Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for judging network behavior similarity

A similarity and behavior technology, applied in the computer field, can solve problems such as privacy data leakage, and achieve the effect of ensuring privacy security.

Active Publication Date: 2022-06-21
SHANDONG NORMAL UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the inventors found that information such as the above-mentioned appearance route, web browsing records, and purchase records often involves user privacy. When obtaining user network behavior data, the user's private data must be included, so there is a risk of privacy data leakage , and from the user's point of view, it is more desirable to only obtain the result of whether the two parties are similar, and not to disclose their own private data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for judging network behavior similarity
  • Method and system for judging network behavior similarity
  • Method and system for judging network behavior similarity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] like figure 1 As shown, this embodiment provides a method for judging network behavior similarity based on polynomial coding, including:

[0033] S1: Obtain a network behavior set of the first terminal and the second terminal to be judged;

[0034] S2: Complete the secret sharing between the first terminal and the second terminal by calculating the initial secret share of the network behavior set;

[0035] S3: The new secret shares obtained after the first terminal and the second terminal are secretly shared respectively adopt the multiplication protocol to obtain the arithmetic secret share, and calculate the n-order linear recursive sequence for the arithmetic secret share;

[0036] S4: According to judging whether the minimum polynomial constant term corresponding to the n-order linear recursive sequence is a non-zero value, obtain a result of judging the similarity of the network behavior of the first terminal and the second terminal.

[0037] In the step S1, the ...

Embodiment 2

[0088] This embodiment provides a network behavior similarity judgment system, including:

[0089] an acquisition module, configured to acquire the network behavior sets of the first terminal and the second terminal to be judged;

[0090] a sharing module, configured to complete the secret sharing between the first terminal and the second terminal by calculating the initial secret share of the network behavior set;

[0091] The calculation module is used to obtain the arithmetic secret share for the new secret shares obtained after the first terminal and the second terminal are secretly shared by using the multiplication protocol respectively, and calculate the n-order linear recursive sequence for the arithmetic secret share;

[0092] The judging module is used for judging whether the minimum polynomial constant term corresponding to the nth-order linear recursive sequence is a non-zero value, and obtains the judging result of the similarity of the network behavior ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for judging network behavior similarity, which includes acquiring the network behavior sets of the first terminal and the second terminal to be judged; and completing the first terminal and the second terminal by calculating the initial secret share of the network behavior set Secret sharing; the multiplication protocol is used to obtain the arithmetic secret share for the new secret share obtained after the secret sharing of the first terminal and the second terminal, and the n-order linear recursive sequence is calculated for the arithmetic secret share; according to judging the minimum polynomial corresponding to the n-order linear recursive sequence Whether the constant term is a non-zero value, the result of judging the network behavior similarity between the first terminal and the second terminal is obtained. Realize the set similarity judgment between different users, and all users can only get the result of the similarity judgment without obtaining any information about personal privacy, so as to ensure the security of private data.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for judging the similarity of network behaviors. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] With the increasing development of network informatization, the amount of network behavior data of network terminals is increasing, and network behaviors include, for example, web browsing, purchase records, network search records, upload or download records, etc., or network travel query records, travel query records, etc. route etc. [0004] The set similarity judgment is widely used in various information systems. The principle of set similarity judgment is used to analyze and judge the terminal network behavior, which can realize the rapid and effective matching of users with similar travel routes in the network carpooling...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F16/9536
CPCG06F16/9536G06F18/22
Inventor 王皓李智牛梓宇
Owner SHANDONG NORMAL UNIV