Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-standard four-real data security access system based on 5G edge computing

An edge computing and data security technology, applied in the field of communication, can solve problems such as low data utilization, low efficiency, and difficulty in accessing data on 4G mobile terminals, and achieve efficient collection

Active Publication Date: 2021-08-24
广州瀚信通信科技股份有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution is inefficient and cannot provide real-time data access from the public security extranet
The utilization rate of the two-standard and four-real data is low, and the policy requirements of allowing data to travel more and the masses to run less errands cannot be realized
This determines that the traditional two-standard and four-real data collection is inefficient, and it is difficult to access data through traditional 4G mobile terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-standard four-real data security access system based on 5G edge computing
  • Two-standard four-real data security access system based on 5G edge computing
  • Two-standard four-real data security access system based on 5G edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0059] As a preferred embodiment of the present invention, the key generator specifically includes:

[0060] The face verification module is used to obtain the user's face information, and perform verification according to the user's face information to obtain the first result;

[0061] The ID card verification module is used to obtain the user's ID card information, and perform verification according to the user's ID card information to obtain the second result;

[0062] A key acquisition module, configured to acquire the third result, and send a request to the Beidou controller to acquire a key when both the first result and the second result pass.

[0063] As a preferred embodiment of the present invention, the 5G edge computing system also includes,

[0064] The front-end 5G core network is used to receive the verification result of the key verification device, and control and allow the key verification machine to access the two-standard four-real system platform accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a two-standard four-real data security access system based on 5G edge computing, and the system comprises the following parts: a key generator which is used for verifying the identity of a user, and obtaining a key transmitted by a Beidou controller after the verification succeeds; a key verifier which is associated with the key generator and is used for acquiring a key obtained by a user through the key generator; a 5G edge computing system which comprises a key verification device that interacts with a 5G base station through a 5G air interface and further interacts with the key verifier through a 5G slicing technology, and which is used for obtaining the key and verifying the key through the key verification device to obtain a verification result; the two-standard four-real system platform which is deployed in a public security internal network and is used for storing two-standard four-real data and allowing the key verifier to get access when the verification result obtained by the 5G edge computing system passes. According to the invention, the key generator and the key verifier can be used outside the public security private network to provide preconditions for an extranet user to access the public security intranet two-standard four-real platform data.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a two-standard and four-real data security access system based on 5G edge computing. Background technique [0002] "Two Standards and Four Realities" is a public security basic informatization project. It is led by the public security department and serves the informatization of the basic work of public security management. It collects the standard base map, standard address (referred to as "second standard"), and information on actual population, actual houses, actual units, and actual facilities into the database. , Improve the basic information service project, through the construction of a platform with population big data as the core, realize information sharing and interoperability, serve the actual combat of public security, combat crimes and comprehensively consolidate the basic police work in the community. From the perspective of work content, "Two Stand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04W12/06H04W84/06G06F17/18
CPCH04W12/06H04W84/06G06F17/18Y02D30/70
Inventor 练镜锋宋德寿
Owner 广州瀚信通信科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products