Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system based on 5G power

An authentication and power technology, applied in the field of data security, can solve problems such as vulnerability to attack, low authentication efficiency and reliability, and achieve high authentication reliability and high authentication efficiency

Pending Publication Date: 2021-11-02
CHINA SOUTHERN POWER GRID COMPANY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authentication of the existing technology does not have the identity mark of the encryption strategy, etc., and cannot reject unqualified access requests, is vulnerable to attacks, and has low authentication efficiency and reliability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system based on 5G power
  • Authentication method and system based on 5G power
  • Authentication method and system based on 5G power

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] An embodiment of the present invention provides an authentication method based on 5G power, such as figure 1 As shown, the method may specifically include the following steps:

[0041] In step S101, the gateway receives a service establishment request from a user terminal.

[0042] In the embodiment of the present invention, the service establishment request carries encrypted data of the user terminal identity. It is exemplarily applied to a service access system including user terminals, routers, servers, and service systems. The user terminals can send service bearer allocation requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication. Routers, routers, The server sequentially obtains the service bearer allocation request sent by the user terminal, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with access functions.

[0043] ...

Embodiment 2

[0049] An embodiment of the present invention provides an authentication system based on 5G power, such as figure 2 As shown, the system can specifically include the following modules:

[0050] The receiving module is used for the gateway to receive the service establishment request of the user terminal.

[0051] In the embodiment of the present invention, the service establishment request carries encrypted data of the user terminal identity. It is exemplarily applied to a service access system including user terminals, routers, servers, and service systems. The user terminals can send service bearer allocation requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication. Routers, routers, The server sequentially obtains the service bearer allocation request sent by the user terminal, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with ac...

Embodiment 3

[0058] An embodiment of the present invention provides an authentication device based on 5G power, such as image 3 As shown, the device may specifically include the following modules:

[0059] The communication bus is used to realize the connection and communication between the processor and the memory;

[0060] The memory is used to store computer programs; the memory may include a high-speed RAM memory, and may also include a non-volatile memory, such as at least one disk memory. The memory may optionally comprise at least one storage device.

[0061] A processor, configured to execute the above computer program to achieve the following steps:

[0062] First, the gateway receives a service establishment request from a user terminal.

[0063] In the embodiment of the present invention, the service establishment request carries encrypted data of the user terminal identity. It is exemplarily applied to a service access system including user terminals, routers, servers, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and system based on 5G power, and the method comprises the steps of receiving a service building request of a user terminal through a gateway, and enabling the service building request to carry the encrypted data of the identity identification of the user terminal; the gateway obtaining the identity identifier from the access request, judging whether the identity identifier is consistent with a stored identity identifier, and sending an authentication request carrying the service establishment request to a server if the identity identifier is consistent with the stored identity identifier; and the server carrying out authentication on the authentication request, and if the authentication passes, receiving a service establishment request of the user terminal. The method has the advantages that the identity identification with the encryption strategy and the like are provided, access can be denied for access requests which do not meet conditions, and therefore the method has the anti-attack effect and is high in authentication reliability and authentication efficiency.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to an authentication method and system based on 5G power. Background technique [0002] As a network strongly related to the power grid in the future, 5G can be divided into business segments based on the overall goal of "network synergy, good technology use, terminal management, reliable channels, guaranteed services, more open platforms, and acceptable costs". Access, communication adaptation layer, network layer, support system, and secure access system support the digital transformation of the smart grid. This project will use "5G-integrated smart grid end-to-end converged network architecture" as the top-level design, and guide the construction of each layer from the four aspects of "converged networking, management collaboration, unified security, and standardized system". The communication adaptation layer will focus on the development of 5G-adapted power termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/069G06F21/46G06F21/60G06Q50/06
CPCH04W12/06H04W12/068H04W12/069G06F21/46G06F21/602G06Q50/06
Inventor 朱海龙张国翊洪丹轲张思拓黄山珂
Owner CHINA SOUTHERN POWER GRID COMPANY