CN116321254A - Indoor intrusion monitoring method and system based on 5G core network - Google Patents

Indoor intrusion monitoring method and system based on 5G core network Download PDF

Info

Publication number
CN116321254A
CN116321254A CN202310121244.4A CN202310121244A CN116321254A CN 116321254 A CN116321254 A CN 116321254A CN 202310121244 A CN202310121244 A CN 202310121244A CN 116321254 A CN116321254 A CN 116321254A
Authority
CN
China
Prior art keywords
equipment
channel state
state information
user
core
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310121244.4A
Other languages
Chinese (zh)
Other versions
CN116321254B (en
Inventor
梁锦涛
谢涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Aipu Road Network Technology Co Ltd
Original Assignee
Guangzhou Aipu Road Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Aipu Road Network Technology Co Ltd filed Critical Guangzhou Aipu Road Network Technology Co Ltd
Priority to CN202310121244.4A priority Critical patent/CN116321254B/en
Publication of CN116321254A publication Critical patent/CN116321254A/en
Application granted granted Critical
Publication of CN116321254B publication Critical patent/CN116321254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application provides an indoor intrusion monitoring method and system based on a 5G core network, wherein the indoor intrusion monitoring method is applied to the indoor intrusion monitoring system based on the 5G core network, and the indoor intrusion monitoring method comprises the following steps: the application function device responds to the specific operation of the user on the intrusion monitoring function and sends the device information to the 5G core device so that the 5G core device can verify the device information; after the verification of the 5G core equipment on the equipment information is passed, sending a data receiving request to a plurality of user front-end equipment; the user front-end equipment sends real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request; the 5G core equipment receives real-time channel state information sent by the plurality of user front-end equipment and analyzes the real-time channel state information to monitor indoor invasion. By the method and the system, the intrusion monitoring efficiency is higher, and the reliability of the monitoring service is stronger.

Description

Indoor intrusion monitoring method and system based on 5G core network
Technical Field
The application relates to the technical field of intrusion monitoring, in particular to an indoor intrusion monitoring method and system based on a 5G core network.
Background
With the development of technology, once only the effect existing in the film and television is gradually realized and civilian, such as indoor monitoring systems. Home protection is of increasing concern and more people choose to deploy indoor intrusion monitoring systems in the home. However, currently, generally, an indoor security monitoring device mainly adopts video monitoring, the video monitoring device transmits a shot video to a terminal used by a user through a wireless network, and the user watches the video by himself to identify whether strangers invade the home. The intrusion monitoring method has low efficiency and has great potential safety hazard.
Disclosure of Invention
In view of this, an object of the present application is to provide an indoor intrusion monitoring method and monitoring system based on a 5G core network, where a plurality of application function devices arranged indoors send collected real-time channel state information to the 5G core device, and the 5G core device performs indoor intrusion detection based on the real-time channel state information, and through an indoor intrusion monitoring service bound by the 5G core network, intrusion monitoring efficiency can be higher, and reliability of the monitoring service is stronger.
In a first aspect, an embodiment of the present application provides an indoor intrusion monitoring method based on a 5G core network, where the indoor intrusion monitoring method is applied to an indoor intrusion monitoring system based on the 5G core network, where the indoor intrusion monitoring system includes an application function device, a plurality of user pre-devices associated with the application function device, and a 5G core device, and the indoor intrusion monitoring method includes:
The application function device responds to the specific operation of a user on the intrusion monitoring function and sends device information to the 5G core device so that the 5G core device can verify the device information;
after the verification of the 5G core equipment on the equipment information is passed, sending data receiving requests to a plurality of user front-end equipment;
the user front-end equipment sends real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request;
and the 5G core equipment receives the real-time channel state information sent by the plurality of user front-end equipment and analyzes the real-time channel state information so as to monitor indoor intrusion.
Further, the 5G core device includes a network opening device and a network analysis device, the device information includes first identification information of an intelligent network device in which the application function device is installed and second identification information of a plurality of user pre-devices associated with the application function device, and the indoor intrusion monitoring method further includes:
the network opening equipment receives the equipment information sent by the application function equipment, verifies the first identification information in the equipment information, and sends a plurality of pieces of second identification information in the equipment information to the network analysis equipment after the verification is passed;
The network analysis equipment sends the data receiving request to a plurality of user prepositions corresponding to the second identification information according to the second identification information, receives the real-time channel state information sent by the user prepositions, and analyzes the real-time channel state information to perform indoor intrusion monitoring.
Further, before the network analysis device analyzes the real-time channel state information, the indoor intrusion monitoring method further includes:
for each user front-end equipment, the network analysis equipment receives historical channel state information sent by the user front-end equipment in a historical time period and establishes a plurality of average vector fluctuation models of different time ranges of the user front-end equipment in the historical time period based on the historical channel state information.
Further, the network analysis device receives the real-time channel state information sent by the plurality of user front-end devices, analyzes the real-time channel state information, so as to perform indoor intrusion monitoring, and includes:
determining, for each user head-end, a current time at which the user head-end generated the real-time channel state information;
Determining a target average vector fluctuation model corresponding to the current time from the plurality of average vector fluctuation models corresponding to the user front-end equipment based on the current time;
comparing the received real-time channel state information sent by the user front-end equipment with the target usual vector fluctuation model to determine a channel state information fluctuation value;
and comparing the channel state information fluctuation value with a preset average fluctuation threshold, and judging that the indoor intrusion exists currently when the channel state information fluctuation value is larger than or equal to the average fluctuation threshold.
Further, the 5G core device further includes a network decision device, and when the network analysis device determines that there is an intrusion in the current room, the indoor intrusion monitoring method further includes:
the network analysis equipment sends the channel state information fluctuation value to the network decision-making equipment when judging that the current indoor intrusion exists;
the network decision device determines an intrusion early warning strategy based on the channel state information fluctuation value and sends the intrusion early warning strategy to the application function device;
the application function equipment responds to the specific operation of the user on the intrusion early warning strategy, generates a strategy execution request and sends the strategy execution request to a plurality of user front-end equipment;
And the user front-end equipment executes the corresponding intrusion early warning strategy based on the strategy execution request.
In a second aspect, an embodiment of the present application further provides an indoor intrusion monitoring system based on a 5G core network, where the indoor intrusion monitoring system includes:
the application function device is used for responding to the specific operation of a user on the intrusion monitoring function, and sending device information to the 5G core device so that the 5G core device can verify the device information;
the 5G core equipment is used for sending data receiving requests to the plurality of user front-end equipment after the equipment information passes the verification;
the user front-end equipment is used for sending real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request;
and the 5G core equipment is also used for receiving the real-time channel state information sent by the plurality of user front-end equipment and analyzing the real-time channel state information so as to monitor indoor intrusion.
Further, the 5G core device comprises a network opening device and a network analysis device, and the device information comprises first identification information of an intelligent network device for installing the application function device and second identification information of a plurality of user pre-devices associated with the application function device;
The network opening device is used for receiving the device information sent by the application function device, verifying the first identification information in the device information, and sending a plurality of second identification information in the device information to the network analysis device after the verification is passed;
and the network analysis equipment is used for sending the data receiving request to a plurality of user prepositive equipment corresponding to the plurality of second identification information according to the plurality of second identification information, receiving the real-time channel state information sent by the plurality of user prepositive equipment, and analyzing the real-time channel state information so as to monitor indoor intrusion.
Further, before the network analysis device is configured to analyze the real-time channel state information, the network analysis device is further configured to:
for each user front-end equipment, receiving historical channel state information sent by the user front-end equipment in a historical time period, and establishing a plurality of average vector fluctuation models of the user front-end equipment in different time ranges in the historical time period based on the historical channel state information.
In a third aspect, embodiments of the present application further provide an electronic device, including: the system comprises a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, the processor and the memory are communicated through the bus when the electronic device runs, and the machine-readable instructions are executed by the processor to execute the steps of the indoor intrusion monitoring method based on the 5G core network.
In a fourth aspect, embodiments of the present application further provide a computer readable storage medium having a computer program stored thereon, which when executed by a processor performs the steps of the indoor intrusion monitoring method based on a 5G core network as described above.
The embodiment of the application provides an indoor intrusion monitoring method and a monitoring system based on a 5G core network, wherein the indoor intrusion monitoring method is applied to the indoor intrusion monitoring system based on the 5G core network, and the indoor intrusion monitoring system comprises application function equipment, a plurality of user prepositions associated with the application function equipment and the 5G core equipment, and the indoor intrusion monitoring method comprises the following steps: the application function device responds to the specific operation of a user on the intrusion monitoring function and sends device information to the 5G core device so that the 5G core device can verify the device information; after the verification of the 5G core equipment on the equipment information is passed, sending data receiving requests to a plurality of user front-end equipment; the user front-end equipment sends real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request; and the 5G core equipment receives the real-time channel state information sent by the plurality of user front-end equipment and analyzes the real-time channel state information so as to monitor indoor intrusion.
According to the indoor intrusion monitoring method and the indoor intrusion monitoring system based on the 5G core network, the collected real-time channel state information is sent to the 5G core device through the plurality of application function devices arranged indoors, the 5G core device performs indoor intrusion detection based on the real-time channel state information, and the indoor intrusion monitoring service bound through the 5G core network can enable intrusion monitoring efficiency to be higher, and reliability of monitoring service is stronger.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered limiting the scope, and that other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an indoor intrusion monitoring method based on a 5G core network according to an embodiment of the present application;
Fig. 2 is a schematic structural diagram of an indoor intrusion monitoring system based on a 5G core network according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a 5G core device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. Based on the embodiments of the present application, every other embodiment that a person skilled in the art would obtain without making any inventive effort is within the scope of protection of the present application.
First, application scenarios applicable to the present application will be described. The method and the device can be applied to the technical field of intrusion monitoring.
With the development of technology, once only the effect existing in the film and television is gradually realized and civilian, such as indoor monitoring systems. Home protection is of increasing concern and more people choose to deploy indoor intrusion monitoring systems in the home. However, currently, generally, an indoor security monitoring device mainly adopts video monitoring, the video monitoring device transmits a shot video to a terminal used by a user through a wireless network, and the user watches the video by himself to identify whether strangers invade the home. The intrusion monitoring method has low efficiency and has great potential safety hazard.
Based on the above, the embodiment of the application provides an indoor intrusion monitoring method based on a 5G core network, which can enable the intrusion monitoring efficiency to be higher and the reliability of the monitoring service to be stronger through the indoor intrusion monitoring service bound by the 5G core network.
Referring to fig. 1, fig. 1 is a flowchart of an indoor intrusion monitoring method based on a 5G core network according to an embodiment of the present application. As shown in fig. 1, an indoor intrusion monitoring method provided in an embodiment of the present application is applied to an indoor intrusion monitoring system based on a 5G core network, where the indoor intrusion monitoring system includes an application function device, a plurality of user pre-devices associated with the application function device, and a 5G core device, and the indoor intrusion monitoring method includes:
And S101, the application function device responds to the specific operation of the user on the intrusion monitoring function, and sends device information to the 5G core device so that the 5G core device can verify the device information.
It should be noted that, the application function device refers to a network element AF (The Application Function) in the 5G core network, and refers to various APPs that may directly or indirectly interact with the 5G network. According to the embodiment provided by the application function device can be an APP (application program) which can be used for realizing indoor intrusion monitoring in intelligent network equipment used by a user. The intelligent network device is a smart phone, a tablet, a bracelet, or the like, and the application is not particularly limited. The specific operation refers to an operation of the user on the application function device for the intrusion monitoring function, for example, the specific operation may be a selection operation or a click operation of the user on the application function device for the intrusion monitoring function, and the application is not particularly limited.
Here, the application function device is mainly used for interaction with a user. Before using the intrusion monitoring function, a user can install an intelligent home intrusion monitoring application, namely an application function device, on the intelligent network device, and register and bind the application function device through a telephone number. And then, the application function equipment is used for pairing with each user front-end equipment by scanning a two-dimensional code on the user front-end equipment or manually inputting an IP address of the user front-end equipment, so that equipment information of each user front-end equipment paired with the application function equipment can be recorded. For the above step S101, in implementation, the application function device responds to the specific operation of the user on the intrusion monitoring function, and sends the device information to the 5G core device, so that the 5G core device can verify the validity of the intelligent network device on which the application function device is installed according to the device information sent by the application function device.
Specifically, the device information includes first identification information of an intelligent network device in which the application function device is installed and second identification information of a plurality of user pre-devices associated with the application function device. Here, the first identification information is identification information of the intelligent network device on which the application function device is installed, for example, the first identification information may be an IP address or a mobile phone number of the user side, which is not specifically limited in this application. The second identification information is the second identification information of the plurality of user pre-devices associated with the application function device, for example, the second identification information may be an IP address of each user pre-device, etc., which is not specifically limited in this application. Each user head-end has a specific IP address to facilitate differentiation and control.
S102, after the verification of the device information by the 5G core device is passed, sending data receiving requests to a plurality of user front-end devices.
The data receiving request refers to a request sent by the 5G core device to the user front end device to collect data sent by the user front end device.
Here, the 5G core device is mainly used for performing indoor intrusion monitoring according to data sent by the user front-end device. For the above step S102, in the implementation, after receiving the application function device, the 5G core device verifies the device information sent by the application function device, and after the verification is passed, sends a data receiving request to the plurality of user front-end devices.
And S103, the user front-end equipment sends real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request.
In the field of wireless communication, channel state information (CSI, channel State Information) refers to channel properties of a communication link. It describes the attenuation factor of the signal on each transmission path, i.e. the value of each element in the channel gain matrix H, such as signal Scattering (Scattering), environmental attenuation (coding, multipath fading or shadowing fading), distance attenuation (power decay of distance), etc. The CSI may adapt the communication system to the current channel conditions, providing a guarantee for high reliability and high rate communication in a multi-antenna system. The customer premises equipment (Customer premises equipment, CPE) refers to a mobile signal access device that receives mobile signals and forwards them out as wireless signals. The preset time interval refers to a preset time interval in which the user front-end equipment sends real-time channel state information to the 5G core equipment in real time, for example, the preset time interval may be 3 seconds, which is not specifically limited in this application. In particular implementations, a user may set a time interval for a user-premises equipment to transmit real-time channel state information by applying a functional device.
Here, the user arranges the user head-end in the room, and in order to reduce the error of the signal data, a plurality of user head-end devices may be arranged in the room to completely and sufficiently cover each corner of the room. The user front-end equipment is mainly used for sensing indoor channel state information and forwarding the channel state information to the 5G core equipment. For the above step S103, in a specific implementation, for each of the plurality of user head-end equipments, after receiving the data receiving request sent by the 5G core equipment, the real-time channel state information is sent to the 5G core equipment at a preset time interval. Here, according to the embodiment provided by the application, the user front-end device is used as a transmitting device and a receiving device of signals, the user front-end device is placed at four corners of a relatively closed room to serve as the transmitting and receiving devices of signals, when the device works, the user front-end device transmits and receives channel state information between each other, the channel state information can be affected by a plurality of obstacles in an actual indoor propagation environment, and can reach a receiver along a plurality of paths including refraction and reflection, wherein signals on different paths can undergo distortion such as attenuation and time delay of different degrees, and in a relatively static environment, the data of the channel state information can keep relatively stable, and the channel state information can be collected at preset time intervals by the user front-end device and uploaded to the 5G core device.
And S104, the 5G core equipment receives the real-time channel state information sent by the plurality of user front-end equipment and analyzes the real-time channel state information so as to monitor indoor intrusion.
For the step S104, in implementation, the 5G core device receives the real-time channel state information sent by the plurality of user pre-devices, and analyzes the received real-time channel state information to perform indoor intrusion monitoring.
Specifically, the 5G core device includes a network opening device and a network analysis device; the indoor intrusion monitoring method further comprises the following steps:
step 201: the network opening device receives the device information sent by the application function device, verifies the first identification information in the device information, and sends a plurality of second identification information in the device information to the network analysis device after verification is passed.
It should be noted that, the network opening device refers to a network element NEF (The Network Exposure Function, network opening function) in the 5G core network, and the main function of this network function is capability opening, that is, outputting the capability of the 5G network to an external network, such as outputting location information of a terminal to the outside. According to the embodiment provided by the application, the network opening device is mainly used for authorizing the application function device and subscribing the indoor intrusion monitoring function for the user.
For the above step 201, in implementation, the network opening device receives the device information sent by the application function device, verifies the first identification information of the intelligent network device installed with the application function device in the device information, and verifies whether the first identification information is registered with the indoor intrusion monitoring function or not. And after the verification is passed, second identification information of a plurality of user prepositions associated with the application function device in the device information is sent to the network analysis device, so that the network analysis device can determine the plurality of user prepositions associated with the application function device according to the second identification information.
Step 202: the network analysis equipment sends the data receiving request to a plurality of user prepositions corresponding to the second identification information according to the second identification information, receives the real-time channel state information sent by the user prepositions, and analyzes the real-time channel state information to perform indoor intrusion monitoring.
It should be noted that, the network analysis device refers to a network element NWDAF (Network Data Analytics Function, network data analysis function) in the 5G core network, and the main function of this network function is to implement network analysis, where the NWDAF may collect network data from each network function and perform analysis, and provide the analysis result as a service to other network functions.
For the step 202, when the verification of the first identification information by the network analysis device is passed, the network analysis device sends a data receiving request to a plurality of user front-end devices corresponding to the plurality of second identification information according to the plurality of second identification information, receives the real-time channel state information sent by the plurality of user front-end devices, and analyzes the real-time channel state information to perform indoor intrusion monitoring.
Specifically, before the network analysis device analyzes the real-time channel state information, the indoor intrusion monitoring method further includes:
for each user front-end equipment, the network analysis equipment receives historical channel state information sent by the user front-end equipment in a historical time period and establishes a plurality of average vector fluctuation models of different time ranges of the user front-end equipment in the historical time period based on the historical channel state information.
Here, the history period may be a day or a week or the like in the past, and the present application is not particularly limited. The history time ranges refer to respective time periods in the history time period. For example, when the historical time period is a certain day of the history, the time range may be each hour of the day; when the historical time period is a certain week of the history, the time range may be each day of the week. The average vector fluctuation model is an average CSI vector fluctuation model generated from all the historical channel state information received in the historical time range.
Here, the examples of the history period and the history time range are merely examples, and in practice, the history period and the history time range are not limited to the above examples.
For the above steps, in implementation, before indoor intrusion monitoring, the network analysis device needs to analyze normal channel state information under the condition of no personnel intrusion. For each user front-end equipment arranged indoors, the network analysis equipment receives historical channel state information sent by the user front-end equipment in a historical time period and establishes a plurality of average vector fluctuation models of different time ranges of the user front-end equipment in the historical time period based on the historical channel state information. As an example, the network analysis device receives historical channel state information transmitted by the user head-end over a certain day of the history, then divides the historical time range into a plurality of time ranges, each time range may represent one hour of the day, and then establishes, for each time range, an average vector fluctuation model corresponding to the time range based on the historical channel state information in the historical time range.
Specifically, for the step 202, the network analysis device receives the real-time channel state information sent by the plurality of user pre-devices, analyzes the real-time channel state information, so as to perform indoor intrusion monitoring, and includes:
Step 2021: for each user head end, determining a current time at which the user head end generated the real-time channel state information.
Step 2022: and determining a target average vector fluctuation model corresponding to the current time from the plurality of average vector fluctuation models corresponding to the user front-end equipment based on the current time.
For the above steps 2021-2022, in implementation, for each user-premises equipment, the current time at which the user-premises equipment generates real-time channel state information is first determined. And then determining a target average vector fluctuation model corresponding to the current time from a plurality of average vector fluctuation models corresponding to the user front-end equipment based on the current time. Continuing with the above embodiment, for example, the time range corresponding to each average vector fluctuation model may represent one hour in the day, and when the current time of the user front-end device generating real-time channel state information is 10:30, it is determined that the time range corresponding to the current time is 10:00-11:00, so that an average vector fluctuation model with the time range of 10:00-11:00 is determined as the target average vector fluctuation model in a plurality of average vector fluctuation models.
Step 2023: and comparing the received real-time channel state information sent by the user front-end equipment with the target usual vector fluctuation model to determine a channel state information fluctuation value.
Step 2024: and comparing the channel state information fluctuation value with a preset average fluctuation threshold, and judging that the indoor intrusion exists currently when the channel state information fluctuation value is larger than or equal to the average fluctuation threshold.
The average fluctuation threshold is preset to determine whether a person intrudes into the current room or not and the fluctuation threshold of the channel state information in the normal range. The channel state information fluctuation value refers to the fluctuation condition between the received real-time channel state information and a normal target usual vector fluctuation model.
For the above steps 2023 to 2024, in the implementation, after the target average vector waveform model is obtained in step b, the received real-time channel state information sent by the user front-end device is compared with the target normal vector fluctuation model, so as to determine the channel state information fluctuation value. And comparing the fluctuation value of the channel state information with a preset average fluctuation threshold, and judging that the indoor intrusion exists currently when the fluctuation value of the channel state information is larger than or equal to the average fluctuation threshold.
Thus, according to the indoor intrusion monitoring method provided by the embodiment of the application, one or more pieces of user prepositive equipment supporting the sensing function are arranged in each independent space in the room, channel state information is affected by indoor articles or mobile individuals, and behaviors of indoor objects or people can be detected by combining analysis and acquisition of sensing information such as Doppler frequency shift, amplitude change and phase change, so that personal privacy is protected, and household cost is saved. And the signal change data acquired through intelligent analysis is compared with the historical data, and when an intruder intrudes into the space, the channel state information acquired in real time is compared with the historical channel state information under normal conditions, so that the existence of the intruder is detected.
Further, the 5G core device further includes a network decision device, and when the network analysis device determines that there is an intrusion in the current room, the indoor intrusion monitoring method further includes:
i: and when the network analysis equipment judges that the current indoor intrusion exists, the network analysis equipment sends the channel state information fluctuation numerical value to the network decision-making equipment.
II: and the network decision device determines an intrusion early warning strategy based on the channel state information fluctuation value and sends the intrusion early warning strategy to the application function device.
III: and the application function equipment responds to the specific operation of the user on the intrusion early warning strategy, generates a strategy execution request and sends the strategy execution request to a plurality of user front-end equipment.
IV: and the user front-end equipment executes the corresponding intrusion early warning strategy based on the strategy execution request.
It should be noted that, the intrusion early warning policy refers to an early warning policy determined by the network decision-making device and executed by the user front-end device. For example, the intrusion alert policy may be an audio alert policy, a public security alert policy, etc., which is not specifically limited in this application. The sound alarm strategy can be to alarm the intruder by making sound through the front-end equipment of the user; the police alarm strategy can collect image and video of an intruder through the front-end equipment of the user and then send the image and video to the police early warning system for alarm.
Here, the network analysis device is mainly used for determining an intrusion early warning policy for the user according to the fluctuation condition of the current channel state information. Aiming at the steps I-IV, when the network analysis equipment judges that the current indoor intrusion exists in the concrete implementation, the fluctuation value of the channel state information is sent to the network decision-making equipment. And the network decision device determines an intrusion early warning strategy based on the channel state information fluctuation value and sends the intrusion early warning strategy to the application function device. At this time, the intrusion early warning policy is displayed in the application function device, and the user can select to execute the intrusion early warning policy in the application function device. When the user selects to execute the intrusion early warning strategy, the application function equipment responds to the specific operation of the user on the intrusion early warning strategy, generates a strategy execution request and sends the strategy execution request to the user front-end equipment. And after receiving the policy execution request, the user front-end equipment executes the corresponding intrusion early warning policy based on the policy execution request. Therefore, the user can learn the condition of the home earlier when away from home, and early warning processing can be performed faster.
As an optional implementation manner, after the application function device receives the intrusion early warning policy, the indoor intrusion monitoring method provided in the embodiment of the present application further includes:
when the application function equipment does not respond to the specific operation of the user on the intrusion early warning strategy, if the unresponsive time is greater than or equal to the preset time, generating the strategy execution request, and sending the strategy execution request to a plurality of user front-end equipment.
And the user front-end equipment executes the corresponding intrusion early warning strategy based on the strategy execution request.
For the two steps, when the application function device does not respond to the specific operation of the user on the intrusion early warning strategy in the concrete implementation, if the unresponsive time is greater than or equal to the preset time, a strategy execution request is automatically generated, and the strategy execution request is sent to the user front-end equipment. The user front-end equipment executes the corresponding intrusion early warning strategy based on the strategy execution request. Therefore, even if the user does not know that the indoor is invaded in time, the rapid early warning can be achieved.
The embodiment of the application provides an indoor intrusion monitoring method based on a 5G core network, which is applied to an indoor intrusion monitoring system based on the 5G core network, wherein the indoor intrusion monitoring system comprises application function equipment, a plurality of user prepositive devices associated with the application function equipment and 5G core equipment, and the indoor intrusion monitoring method comprises the following steps: firstly, the application function device responds to the specific operation of a user on an intrusion monitoring function, and sends device information to the 5G core device so that the 5G core device can verify the device information; then, after the verification of the 5G core equipment on the equipment information is passed, sending data receiving requests to a plurality of user front-end equipment; the user front-end equipment sends real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request; and finally, the 5G core equipment receives the real-time channel state information sent by the plurality of user front-end equipment and analyzes the real-time channel state information so as to monitor indoor intrusion.
Thus, according to the indoor intrusion monitoring method provided by the application, the collected real-time channel state information is sent to the 5G core equipment through the plurality of application function equipment arranged indoors, the 5G core equipment carries out indoor intrusion detection based on the real-time channel state information, and the indoor intrusion monitoring service bound through the 5G core network can enable the intrusion monitoring efficiency to be higher, and the reliability of the monitoring service to be stronger.
Referring to fig. 2 and fig. 3, fig. 2 is a schematic structural diagram of an indoor intrusion monitoring system based on a 5G core network according to an embodiment of the present application, and fig. 3 is a schematic structural diagram of a 5G core device according to an embodiment of the present application. As shown in fig. 2, the indoor intrusion monitoring system 200 includes:
an application function device a, configured to send device information to a 5G core device B in response to a specific operation of a user on an intrusion monitoring function, so that the 5G core device B verifies the device information;
the 5G core device B is used for sending data receiving requests to the plurality of user front-end devices C1 … … Cn after the verification of the device information is passed;
the user front-end equipment Ci is used for sending real-time channel state information to the 5G core equipment B according to a preset time interval based on the data receiving request;
And the 5G core equipment B is also used for receiving the real-time channel state information sent by the plurality of user front-end equipment C1 … … Cn and analyzing the real-time channel state information so as to monitor indoor intrusion.
Further, as shown in fig. 3, the 5G core device B includes a network opening device a and a network analysis device B, and the device information includes first identification information of an intelligent network device for installing the application function device and second identification information of a plurality of user pre-devices associated with the application function device;
the network opening device a is used for receiving the device information sent by the application function device, verifying the first identification information in the device information, and sending a plurality of second identification information in the device information to the network analysis device b after the verification is passed;
the network analysis device b is configured to send the data receiving request to a plurality of user pre-devices C1 … … Cn corresponding to the plurality of second identification information according to the plurality of second identification information, receive the real-time channel state information sent by the plurality of user pre-devices C1 … … Cn, and analyze the real-time channel state information to perform indoor intrusion monitoring.
Further, before the network analysis device is configured to analyze the real-time channel state information, the network analysis device b is further configured to:
for each user front-end equipment, receiving historical channel state information sent by the user front-end equipment in a historical time period, and establishing a plurality of average vector fluctuation models of the user front-end equipment in different time ranges in the historical time period based on the historical channel state information.
Further, when the network analysis device b is configured to receive the real-time channel state information sent by the plurality of user pre-devices and analyze the real-time channel state information to perform indoor intrusion monitoring, the network analysis device b is further configured to:
determining, for each user head-end, a current time at which the user head-end generated the real-time channel state information;
determining a target average vector fluctuation model corresponding to the current time from the plurality of average vector fluctuation models corresponding to the user front-end equipment based on the current time;
comparing the received real-time channel state information sent by the user front-end equipment with the target usual vector fluctuation model to determine a channel state information fluctuation value;
And comparing the channel state information fluctuation value with a preset average fluctuation threshold, and judging that the indoor intrusion exists currently when the channel state information fluctuation value is larger than or equal to the average fluctuation threshold.
Further, as shown in fig. 3, the 5G core device B further includes a network decision device c;
the network analysis equipment b sends the channel state information fluctuation value to the network decision-making equipment c when judging that the current indoor intrusion exists;
the network decision device c determines an intrusion early warning strategy based on the channel state information fluctuation value and sends the intrusion early warning strategy to the application function device A;
the application function device A responds to the specific operation of the user on the intrusion early warning strategy, generates a strategy execution request and sends the strategy execution request to a plurality of user prepositive devices C1 … … Cn;
and the user front-end equipment Ci executes the corresponding intrusion early warning strategy based on the strategy execution request.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4, the electronic device 400 includes a processor 410, a memory 420, and a bus 430.
The memory 420 stores machine-readable instructions executable by the processor 410, when the electronic device 400 is running, the processor 410 communicates with the memory 420 through the bus 430, and when the machine-readable instructions are executed by the processor 410, the steps of a method for indoor intrusion detection based on a 5G core network in the method embodiment shown in fig. 1 may be executed, and a specific implementation may refer to a method embodiment and will not be described herein.
The embodiment of the present application further provides a computer readable storage medium, where a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the computer program may execute the steps of a method for indoor intrusion detection based on a 5G core network in the method embodiment shown in fig. 1, and a specific implementation manner may refer to the method embodiment and will not be described herein.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It should be noted that: like reference numerals and letters in the following figures denote like items, and thus once an item is defined in one figure, no further definition or explanation of it is required in the following figures, and furthermore, the terms "first," "second," "third," etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the foregoing examples are merely specific embodiments of the present application, and are not intended to limit the scope of the present application, but the present application is not limited thereto, and those skilled in the art will appreciate that while the foregoing examples are described in detail, the present application is not limited thereto. Any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or make equivalent substitutions for some of the technical features within the technical scope of the disclosure of the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An indoor intrusion monitoring method based on a 5G core network, wherein the indoor intrusion monitoring method is applied to an indoor intrusion monitoring system based on a 5G core network, the indoor intrusion monitoring system includes an application function device, a plurality of user pre-devices associated with the application function device, and a 5G core device, and the indoor intrusion monitoring method includes:
the application function device responds to the specific operation of a user on the intrusion monitoring function and sends device information to the 5G core device so that the 5G core device can verify the device information;
after the verification of the 5G core equipment on the equipment information is passed, sending data receiving requests to a plurality of user front-end equipment;
the user front-end equipment sends real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request;
and the 5G core equipment receives the real-time channel state information sent by the plurality of user front-end equipment and analyzes the real-time channel state information so as to monitor indoor intrusion.
2. The indoor intrusion monitoring method of claim 1, wherein the 5G core device comprises a network opening device and a network analysis device, the device information comprising first identification information of an intelligent network device in which the application function device is installed and second identification information of a plurality of user premises equipment associated with the application function device, the indoor intrusion monitoring method further comprising:
The network opening equipment receives the equipment information sent by the application function equipment, verifies the first identification information in the equipment information, and sends a plurality of pieces of second identification information in the equipment information to the network analysis equipment after the verification is passed;
the network analysis equipment sends the data receiving request to a plurality of user prepositions corresponding to the second identification information according to the second identification information, receives the real-time channel state information sent by the user prepositions, and analyzes the real-time channel state information to perform indoor intrusion monitoring.
3. The indoor intrusion monitoring method according to claim 2, wherein the network analysis device, prior to analyzing the real-time channel state information, further comprises:
for each user front-end equipment, the network analysis equipment receives historical channel state information sent by the user front-end equipment in a historical time period and establishes a plurality of average vector fluctuation models of different time ranges of the user front-end equipment in the historical time period based on the historical channel state information.
4. The indoor intrusion monitoring method according to claim 3, wherein the network analysis device receives the real-time channel state information transmitted by the plurality of user head-end devices, analyzes the real-time channel state information to perform indoor intrusion monitoring, and comprises:
determining, for each user head-end, a current time at which the user head-end generated the real-time channel state information;
determining a target average vector fluctuation model corresponding to the current time from the plurality of average vector fluctuation models corresponding to the user front-end equipment based on the current time;
comparing the received real-time channel state information sent by the user front-end equipment with the target usual vector fluctuation model to determine a channel state information fluctuation value;
and comparing the channel state information fluctuation value with a preset average fluctuation threshold, and judging that the indoor intrusion exists currently when the channel state information fluctuation value is larger than or equal to the average fluctuation threshold.
5. The indoor intrusion monitoring method according to claim 4, wherein the 5G core device further comprises a network decision device, and when the network analysis device determines that there is an intrusion in the current indoor space, the indoor intrusion monitoring method further comprises:
The network analysis equipment sends the channel state information fluctuation value to the network decision-making equipment when judging that the current indoor intrusion exists;
the network decision device determines an intrusion early warning strategy based on the channel state information fluctuation value and sends the intrusion early warning strategy to the application function device;
the application function equipment responds to the specific operation of the user on the intrusion early warning strategy, generates a strategy execution request and sends the strategy execution request to a plurality of user front-end equipment;
and the user front-end equipment executes the corresponding intrusion early warning strategy based on the strategy execution request.
6. An indoor intrusion monitoring system based on a 5G core network, wherein the indoor intrusion monitoring system comprises:
the application function device is used for responding to the specific operation of a user on the intrusion monitoring function, and sending device information to the 5G core device so that the 5G core device can verify the device information;
the 5G core equipment is used for sending data receiving requests to the plurality of user front-end equipment after the equipment information passes the verification;
the user front-end equipment is used for sending real-time channel state information to the 5G core equipment according to a preset time interval based on the data receiving request;
And the 5G core equipment is also used for receiving the real-time channel state information sent by the plurality of user front-end equipment and analyzing the real-time channel state information so as to monitor indoor intrusion.
7. The indoor intrusion monitoring system of claim 6, wherein the 5G core device comprises a network opening device and a network analysis device, the device information comprising first identification information of an intelligent network device in which the application function device is installed and second identification information of a plurality of user premises equipment associated with the application function device;
the network opening device is used for receiving the device information sent by the application function device, verifying the first identification information in the device information, and sending a plurality of second identification information in the device information to the network analysis device after the verification is passed;
and the network analysis equipment is used for sending the data receiving request to a plurality of user prepositive equipment corresponding to the plurality of second identification information according to the plurality of second identification information, receiving the real-time channel state information sent by the plurality of user prepositive equipment, and analyzing the real-time channel state information so as to monitor indoor intrusion.
8. The indoor intrusion monitoring system of claim 7, wherein the network analysis device is further configured to, prior to being configured to analyze the real-time channel state information:
for each user front-end equipment, receiving historical channel state information sent by the user front-end equipment in a historical time period, and establishing a plurality of average vector fluctuation models of the user front-end equipment in different time ranges in the historical time period based on the historical channel state information.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory in communication via the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the steps of the 5G core network based indoor intrusion monitoring method according to any one of claims 1 to 5.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, performs the steps of the 5G core network based indoor intrusion monitoring method according to any one of claims 1 to 5.
CN202310121244.4A 2023-02-14 2023-02-14 Indoor intrusion monitoring method and system based on 5G core network Active CN116321254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310121244.4A CN116321254B (en) 2023-02-14 2023-02-14 Indoor intrusion monitoring method and system based on 5G core network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310121244.4A CN116321254B (en) 2023-02-14 2023-02-14 Indoor intrusion monitoring method and system based on 5G core network

Publications (2)

Publication Number Publication Date
CN116321254A true CN116321254A (en) 2023-06-23
CN116321254B CN116321254B (en) 2024-03-15

Family

ID=86831557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310121244.4A Active CN116321254B (en) 2023-02-14 2023-02-14 Indoor intrusion monitoring method and system based on 5G core network

Country Status (1)

Country Link
CN (1) CN116321254B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108568A1 (en) * 2003-11-14 2005-05-19 Enterasys Networks, Inc. Distributed intrusion response system
KR20160072533A (en) * 2014-12-15 2016-06-23 한국전자통신연구원 Apparatus and method of channel scheduling for preventing wireless lan intrusion
US20190213857A1 (en) * 2016-06-08 2019-07-11 Aerial Technologies Inc. System and methods for smart intrusion detection using wireless signals and artificial intelligence
CN113611065A (en) * 2021-08-24 2021-11-05 上海欣方智能系统有限公司 Intrusion monitoring method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108568A1 (en) * 2003-11-14 2005-05-19 Enterasys Networks, Inc. Distributed intrusion response system
KR20160072533A (en) * 2014-12-15 2016-06-23 한국전자통신연구원 Apparatus and method of channel scheduling for preventing wireless lan intrusion
US20190213857A1 (en) * 2016-06-08 2019-07-11 Aerial Technologies Inc. System and methods for smart intrusion detection using wireless signals and artificial intelligence
CN113611065A (en) * 2021-08-24 2021-11-05 上海欣方智能系统有限公司 Intrusion monitoring method and device

Also Published As

Publication number Publication date
CN116321254B (en) 2024-03-15

Similar Documents

Publication Publication Date Title
CA3054563C (en) Detecting an intruder's wireless device during a break in to a premises
US10491495B2 (en) Home automation system deployment
US11977623B2 (en) Automatic password reset using a security system
EP3134883B1 (en) Identifying persons of interest using mobile device information
US8049613B2 (en) Building security system
EP3246889B1 (en) Method for disaster notification service not requiring collecting of location information, and disaster notification server and application system therefor
CN110012496B (en) WiFi-based intrusion detection method and device
CN106134117A (en) The detection of undelegated Wireless Telecom Equipment
CN103680089B (en) Video monitoring police service linkage system
KR101906880B1 (en) Method of providing Motion sensing based on parametric perturbation of wireless LAN
US11875657B2 (en) Proactive loss prevention system
CN116321254B (en) Indoor intrusion monitoring method and system based on 5G core network
KR101186635B1 (en) Method and apparatus for providing reply service
CN105374150A (en) Alarm control method, device and server
US11941959B2 (en) Premises monitoring using acoustic models of premises
CN105828035A (en) Monitoring method and device
CN112749586A (en) User identification method and system
JP2003178385A (en) Intruder recognizing device and detecting method, intruder recognizing system and estimation method
KR20210023219A (en) Smart window alarm system, multi-purposes alarm device, window chassis module and window frame for the same
KR20100067265A (en) Alarm and method
CN105389961A (en) Home safety early warning method and device
KR20040096181A (en) Network linked system for monitoring and controlling emergency, a business method using the system and computer readable medium having stored thereon computer executable instruction for preforming the same
AU2267900A (en) Monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant