CN116193432B - Information security authentication method and system based on 5G network - Google Patents

Information security authentication method and system based on 5G network Download PDF

Info

Publication number
CN116193432B
CN116193432B CN202310490011.1A CN202310490011A CN116193432B CN 116193432 B CN116193432 B CN 116193432B CN 202310490011 A CN202310490011 A CN 202310490011A CN 116193432 B CN116193432 B CN 116193432B
Authority
CN
China
Prior art keywords
authentication
network
node
clue
isolation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310490011.1A
Other languages
Chinese (zh)
Other versions
CN116193432A (en
Inventor
黄红兵
邵炜平
李昂
章毅
汤亿则
邱兰馨
钱锦
王玮
王俊伟
王法辉
刘秀龙
饶子仁
荣宁
樊兆宾
沈秋泉
胡少清
杜猛俊
王源涛
王剑
张吉
张烨华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
China Mobile Group Zhejiang Co Ltd
Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Huawei Technologies Co Ltd
China Mobile Group Zhejiang Co Ltd
Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd, China Mobile Group Zhejiang Co Ltd, Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202310490011.1A priority Critical patent/CN116193432B/en
Publication of CN116193432A publication Critical patent/CN116193432A/en
Application granted granted Critical
Publication of CN116193432B publication Critical patent/CN116193432B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an information security authentication method and system based on a 5G network, which are used for authentication among different nodes under the 5G network, wherein the method comprises the following steps: initializing configuration; authentication clue transfer; authentication is performed according to the request. The invention controls the loss of the authentication clue after each transmission through the preset packet loss rate, and can judge whether the integrity rate of the authentication clue accords with the real transmission condition because the virtual network of the initiating node is determined and the packet loss rate after each transmission is determined. Under the authentication measures of the application, an external visitor wants to impersonate the identity, needs to know complete authentication clues, packet loss rate, transfer times and the like, and lacks any message to pass authentication, and the information is not transferred in a network and is difficult to acquire, so that the impersonation possibility is basically stopped, and the security is extremely high.

Description

Information security authentication method and system based on 5G network
Technical Field
The invention relates to the field of network communication, in particular to an information security authentication method and system based on a 5G network.
Background
The safety of the power system is important, and in view of data safety, the intranet network planning of the power monitoring system generally has isolation measures to ensure the safety of data transmission, and with the acceleration of the intelligent process, especially the popularization of 5G, more and more devices can be rapidly and efficiently networked, so that the internet safety also gradually affects the whole power system. For each node of the power system, it is important to confirm the identity of the visitor, but the conventional authentication using a fixed password or key has low security.
Therefore, when each device and node in the power system accesses data across the intranet by means of the internet, how to prevent the false identity of the possible visitor and ensure the access safety is a problem to be solved.
Disclosure of Invention
Aiming at the problem that the visitor identity is easy to forge and the access is unsafe when the inter-intranet data access is performed in the prior art, the invention provides the information security authentication method and the system based on the 5G network, the authentication is performed by using an authentication clue through isolating the hierarchical control data transmission condition of a container and a virtual network, and the network characteristic and the data transmission characteristic are integrated in the authentication process, so that the external visitor cannot forge and has higher security.
The following is a technical scheme of the invention.
An information security authentication method based on a 5G network is used for authentication among different nodes under the 5G network, and comprises the following steps:
s1: initializing configuration: configuring a virtual isolation container for each node, creating a virtual network, wherein a plurality of isolation containers are connected in each virtual network, and the isolation containers are configured to completely receive data and output the data with a preset packet loss rate;
s2: authentication clue transfer: each node periodically sends an authentication clue to the virtual network through the isolation container, and other isolation containers receive the authentication clue from the virtual network and output the authentication clue to the node, wherein the intermediate node uses two isolation containers to carry out cross-network transmission of the authentication clue between different virtual networks;
s3: authentication is carried out according to the request: after any node generates an access request, an authentication clue from a target node is sent to the target node by using a 5G network, the target node calculates the integrity rate according to the authentication clue, and if the result obtained by calculation according to the hierarchical relation between the preset packet loss rate and the virtual network where the initiating node is located is the same as the integrity rate, the integrity rate is authenticated.
The invention isolates the node and the virtual network through the isolation container, controls the loss of the authentication clue after each transmission through the preset packet loss rate, and the target node can compare the received authentication clue with the original complete authentication clue after the initiating node sends the received authentication clue to the target node. Under the authentication measures of the application, the external visitor wants to impersonate the identity, needs to know the complete authentication clue, the packet loss rate and the transmission times (packet loss times), but the information is not transmitted in the network and is difficult to acquire, and the authentication cannot be passed by any short message, so that the impersonation possibility is basically stopped, and the security is extremely high.
Preferably, in the step S1, a virtual isolation container is configured for each node, and a virtual network is created, and a plurality of isolation containers are connected in each virtual network, including:
and (3) isolating part of the storage space for each node, configuring a virtual isolation container, adhering to a transmission protocol between the node body and the isolation container, and isolating the node body from the virtual network through the isolation container and the transmission protocol.
Preferably, in the step S1, the isolation container is configured to completely receive data and output the data at a preset packet loss rate, and includes:
when the isolation container receives data, the received data is completely stored;
when the isolation container outputs data, the stored data is output according to a preset packet loss rate;
and updating the preset packet loss rate according to the requirement.
Preferably, in S2, each node periodically sends an authentication thread to the virtual network through the isolation container, and the other isolation containers receive the authentication thread from the virtual network and output the authentication thread to the node, where the steps include:
the node inputs authentication clues to the own isolation container according to a preset time period;
the isolation container completely stores the received authentication clues, and sends the authentication clues to other isolation containers in the virtual network according to a preset packet loss rate;
and after receiving the authentication clue from the virtual network, the isolation container outputs the authentication clue to the node according to the preset packet loss rate.
Preferably, in the step S2, the intermediate node uses two isolation containers to perform cross-network delivery of authentication threads between different virtual networks, and the method includes:
the intermediate node is configured with two isolation containers respectively connected with different virtual networks, and forwards the authentication clue output by any one isolation container to the other isolation container so as to realize cross-network transmission of the authentication clue among different virtual networks.
In the invention, the intermediate node can download the authentication clue from the two isolation containers and forward the authentication clue to the other isolation container, so that the cross-network transmission of the authentication clue among different virtual networks can be realized, and in the transmission process, the superposition of new one-time packet loss rate is generated.
Preferably, in the step S3, after the arbitrary node generates the access request, the method sends an authentication hint from the target node to the target node by using the 5G network, including:
and any node generates an access request, determines a target node according to the access target, and packages and sends the authentication clues received in the time period to the target node.
Preferably, in the step S3, the target node calculates the integrity rate according to the authentication clue, and if the result obtained by calculating according to the hierarchical relationship between the preset packet loss rate and the virtual network where the initiating node is located is the same as the integrity rate, the method includes the steps of:
after receiving the packed authentication clues, the target node performs clue matching and extracts the authentication clues corresponding to the target node;
calculating to obtain the integrity rate according to the received corresponding authentication clue and the self-saved integrity authentication clue;
and calculating the passing number of times of the complete authentication clue according to the level difference of the virtual network where the initiating node is located and the virtual network where the target node is located, and calculating the remaining ratio according to the preset packet loss rate and the passing number of times, if the complete rate is the same as the remaining ratio, passing authentication.
The invention also provides an information security authentication system based on the 5G network, which comprises a 5G base station and a plurality of nodes, and the information security authentication method based on the 5G network is executed.
The invention also provides an electronic device, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the information security authentication method based on the 5G network when calling the computer program in the memory.
The invention also provides a storage medium, wherein the storage medium stores computer executable instructions, and when the computer executable instructions are loaded and executed by a processor, the steps of the information security authentication method based on the 5G network are realized.
The essential effects of the invention include: after the virtual network and the virtual container are configured, the complete authentication clue is subjected to asymmetric transmission through the virtual container, the complete authentication clue is lost layer by layer in the virtual network, when the authentication clue is used for authentication, a producer of the authentication clue only needs to confirm whether the loss degree is matched with the virtual network where the opposite node is located, and the loss degree is required to be imitated, the original authentication clue, the preset packet loss rate and the transmission times (packet loss times) are required to be accurately acquired, and because the data are not transmitted in the network but are acquired according to actual conditions, the external visitor is almost impossible to imitate before mastering the network frame of the whole system. The authentication scheme of the invention is particularly suitable for a multi-node multi-network isolated system and has higher security.
Drawings
FIG. 1 is a flow chart of an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solution will be clearly and completely described in the following in conjunction with the embodiments, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that, in various embodiments of the present invention, the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present invention, "comprising" and "having" and any variations thereof are intended to cover non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements that are expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in the present invention, "plurality" means two or more. "and/or" is merely an association relationship describing an association object, and means that three relationships may exist, for example, and/or B may mean: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. "comprising A, B and C", "comprising A, B, C" means that all three of A, B, C comprise, "comprising A, B or C" means that one of the three comprises A, B, C, and "comprising A, B and/or C" means that any 1 or any 2 or 3 of the three comprises A, B, C.
The technical scheme of the invention is described in detail below by specific examples. Embodiments may be combined with each other and the same or similar concepts or processes may not be described in detail in some embodiments.
Examples
An information security authentication method based on a 5G network, as shown in figure 1, is used for authentication between different nodes under the 5G network, and comprises the following steps:
s1: initializing configuration: and configuring a virtual isolation container for each node, and creating a virtual network, wherein a plurality of isolation containers are connected in each virtual network, and the isolation containers are configured to completely receive data and output the data at a preset packet loss rate.
The S1 of this embodiment specifically includes:
and (3) isolating part of the storage space for each node, configuring a virtual isolation container, adhering to a transmission protocol between the node body and the isolation container, and isolating the node body from the virtual network through the isolation container and the transmission protocol.
When the isolation container receives data, the received data is completely stored;
when the isolation container outputs data, the stored data is output according to a preset packet loss rate;
and updating the preset packet loss rate according to the requirement.
In this embodiment, the node may be any device with a 5G module within the power system, typically some device that collects parameters or executes control instructions. The isolation configuration of the virtual container may be performed by any desired function, for example, by using a technique such as Kubernetes, openShift.
The input and output of the virtual container of the present embodiment is configured such that the data is reserved in full disk when data is written to the virtual container, and the virtual container is output at a preset packet loss rate when data is requested from the virtual container. If the packet loss rate is 20%, 80% of each data is output, four valid bytes can be regularly output every five bytes, or characters can be randomly output, so that only 80% of the data is ensured to be output. The updating mode of the preset packet loss rate can be offline setting or network setting.
S2: authentication clue transfer: each node periodically sends an authentication clue to the virtual network through the isolation container, and other isolation containers receive the authentication clue from the virtual network and output the authentication clue to the node, wherein the intermediate node utilizes two isolation containers to carry out cross-network transmission of the authentication clue among different virtual networks.
Comprising the following steps:
the node inputs authentication clues to the own isolation container according to a preset time period;
the isolation container completely stores the received authentication clues, and sends the authentication clues to other isolation containers in the virtual network according to a preset packet loss rate;
and after receiving the authentication clue from the virtual network, the isolation container outputs the authentication clue to the node according to the preset packet loss rate.
For example, every 10 minutes, the node a inputs a new authentication thread to its own isolation container a, the isolation container a transmits the authentication thread to the isolation containers of other nodes in the same virtual network at a preset packet loss rate, if the packet loss rate is 20%, the isolation container B of the node B in the same virtual network receives 80% of the authentication thread, and so on, the retrieval integrity degree received by the same virtual network is the same.
The intermediate node is configured with two isolation containers respectively connected with different virtual networks, and forwards the authentication clue output by any one isolation container to the other isolation container so as to realize cross-network transmission of the authentication clue among different virtual networks.
In this embodiment, the intermediate node may download the authentication thread from its two isolation containers and forward the authentication thread to another isolation container, so as to implement cross-network transmission of the authentication thread between different virtual networks, and in the transmission process, a new superposition of the first packet loss rate is generated.
For example, the intermediate node C is configured with two isolation containers C1 and C2 respectively connected to different virtual networks, wherein the isolation container C1 receives 80% of the authentication threads sent from the isolation container a, and then the intermediate node C downloads 64% (80% of the authentication threads with 20% of the packet loss rate superimposed on the basis of the authentication threads) from the isolation container C1, forwards the authentication threads to the isolation container C2, and forwards 51.2% (64% of the authentication threads with 20% of the packet loss rate superimposed on the basis of the authentication threads) to another virtual network by the isolation container C2, and so on.
S3: authentication is carried out according to the request: after any node generates an access request, an authentication clue from a target node is sent to the target node by using a 5G network, the target node calculates the integrity rate according to the authentication clue, and if the result obtained by calculation according to the hierarchical relation between the preset packet loss rate and the virtual network where the initiating node is located is the same as the integrity rate, the integrity rate is authenticated.
Comprising the following steps:
and any node generates an access request, determines a target node according to the access target, and packages and sends the authentication clues received in the time period to the target node.
After receiving the packed authentication clues, the target node performs clue matching and extracts the authentication clues corresponding to the target node;
calculating to obtain the integrity rate according to the received corresponding authentication clue and the self-saved integrity authentication clue;
and calculating the passing number of times of the complete authentication clue according to the level difference of the virtual network where the initiating node is located and the virtual network where the target node is located, and calculating the remaining ratio according to the preset packet loss rate and the passing number of times, if the complete rate is the same as the remaining ratio, passing authentication.
For example, after receiving the packaged authentication clues, the target node performs clue matching to find incomplete authentication clues matched with the complete clues, and after comparing, the complete rate is found to be 51.2%, then the incomplete authentication clues are known according to 20% of the packet loss rate, and the incomplete authentication clues are overlapped by three times of packet loss rates. And according to the layer level difference of the virtual network where the initiating node is located and the virtual network where the target node is located, three times of transmission are needed, the result obtained by combining the packet loss rate calculation is 51.2%, the two values are the same, obviously the information is matched, and authentication is passed.
If the survival ratio calculated by combining the number of delivery times and the packet loss rate is different from the integrity rate, it is obvious that the identity of the initiating node is false, and the initiating node is not from the virtual network claimed by the initiating node. The hierarchy, packet loss rate and complete authentication clues between virtual networks are not available to outsiders and are thus hardly imitated.
In the embodiment, the node and the virtual network are isolated through the isolation container, the loss of the authentication clue after each transmission is controlled through the preset packet loss rate, the initiating node sends the received authentication clue to the target node, the target node can compare according to the original complete authentication clue, and the virtual network where the initiating node is located is determined, so that whether the complete rate of the authentication clue accords with the real transmission condition can be judged, and if so, the authentication is passed. Under the authentication measures of the application, the external visitor wants to impersonate the identity, needs to know the complete authentication clue, the packet loss rate and the transmission times (packet loss times), but the information is not transmitted in the network and is difficult to acquire, and the authentication cannot be passed by any short message, so that the impersonation possibility is basically stopped, and the security is extremely high.
The embodiment also provides an information security authentication system based on the 5G network, which comprises a 5G base station and a plurality of nodes, and the information security authentication method based on the 5G network is executed.
The embodiment also provides an electronic device, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the information security authentication method based on the 5G network when calling the computer program in the memory.
The present embodiment also provides a storage medium, where computer executable instructions are stored, where the computer executable instructions implement the steps of the above-mentioned 5G network-based information security authentication method when loaded and executed by a processor.
The essential effects of the present embodiment include: after the virtual network and the virtual container are configured, the complete authentication clue is subjected to asymmetric transmission through the virtual container, and is lost layer by layer in the virtual network, when authentication is performed by using the authentication clue, a generator of the authentication clue only needs to confirm whether the loss degree is matched with the virtual network where the opposite node is located, and the degree of loss is required to be imitated, the original authentication clue, the preset packet loss rate and the transmission times (packet loss times) are required to be accurately obtained, and the data are not transmitted in the network and are not in the recent communication information at least, so that the data are almost impossible to imitate. Therefore, the authentication scheme of the embodiment is particularly suitable for a multi-node multi-network isolation system and has higher security.
From the foregoing description of the embodiments, it will be appreciated by those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of a specific apparatus is divided into different functional modules to implement all or part of the functions described above.
In the embodiments provided in this application, it should be understood that the disclosed structures and methods may be implemented in other ways. For example, the embodiments described above with respect to structures are merely illustrative, e.g., the division of modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another structure, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via interfaces, structures or units, which may be in electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and the parts shown as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information security authentication method based on a 5G network is used for authentication among different nodes under the 5G network, and is characterized by comprising the following steps:
s1: initializing configuration: configuring a virtual isolation container for each node, creating a virtual network, wherein a plurality of isolation containers are connected in each virtual network, and the isolation containers are configured to completely receive data and output the data with a preset packet loss rate;
s2: authentication clue transfer: each node periodically sends an authentication clue to the virtual network through the isolation container, and other isolation containers receive the authentication clue from the virtual network and output the authentication clue to the node, wherein the intermediate node uses two isolation containers to carry out cross-network transmission of the authentication clue between different virtual networks;
s3: authentication is carried out according to the request: after any node generates an access request, an authentication clue from a target node is sent to the target node by using a 5G network, the target node calculates the integrity rate according to the authentication clue, and if the result obtained by calculation according to the hierarchical relation between the preset packet loss rate and the virtual network where the initiating node is located is the same as the integrity rate, the integrity rate is authenticated.
2. The method for information security authentication based on 5G network according to claim 1, wherein in S1, a virtual isolation container is configured for each node, and a virtual network is created, and a plurality of isolation containers are connected in each virtual network, including:
and (3) isolating part of the storage space for each node, configuring a virtual isolation container, adhering to a transmission protocol between the node body and the isolation container, and isolating the node body from the virtual network through the isolation container and the transmission protocol.
3. The method for information security authentication based on 5G network according to claim 1, wherein in S1, the isolation container is configured to completely receive data and output the data with a preset packet loss rate, and the method comprises:
when the isolation container receives data, the received data is completely stored;
when the isolation container outputs data, the stored data is output according to a preset packet loss rate;
and updating the preset packet loss rate according to the requirement.
4. The method for information security authentication based on 5G network of claim 1, wherein in S2, each node periodically sends an authentication thread to the virtual network through an isolation container, and the other isolation containers receive the authentication thread from the virtual network and output the authentication thread to the node, and the method comprises:
the node inputs authentication clues to the own isolation container according to a preset time period;
the isolation container completely stores the received authentication clues, and sends the authentication clues to other isolation containers in the virtual network according to a preset packet loss rate;
and after receiving the authentication clue from the virtual network, the isolation container outputs the authentication clue to the node according to the preset packet loss rate.
5. The method for information security authentication based on 5G network according to claim 1, wherein in S2, the intermediate node uses two isolation containers to perform cross-network delivery of authentication threads between different virtual networks, and the method comprises:
the intermediate node is configured with two isolation containers respectively connected with different virtual networks, and forwards the authentication clue output by any one isolation container to the other isolation container so as to realize cross-network transmission of the authentication clue among different virtual networks.
6. The method for information security authentication based on 5G network of claim 1, wherein in S3, after any node generates an access request, sending an authentication hint from a target node to the target node by using the 5G network, includes:
and any node generates an access request, determines a target node according to the access target, and packages and sends the authentication clues received in the time period to the target node.
7. The method for authenticating information security based on a 5G network according to claim 6, wherein in S3, the target node calculates the integrity rate according to the authentication thread, and if the result obtained by calculating the hierarchical relationship between the preset packet loss rate and the virtual network where the originating node is located is the same as the integrity rate, the method passes authentication, including:
after receiving the packed authentication clues, the target node performs clue matching and extracts the authentication clues corresponding to the target node;
calculating to obtain the integrity rate according to the received corresponding authentication clue and the self-saved integrity authentication clue;
and calculating the passing number of times of the complete authentication clue according to the level difference of the virtual network where the initiating node is located and the virtual network where the target node is located, and calculating the remaining ratio according to the preset packet loss rate and the passing number of times, if the complete rate is the same as the remaining ratio, passing authentication.
8. An information security authentication system based on a 5G network, comprising a 5G base station and a plurality of nodes, wherein the information security authentication method based on the 5G network according to any one of claims 1 to 7 is executed.
9. An electronic device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of a 5G network based information security authentication method according to any of claims 1 to 7 when the computer program in the memory is invoked by the processor.
10. A storage medium having stored therein computer executable instructions which when loaded and executed by a processor implement the steps of a 5G network based information security authentication method as claimed in any one of claims 1 to 7.
CN202310490011.1A 2023-05-04 2023-05-04 Information security authentication method and system based on 5G network Active CN116193432B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310490011.1A CN116193432B (en) 2023-05-04 2023-05-04 Information security authentication method and system based on 5G network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310490011.1A CN116193432B (en) 2023-05-04 2023-05-04 Information security authentication method and system based on 5G network

Publications (2)

Publication Number Publication Date
CN116193432A CN116193432A (en) 2023-05-30
CN116193432B true CN116193432B (en) 2023-07-04

Family

ID=86444698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310490011.1A Active CN116193432B (en) 2023-05-04 2023-05-04 Information security authentication method and system based on 5G network

Country Status (1)

Country Link
CN (1) CN116193432B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079125A (en) * 2020-01-03 2021-07-06 国网湖北省电力有限公司 Clue analyzing and verifying system, apparatus and storage medium for network security
WO2023016367A1 (en) * 2021-08-09 2023-02-16 维沃移动通信有限公司 Measurement method and device

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180123898A1 (en) * 2015-06-09 2018-05-03 Nec Corporation Network verification device, network verification method and program recording medium
CN107846409A (en) * 2017-11-17 2018-03-27 广州葵翼信息科技有限公司 A kind of smart city network integration and safety management system
CN108199925B (en) * 2018-01-30 2021-06-04 网宿科技股份有限公司 Data sending method, receiving method and device
US11394691B2 (en) * 2018-06-05 2022-07-19 Acreto Cloud Corporation Ecosystem per distributed element security through virtual isolation networks
CN109379741B (en) * 2018-09-17 2022-03-01 北京泰迪熊移动科技有限公司 Network access method and system
CN109391686B (en) * 2018-09-27 2022-04-12 网宿科技股份有限公司 Processing method of access request and CDN node server
CN111224990B (en) * 2020-01-09 2022-05-03 武汉思普崚技术有限公司 Flow traction method and system of distributed micro-isolation network
US11520615B1 (en) * 2020-03-31 2022-12-06 Equinix, Inc. Virtual network function virtual domain isolation
CN113472575B (en) * 2021-06-30 2024-03-22 北京凌云雀科技有限公司 Deployment method and device of open virtual network
CN113691414B (en) * 2021-07-22 2023-08-11 苏州浪潮智能科技有限公司 Bandwidth performance test method, device and system
CN114244449B (en) * 2021-11-26 2024-04-05 网络通信与安全紫金山实验室 Satellite network simulation verification method, system, electronic equipment and storage medium
CN114567883A (en) * 2022-02-08 2022-05-31 南京信息工程大学 Double-layer fuzzy logic trust model method based on environment self-adaptive decision
CN115865779A (en) * 2023-03-02 2023-03-28 北京天维信通科技有限公司 Communication path selection method, system, terminal equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079125A (en) * 2020-01-03 2021-07-06 国网湖北省电力有限公司 Clue analyzing and verifying system, apparatus and storage medium for network security
WO2023016367A1 (en) * 2021-08-09 2023-02-16 维沃移动通信有限公司 Measurement method and device

Also Published As

Publication number Publication date
CN116193432A (en) 2023-05-30

Similar Documents

Publication Publication Date Title
CN103384237B (en) Method for sharing IaaS cloud account, shared platform and network device
CN109981689A (en) Cross-domain logical is isolated by force and safety access control method and device under scenes of internet of things
CN107566314A (en) A kind of data transmission system, method and apparatus
MX2013013856A (en) Systems and methods for managing secure communication sessions with remote devices.
CN110196715A (en) A kind of code generating system and method
Groza et al. Highly efficient authentication for CAN by identifier reallocation with ordered CMACs
CN112487408A (en) Safe access method and system for ECU in vehicle and storage medium
Brown et al. Dynamic Address Validation Array (DAVA) A Moving Target Defense Protocol for CAN bus
CN109547450A (en) Method, apparatus, electronic equipment and the computer media in operational safety execution domain
CN110602130B (en) Terminal authentication system and method, equipment terminal and authentication server
CN116193432B (en) Information security authentication method and system based on 5G network
CN114238262A (en) Image distribution method, image distribution device, electronic device, and storage medium
CN111885057B (en) Message middleware access method, device, equipment and storage medium
CN112286911B (en) Database management method and device, equipment and storage medium
CN112099964A (en) Interface calling method and device, storage medium and electronic device
CN111586045B (en) Attribute encryption and dynamic security layer protection method and corresponding firewall
CN112738751B (en) Wireless sensor access authentication method, device and system
CN110134461B (en) Universal processing method and device for data interaction
CN114257406A (en) Equipment communication method and device based on identification algorithm and computer equipment
CN105160279B (en) RFID system needs the multiple-owner label ownership conversion method of trusted third party
Murvay et al. A brief look at the security of DeviceNet communication in industrial control systems
CN108540301A (en) A kind of the cryptographic initialization method and relevant device of prearranged account
WO2021089983A1 (en) Validating distributed source content
CN105376345B (en) A kind of cloud platform security processing, controller and cloud computing system
CN217486506U (en) Security simulation unit and interaction system of security simulation unit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Huang Hongbing

Inventor after: Wang Fahui

Inventor after: Liu Xiulong

Inventor after: Rao Ziren

Inventor after: Rong Ning

Inventor after: Fan Zhaobin

Inventor after: Shen Qiuquan

Inventor after: Hu Shaoqing

Inventor after: Du Mengjun

Inventor after: Wang Yuantao

Inventor after: Wang Jian

Inventor after: Tang Yize

Inventor after: Zhang Ji

Inventor after: Zhang Yehua

Inventor after: Li Ang

Inventor after: Zhang Yi

Inventor after: Shao Weiping

Inventor after: Qiu Lanxin

Inventor after: Qian Jin

Inventor after: Wang Wei

Inventor after: Wang Junwei

Inventor before: Huang Hongbing

Inventor before: Wang Fahui

Inventor before: Liu Xiulong

Inventor before: Rao Ziren

Inventor before: Rong Ning

Inventor before: Fan Zhaobin

Inventor before: Shen Qiuquan

Inventor before: Hu Shaoqing

Inventor before: Du Mengjun

Inventor before: Wang Yuantao

Inventor before: Wang Jian

Inventor before: Shao Weiping

Inventor before: Zhang Ji

Inventor before: Zhang Yehua

Inventor before: Li Ang

Inventor before: Zhang Yi

Inventor before: Tang Yize

Inventor before: Qiu Lanxin

Inventor before: Qian Jin

Inventor before: Wang Wei

Inventor before: Wang Junwei

CB03 Change of inventor or designer information