Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method based on repeated game

An access control and accessed technology, applied in electrical components, transmission systems, etc., can solve problems such as no authoritative control center, loss of resources and data, etc.

Active Publication Date: 2014-06-18
和宇健康科技股份有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will bring immeasurable loss to resources and data in the network
[0004] (2) The accessed resource nodes in the open network may be scattered, and the nodes are independent of each other, and there is no authoritative control center
[0005] (3) In an open dynamic network, there is currently no unified punishment mechanism to punish users for illegal access, and illegal users may obtain huge additional benefits at a very small cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on repeated game

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Faced with the shortcomings and deficiencies of the above access control models, we use the repeated game theory in game theory to propose an access control method based on repeated games.

[0022] Repeated game theory is an important content of game theory, it refers to the game of the same structure repeated multiple times to form the overall game. In access control, the visiting subject and the visited object are naturally existing game parties. Their respective strategies "legal access", "illegal access" and "accepting access" and "rejecting access" are the natural game strategies of both parties. In repeated games, players face the same game at each stage. Although repeated games are a collection of independent games at each stage, the behavior of players and the choice of game strategies are not necessarily simple repetitions of independent games. Repeated games are not the current superposition of independent games, but need to be studied as a whole. Among them, if...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method based on a repeated game. A set of access control mode is established through the repeated game principle, and a more legal access strategy is adopted when a main access body has access, so that safety of resources and data to which the main access body has access is ensured. After an main access body provides an access request, the main access body corresponds to a unique main body identity according to a behavior track of the main access body through an access object, and a network identity of the main access body has uniqueness according to the unique identification of the main access body, so that the multi-access process of the main access body to the access object becomes a repeated game process. By means of analysis and utilization of the related principle of the repeated game, the more legal access strategy is adopted in access of the main access body.

Description

Technical field [0001] The invention relates to the technical field of access control and information security, in particular to an access control method based on repeated games. Background technique [0002] Access control refers to the setting of certain access policies, and the access of the access subject to the accessed objects according to the set policies, thereby protecting the security of information, resources and services in computers and networks. Access control is an important area of ​​information security and a key means to protect system data. The main functions of access control include: allowing legitimate users to access authorized resources and data; preventing illegal users from accessing resources and data; preventing legitimate users from illegally accessing unauthorized resources and data. Traditional access control technologies include autonomous access control, mandatory access control and role-based access control. With the rapid development of comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 何泾沙张伊璇张跃骞
Owner 和宇健康科技股份有限公司