CN109362078A - A kind of access authentication method and its system based on 5G super-intensive network - Google Patents
A kind of access authentication method and its system based on 5G super-intensive network Download PDFInfo
- Publication number
- CN109362078A CN109362078A CN201811308457.3A CN201811308457A CN109362078A CN 109362078 A CN109362078 A CN 109362078A CN 201811308457 A CN201811308457 A CN 201811308457A CN 109362078 A CN109362078 A CN 109362078A
- Authority
- CN
- China
- Prior art keywords
- authentication
- identity information
- device end
- information
- super
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 15
- 230000004044 response Effects 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 7
- 230000009471 action Effects 0.000 claims description 5
- 238000012546 transfer Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 5
- 230000008901 benefit Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000000707 wrist Anatomy 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The invention discloses a kind of access authentication methods and its system based on 5G super-intensive network, are related to authentication method and its systems technology field.The present invention is the following steps are included: obtaining identity information and identity information being sent to authentication unit;Judge whether the identity information stored in identity information and database checks success;Pass through in response to authentication, obtain secret key and key information is forwarded to user terminal and each device end;The key information that device end acquisition user is inputted, and the key information and key information acquired in device end are veritified;If veritification passes through, equipment is opened.The present invention is by carrying out authentication to user using master control set, and assistant authentification is carried out to each device end after user identity authentication passes through, reduce the fussy degree when carrying out authentication to each device end, it ensure that the safety of authentication simultaneously, user is helped to improve to the access speed of each device end, is improved work efficiency.
Description
Technical field
The invention belongs to authentication method and its systems technology fields, more particularly to a kind of connecing based on 5G super-intensive network
Enter authentication method and its system.
Background technique
5G is the abbreviation of the 5th third-generation mobile communication technology.Super-intensive network is one of core technology of 5G, 5G super-intensive net
Network can substantially reduce the distance of user's access by the Scaledeployment of wireless access point, thus improve the handling capacity of user with
And the handling capacity (bps/km2) in region, it is the key technology for meeting 5G power system capacity demand.5G network is mobile logical as the 5th generation
Communication network, peak value theoretical transmission speed is up to tens of Gb per second, and this hundreds times faster than the transmission speed of 4G network, whole superelevation
Picture quality movie can download completion within 1 second.The main target of 5G network is that terminal user is allowed to be in connected state always.5G net
It is smart phone that the equipment that network is supported in the future, which is run far deeper than, --- it will also support smartwatch, body building wrist strap, wired home to set
Standby such as nest type room thermostat, therefore 5G network more will provide technical support to Internet of Things.
Currently, can be encrypted due to safety concerns to smart machine when using smart machine, that is, pass through identity
Certification can just operate equipment, to prevent being operated without permission to equipment, but the place more in smart machine, if
It is then excessively cumbersome that authentication is all carried out when using smart machine every time, is unfavorable for the promotion of working efficiency.
Summary of the invention
The purpose of the present invention is to provide a kind of access authentication methods and its system based on 5G super-intensive network, pass through benefit
Authentication is carried out to user with master control set, and assistant authentification is carried out to each device end after user identity authentication passes through,
The fussy degree when carrying out authentication to each device end is reduced, while ensure that the safety of authentication, is helped
It in improving user to the access speed of each device end, improves work efficiency, solves existing before using smart machine
The excessively cumbersome problem of authentication procedures.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
A kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains identity information and the identity information is sent to authentication unit;
Judge whether the identity information stored in the identity information and database checks success;
In the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to the authentication, obtain secret key and key information is forwarded to user terminal and each equipment end
End;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device end
Information is veritified;
If the veritification passes through, equipment is opened.
Preferably, described to judge whether the identity information stored in the identity information and database checks success, have
Body includes: to check the identity information stored in the identity information and database.
A kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and the identity information is sent to certification list
Member;
Information checks unit, be configured as judging the identity information stored in the identity information and database whether core
To success, wherein in the successful situation of verification, authentication passes through;In the case where checking failure, alarm behaviour is executed
Make;
Secret key obtains retransmission unit, is configured to respond to the authentication and passes through, and obtains secret key and by key information
It is forwarded to user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end institute
The key information of acquisition is veritified, wherein if the veritification passes through, opens equipment.
Preferably, it includes identification module that the identity information, which obtains retransmission unit, and the identification module is to refer to
Line identifies one of equipment, face recognition device and iris identification equipment or a variety of.
Preferably, the information verification unit includes authentication module, database and alarm modules;The authentication
Module is connect by data information download module with database;The authentication module passes through data information uploading module and police
Report module connection.
Preferably, it includes master control set that the secret key, which obtains retransmission unit,;The master control set is configured as and each equipment
Terminal establishes data information transfer connection.
Preferably, the device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
The invention has the following advantages:
1, of the invention by carrying out authentication to user using master control set, and to each after user identity authentication passes through
Device end carries out assistant authentification, reduces the fussy degree when carrying out authentication to each device end, ensure that simultaneously
The safety of authentication helps to improve user to the access speed of each device end, improves work efficiency.
2, the present invention is improved by carrying out alarm to authentication failure operation using alarm modules to without permission
Operate sensing capability when equipment.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment required
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of access authentication method flow chart based on 5G super-intensive network of the invention;
Fig. 2 is a kind of access authentication system figure based on 5G super-intensive network of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
Refering to Figure 1, a kind of access authentication method based on 5G super-intensive network, comprising the following steps:
It obtains the identity information of user and identity information is sent to authentication unit;
Judge whether the identity information stored in identity information and database checks success;
In the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to authentication, obtain secret key and key information is forwarded to user terminal and each device end;
The key information that is inputted of device end acquisition user, and by secret key acquired in the key information and device end
Information is veritified;
If veritification passes through, equipment is opened.
Preferably, judge whether the identity information stored in identity information and database checks success, specifically include: will
The identity information stored in identity information and database is checked.
It please refers to shown in Fig. 2, a kind of access authentication system based on 5G super-intensive network, comprising:
Identity information obtains retransmission unit, is configured as obtaining identity information and identity information is sent to authentication unit;
Information checks unit, is configured as judging whether the identity information stored in identity information and database is checked into
Function, wherein in the case where checking successful situation, authentication passes through;In the case where checking failure, alert action is executed;
Secret key obtains retransmission unit, is configured to respond to authentication and passes through, and obtains secret key and forwards key information
To user terminal and each device end;
Device end, is configured as the key information that is inputted of acquisition user, and by the key information and device end institute
The key information of acquisition is veritified, wherein is passed through if veritifying, is opened equipment.
Wherein, it includes identification module that identity information, which obtains retransmission unit, identification module be fingerprint identification device,
One of face recognition device and iris identification equipment are a variety of.
Wherein, information verification unit includes authentication module, database and alarm modules;Authentication module passes through number
It is connect according to information downloading module with database;Authentication module is connect by data information uploading module with alarm modules.
Wherein, it includes master control set that secret key, which obtains retransmission unit,;Master control set is configured as establishing number with each device end
It is believed that breath transmission connection.
Wherein, device end is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
It is worth noting that, included each unit is only drawn according to function logic in the above system embodiment
Point, but be not limited to the above division, as long as corresponding functions can be realized;In addition, each functional unit is specific
Title is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in the various embodiments described above method
It is that relevant hardware can be instructed to complete by program, corresponding program can store to be situated between in a computer-readable storage
In matter, the storage medium, such as ROM/RAM, disk or CD.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment
All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,
It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention
Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only
It is limited by claims and its full scope and equivalent.
Claims (7)
1. a kind of access authentication method based on 5G super-intensive network, which comprises the following steps:
It obtains identity information and the identity information is sent to authentication unit;
Judge whether the identity information stored in the identity information and database checks success;
In the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Pass through in response to the authentication, obtain secret key and key information is forwarded to user terminal and each device end;
The key information that is inputted of device end acquisition user, and by key information acquired in the key information and device end
It is veritified;
If the veritification passes through, equipment is opened.
2. a kind of access authentication method based on 5G super-intensive network according to claim 1, which is characterized in that described to sentence
Whether the identity information stored in the identity information and database that breaks checks success, specifically includes:
The identity information stored in the identity information and database is checked.
3. a kind of access authentication system based on 5G super-intensive network characterized by comprising
Identity information obtains retransmission unit, is configured as obtaining identity information and the identity information is sent to authentication unit;
Information checks unit, is configured as judging whether the identity information stored in the identity information and database is checked into
Function, wherein in the successful situation of verification, authentication passes through;In the case where checking failure, alert action is executed;
Secret key obtains retransmission unit, is configured to respond to the authentication and passes through, and obtains secret key and forwards key information
To user terminal and each device end;
Device end is configured as the key information that acquisition user is inputted, and will be acquired in the key information and device end
Key information veritified, wherein if it is described veritification pass through, open equipment.
4. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that the body
Part acquisition of information retransmission unit includes identification module, and the identification module is fingerprint identification device, recognition of face is set
One of standby and iris identification equipment is a variety of.
5. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that the letter
Breath verification unit includes authentication module, database and alarm modules;
The authentication module is connect by data information download module with database;The authentication module passes through data
Information uploading module is connect with alarm modules.
6. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that described close
It includes master control set that spoon, which obtains retransmission unit,;The master control set is configured as establishing data information transfer company with each device end
It connects.
7. a kind of access authentication system based on 5G super-intensive network according to claim 3, which is characterized in that described to set
Standby terminal is Intelligent office equipment and/or smart home device and/or intelligent instructional device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811308457.3A CN109362078A (en) | 2018-11-05 | 2018-11-05 | A kind of access authentication method and its system based on 5G super-intensive network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811308457.3A CN109362078A (en) | 2018-11-05 | 2018-11-05 | A kind of access authentication method and its system based on 5G super-intensive network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109362078A true CN109362078A (en) | 2019-02-19 |
Family
ID=65344028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811308457.3A Pending CN109362078A (en) | 2018-11-05 | 2018-11-05 | A kind of access authentication method and its system based on 5G super-intensive network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109362078A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101051905A (en) * | 2007-05-15 | 2007-10-10 | 谢川 | Agent identity certificiation method |
CN101051908A (en) * | 2007-05-21 | 2007-10-10 | 北京飞天诚信科技有限公司 | Dynamic cipher certifying system and method |
US20080184029A1 (en) * | 2007-01-30 | 2008-07-31 | Sims John B | Method and system for generating digital fingerprint |
CN105491077A (en) * | 2016-02-26 | 2016-04-13 | 浙江维尔科技股份有限公司 | Identity authentication system |
CN206522020U (en) * | 2017-03-02 | 2017-09-26 | 冯云祥 | A kind of intelligent door lock and system |
-
2018
- 2018-11-05 CN CN201811308457.3A patent/CN109362078A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080184029A1 (en) * | 2007-01-30 | 2008-07-31 | Sims John B | Method and system for generating digital fingerprint |
CN101051905A (en) * | 2007-05-15 | 2007-10-10 | 谢川 | Agent identity certificiation method |
CN101051908A (en) * | 2007-05-21 | 2007-10-10 | 北京飞天诚信科技有限公司 | Dynamic cipher certifying system and method |
CN105491077A (en) * | 2016-02-26 | 2016-04-13 | 浙江维尔科技股份有限公司 | Identity authentication system |
CN206522020U (en) * | 2017-03-02 | 2017-09-26 | 冯云祥 | A kind of intelligent door lock and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104639624B (en) | A kind of method and apparatus for realizing mobile terminal remote access control | |
KR102275720B1 (en) | Bluetooth communication method and bluetooth communication device | |
CN105279416A (en) | Identity recognition method and system based on multi-biometric feature in combination with device fingerprint | |
CN202772921U (en) | Network login authentication protection system based on face identification | |
CN102915582A (en) | Face recognition-based residence visitor system | |
CN104902465B (en) | System of real name is opened an account remote writing-card method and system | |
CN105790957A (en) | eSIM card data sharing method and related equipment and system thereof | |
CN105488495A (en) | Identity identification method and system based on combination of face characteristics and device fingerprint | |
TWI241829B (en) | Remote control system | |
CN104091113A (en) | Method and system for achieving mobile terminal screen unlocking through NFC data matching | |
CN104299303A (en) | Intelligent access control system and implementation method of intelligent access control system | |
CN110414699A (en) | A kind of hotel occupancy method and system, computer readable storage medium | |
CN205899636U (en) | Intelligent gate inhibition system | |
CN109743722A (en) | It is connected to the network treating method and apparatus | |
CN107172223A (en) | A kind of sharing method and shared system based on communication terminal and remote server | |
CN104753898A (en) | Verification method, terminal and server | |
CN206292898U (en) | A kind of multiple-authentication safety-protection system | |
CN205541024U (en) | Two -dimensional code access control system | |
KR102303254B1 (en) | Authentication system for blockchain did | |
CN201590910U (en) | Mobile phone with personal identification function | |
CN108124009A (en) | A kind of office controls office software system and method with mobile phone remote | |
CN105025273A (en) | Building visible intercom system connection method, password setting method and system | |
CN105740719A (en) | Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof | |
CN109362078A (en) | A kind of access authentication method and its system based on 5G super-intensive network | |
CN106056798A (en) | Rapid bank card loss-reporting and reissuing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |
|
RJ01 | Rejection of invention patent application after publication |