Social network user identity authentication method based on relation statement

A technology of user identity authentication and social networking, applied in user identity/authority verification, transmission system, public key for secure communication, etc., to achieve the effect of easy operation and convenient verification

Active Publication Date: 2012-07-04
BEIHANG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Purpose: In order to overcome the above problems and realize the authentication of user identities with indirect relationships, the present invention provides a social network user identity authentication method based on relationship statements, which can solve the problem of relying on the relationship between members in social networks to implement access Issues requiring relationship authentication for access requesters when controlling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social network user identity authentication method based on relation statement
  • Social network user identity authentication method based on relation statement
  • Social network user identity authentication method based on relation statement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] See figure 1 , the present invention is a social network user identity authentication method based on relationship statement, the specific steps of the method are as follows:

[0049] Step 1: Issuing a Relationship Statement

[0050]The user first issues a relationship statement to his direct friends, and the relationship statement contains these parameters: {the issuer of the relationship statement, the receiver, the relationship type, and the timestamp}. where the timestamp indicates when the relationship statement was signed. The relationship declaration in Extensible Markup Language (XML) form is as follows:

[0051]

[0052] publisher public key

[0053] recipient public key

[0054] Relation Type

[0055] current time

[0056]

[0057] For example in figure 2 In , A wants to issue a relationship statement with a colleague relationship to B. This relationship statement can be expressed as: Sig A (P A , P B , CollegeOf, TS), where TS refers to the tim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a social network user identity authentication method based on a relation statement, comprising the following three steps of: 1. issuing a relation statement; 2. defining an access rule; and 3. implementing relation authentication. A user determines the relation type between the user and a friend by issuing the relation statement to the direct-relation friend of the user; arelation server builds a relation path for the user according to the relation statement issued by the user; because each level of relation is signed by a relation statement publisher, the reliabilityof the level of relation can be effectively guaranteed so as to integrally improve the reliability of the relation path. The method is simple and convenient for operation and convenient for verification and has better practical value and wide application prospect in the technical field of network security.

Description

(1) Technical field [0001] The invention relates to a social network user identity authentication method based on a relationship statement, which is used to solve the problem of realizing access control in the social network relying on the relationship between members, and belongs to the technical field of network security. (2) Background technology [0002] With the widespread popularity of social networks and the increase of user groups, the security issues in social networks have attracted more and more attention. Among them, the access control issue is an important content in the social network security issues. [0003] In social networks, users create data resources and share them with others. In some cases, users may wish to create private data resources only to be shared with friends of a specific relationship. But the problem is, when the relationship between the access requester and the owner is not a direct friendship, but an indirect relationship, how do we verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 刘建伟陈庆余郑志明毛剑修春娣尚涛刘靖
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products