Control system and method of intelligent security entrance guard based on 5G architecture
Technical Field
The invention relates to the technical field of information and communication, in particular to an intelligent security access control system and method based on a 5G framework.
Background
The intelligent safety entrance guard system is a novel modern digital intelligent safety management system, and is widely applied to various occasions, the existing intelligent technology mostly adopts biological identification such as irises, fingerprints, voices and human faces, the entrance and exit conditions of personnel can be automatically recorded constantly, the entrance and exit area and the entrance and exit time of internal personnel are limited, the passengers can be politely refused, and meanwhile, the property is effectively protected from being invaded. The intelligent security access control system has high recognition error rate due to the fact that technical conditions and application maturity levels of various technologies are different. Moreover, pure biometric identification also risks counterfeiting.
With the maturity and popularization of the 5G technology, the 5G technology provides a new solution for the problem of uneven recognition level in the existing access control technology through the nearby and quick response capability of a mobile edge computing domain (MEC).
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an intelligent safety access control system and method based on a 5G framework, and solves the technical problems that the existing intelligent safety access control identification technology has large error and uneven technical level, and the individual biological identification is easy to forge and deceive.
The technical scheme of the invention is realized as follows:
a control method of intelligent security entrance guard based on 5G architecture comprises the following steps:
step S101: establishing 5G communication connection between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform;
step S102: acquiring biological sample data of a user by using intelligent access control equipment or mobile terminal equipment, and logging in a control system through APP software to store the biological sample data in a user characteristic sample library of the MEC platform;
step S103: acquiring data information to be identified by using intelligent access control equipment or mobile terminal equipment, uploading the data information to an MEC platform, comparing the data information with biological sample data in a user characteristic sample library on the MEC platform, and feeding back a comparison result to the intelligent access control equipment or the mobile terminal equipment;
step S104: the intelligent access control equipment or the mobile terminal equipment receives the comparison result of the MEC platform, if the comparison result is correct, the intelligent access control equipment searches the bound mobile terminal equipment nearby through D2D communication or searches the bound intelligent access control equipment nearby through D2D communication, and step S105 is executed, otherwise, the intelligent access control equipment keeps a locking state;
step S105: if the intelligent access control equipment successfully searches the bound mobile terminal equipment through D2D communication or successfully searches the bound intelligent access control equipment through D2D communication, the mobile terminal equipment sends an unlocking instruction to the intelligent access control equipment, the intelligent access control equipment executes an access unlocking instruction to open an intelligent lock, otherwise, the intelligent access control equipment keeps a locking state, and the control of intelligent security access control is completed.
The identification of the intelligent access control equipment is a hardware serial number of the intelligent access control equipment, and the identification of the mobile terminal equipment is a hardware serial number of the mobile terminal equipment.
A control system of intelligent security entrance guard based on 5G architecture comprises an MEC platform, a 5G base station, intelligent entrance guard equipment and mobile terminal equipment; the MEC platform is connected with the 5G base station, and the 5G base station is respectively connected with the intelligent access control equipment and the mobile terminal equipment through 5G wireless communication; the mobile terminal device is connected with the intelligent access control device through D2D communication.
The intelligent access control equipment comprises a fingerprint identification module, a voice identification module, a face identification module, an iris identification module and a 5G wireless communication module; fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with the MEC platform through 5G wireless communication module, fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with mobile terminal equipment through 5G wireless communication module.
The mobile terminal equipment comprises an APP software login control system, an acquisition module and a 5G wireless communication module, the APP software login control system and the acquisition module are connected with the MEC platform through the 5G wireless communication module, and the APP software login control system is connected with the intelligent access control equipment through D2D communication.
The beneficial effect that this technical scheme can produce: the invention adopts the 5G technology to provide uniform and more accurate identification service through the nearby and quick response capability of the mobile edge computing domain (MEC), thereby solving the problem of uneven identification level; the invention combines the D2D communication mode from the device to the device in 5G, increases the hardware identification to prevent the forgery and the deception while carrying out the biological identification, and can further improve the safety guarantee coefficient of the intelligent safety entrance guard by adopting the soft and hard combination mode.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a schematic diagram of the recognition based on the 5G architecture of the present invention;
fig. 3 is a schematic diagram of the 5G-based architecture of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
Embodiment 1, an intelligent security access control system based on a 5G architecture, as shown in fig. 1, includes an MEC platform, a 5G base station, an intelligent access control device, and a mobile terminal device; the MEC platform is connected with the 5G base station, and the 5G base station is respectively connected with the intelligent access control equipment and the mobile terminal equipment through 5G wireless communication; the mobile terminal device is connected with the intelligent access control device through D2D communication.
The MEC platform establishes wireless connection with the intelligent access control equipment through the 5G base station, utilizes 5G communication and mobile edge to calculate the nearby service provided by the MEC platform, and the biological identification request sent by the intelligent access control equipment is responded quickly and accurate identification service is provided.
The intelligent access control equipment comprises a fingerprint identification module, a voice identification module, a face identification module, an iris identification module and a 5G wireless communication module; the fingerprint identification module is used for collecting fingerprint information of a user, the voice identification module is used for collecting voice information of the user, the face identification module is used for collecting face image information of the user, and the iris identification module is used for collecting iris information of the user. Fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with the MEC platform through 5G wireless communication module, fingerprint identification module, speech recognition module, face identification module, iris identification module all are connected with mobile terminal equipment through 5G wireless communication module.
The mobile terminal equipment comprises but is not limited to smart phone equipment of a user, the mobile terminal equipment carries a wireless communication module, serves as hardware equipment for hardware anti-counterfeiting, and provides interactive control and setting of an intelligent security access control system. The mobile terminal equipment comprises an APP software login control system, an acquisition module and a 5G wireless communication module, wherein the acquisition module is used for acquiring biological data of a user. APP software login system and collection module all are connected with the MEC platform through 5G wireless communication module, and APP software login control system is connected with intelligent entrance guard's equipment through D2D communication.
Embodiment 2, an intelligent security access control method based on a 5G architecture, where an intelligent access control device has a biometric capability, as shown in fig. 2, and the communication among the MEC platform, the intelligent access control device, and the mobile terminal device in embodiment 2 all uses a 5G technology. The MEC platform mainly provides a general biological recognition algorithm, the intelligent access control equipment collects sample data through biological recognition hardware, and the mobile terminal equipment is mainly used as a hardware lock. The method comprises the following specific steps:
step S201: establishing a 5G connection relation between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform; the identification of the intelligent access control equipment is a hardware serial number of the intelligent access control equipment, and the identification of the mobile terminal equipment is a hardware serial number of the mobile terminal equipment.
Step S202: the method comprises the steps of establishing 5G communication connection between the intelligent access control equipment and the MEC platform, collecting biological sample data of a user through a fingerprint recognition module, a voice recognition module, a face recognition module or an iris recognition module of the intelligent access control equipment, and storing the biological sample data in a user characteristic sample library of the MEC platform through an APP software login control system.
Step S203: after the setting of step S201 and step S202, when the user needs to open the intelligent security access control, the intelligent access control device is used to collect data information to be identified, the data information is uploaded to the MEC platform, on the MEC platform, the data information is compared with the biological sample data in the user characteristic sample library, and the comparison result is fed back to the intelligent access control device.
Step S204: the intelligent access control equipment receives the comparison result of the MEC platform, if the comparison result is correct, the intelligent access control equipment searches the bound mobile terminal equipment nearby through D2D communication, step S205 is executed, otherwise, the intelligent access control equipment keeps a locking state. And the intelligent access control equipment refuses unlocking if the comparison result is not matched according to the comparison result fed back by the MEC platform system, and the software identification process is finished if the comparison result is matched. However, since the data information collected in step S203 may be a forged fingerprint or a forced collection behavior under an illegal behavior, further hardware device anti-counterfeit identification is required. Therefore, in order to avoid this situation, or to enhance the security system, the hardware device anti-counterfeit identification process of step S205 needs to be entered;
step S205: if the intelligent access control device successfully searches the bound mobile terminal device through D2D communication, hardware anti-counterfeiting information is found, for example, UUID (Universal unique identifier) information of a CPU (Central processing Unit) of the mobile terminal is the hardware anti-counterfeiting information of the mobile terminal; and combining the acquired hardware anti-counterfeiting information, comparing the software identification information fed back in the step S204, if the software identification information and the hardware identification information both meet the requirements, executing an unlocking instruction to open the intelligent lock, otherwise, keeping the intelligent access control equipment in a locking state, and finishing the control of the intelligent safety access control.
Embodiment 3, an intelligent security access control method based on a 5G architecture, where an intelligent access control device does not have a biometric capability, but places the biometric capability in a mobile terminal device, as shown in fig. 3, and the communication among the MEC platform, the intelligent access control device, and the mobile terminal device in embodiment 3 all uses a 5G technology. Considering the development of hardware, the miniaturization of the biological identification component can be integrated into the mobile terminal equipment, and the sampling function of the original intelligent lock can be completed by the mobile terminal equipment, so that the repetition of the component is avoided, and the user cost is reduced. In embodiment 3, the MEC platform mainly provides a biometric algorithm, the intelligent access control device integrates a 5G communication module and provides functions of receiving an unlocking instruction and unlocking, and the mobile terminal device integrates a biometric acquisition hardware module, provides a data acquisition function, and serves as a hardware lock at the same time. The method comprises the following specific steps:
step S301: establishing a 5G connection relation between the mobile terminal equipment and the MEC platform, binding the identifier of the intelligent access control equipment and the identifier of the mobile terminal equipment through an APP software login control system on the mobile terminal equipment, and storing the identifier bound between the mobile terminal equipment and the intelligent access control equipment into the MEC platform; the identification of the intelligent access control equipment is a hardware serial number of the intelligent access control equipment, and the identification of the mobile terminal equipment is a hardware serial number of the mobile terminal equipment.
Step S302: the method comprises the steps of collecting biological sample data of a user by using a collection module of the mobile terminal device, logging in a control system through APP software, and storing the biological sample data in a user characteristic sample library of the MEC platform.
Step S303: after the settings of step S201 and step S202, when the user needs to open the intelligent security access control, the mobile terminal device is used to collect data information to be identified, the data information is uploaded to the MEC platform, the data information is compared with the biological sample data in the user characteristic sample library on the MEC platform, and the comparison result is fed back to the mobile terminal device.
Step S304: the mobile terminal device receives the comparison result of the MEC platform, if the comparison result is correct, the mobile terminal device searches for the bound intelligent access control device through D2D communication, step S305 is executed, otherwise, the intelligent access control device keeps a locking state. And the mobile terminal equipment fails to unlock if the comparison result is not matched according to the comparison result fed back by the MEC platform system. And if the comparison result is matching, ending the software identification process. However, since the data information sample collected in step S302 may be a fake fingerprint or a forced collection behavior under an illegal behavior, further hardware device anti-counterfeit identification is required. Therefore, in order to avoid this situation, or to enhance the security system, a hardware device anti-counterfeit identification process is required.
Step S305: if the mobile terminal device successfully searches the bound intelligent access control device through D2D communication, hardware anti-counterfeiting information is found, the mobile terminal device comprehensively compares the software identification comparison result information obtained in the step S304, if the two conditions are met, the mobile terminal device communicates through D2D, an unlocking instruction is directly sent to the intelligent access control device, the intelligent access control device executes an access unlocking instruction to open an intelligent lock, otherwise, the intelligent access control device keeps a locking state, and the control of intelligent security access control is completed.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.