Movatterモバイル変換


[0]ホーム

URL:


CN109362078A - A 5G ultra-dense network-based access authentication method and system - Google Patents

A 5G ultra-dense network-based access authentication method and system
Download PDF

Info

Publication number
CN109362078A
CN109362078ACN201811308457.3ACN201811308457ACN109362078ACN 109362078 ACN109362078 ACN 109362078ACN 201811308457 ACN201811308457 ACN 201811308457ACN 109362078 ACN109362078 ACN 109362078A
Authority
CN
China
Prior art keywords
identity
information
authentication
identity information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811308457.3A
Other languages
Chinese (zh)
Inventor
黄河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Polytechnic
Original Assignee
Wenzhou Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou PolytechnicfiledCriticalWenzhou Polytechnic
Priority to CN201811308457.3ApriorityCriticalpatent/CN109362078A/en
Publication of CN109362078ApublicationCriticalpatent/CN109362078A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种基于5G超密集网络的接入认证方法及其系统,涉及认证方法及其系统技术领域。本发明包括以下步骤:获取身份信息并将身份信息发送至认证单元;判断身份信息与数据库中所存储的身份信息是否核对成功;响应于身份认证通过,获取密匙并将密匙信息转发至用户终端及各设备终端;设备终端采集用户所输入的密匙信息,并将该密匙信息与设备终端所获取的密匙信息进行核验;若核验通过,则开启设备。本发明通过利用主控装置对用户进行身份认证,并在用户身份认证通过后对各设备终端进行辅助认证,降低了在向各设备终端进行身份认证时的繁琐程度,同时保证了身份认证的安全性,有助于提高用户对各设备终端的访问速度,提高了工作效率。

The invention discloses an access authentication method and system based on a 5G ultra-dense network, and relates to the technical field of authentication methods and systems. The present invention includes the following steps: obtaining identity information and sending the identity information to the authentication unit; judging whether the identity information is successfully checked with the identity information stored in the database; in response to passing the identity authentication, obtaining a key and forwarding the key information to the user The terminal and each device terminal; the device terminal collects the key information input by the user, and verifies the key information with the key information obtained by the device terminal; if the verification is passed, the device is turned on. The present invention uses the main control device to authenticate the user's identity, and performs auxiliary authentication to each device terminal after the user's identity authentication is passed, thereby reducing the complexity of performing identity authentication on each device terminal, and at the same time ensuring the security of the identity authentication. It is helpful to improve the user's access speed to each device terminal and improve work efficiency.

Description

A kind of access authentication method and its system based on 5G super-intensive network
Technical field
The invention belongs to authentication method and its systems technology fields, more particularly to a kind of connecing based on 5G super-intensive networkEnter authentication method and its system.
Background technique
5G is the abbreviation of the 5th third-generation mobile communication technology.Super-intensive network is one of core technology of 5G, 5G super-intensive netNetwork can substantially reduce the distance of user's access by the Scaledeployment of wireless access point, thus improve the handling capacity of user withAnd the handling capacity (bps/km2) in region, it is the key technology for meeting 5G power system capacity demand.5G network is mobile logical as the 5th generationCommunication network, peak value theoretical transmission speed is up to tens of Gb per second, and this hundreds times faster than the transmission speed of 4G network, whole superelevationPicture quality movie can download completion within 1 second.The main target of 5G network is that terminal user is allowed to be in connected state always.5G netIt is smart phone that the equipment that network is supported in the future, which is run far deeper than, --- it will also support smartwatch, body building wrist strap, wired home to setStandby such as nest type room thermostat, therefore 5G network more will provide technical support to Internet of Things.
Currently, can be encrypted due to safety concerns to smart machine when using smart machine, that is, pass through identityCertification can just operate equipment, to prevent being operated without permission to equipment, but the place more in smart machine, ifIt is then excessively cumbersome that authentication is all carried out when using smart machine every time, is unfavorable for the promotion of working efficiency.
Summary of the invention
The purpose of the present invention is to provide a kind of access authentication methods and its system based on 5G super-intensive network, pass through benefitAuthentication is carried out to user with master control set, and assistant authentification is carried out to each device end after user identity authentication passes through,The fussy degree when carrying out authentication to each device end is reduced, while ensure that the safety of authentication, is helpedIt in improving user to the access speed of each device end, improves work efficiency, solves existing before using smart machineThe excessively cumbersome problem of authentication procedures.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
A kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains identity information and the identity information is sent to authentication unit;
Judge whether the identity information stored in the identity information and database checks success;
In the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to the authentication, obtain secret key and key information is forwarded to user terminal and each equipment endEnd;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device endInformation is veritified;
If the veritification passes through, equipment is opened.
Preferably, described to judge whether the identity information stored in the identity information and database checks success, haveBody includes: to check the identity information stored in the identity information and database.
A kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and the identity information is sent to certification listMember;
Information checks unit, be configured as judging the identity information stored in the identity information and database whether coreTo success, wherein in the successful situation of verification, authentication passes through;In the case where checking failure, alarm behaviour is executedMake;
Secret key obtains retransmission unit, is configured to respond to the authentication and passes through, and obtains secret key and by key informationIt is forwarded to user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end instituteThe key information of acquisition is veritified, wherein if the veritification passes through, opens equipment.
Preferably, it includes identification module that the identity information, which obtains retransmission unit, and the identification module is to refer toLine identifies one of equipment, face recognition device and iris identification equipment or a variety of.
Preferably, the information verification unit includes authentication module, database and alarm modules;The authenticationModule is connect by data information download module with database;The authentication module passes through data information uploading module and policeReport module connection.
Preferably, it includes master control set that the secret key, which obtains retransmission unit,;The master control set is configured as and each equipmentTerminal establishes data information transfer connection.
Preferably, the device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
The invention has the following advantages:
1, of the invention by carrying out authentication to user using master control set, and to each after user identity authentication passes throughDevice end carries out assistant authentification, reduces the fussy degree when carrying out authentication to each device end, ensure that simultaneouslyThe safety of authentication helps to improve user to the access speed of each device end, improves work efficiency.
2, the present invention is improved by carrying out alarm to authentication failure operation using alarm modules to without permissionOperate sensing capability when equipment.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment requiredAttached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for abilityFor the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attachedFigure.
Fig. 1 is a kind of access authentication method flow chart based on 5G super-intensive network of the invention;
Fig. 2 is a kind of access authentication system figure based on 5G super-intensive network of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based onEmbodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all otherEmbodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, a kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains the identity information of user and identity information is sent to authentication unit;
Judge whether the identity information stored in identity information and database checks success;
In the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to authentication, obtain secret key and key information is forwarded to user terminal and each device end;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device endInformation is veritified;
If veritification passes through, equipment is opened.
Preferably, judge whether the identity information stored in identity information and database checks success, specifically include: willThe identity information stored in identity information and database is checked.
It please refers to shown in Fig. 2, a kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and identity information is sent to authentication unit;
Information checks unit, is configured as judging whether the identity information stored in identity information and database is checked intoFunction, wherein in the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Secret key obtains retransmission unit, is configured to respond to authentication and passes through, and obtains secret key and forwards key informationTo user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end instituteThe key information of acquisition is veritified, wherein is passed through if veritifying, is opened equipment.
Wherein, it includes identification module that identity information, which obtains retransmission unit, identification module be fingerprint identification device,One of face recognition device and iris identification equipment are a variety of.
Wherein, information verification unit includes authentication module, database and alarm modules;Authentication module passes through numberIt is connect according to information downloading module with database;Authentication module is connect by data information uploading module with alarm modules.
Wherein, it includes master control set that secret key, which obtains retransmission unit,;Master control set is configured as establishing number with each device endIt is believed that breath transmission connection.
Wherein, device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodimentPoint, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specificTitle is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above methodIt is that relevant hardware can be instructed to complete by program, corresponding program can store to be situated between in a computer-readable storageIn matter, the storage medium, such as ROM/RAM, disk or CD.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodimentAll details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present inventionPrinciple and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is onlyIt is limited by claims and its full scope and equivalent.

Claims (7)

Translated fromChinese
1.一种基于5G超密集网络的接入认证方法,其特征在于,包括以下步骤:1. an access authentication method based on 5G ultra-dense network, is characterized in that, comprises the following steps:获取身份信息并将所述身份信息发送至认证单元;Obtain identity information and send the identity information to the authentication unit;判断所述身份信息与数据库中所存储的身份信息是否核对成功;Determine whether the identity information is successfully checked with the identity information stored in the database;在所述核对成功的情况下,身份认证通过;在核对失败的情况下,执行警报操作;In the case that the verification is successful, the identity authentication is passed; in the case of the verification failure, an alarm operation is performed;响应于所述身份认证通过,获取密匙并将密匙信息转发至用户终端及各设备终端;In response to passing the identity authentication, obtain a key and forward the key information to the user terminal and each device terminal;设备终端采集用户所输入的密匙信息,并将该密匙信息与设备终端所获取的密匙信息进行核验;The device terminal collects the key information input by the user, and verifies the key information with the key information obtained by the device terminal;若所述核验通过,则开启设备。If the verification is passed, the device is turned on.2.根据权利要求1所述的一种基于5G超密集网络的接入认证方法,其特征在于,所述判断所述身份信息与数据库中所存储的身份信息是否核对成功,具体包括:2. a kind of access authentication method based on 5G ultra-dense network according to claim 1, is characterized in that, described judging whether described identity information and the identity information stored in the database are checked successfully, specifically comprises:将所述身份信息与数据库中所存储的身份信息进行核对。The identity information is checked against identity information stored in a database.3.一种基于5G超密集网络的接入认证系统,其特征在于,包括:3. An access authentication system based on a 5G ultra-dense network, characterized in that, comprising:身份信息获取转发单元,被配置为获取身份信息并将所述身份信息发送至认证单元;an identity information acquisition and forwarding unit, configured to acquire identity information and send the identity information to the authentication unit;信息核对单元,被配置为判断所述身份信息与数据库中所存储的身份信息是否核对成功,其中,在所述核对成功的情况下,身份认证通过;在核对失败的情况下,执行警报操作;an information verification unit, configured to determine whether the identity information is successfully checked with the identity information stored in the database, wherein, in the case of successful verification, the identity authentication is passed; in the case of failure in the verification, an alarm operation is performed;密匙获取转发单元,被配置为响应于所述身份认证通过,获取密匙并将密匙信息转发至用户终端及各设备终端;a key obtaining and forwarding unit, configured to obtain a key and forward the key information to the user terminal and each device terminal in response to the identity authentication passing;设备终端,被配置为采集用户所输入的密匙信息,并将该密匙信息与设备终端所获取的密匙信息进行核验,其中,若所述核验通过,则开启设备。The device terminal is configured to collect the key information input by the user, and verify the key information with the key information obtained by the device terminal, wherein if the verification is passed, the device is turned on.4.根据权利要求3所述的一种基于5G超密集网络的接入认证系统,其特征在于,所述身份信息获取转发单元包括身份识别模块,所述身份识别模块为指纹识别设备、人脸识别设备和虹膜识别设备中的一种或多种。4. a kind of access authentication system based on 5G ultra-dense network according to claim 3, is characterized in that, described identity information acquisition and forwarding unit comprises identity recognition module, and described identity recognition module is fingerprint recognition equipment, human face One or more of a recognition device and an iris recognition device.5.根据权利要求3所述的一种基于5G超密集网络的接入认证系统,其特征在于,所述信息核对单元包括身份认证模块、数据库和警报模块;5. A 5G ultra-dense network-based access authentication system according to claim 3, wherein the information verification unit comprises an identity authentication module, a database and an alarm module;所述身份认证模块通过数据信息下载模块与数据库连接;所述身份认证模块通过数据信息上传模块与警报模块连接。The identity authentication module is connected with the database through the data information downloading module; the identity authentication module is connected with the alarm module through the data information uploading module.6.根据权利要求3所述的一种基于5G超密集网络的接入认证系统,其特征在于,所述密匙获取转发单元包括主控装置;所述主控装置被配置为与各设备终端建立数据信息传输连接。The 5G ultra-dense network-based access authentication system according to claim 3, wherein the key acquisition and forwarding unit comprises a main control device; the main control device is configured to communicate with each device terminal Establish a data information transmission connection.7.根据权利要求3所述的一种基于5G超密集网络的接入认证系统,其特征在于,所述设备终端为智能办公设备和/或智能家居设备和/或智能教学设备。7 . The access authentication system based on 5G ultra-dense network according to claim 3 , wherein the device terminal is an intelligent office device and/or a smart home device and/or an intelligent teaching device. 8 .
CN201811308457.3A2018-11-052018-11-05 A 5G ultra-dense network-based access authentication method and systemPendingCN109362078A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811308457.3ACN109362078A (en)2018-11-052018-11-05 A 5G ultra-dense network-based access authentication method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811308457.3ACN109362078A (en)2018-11-052018-11-05 A 5G ultra-dense network-based access authentication method and system

Publications (1)

Publication NumberPublication Date
CN109362078Atrue CN109362078A (en)2019-02-19

Family

ID=65344028

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811308457.3APendingCN109362078A (en)2018-11-052018-11-05 A 5G ultra-dense network-based access authentication method and system

Country Status (1)

CountryLink
CN (1)CN109362078A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101051905A (en)*2007-05-152007-10-10谢川Agent identity certificiation method
CN101051908A (en)*2007-05-212007-10-10北京飞天诚信科技有限公司Dynamic cipher certifying system and method
US20080184029A1 (en)*2007-01-302008-07-31Sims John BMethod and system for generating digital fingerprint
CN105491077A (en)*2016-02-262016-04-13浙江维尔科技股份有限公司Identity authentication system
CN206522020U (en)*2017-03-022017-09-26冯云祥A kind of intelligent door lock and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080184029A1 (en)*2007-01-302008-07-31Sims John BMethod and system for generating digital fingerprint
CN101051905A (en)*2007-05-152007-10-10谢川Agent identity certificiation method
CN101051908A (en)*2007-05-212007-10-10北京飞天诚信科技有限公司Dynamic cipher certifying system and method
CN105491077A (en)*2016-02-262016-04-13浙江维尔科技股份有限公司Identity authentication system
CN206522020U (en)*2017-03-022017-09-26冯云祥A kind of intelligent door lock and system

Similar Documents

PublicationPublication DateTitle
CN109905235B (en) A smart lock unlocking method, smart lock, terminal, server and system
KR102275720B1 (en)Bluetooth communication method and bluetooth communication device
KR102303254B1 (en)Authentication system for blockchain did
CN202772921U (en)Network login authentication protection system based on face identification
CN107689944A (en)Identity identifying method, device and system
BR112013000214A2 (en) method to allow, in a communication device, an indirect communication channel between the communication device and at least one additional communication device, communication device to allow an indirect communication channel between the communication device and at least one communication device additional communications, and computer program product
CN105282868B (en)System and method for WiFi network to be temporarily added
CN104159223A (en)Identification method for relay communication user
CN103237030A (en)Biological recognition-based user authentication method and system
CN106559213B (en)Equipment management method, equipment and system
CN107682363B (en)Intelligent household product safety communication method, system and computer readable storage medium
TWI241829B (en)Remote control system
CN108810891A (en) An authentication method for realizing network access, authentication equipment and user equipment
CN110176091A (en)A method of smart lock safety is improved by mobile terminal device code
CN108282768A (en)Bluetooth equipment shares control and requesting method and electronic equipment
WO2021017567A1 (en)Door lock control system and method, display control terminal and door lock control device
TW201348568A (en)Multi-functional access control device structure and method of authentication
CN107172223A (en)A kind of sharing method and shared system based on communication terminal and remote server
CN206292898U (en)A kind of multiple-authentication safety-protection system
JP2017102842A (en)Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
CN104579639B (en)The realization of multi-party collaborative authorization secret key and move the system of controlled in wireless with it
CN105516172A (en)Identity authentication terminal, identity authentication system and online affair handling platform
CN104902476A (en)Control method for Bluetooth security management
CN109362078A (en) A 5G ultra-dense network-based access authentication method and system
CN104331649A (en)Identity recognition system and method based on network connection

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20190219


[8]ページ先頭

©2009-2025 Movatter.jp