Privacy matching method based on exchange encryption in social network

A social network and privacy technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve the problems that multiple users cannot perform independent matching, cumbersome matching operations, time-consuming calculations, etc., to prevent frequent matching attacks, The effect of protecting privacy and reducing the amount of calculation

Inactive Publication Date: 2014-05-14
XIDIAN UNIV
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Precise matching cannot be performed between two users, and the matching operation is too cumbersome;
[0006] 2) Independen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy matching method based on exchange encryption in social network
  • Privacy matching method based on exchange encryption in social network
  • Privacy matching method based on exchange encryption in social network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Example 1, both users perform privacy matching

[0047] The realization of this embodiment includes the following two parts:

[0048] 1. Establish a communication system between the user and the identity authentication agency IDA.

[0049] refer to figure 1 , the framework of the communication system established in this example is as follows figure 1 , which includes: user A and user B, and the identity authentication authority IDA. Among them, user A and user B communicate through Bluetooth or WiFi network, and the communication between the two users and the identity authentication agency IDA through 3G or 4G cellular network;

[0050] User A and user B enjoy privacy matching services through smart phones, tablet computers and other mobile devices, and the identity authentication agency IDA distributes dynamic identity IDs to user A and user B respectively A and ID B After that, user A and user B perform identity authentication and privacy matching with each other...

Embodiment 2

[0087] User A will match the similarity D(A,B) with the threshold τ A For comparison: if D(A,B)>τ A , user A terminates the matching process with user B, and refuses to be friends with user B; if D(A,B)≤τ A , then user A chooses user B to be his friend, and the two users can communicate formally, where, τ A Threshold value set for user A. Embodiment 2, multiple users perform privacy matching

[0088] The implementation of this embodiment includes two parts: establishing a communication system between multi-party users and identity authentication agencies and multi-party privacy matching. The implementation steps are as follows:

[0089] Step 1: Establish a communication system between multi-party users and the identity authentication agency IDA.

[0090] refer to image 3 , the framework of the communication system established in this example includes: user A, user C, other team members M t and Identity Authority IDA. in:

[0091] Communicate between users through Blu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy matching method based on exchange encryption in a social network. The problem that both parties and multiple parties in an existing mobile social network cannot effectively carry out safe privacy matching is mainly solved. The implementation process comprises the steps that (1) a communication system framework of a user and a dynamic IDA is built to distribute a dynamic ID to the user at regular intervals; (2) an initiator user verifies the dynamic identity of a responder user; (3) the exchange encryption and comparison are carried out on the personal attribute of the initiator user and the personal attribute of the responder user; (4) the initiator user calculates the matching similarity of the initiator user and the responder user, and whether matching is allowed to be carried out or not is determined through comparison between the matching similarity and a threshold value. According to the method, the number of the common attributes of the users and the priority of the corresponding attributes are considered at the same time, the privacy of the users is protected, meanwhile, the matching efficiency of the users is improved, the users can find a friend matched with the users best accurately, efficiently and safely, and the method can be used in the mobile social network.

Description

Technical field: [0001] The invention belongs to the technical field of network security, relates to privacy matching and protection of personal data of mobile users, and can be used in mobile social networks based on proximity. Background technique: [0002] With the continuous improvement of Internet technology, social networks, especially mobile social networks, have been extensively developed. At the same time, the popularity of mobile terminal devices, such as smart phones and tablet computers, is closely related to our lives. According to the latest report released by Nielsen in 2012, nearly half of social network users worldwide access social networks through mobile devices such as mobile phones. In recent years, applications based on mobile social networks have attracted more and more attention. In these mobile social network applications, friend matching based on user personal attributes is very popular. Users can communicate through Bluetooth or wireless network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱晓妍陈增宝师双双刘洁池浩田雷小三姜顺荣苏阳高曼飞曹磊
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products