A kind of access authentication method and its system based on 5G super-intensive networkTechnical field
The invention belongs to authentication method and its systems technology fields, more particularly to a kind of connecing based on 5G super-intensive networkEnter authentication method and its system.
Background technique
5G is the abbreviation of the 5th third-generation mobile communication technology.Super-intensive network is one of core technology of 5G, 5G super-intensive netNetwork can substantially reduce the distance of user's access by the Scaledeployment of wireless access point, thus improve the handling capacity of user withAnd the handling capacity (bps/km2) in region, it is the key technology for meeting 5G power system capacity demand.5G network is mobile logical as the 5th generationCommunication network, peak value theoretical transmission speed is up to tens of Gb per second, and this hundreds times faster than the transmission speed of 4G network, whole superelevationPicture quality movie can download completion within 1 second.The main target of 5G network is that terminal user is allowed to be in connected state always.5G netIt is smart phone that the equipment that network is supported in the future, which is run far deeper than, --- it will also support smartwatch, body building wrist strap, wired home to setStandby such as nest type room thermostat, therefore 5G network more will provide technical support to Internet of Things.
Currently, can be encrypted due to safety concerns to smart machine when using smart machine, that is, pass through identityCertification can just operate equipment, to prevent being operated without permission to equipment, but the place more in smart machine, ifIt is then excessively cumbersome that authentication is all carried out when using smart machine every time, is unfavorable for the promotion of working efficiency.
Summary of the invention
The purpose of the present invention is to provide a kind of access authentication methods and its system based on 5G super-intensive network, pass through benefitAuthentication is carried out to user with master control set, and assistant authentification is carried out to each device end after user identity authentication passes through,The fussy degree when carrying out authentication to each device end is reduced, while ensure that the safety of authentication, is helpedIt in improving user to the access speed of each device end, improves work efficiency, solves existing before using smart machineThe excessively cumbersome problem of authentication procedures.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
A kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains identity information and the identity information is sent to authentication unit;
Judge whether the identity information stored in the identity information and database checks success;
In the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to the authentication, obtain secret key and key information is forwarded to user terminal and each equipment endEnd;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device endInformation is veritified;
If the veritification passes through, equipment is opened.
Preferably, described to judge whether the identity information stored in the identity information and database checks success, haveBody includes: to check the identity information stored in the identity information and database.
A kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and the identity information is sent to certification listMember;
Information checks unit, be configured as judging the identity information stored in the identity information and database whether coreTo success, wherein in the successful situation of verification, authentication passes through;In the case where checking failure, alarm behaviour is executedMake;
Secret key obtains retransmission unit, is configured to respond to the authentication and passes through, and obtains secret key and by key informationIt is forwarded to user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end instituteThe key information of acquisition is veritified, wherein if the veritification passes through, opens equipment.
Preferably, it includes identification module that the identity information, which obtains retransmission unit, and the identification module is to refer toLine identifies one of equipment, face recognition device and iris identification equipment or a variety of.
Preferably, the information verification unit includes authentication module, database and alarm modules;The authenticationModule is connect by data information download module with database;The authentication module passes through data information uploading module and policeReport module connection.
Preferably, it includes master control set that the secret key, which obtains retransmission unit,;The master control set is configured as and each equipmentTerminal establishes data information transfer connection.
Preferably, the device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
The invention has the following advantages:
1, of the invention by carrying out authentication to user using master control set, and to each after user identity authentication passes throughDevice end carries out assistant authentification, reduces the fussy degree when carrying out authentication to each device end, ensure that simultaneouslyThe safety of authentication helps to improve user to the access speed of each device end, improves work efficiency.
2, the present invention is improved by carrying out alarm to authentication failure operation using alarm modules to without permissionOperate sensing capability when equipment.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment requiredAttached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for abilityFor the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attachedFigure.
Fig. 1 is a kind of access authentication method flow chart based on 5G super-intensive network of the invention;
Fig. 2 is a kind of access authentication system figure based on 5G super-intensive network of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based onEmbodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all otherEmbodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, a kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains the identity information of user and identity information is sent to authentication unit;
Judge whether the identity information stored in identity information and database checks success;
In the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to authentication, obtain secret key and key information is forwarded to user terminal and each device end;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device endInformation is veritified;
If veritification passes through, equipment is opened.
Preferably, judge whether the identity information stored in identity information and database checks success, specifically include: willThe identity information stored in identity information and database is checked.
It please refers to shown in Fig. 2, a kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and identity information is sent to authentication unit;
Information checks unit, is configured as judging whether the identity information stored in identity information and database is checked intoFunction, wherein in the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Secret key obtains retransmission unit, is configured to respond to authentication and passes through, and obtains secret key and forwards key informationTo user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end instituteThe key information of acquisition is veritified, wherein is passed through if veritifying, is opened equipment.
Wherein, it includes identification module that identity information, which obtains retransmission unit, identification module be fingerprint identification device,One of face recognition device and iris identification equipment are a variety of.
Wherein, information verification unit includes authentication module, database and alarm modules;Authentication module passes through numberIt is connect according to information downloading module with database;Authentication module is connect by data information uploading module with alarm modules.
Wherein, it includes master control set that secret key, which obtains retransmission unit,;Master control set is configured as establishing number with each device endIt is believed that breath transmission connection.
Wherein, device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodimentPoint, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specificTitle is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above methodIt is that relevant hardware can be instructed to complete by program, corresponding program can store to be situated between in a computer-readable storageIn matter, the storage medium, such as ROM/RAM, disk or CD.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodimentAll details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present inventionPrinciple and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is onlyIt is limited by claims and its full scope and equivalent.