Network transaction method based on privacy protection trust evaluation

A technology for network transactions and privacy protection, which is used in sales/rental transactions, electrical components, transmission systems, etc., to achieve the effect of clear concept, privacy protection security, and wide application

Inactive Publication Date: 2012-07-04
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for conducting network transactions based on privacy protection trust evaluation, which solves the problem of calculating the trust value of both parties before network transactions in the prior art and not disclosing any node information based on the purpose of privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network transaction method based on privacy protection trust evaluation
  • Network transaction method based on privacy protection trust evaluation
  • Network transaction method based on privacy protection trust evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Embodiment 1 Embodiment of network transactions based on privacy protection trust evaluation

[0021] The network environment of large-scale deployment of the present invention is implemented such as figure 1 Shown, denoted as graph G (V, E) said. Among them, V is a set of all points, each point in the figure represents each node in the network, E is a set of edges, each edge in the figure represents a communication link between nodes, and there is a direct link between any two nodes in the figure Or an indirect communication link, that is, the graph must be a Unicom graph. The integrated network environment consists of |V| ordinary nodes and a semi-honest third-party node Agent, where semi-honest means that the node follows the protocol in the network like other nodes, but it can arbitrarily use all intermediate data to infer other nodes private data. According to actual network conditions, the range of V is between 2 and 100,000. The semi-honest node Agent can com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network transaction method based on privacy protection trust evaluation. The method is safe under a half-honest network environment and a malicious network environment, and the safety of privacy protection can be effectively implemented; the computing process of the method is simple and efficient so that the result can be rapidly computed; and the method can be effectively applied to various network environments and has strong practicability. The method can be widely applied to various real-world applications, such as electronic commerce, P2P (peer-to-peer) networks, wire1ess sensor networks, cloud computing and the like.

Description

technical field [0001] The invention belongs to the technical field of network transaction security, and in particular relates to a method for network transaction based on privacy protection trust evaluation. Background technique [0002] In real life, before a transaction occurs, people often need to evaluate the credibility of the transaction party based on the historical records of previous transactions and the recommendation information of friends, and decide whether to conduct a transaction based on the evaluation results. In the network environment, trust value evaluation is also required before "transactions" between nodes in the network. Through the trust mechanism, the security and reliability of the network can be effectively improved, and the damage to the network environment by malicious nodes can be avoided. [0003] Reputation and trust management mechanism can effectively detect whether a node is malicious, and it is widely used in auxiliary decision-making p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q30/06
Inventor 黄刘生袁星朱友文
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products