Information Security Discrimination Method, System and Related Devices Based on Rough Set Theory
A technology of rough set theory and information security, applied in the field of information security discrimination based on rough set theory, and computer readable storage media, can solve the problems of low verification efficiency, inability to timely and accurately feedback security status, and adaptability to industrial application scenarios Poor and other problems, to achieve the effect of improving verification efficiency, reducing time complexity, and reducing verification time-consuming
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0117] Combine the following Figure 11 , Figure 11 A flowchart of a method for discriminating information security based on rough set theory provided in the embodiment of the present application, which specifically includes the following steps:
[0118] S101: respectively perform an appreciable transition optimization operation on the first event string and the second event string constructed according to the target discrete event system, and correspondingly obtain a first generator and a second generator;
[0119] Among them, the first event string contains information that needs to be concealed, and the second event string is a cover event string of the first event string, that is, the ultimate goal is to prevent other people from being able to accurately distinguish the information that needs to be concealed (need to be kept secret) in which event. In the string, in the case of uncertainty, it can be considered that the information that needs to be concealed is kept secr...
Embodiment 2
[0135] Combine the following Figure 12 , Figure 12 A flow chart of a method for judging whether there is opacity and the degree of opacity between the first event string and the second time string in the information security judging method provided by the embodiment of the present application, on the basis of the first embodiment, is given. A specific way of judging opacity and the degree of opacity, the specific steps are as follows:
[0136] S201: Determine the event string to which it belongs according to the decision attribute corresponding to each event path included in the decision table, and obtain the event path set of the first event string and the event path set of the second event string;
[0137] S202: Determine whether there is a consistent event path in the event path sets corresponding to the first event string and the second event string respectively;
[0138] S203: Determine that there is no opacity between the first event string and the second event strin...
Embodiment 3
[0148] Aiming at the opacity of discrete event systems, this embodiment proposes a method for processing the opacity verification of discrete event systems using rough set theory as a knowledge extraction tool: first formalize the opacity of discrete event systems, and then use rough sets The theory expresses the discrete event system in the form of information table and decision table, obtains a necessary and sufficient condition about the opacity of discrete event system, and gives an algorithm to verify the opacity of discrete event system, which realizes the opacity of the system. Validation of:
[0149] 1. According to the discrete event system G=(∑, X, δ, ψ, x 0 , X m ), first construct the automaton of L and K:
[0150] Knowing L, First construct an automaton for L: G 1 =(∑, X 1 ,δ 1 , ψ 1 , x 10 , X 1m ), where L m (G 1 ) = L, for all x 1 ∈X 1 , ψ 1 (x 1 ) = ∑. To determine G 1 , one can choose to base G on G 1 After optimization, the results are as ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com