Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for evaluating trust of user action in trusted network

A user and network technology, applied in electrical components, transmission systems, etc., can solve problems such as research on trusted network trust requirements, and achieve the effects of improving time-sensitive characteristics, facilitating resources, and making independent trust decisions.

Inactive Publication Date: 2010-06-30
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These trust models all provide the implementation scheme of user behavior trust evaluation, but since the focus of these research work is to propose a trust model, there is no special research on the trust requirements of trusted networks, so they are directly applied to users in trusted networks. There must be some problems in the measurement of behavioral trust

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for evaluating trust of user action in trusted network
  • Method for evaluating trust of user action in trusted network
  • Method for evaluating trust of user action in trusted network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The implementation method of user behavior trust evaluation adopted in the present invention is: the user (User, referred to as U) and the resource provider (Provider, referred to as P) in the trusted network interact, and the user U sends a request to the resource provider P, requesting Use this resource. At this time, remember that there are m other users who have transaction history with the user U in the trusted network, and the set formed is S U , the resource provider P will be based on S U All users in the system make a trust decision based on the user's behavioral trust evaluation to decide whether to accept their request. In order to realize trust evaluation, the basic trust value in the initial state is defined as 0.3, indicating that the relationship between users and resources in a trusted network is a basic trust relationship; the untrusted value is defined as 0, indicating that the relationship between users and resources The relationship is a completely...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for evaluating the trust of a user action in a trusted network. In the method, distributed computing technology, trusted computing technology, trust management technology are applied to the construction of a trust evaluation vector comprising a priority array serving as a storage structure and resource evaluates the trust according to the trust evaluation vectors provided by other users having transaction histories with a user so as to provide basis for trust decision. The trust evaluation vector consists of four parts which are transaction duration, transaction results, transaction value and trust value respectively, wherein the transaction duration ensures timeliness of the trust evaluation; the transaction results are accumulated to ensure that the trust can be successfully and quickly reduced; and the transaction value is defined to reflect different positions and functions of transactions with different values in the trust evaluation. By adopting the whole evaluation executing scheme, the timeliness of the trust is improved, the resource can conveniently realize reliable and independent trust decision, and a novel idea is provided for realizing the method for evaluating the user action in the trusted network and constructing trust models of the trusted network.

Description

technical field [0001] The invention relates to an implementation method for realizing user behavior trust evaluation in a trusted network, which mainly uses distributed computing technology, trusted computing technology and trust management technology to solve the problem of trust evaluation of user behavior in a trusted network, and belongs to distributed Computing, information security, and trusted computing cross-technical application fields. Background technique [0002] With the rapid development of network technology and applications, the Internet is increasingly complex and heterogeneous. Ensuring the reliability of the network has become an urgent need for the further development of the network. The initial concept of absolute liberalism in network applications and the anarchy of management are no longer suitable for the current actual network development, and a new order of trusted network behavior needs to be established. The computer network system has changed f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 王海艳王汝传王杨张琳邓勇
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products