Patil, A.Singh, A.Chauhan, N.2026-02-062021Lecture Notes in Networks and Systems, 2021, Vol.190, , p. 1073-108123673370https://doi.org/10.1007/978-981-16-0882-7_97https://idr.nitk.ac.in/handle/123456789/30359Google Meet, much like other online video-conferencing platforms, has seen a surge in popularity for its reliability and convenience, which also makes it necessary to be analysed for vulnerabilities owing to its large user-base. This paper focuses on an observational study on Google Meet to find certain shortcomings, specifically the freedom users have to login through multiple devices and how it can aid attackers in certain scenarios. A simulated back-end architecture is developed to propose a proof of concept on tackling the explored issues using a path compressed double-trie structure and the location of user from his public IP address. © 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Double-trieGoogle MeetLocationPath compressionShortcomingsSimulationVideo-conferencing platformsVulnerabilitiesMulti-device Login Monitoring for Google Meet Using Path Compressed Double-Trie and User Location