Power terminal identity authentication method and system based on trusted behavior sequence

An identity authentication and power terminal technology, applied in the computer field, can solve problems such as long time for terminal identity authentication, insufficient computing power, limited terminal resources, etc., and achieve the effects of reducing authentication time, accurate authentication results, and enhancing security

Pending Publication Date: 2021-02-09
国网重庆市电力公司营销服务中心
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional terminal identity authentication technology adopts the user name and password authentication method, which will leak the sensitive information of the user and infringe on the privacy information such as the user's identity status, behavior habits, and electricity consumption characteristics.
Moreover, the network data information is becoming more and more abundant, while the terminal resources in the power network environment are limited, the computing power is insufficient, and the time for terminal identity authentication is too long, which increases the possibility of user information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power terminal identity authentication method and system based on trusted behavior sequence
  • Power terminal identity authentication method and system based on trusted behavior sequence
  • Power terminal identity authentication method and system based on trusted behavior sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] A power terminal identity authentication method based on a trusted behavior sequence. Firstly, the terminal behavior is used as the analysis object, and the behavior sequence is used as the terminal feature, and the behavior feature is processed to extract the initial state of the terminal behavior mode, and the terminal behavior is created. model. Then, the terminal behavior sequence is iterated according to the similarity of the behavior sequence, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computers, in particular to a power terminal identity authentication method based on a trusted behavior sequence, which comprises the following steps: acquiring terminal behavior data in real time, and inputting the terminal behavior data acquired in real time into a terminal identity authentication module for authentication; when the authentication fails, ending identity authentication; when the authentication succeeds, outputting that the terminal identity authentication succeeds, and updating the terminal behavior mode in the terminal identity authentication module. The terminal behavior mode similarity is matched through a behavior sequence similarity measurement method, the identity of the terminal is confirmed, and the security authentication ofthe terminal is guaranteed in the mode of calculating the terminal behavior similarity. Multiple pairs of sequences are updated and mined, so that the long-term effectiveness of the method is achieved.

Description

technical field [0001] The invention relates to the computer neighborhood, in particular to a power terminal identity authentication method and system based on trusted behavior sequences. Background technique [0002] With the widespread application of smart devices in smart grids, power customers are increasingly connected with the information world. The smart grid can support the two-way interaction of information flow between power customers and equipment. This two-way interaction ensures the real-time transmission of power consumption data based on customer needs, but the security problems at the user end are becoming more and more obvious. Among the security issues, the leakage of private information of power customers is particularly prominent, which is closely related to everyone, and this is a limiting factor for the further development of smart grids. Therefore, it is of great significance to carry out research on privacy protection of power customers in smart grid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31H04L29/06
CPCG06F21/31H04L63/08H04L63/083
Inventor 王凌宇傅宏杨云
Owner 国网重庆市电力公司营销服务中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products