CN109362078A - A kind of access authentication method and its system based on 5G super-intensive network - Google Patents

A kind of access authentication method and its system based on 5G super-intensive network Download PDF

Info

Publication number
CN109362078A
CN109362078A CN201811308457.3A CN201811308457A CN109362078A CN 109362078 A CN109362078 A CN 109362078A CN 201811308457 A CN201811308457 A CN 201811308457A CN 109362078 A CN109362078 A CN 109362078A
Authority
CN
China
Prior art keywords
authentication
identity information
device end
information
super
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811308457.3A
Other languages
Chinese (zh)
Inventor
黄河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Polytechnic
Original Assignee
Wenzhou Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Polytechnic filed Critical Wenzhou Polytechnic
Priority to CN201811308457.3A priority Critical patent/CN109362078A/en
Publication of CN109362078A publication Critical patent/CN109362078A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention discloses a kind of access authentication methods and its system based on 5G super-intensive network, are related to authentication method and its systems technology field.The present invention is the following steps are included: obtaining identity information and identity information being sent to authentication unit;Judge whether the identity information stored in identity information and database checks success;Pass through in response to authentication, obtain secret key and key information is forwarded to user terminal and each device end;The key information that device end acquisition user is inputted, and the key information and key information acquired in device end are veritified;If veritification passes through, equipment is opened.The present invention is by carrying out authentication to user using master control set, and assistant authentification is carried out to each device end after user identity authentication passes through, reduce the fussy degree when carrying out authentication to each device end, it ensure that the safety of authentication simultaneously, user is helped to improve to the access speed of each device end, is improved work efficiency.

Description

A kind of access authentication method and its system based on 5G super-intensive network
Technical field
The invention belongs to authentication method and its systems technology fields, more particularly to a kind of connecing based on 5G super-intensive network Enter authentication method and its system.
Background technique
5G is the abbreviation of the 5th third-generation mobile communication technology.Super-intensive network is one of core technology of 5G, 5G super-intensive net Network can substantially reduce the distance of user's access by the Scaledeployment of wireless access point, thus improve the handling capacity of user with And the handling capacity (bps/km2) in region, it is the key technology for meeting 5G power system capacity demand.5G network is mobile logical as the 5th generation Communication network, peak value theoretical transmission speed is up to tens of Gb per second, and this hundreds times faster than the transmission speed of 4G network, whole superelevation Picture quality movie can download completion within 1 second.The main target of 5G network is that terminal user is allowed to be in connected state always.5G net It is smart phone that the equipment that network is supported in the future, which is run far deeper than, --- it will also support smartwatch, body building wrist strap, wired home to set Standby such as nest type room thermostat, therefore 5G network more will provide technical support to Internet of Things.
Currently, can be encrypted due to safety concerns to smart machine when using smart machine, that is, pass through identity Certification can just operate equipment, to prevent being operated without permission to equipment, but the place more in smart machine, if It is then excessively cumbersome that authentication is all carried out when using smart machine every time, is unfavorable for the promotion of working efficiency.
Summary of the invention
The purpose of the present invention is to provide a kind of access authentication methods and its system based on 5G super-intensive network, pass through benefit Authentication is carried out to user with master control set, and assistant authentification is carried out to each device end after user identity authentication passes through, The fussy degree when carrying out authentication to each device end is reduced, while ensure that the safety of authentication, is helped It in improving user to the access speed of each device end, improves work efficiency, solves existing before using smart machine The excessively cumbersome problem of authentication procedures.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
A kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains identity information and the identity information is sent to authentication unit;
Judge whether the identity information stored in the identity information and database checks success;
In the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to the authentication, obtain secret key and key information is forwarded to user terminal and each equipment end End;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device end Information is veritified;
If the veritification passes through, equipment is opened.
Preferably, described to judge whether the identity information stored in the identity information and database checks success, have Body includes: to check the identity information stored in the identity information and database.
A kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and the identity information is sent to certification list Member;
Information checks unit, be configured as judging the identity information stored in the identity information and database whether core To success, wherein in the successful situation of verification, authentication passes through;In the case where checking failure, alarm behaviour is executed Make;
Secret key obtains retransmission unit, is configured to respond to the authentication and passes through, and obtains secret key and by key information It is forwarded to user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end institute The key information of acquisition is veritified, wherein if the veritification passes through, opens equipment.
Preferably, it includes identification module that the identity information, which obtains retransmission unit, and the identification module is to refer to Line identifies one of equipment, face recognition device and iris identification equipment or a variety of.
Preferably, the information verification unit includes authentication module, database and alarm modules;The authentication Module is connect by data information download module with database;The authentication module passes through data information uploading module and police Report module connection.
Preferably, it includes master control set that the secret key, which obtains retransmission unit,;The master control set is configured as and each equipment Terminal establishes data information transfer connection.
Preferably, the device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
The invention has the following advantages:
1, of the invention by carrying out authentication to user using master control set, and to each after user identity authentication passes through Device end carries out assistant authentification, reduces the fussy degree when carrying out authentication to each device end, ensure that simultaneously The safety of authentication helps to improve user to the access speed of each device end, improves work efficiency.
2, the present invention is improved by carrying out alarm to authentication failure operation using alarm modules to without permission Operate sensing capability when equipment.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment required Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of access authentication method flow chart based on 5G super-intensive network of the invention;
Fig. 2 is a kind of access authentication system figure based on 5G super-intensive network of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, a kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains the identity information of user and identity information is sent to authentication unit;
Judge whether the identity information stored in identity information and database checks success;
In the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to authentication, obtain secret key and key information is forwarded to user terminal and each device end;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device end Information is veritified;
If veritification passes through, equipment is opened.
Preferably, judge whether the identity information stored in identity information and database checks success, specifically include: will The identity information stored in identity information and database is checked.
It please refers to shown in Fig. 2, a kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and identity information is sent to authentication unit;
Information checks unit, is configured as judging whether the identity information stored in identity information and database is checked into Function, wherein in the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Secret key obtains retransmission unit, is configured to respond to authentication and passes through, and obtains secret key and forwards key information To user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end institute The key information of acquisition is veritified, wherein is passed through if veritifying, is opened equipment.
Wherein, it includes identification module that identity information, which obtains retransmission unit, identification module be fingerprint identification device, One of face recognition device and iris identification equipment are a variety of.
Wherein, information verification unit includes authentication module, database and alarm modules;Authentication module passes through number It is connect according to information downloading module with database;Authentication module is connect by data information uploading module with alarm modules.
Wherein, it includes master control set that secret key, which obtains retransmission unit,;Master control set is configured as establishing number with each device end It is believed that breath transmission connection.
Wherein, device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodiment Point, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specific Title is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above method It is that relevant hardware can be instructed to complete by program, corresponding program can store to be situated between in a computer-readable storage In matter, the storage medium, such as ROM/RAM, disk or CD.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (7)

1. a kind of access authentication method based on 5G super-intensive network, which comprises the following steps:
It obtains identity information and the identity information is sent to authentication unit;
Judge whether the identity information stored in the identity information and database checks success;
In the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to the authentication, obtain secret key and key information is forwarded to user terminal and each device end;
The key information that is inputted of device end acquisition user, and by key information acquired in the key information and device end It is veritified;
If the veritification passes through, equipment is opened.
2. a kind of access authentication method based on 5G super-intensive network according to claim 1, which is characterized in that described to sentence Whether the identity information stored in the identity information and database that breaks checks success, specifically includes:
The identity information stored in the identity information and database is checked.
3. a kind of access authentication system based on 5G super-intensive network characterized by comprising
Identity information obtains retransmission unit, is configured as obtaining identity information and the identity information is sent to authentication unit;
Information checks unit, is configured as judging whether the identity information stored in the identity information and database is checked into Function, wherein in the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Secret key obtains retransmission unit, is configured to respond to the authentication and passes through, and obtains secret key and forwards key information To user terminal and each device end;
Device end is configured as the key information that acquisition user is inputted, and will be acquired in the key information and device end Key information veritified, wherein if it is described veritification pass through, open equipment.
4. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that the body Part acquisition of information retransmission unit includes identification module, and the identification module is fingerprint identification device, recognition of face is set One of standby and iris identification equipment is a variety of.
5. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that the letter Breath verification unit includes authentication module, database and alarm modules;
The authentication module is connect by data information download module with database;The authentication module passes through data Information uploading module is connect with alarm modules.
6. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that described close It includes master control set that spoon, which obtains retransmission unit,;The master control set is configured as establishing data information transfer company with each device end It connects.
7. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that described to set Standby terminal is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
CN201811308457.3A 2018-11-05 2018-11-05 A kind of access authentication method and its system based on 5G super-intensive network Pending CN109362078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811308457.3A CN109362078A (en) 2018-11-05 2018-11-05 A kind of access authentication method and its system based on 5G super-intensive network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811308457.3A CN109362078A (en) 2018-11-05 2018-11-05 A kind of access authentication method and its system based on 5G super-intensive network

Publications (1)

Publication Number Publication Date
CN109362078A true CN109362078A (en) 2019-02-19

Family

ID=65344028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811308457.3A Pending CN109362078A (en) 2018-11-05 2018-11-05 A kind of access authentication method and its system based on 5G super-intensive network

Country Status (1)

Country Link
CN (1) CN109362078A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051905A (en) * 2007-05-15 2007-10-10 谢川 Agent identity certificiation method
CN101051908A (en) * 2007-05-21 2007-10-10 北京飞天诚信科技有限公司 Dynamic cipher certifying system and method
US20080184029A1 (en) * 2007-01-30 2008-07-31 Sims John B Method and system for generating digital fingerprint
CN105491077A (en) * 2016-02-26 2016-04-13 浙江维尔科技股份有限公司 Identity authentication system
CN206522020U (en) * 2017-03-02 2017-09-26 冯云祥 A kind of intelligent door lock and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080184029A1 (en) * 2007-01-30 2008-07-31 Sims John B Method and system for generating digital fingerprint
CN101051905A (en) * 2007-05-15 2007-10-10 谢川 Agent identity certificiation method
CN101051908A (en) * 2007-05-21 2007-10-10 北京飞天诚信科技有限公司 Dynamic cipher certifying system and method
CN105491077A (en) * 2016-02-26 2016-04-13 浙江维尔科技股份有限公司 Identity authentication system
CN206522020U (en) * 2017-03-02 2017-09-26 冯云祥 A kind of intelligent door lock and system

Similar Documents

Publication Publication Date Title
CN104639624B (en) A kind of method and apparatus for realizing mobile terminal remote access control
KR102275720B1 (en) Bluetooth communication method and bluetooth communication device
CN105279416A (en) Identity recognition method and system based on multi-biometric feature in combination with device fingerprint
CN202772921U (en) Network login authentication protection system based on face identification
CN102915582A (en) Face recognition-based residence visitor system
CN104902465B (en) System of real name is opened an account remote writing-card method and system
CN105790957A (en) eSIM card data sharing method and related equipment and system thereof
CN105488495A (en) Identity identification method and system based on combination of face characteristics and device fingerprint
TWI241829B (en) Remote control system
CN104091113A (en) Method and system for achieving mobile terminal screen unlocking through NFC data matching
CN104299303A (en) Intelligent access control system and implementation method of intelligent access control system
CN110414699A (en) A kind of hotel occupancy method and system, computer readable storage medium
CN205899636U (en) Intelligent gate inhibition system
CN109743722A (en) It is connected to the network treating method and apparatus
CN107172223A (en) A kind of sharing method and shared system based on communication terminal and remote server
CN104753898A (en) Verification method, terminal and server
CN206292898U (en) A kind of multiple-authentication safety-protection system
CN205541024U (en) Two -dimensional code access control system
KR102303254B1 (en) Authentication system for blockchain did
CN201590910U (en) Mobile phone with personal identification function
CN108124009A (en) A kind of office controls office software system and method with mobile phone remote
CN105025273A (en) Building visible intercom system connection method, password setting method and system
CN105740719A (en) Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof
CN109362078A (en) A kind of access authentication method and its system based on 5G super-intensive network
CN106056798A (en) Rapid bank card loss-reporting and reissuing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219

RJ01 Rejection of invention patent application after publication