CN113301566A - Two-standard four-real data security access system based on 5G edge calculation - Google Patents

Two-standard four-real data security access system based on 5G edge calculation Download PDF

Info

Publication number
CN113301566A
CN113301566A CN202110572471.XA CN202110572471A CN113301566A CN 113301566 A CN113301566 A CN 113301566A CN 202110572471 A CN202110572471 A CN 202110572471A CN 113301566 A CN113301566 A CN 113301566A
Authority
CN
China
Prior art keywords
key
verification
beidou
real
machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110572471.XA
Other languages
Chinese (zh)
Other versions
CN113301566B (en
Inventor
练镜锋
宋德寿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Hantele Communication Co ltd
Original Assignee
Guangzhou Hantele Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Hantele Communication Co ltd filed Critical Guangzhou Hantele Communication Co ltd
Priority to CN202110572471.XA priority Critical patent/CN113301566B/en
Publication of CN113301566A publication Critical patent/CN113301566A/en
Application granted granted Critical
Publication of CN113301566B publication Critical patent/CN113301566B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/06Airborne or Satellite Networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Operations Research (AREA)
  • Algebra (AREA)
  • Evolutionary Biology (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Astronomy & Astrophysics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a two-standard four-real data security access system based on 5G edge calculation, which comprises the following steps: the key generating machine is used for carrying out identity verification on the user and acquiring a key sent by the Beidou controller after the verification is successful; the key verification machine is associated with the key generator and is used for acquiring a key obtained by a user through the key generator; the 5G edge computing system comprises a key verification device, interacts with a 5G base station through a 5G air interface and further interacts with the key verification machine through a 5G slicing technology, is used for obtaining the key, and verifies the key through the key verification device to obtain a verification result; the second-label four-real system platform is deployed in a public security internal network and used for storing second-label four-real data and allowing the key verification machine to access when a verification result obtained by the 5G edge computing system passes; the invention can use the key generator and the key verifier outside the public security private network to provide the precondition for the external network user to access the public security internal network two-standard four-real platform data.

Description

Two-standard four-real data security access system based on 5G edge calculation
Technical Field
The invention relates to the technical field of communication, in particular to a two-standard four-real data security access system based on 5G edge calculation.
Background
The 'two-label four-reality' is a basic informationized project of public security. The basic information service engineering is perfected by collecting and warehousing standard base maps, standard addresses (called as 'two-standard' for short) and information of real population, real house, real unit and real facility, and the basic police affairs of public security actual combat, illegal crime attack and comprehensive tamped community are served by public security departments. From the view of working content, "two standard four real", first, based on the standard operation chart, collect the standard address data of the house building, set up the standard data information base; then collecting all real population, real house, real unit and real facility information in the universe range to complete business association construction; then, cleaning and checking the 'heavy, wrong and missing' doorplates, arranging the doorplates, and manufacturing nailed intelligent doorplates; and finally, constructing a data integration management, space data acquisition, map analysis and application display system.
The traditional solution for deploying the system with the two standards and the four realities is to deploy the system in a public security intranet for accessing a special person, a special machine, a special line and a special network. This solution is inefficient and does not allow immediate data access from the public security extranet. The two-label four-piece data has low utilization rate, and cannot meet the policy requirements of making the data run more and making the masses run less. The acquired data needs to be input in a special person, a special machine, a special line and a special network in the public security intranet, the delivery time cannot be guaranteed, and the project budget cannot be guaranteed.
The safety of the data transmission process is ensured by the existing public security intranet data transmission mechanism of a special person, a special machine, a special line and a special network, and the safety transmission of data is realized through a safe process.
The traditional two-standard four-real system is deployed in a public security intranet, and laws and regulations require that the public security intranet needs to be accessed by a special person, a special plane, a special line and a special network. This determines that the conventional two-standard four-real data acquisition is inefficient, and the conventional 4G mobile terminal has difficulty accessing data.
Disclosure of Invention
The invention aims to solve at least one of the defects of the prior art and provides a two-standard four-real data security access system based on 5G edge calculation.
In order to achieve the purpose, the invention adopts the following technical scheme:
specifically, a two-standard four-real data security access system based on 5G edge calculation is provided, which comprises the following steps:
the key generating machine is used for carrying out identity verification on the user and acquiring a key sent by the Beidou controller after the verification is successful;
the key verification machine is associated with the key generator and is used for acquiring a key obtained by a user through the key generator;
the 5G edge computing system comprises a key verification device, interacts with a 5G base station through a 5G air interface and further interacts with the key verification machine through a 5G slicing technology, is used for obtaining the key, and verifies the key through the key verification device to obtain a verification result;
the second-label-four-real system platform is deployed in a public security internal network and used for storing second-label-four-real data and allowing the key verification machine to access when a verification result obtained by the 5G edge computing system passes;
and the Beidou control machine is communicated with the key generator through the Beidou satellite and sends the key to the key generator according to the timestamp and the related data of the two-standard four-real system platform.
Further, the key generation tool includes,
the face verification module is used for acquiring face information of the user and verifying the face information according to the face information of the user to obtain a first result;
the identity card verification module is used for acquiring the identity card information of the user and verifying according to the identity card information of the user to obtain a second result;
and the key acquisition module is used for acquiring the third result and sending a request to a Beidou controller to acquire a key when the first result and the second result both pass through.
Further, the 5G edge computing system further comprises,
the front-end 5G core network is used for receiving the verification result of the key verification equipment and controlling the key verification machine to be allowed to access the two-standard four-real system platform according to the verification result;
and the rear 4G core network is used for receiving the data of the front 5G core network in a local transmission mode and processing the data.
Further, the front 5G core network is constructed based on a CU/DU separation architecture, and the rear 4G core network is constructed based on a BBU architecture.
Further, the two-standard four-real system platform also comprises,
and the safety module is in communication connection with the Beidou controller and is used for recording the Beidou coordinate range and the Beidou working time period of the working area which needs to be accessed by the preparation user of the key generation machine and the key verification machine in the next day.
Further, when the key generator and the Beidou controller carry out data interaction, the following rules are met,
assuming that a factor of allowed simultaneous average interaction times between the key generator and the Beidou controller is a, and the number of available communication channels is s, wherein a and s are both natural numbers;
then there is a relationship that exists as follows,
Figure BDA0003083063770000021
wherein the content of the first and second substances,
Figure BDA0003083063770000031
Figure BDA0003083063770000032
and (3) calculating to obtain the average request times of information interaction between the key generation machine and the Beidou control machine every time by combining the relational expression:
Figure BDA0003083063770000033
the method comprises the following steps:
Figure BDA0003083063770000034
where ρ is a/s and ρ < 1,
Figure BDA0003083063770000035
the average number of requests of the key generator and the Beidou controller in the waiting queue is obtained;
the average response time obtained by final calculation is:
Figure BDA0003083063770000036
wherein λ and μ are constants, satisfying λ/μ ═ a;
by adjusting the values of a and s, the average response time E [ w ] is finally made lower than the first threshold value to make the data interaction proceed stably.
The invention has the beneficial effects that:
the invention realizes secret communication through the two-standard four-real system platform deployed in the internal network of the public security and the 5G edge computing system and the Beidou controller respectively deployed in the public security organ
The original public security intranet special line and the bare optical fiber of the rented operator are reused, the 5G base station is connected with the edge computing system to realize the special line, the registrant, the controlled key generator and the controlled key verifier realize the special person and the special machine, and the edge computing system routes data to a superior organ through the public security internal special network through a controllable strategy to realize the special network;
based on the method, background system support is provided for realizing efficient acquisition of the four-real data and remote and safe access of the two-standard four-real data through the 5G terminal data.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic block diagram illustrating a two-standard four-real data security access system based on 5G edge calculation according to the present invention;
FIG. 2 is a two-standard four-data presentation diagram according to the present invention.
Detailed Description
The conception, the specific structure and the technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the accompanying drawings to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The same reference numbers will be used throughout the drawings to refer to the same or like parts.
Referring to fig. 1, embodiment 1, the present invention provides a two-standard four-real data security access system based on 5G edge calculation, which includes the following:
the key generating machine is used for carrying out identity verification on the user and acquiring a key sent by the Beidou controller after the verification is successful;
the key verification machine is associated with the key generator and is used for acquiring a key obtained by a user through the key generator;
the 5G edge computing system comprises a key verification device, interacts with a 5G base station through a 5G air interface and further interacts with the key verification machine through a 5G slicing technology, is used for obtaining the key, and verifies the key through the key verification device to obtain a verification result;
the second-label-four-real system platform is deployed in a public security internal network and used for storing second-label-four-real data and allowing the key verification machine to access when a verification result obtained by the 5G edge computing system passes;
and the Beidou control machine is communicated with the key generator through the Beidou satellite and sends the key to the key generator according to the timestamp and the related data of the two-standard four-real system platform.
Specifically, the access process of the two-label four-entity system platform is as follows:
the key verification machine is communicated with a 5G base station through a 5G air interface and accesses a key verification device in a 5G edge computing system through a 5G slice, the key verification is sent to a front 5G core network in the 5G edge system through a sending device 1, and the front 5G core network gives an instruction to allow the key verification machine to access a two-standard four-real system platform. And if the key verification fails, sending 0 to a front-end 5G core network in the front-end edge system, and giving an instruction to refuse the key verification machine to access the two-label four-real system platform by the front-end 5G core network.
The security module of the two-label four-real system platform is internally provided with all paired equipment information of the key generator and the key verifier, and the holder face data and the identity card chip of the key generator and the key verifier which are authorized to access record personal data. The security module of the two-standard four-real system platform also records the Beidou coordinate range and the Beidou working time period of the working area which needs to be accessed by the key generator and the key verifier in the next day. And the safety module of the two-standard four-real system platform is communicated with the Beidou controller. The Beidou control machine is communicated with the key generator through the Beidou satellite and sends the key to the key generator according to the timestamp and the safety module data of the two-standard four-real system platform, and the authorized user inputs the key into the key verification machine within the time limit.
The two-standard four-real system platform deployed in the internal network of the public security realizes secret communication with the 5G edge computing system and the Beidou controller deployed in the public security department respectively.
The original public security intranet special line and the bare optical fiber of the rented operator are reused, the 5G base station is connected with the edge computing system to realize the special line, the registrant, the controlled key generator and the controlled key verifier realize the special person and the special machine, and the edge computing system routes data to a superior organ through the public security internal special network through a controllable strategy to realize the special network.
As a preferred embodiment of the present invention, the key generation tool specifically includes,
the face verification module is used for acquiring face information of the user and verifying the face information according to the face information of the user to obtain a first result;
the identity card verification module is used for acquiring the identity card information of the user and verifying according to the identity card information of the user to obtain a second result;
and the key acquisition module is used for acquiring the third result and sending a request to a Beidou controller to acquire a key when the first result and the second result both pass through.
In a preferred embodiment of the present invention, the 5G edge computing system further comprises,
the front-end 5G core network is used for receiving the verification result of the key verification equipment and controlling the key verification machine to be allowed to access the two-standard four-real system platform according to the verification result;
and the rear 4G core network is used for receiving the data of the front 5G core network in a local transmission mode and processing the data.
Referring to fig. 1, as a preferred embodiment of the present invention, the front 5G core network is constructed based on a CU/DU separation architecture, and the back 4G core network is constructed based on a BBU architecture.
In the preferred embodiment, the core network of the original 4G technology is arranged at the back, and the data collected by the front end is transmitted to the back end for processing, so that the data cannot be processed locally and the risk of data insecurity is increased because the data must be routed through a large network. The 5G edge calculation leads the calculation capability, carries out local transmission, and can carry out local processing without routing to a large network, thereby greatly reducing the risk of data leakage. The invention realizes the safe access of the data of the public security intranet by combining the Beidou satellite navigation system and the 5G technology.
As a preferred embodiment of the present invention, the two-label four-entity system platform further comprises,
and the safety module is in communication connection with the Beidou controller and is used for recording the Beidou coordinate range and the Beidou working time period of the working area which needs to be accessed by the preparation user of the key generation machine and the key verification machine in the next day.
In a preferred embodiment of the invention, when the key generator performs data interaction with the beidou controller, the following rules are satisfied,
assuming that a factor of allowed simultaneous average interaction times between the key generator and the Beidou controller is a, and the number of available communication channels is s, wherein a and s are both natural numbers;
then there is a relationship that exists as follows,
Figure BDA0003083063770000061
wherein the content of the first and second substances,
Figure BDA0003083063770000062
Figure BDA0003083063770000063
and (3) calculating to obtain the average request times of information interaction between the key generation machine and the Beidou control machine every time by combining the relational expression:
Figure BDA0003083063770000064
the method comprises the following steps:
Figure BDA0003083063770000065
where ρ is a/s and ρ < 1,
Figure BDA0003083063770000066
the average number of requests of the key generator and the Beidou controller in the waiting queue is obtained;
the average response time obtained by final calculation is:
Figure BDA0003083063770000067
wherein λ and μ are constants, satisfying λ/μ ═ a;
by adjusting the values of a and s, the average response time E [ w ] is finally made lower than the first threshold value to make the data interaction proceed stably.
In consideration of the problem that the server pressure is high due to overlarge local time interaction amount possibly occurring when the key generator interacts with the Beidou control machine of public security in the operation process, the relation between the instant messaging number and the communication channel is adjusted by calculating the average response time, so that the stable operation of the acquisition work is ensured.
In particular, when the system is actually used,
and configuring equipment information and authorized user information of the key generating machine and the key verifying machine in a security module of the system. The key verifier accesses a two-label four-entity system platform, the interface screenshot is as shown in figure 2,
the 5G base station communicates with the edge computing system deployed at the tidal city bureau over the bare fiber of the leased operator. The Chaozhou city public security bureau communicates with the Guangdong province public security hall through the original private network of the public security. And periodically sending the second-label fourth-real data through the public security private network according to the requirements of the provincial and public security hall. Personnel holding the key generator and key verifier register with the police department in the state of the tide. The key generator is communicated with a Beidou control machine controlled by a public security organization through a Beidou satellite navigation system. The key verifier accesses the 5G base station over the 5G air interface and communicates with an edge computing system deployed at the tidal city police over the leased operator's bare fiber.
The implementation of the Chaozhou city public bureau two-standard four-real project in the Chaozhou is realized by the deployment scheme of the two-standard four-real system based on 5G edge calculation, wherein the key generator and the key verifier are used in the Chaozhou.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the above-described method embodiments when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or system capable of carrying said computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and the present invention shall fall within the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (6)

1. Two-standard four-real data security access system based on 5G edge calculation is characterized by comprising the following steps:
the key generating machine is used for carrying out identity verification on the user and acquiring a key sent by the Beidou controller after the verification is successful;
the key verification machine is associated with the key generator and is used for acquiring a key obtained by a user through the key generator;
the 5G edge computing system comprises a key verification device, interacts with a 5G base station through a 5G air interface and further interacts with the key verification machine through a 5G slicing technology, is used for obtaining the key, and verifies the key through the key verification device to obtain a verification result;
the second-label-four-real system platform is deployed in a public security internal network and used for storing second-label-four-real data and allowing the key verification machine to access when a verification result obtained by the 5G edge computing system passes;
and the Beidou control machine is communicated with the key generator through the Beidou satellite and sends the key to the key generator according to the timestamp and the related data of the two-standard four-real system platform.
2. The 5G edge computation based two-label-four data security access system of claim 1, wherein the key generator entity comprises,
the face verification module is used for acquiring face information of the user and verifying the face information according to the face information of the user to obtain a first result;
the identity card verification module is used for acquiring the identity card information of the user and verifying according to the identity card information of the user to obtain a second result;
and the key acquisition module is used for acquiring the third result and sending a request to a Beidou controller to acquire a key when the first result and the second result both pass through.
3. The 5G edge computing based two-label-four data security access system of claim 1, wherein the 5G edge computing system further comprises,
the front-end 5G core network is used for receiving the verification result of the key verification equipment and controlling the key verification machine to be allowed to access the two-standard four-real system platform according to the verification result;
and the rear 4G core network is used for receiving the data of the front 5G core network in a local transmission mode and processing the data.
4. The 5G edge computation-based two-label-four-real data security access system according to claim 3, wherein the front-end 5G core network is constructed based on CU/DU separation architecture, and the back-end 4G core network is constructed based on BBU architecture.
5. The 5G edge computation-based two-label-four-real data security access system of claim 1, wherein the two-label-four-real system platform further comprises,
and the safety module is in communication connection with the Beidou controller and is used for recording the Beidou coordinate range and the Beidou working time period of the working area which needs to be accessed by the preparation user of the key generation machine and the key verification machine in the next day.
6. The 5G edge calculation-based two-standard-four-real data security access system as claimed in claim 1, wherein the key generator and the Beidou controller are in data interaction, and the following rules are satisfied,
assuming that a factor of allowed simultaneous average interaction times between the key generator and the Beidou controller is a, and the number of available communication channels is s, wherein a and s are both natural numbers;
then there is a relationship that exists as follows,
Figure FDA0003083063760000021
wherein the content of the first and second substances,
Figure FDA0003083063760000022
Figure FDA0003083063760000023
and (3) calculating to obtain the average request times of information interaction between the key generation machine and the Beidou control machine every time by combining the relational expression:
Figure FDA0003083063760000024
the method comprises the following steps:
Figure FDA0003083063760000025
where ρ is a/s and ρ < 1,
Figure FDA0003083063760000026
the average number of requests of the key generator and the Beidou controller in the waiting queue is obtained;
the average response time obtained by final calculation is:
Figure FDA0003083063760000027
wherein λ and μ are constants, satisfying λ/μ ═ a;
by adjusting the values of a and s, the average response time E [ w ] is finally made lower than the first threshold value to make the data interaction proceed stably.
CN202110572471.XA 2021-05-25 2021-05-25 Two-standard four-real data security access system based on 5G edge calculation Active CN113301566B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110572471.XA CN113301566B (en) 2021-05-25 2021-05-25 Two-standard four-real data security access system based on 5G edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110572471.XA CN113301566B (en) 2021-05-25 2021-05-25 Two-standard four-real data security access system based on 5G edge calculation

Publications (2)

Publication Number Publication Date
CN113301566A true CN113301566A (en) 2021-08-24
CN113301566B CN113301566B (en) 2022-07-12

Family

ID=77324926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110572471.XA Active CN113301566B (en) 2021-05-25 2021-05-25 Two-standard four-real data security access system based on 5G edge calculation

Country Status (1)

Country Link
CN (1) CN113301566B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314476A (en) * 2022-06-20 2022-11-08 深圳市臻为科技有限公司 Teleconference solution method and system based on audio and video conference device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908163A (en) * 2009-06-05 2010-12-08 深圳市脑库计算机系统有限公司 Expert-supported application system platform used for government affair and business affair decision and establishment method thereof
CN106452749A (en) * 2016-10-18 2017-02-22 北京骏逸通达信息服务有限公司 Method and system for carrying out secret key and data separated transmission by satellite communication
CN106875092A (en) * 2017-01-10 2017-06-20 广东精规划信息科技股份有限公司 A kind of movable police patrols special policeman's system
WO2017128306A1 (en) * 2016-01-29 2017-08-03 华为技术有限公司 Communication method and equipment
CN110798474A (en) * 2019-11-04 2020-02-14 国网思极神往位置服务(北京)有限公司 Power data transmission safety protection system based on Beidou short message communication mode
CN110798309A (en) * 2019-11-04 2020-02-14 国网思极神往位置服务(北京)有限公司 Intelligent meter access system based on Beidou short message communication transmission
US10693872B1 (en) * 2019-05-17 2020-06-23 Q5ID, Inc. Identity verification system
CN111444499A (en) * 2020-03-31 2020-07-24 中国人民解放军海军潜艇学院 User identity authentication method and system
CN111882863A (en) * 2020-06-24 2020-11-03 韩中中 Traffic comprehensive application platform based on Beidou and quantum security 5G Internet of things
CN112257691A (en) * 2020-12-21 2021-01-22 江苏移动信息系统集成有限公司 Community security implementation method, system and equipment based on 5G edge calculation
CN112492602A (en) * 2020-11-19 2021-03-12 武汉武钢绿色城市技术发展有限公司 5G terminal safety access device, system and equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908163A (en) * 2009-06-05 2010-12-08 深圳市脑库计算机系统有限公司 Expert-supported application system platform used for government affair and business affair decision and establishment method thereof
WO2017128306A1 (en) * 2016-01-29 2017-08-03 华为技术有限公司 Communication method and equipment
CN106452749A (en) * 2016-10-18 2017-02-22 北京骏逸通达信息服务有限公司 Method and system for carrying out secret key and data separated transmission by satellite communication
CN106875092A (en) * 2017-01-10 2017-06-20 广东精规划信息科技股份有限公司 A kind of movable police patrols special policeman's system
US10693872B1 (en) * 2019-05-17 2020-06-23 Q5ID, Inc. Identity verification system
CN110798474A (en) * 2019-11-04 2020-02-14 国网思极神往位置服务(北京)有限公司 Power data transmission safety protection system based on Beidou short message communication mode
CN110798309A (en) * 2019-11-04 2020-02-14 国网思极神往位置服务(北京)有限公司 Intelligent meter access system based on Beidou short message communication transmission
CN111444499A (en) * 2020-03-31 2020-07-24 中国人民解放军海军潜艇学院 User identity authentication method and system
CN111882863A (en) * 2020-06-24 2020-11-03 韩中中 Traffic comprehensive application platform based on Beidou and quantum security 5G Internet of things
CN112492602A (en) * 2020-11-19 2021-03-12 武汉武钢绿色城市技术发展有限公司 5G terminal safety access device, system and equipment
CN112257691A (en) * 2020-12-21 2021-01-22 江苏移动信息系统集成有限公司 Community security implementation method, system and equipment based on 5G edge calculation

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314476A (en) * 2022-06-20 2022-11-08 深圳市臻为科技有限公司 Teleconference solution method and system based on audio and video conference device

Also Published As

Publication number Publication date
CN113301566B (en) 2022-07-12

Similar Documents

Publication Publication Date Title
CN112232528A (en) Method and device for training federated learning model and federated learning system
CN107871232A (en) A kind of generation method and its terminal of customer visit plan
CN104217288A (en) Security management device and system for community comprehensive grid
CN101000702A (en) Self service system and method
CN109214784A (en) A kind of method, client, server and the system of fire-fighting inspection management
CN109829703A (en) Virtual objects distribution method and device
CN109472565A (en) A kind of electronics burgher card system and implementation method
CN113301566B (en) Two-standard four-real data security access system based on 5G edge calculation
CN109639719A (en) A kind of auth method and device based on temporary identifier
CN116579067B (en) Geographic information receiving and processing system and method based on CIM platform
CN108011872A (en) Personal information intelligent acquisition method and system
CN108710644A (en) One kind is about government affairs big data processing method
CN113220521A (en) Real-time monitoring system
CN103996035A (en) Passenger security check identity certification product
CN101030309A (en) Method for instant purchasing and checking tickets on bus
CN109726999A (en) A kind of household services card management system
CN103198428A (en) System and method for air depositing and withdrawing of bank
CN111586119B (en) Integrated cloud storage system and storage method thereof
CN113271591B (en) Two-standard four-real data encryption interaction method and device based on 5G slice network
CN117061165A (en) Safety protection system based on space-time data lake technology of monitoring and control system
CN103473657B (en) Hotel information acquisition system and its information collecting method
CN113364749B (en) Data acquisition method and system based on Beidou satellite navigation positioning
CN111382987A (en) Network office system based on high in clouds
CN113627963B (en) Electric power refined operation rule base creation method
CN111353926B (en) Police information cloud platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant