
Application and Consideration of Dynamic Security Identity Authentication in Electric Power Business
Author(s) -
Lei Chen,
Xiaoyu Gao,
Wen Shen,
Xiangqun Wang,
Yuping Tang,
Qigui Yao
Publication year - 2019
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/677/4/042089
Subject(s) - authentication (law) , identity (music) , computer science , computer security , certification , identification (biology) , control (management) , security controls , identity theft , artificial intelligence , physics , botany , acoustics , political science , law , biology
This electronic document carries out the analysis of mouse, keyboard fingerprint characteristics and online time and user behaviour, establishes user behavior characteristics database and model of electric power business, realizes the identification and account risk control based on dynamic behavior characteristics, improves the account security of the system, and solves the problems. The former security certification method is single, and the ability of security risk prevention and control is insufficient.