Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Group Privacy Matching Method Based on Permutation Matrix

A technology of permutation matrix and matching method, which is applied in the field of network security, can solve problems such as no effective solution, achieve the effect of reducing time complexity, improving feasibility, and solving single-point damage attacks

Active Publication Date: 2018-03-06
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current common privacy matching schemes are for the matching between two users, and the matching between users and user groups. There is currently no effective solution for the security matching between groups.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group Privacy Matching Method Based on Permutation Matrix
  • Group Privacy Matching Method Based on Permutation Matrix
  • Group Privacy Matching Method Based on Permutation Matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The core idea of ​​the present invention is to use the permutation function based on the permutation matrix to confuse the weights of group members' privacy attribute keywords, effectively protecting the privacy of group members; The degree of matching between groups; the introduction of the trusted organization TA, effectively manages the permutation function of group members and the corresponding inverse permutation function, so as to solve the problem of single-point destruction attacks in the matching process, and ensure the relationship between groups in the system To achieve efficient and safe matching.

[0042] refer to figure 1 , the communication system used in the present invention includes: a trusted organization TA, an initiating group G I , the response group G R : Initiating group G I with response group G R Between members of the same user group and other members communicate through wireless networks such as Bluetooth or WiFi; between group members an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group privacy matching method based on a permutation matrix, which mainly solves the problem of ineffective safe matching between groups in the existing mobile social network, and its realization process is as follows: (1) determine the communication of the matching system (2) Generate a group privacy matching matrix; (3) Initiate a group to initiate a matching request, and respond to a group to respond; (4) Generate a matrix to be matched based on the group privacy matching matrix; (5) Calculate a weighted Manhattan distance based on the matrix to be matched (6) Calculate the matching value between groups; (7) Judge whether the matching is successful or not according to the matching value. By using the permutation matrix, the present invention confuses the weight values ​​of the corresponding attribute keywords of the group members, effectively protecting the user's private information; at the same time, the introduction of the trusted organization TA effectively solves the single-point damage attack and improves the efficiency of the matching process. Safety and feasibility, it can be used for secure matching between groups in mobile social networks.

Description

Technical field: [0001] The invention belongs to the technical field of network security, relates to the protection of personal privacy of group users, and can be used for group security matching and privacy protection in mobile social networks. Background technique: [0002] With the continuous improvement of Internet technology, social networks, especially mobile social networks, have been extensively developed. Social network is a form that reflects social communication groups that naturally develops with the application of the Internet such as Email, BBS, blog, and Weibo. platform. At the same time, mobile terminal devices such as smartphones and tablet computers are popularized, and it is becoming more and more popular to use mobile terminal devices to access social networks, and mobile social networks are gradually becoming mainstream. According to the latest report released in February 2013, more than half of social network users worldwide access social networks thr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06F21/62
Inventor 朱晓妍陈增宝苏阳高曼飞裴庆祺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products