accessing request from the user for accessing a predefined videoconference in step 200. In one embodiment, obtaining the IP address may include obtaining the IP address by an authentication module (40).
[0041] The method (190) also includes authenticating an identity of the user based on a comparison of the IP address obtained with one or more pre-registered IP addresses in real-time in step 210. In one embodiment, authenticating the identity of the user may include authenticating the identity of the user by the authentication module (40).
[0042] Furthermore, the method (190) includes performing a first predefined operation corresponding to accessing of the predefined videoconference, based on the authentication of the identity of the user in step 220. In one embodiment, performing the first predefined operation may include performing the first predefined operation by a conference access control module (50).
[0043] Furthermore, the method (190) also includes extracting a plurality of user details associated with the corresponding user from a database associated with the processing subsystem upon detecting a conference joining activity being performed by the user, based on the first predefined operation performed by the conference access control module in step 230. In one embodiment, extracting the plurality of user details may include extracting the plurality of user details by a graded access control module (60).
[0044] Furthermore, the method (190) also includes restricting an access to one or more predefined features of the predefined videoconference based on analysis of one or more parameters associated with at least one of the plurality of user details using an artificial intelligence (AI)-based technique in step 240. In one embodiment, restricting the access to the one or more predefined features may include restricting the access to the one or more predefined features by the graded access control module (60).
[0045] In one exemplary embodiment, the method (190) may further include identifying one or more suspicious activities being performed on the IP of the user when the user is accessing the predefined videoconference using an AI-based technique. In such embodiment identifying the one or more suspicious activities may include identifying the one or more suspicious activities by an anomaly detection module (120).
[0046] In one exemplary embodiment, the method (190) may also include performing a second predefined operation corresponding to the accessing of the predefined videoconference, based on the identification of the one or more suspicious activities. In such embodiment, performing the second predefined operation may include performing the second predefined operation by the anomaly detection module (120).
[0047] Further, in one exemplary embodiment, the method (190) may also include generating an alert based on at least one of the identification of the one or more suspicious activities, the authentication of the user, the first predefined operation, and the second predefined operation. In such embodiment, generating the alert may include generating the alert by an alert generation module (140).
[0048] Further, from a technical effect point of view, the implementation time required to perform the method steps included in the present disclosure by the one or more processors of the system is very minimal, thereby the system maintains very minimal operational speed.
[0049] Various embodiments of the present disclosure enable a smooth conducting of the videoconference as any kind of interruption is blocked by the video-conferencing system because of the presence of a graded access control feature. Also, the confidentiality and the security of the videoconference has been taken care of as the identity of the user is authenticated via the IP address corresponding to the user in real-time every time the user is trying to access the videoconference. This leads to saving time and energy for not only the host but also the participants of the videoconference as both the host and the participants are not facing any kind of interruptions.
[0050] While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
[0051] The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Documents

Application Documents

# Name Date
1 202141036182-STATEMENT OF UNDERTAKING (FORM 3) [10-08-2021(online)].pdf 2021-08-10
2 202141036182-PROOF OF RIGHT [10-08-2021(online)].pdf 2021-08-10
3 202141036182-POWER OF AUTHORITY [10-08-2021(online)].pdf 2021-08-10
4 202141036182-FORM FOR SMALL ENTITY(FORM-28) [10-08-2021(online)].pdf 2021-08-10
5 202141036182-FORM FOR SMALL ENTITY [10-08-2021(online)].pdf 2021-08-10
6 202141036182-FORM 1 [10-08-2021(online)].pdf 2021-08-10
7 202141036182-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [10-08-2021(online)].pdf 2021-08-10
8 202141036182-EVIDENCE FOR REGISTRATION UNDER SSI [10-08-2021(online)].pdf 2021-08-10
9 202141036182-DRAWINGS [10-08-2021(online)].pdf 2021-08-10
10 202141036182-DECLARATION OF INVENTORSHIP (FORM 5) [10-08-2021(online)].pdf 2021-08-10
11 202141036182-COMPLETE SPECIFICATION [10-08-2021(online)].pdf 2021-08-10
12 202141036182-FORM-8 [07-05-2025(online)].pdf 2025-05-07