Mobile user credible authentication method and device, electronic device and storage medium

A mobile device and mobile user technology, applied in the field of information security, can solve problems such as low data collection efficiency, limited number of employees, and less consideration of data collection efficiency, so as to overcome data collection difficulties, improve data collection efficiency, and overcome poisoning The effect of the attack

Pending Publication Date: 2021-12-28
JINING POWER SUPPLY CO OF STATE GRID SHANDONG ELECTRIC POWER CO +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in real tasks (i.e., security-related user authentication), the above methods have the following drawbacks: First, the data collection efficiency is low and there is no effective incentive mechanism
Most of the data collection steps in the existing machine learning tasks have been completed in advance, and the number of participating employees is limited, and employees are required to collect new data under each behavior. less consideration, and the rate at which data is collected in this study is largely dependent on how often employees use the devices
Second, the traditional data collection method requires employees to collect data under each behavior and manage it centrally. However, with the federated learning method, it is uncertain whether the data collected by edge mobile devices is true and effective, and there may be mobile The case where the device uses fake data to train the model and returns wrong gradients to achieve a poisoning attack on the model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile user credible authentication method and device, electronic device and storage medium
  • Mobile user credible authentication method and device, electronic device and storage medium
  • Mobile user credible authentication method and device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the description of the application are only for the purpose of describing specific embodiments, and are not intended to limit the application.

[0039] figure 1 is a flow chart of a trusted authentication method for a mobile user according to an exemplary embodiment,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile user credibility authentication method and device, an electronic device and a storage medium, and the method comprises the steps: constructing a private block chain based on a smart contract, the private block chain being composed of a requester and a mobile device willing to participate in model training, sensing data during man-machine interaction between a user and the mobile equipment being stored in the mobile device; sending a global model to the mobile device, so that after the mobile device receives the global model, training the global model by using the sensing data to obtain a local model, and sending the local model to the requester; receiving the local model, verifying the local model by using a quality proof-based consensus mechanism, and providing rewards for the mobile device generating the effective local model; updating the global model by utilizing a federated learning aggregation algorithm according to the effective local model; and carrying out credible authentication on the user on the mobile device by utilizing the updated global model.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a mobile user trusted authentication method and device, electronic equipment, and a storage medium. Background technique [0002] With the development of the Industry 4.0 era, artificial intelligence is widely used in the field of energy security. At the level of production equipment, machine learning methods are used to detect abnormal behaviors in the process of energy safety production; at the level of human-computer interaction, machine learning methods are used for credible authentication of employees. [0003] When user authentication is performed in human-computer interaction, most machine learning techniques need to aggregate private data representing authenticated users to a central server for model training and analysis. This will not only lead to high communication and storage costs, but users also face serious risks of privacy leakage. In orde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06K9/62G06N20/00
CPCG06F21/45G06N20/00G06F18/214
Inventor 常英贤桂纲杨涛马广鹏刘宗杰王红梅宋益睿杨晓娟邵晨张秀琰张翠珍冯庆云乔亚男高强盛沛然邹玉娇丛超陈伦李辉刘秀秀吕德志张坤孔令基西灯考
Owner JINING POWER SUPPLY CO OF STATE GRID SHANDONG ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products