System and method for creating a secure trusted social network

a social network and social network technology, applied in the field of system and method for creating a secure trusted social network, can solve the problems of not offering the same performance under heavy loads, server and bandwidth required to service the number of requests must also be able to scale, and the lack of security, control and authenticity of the requested files

Inactive Publication Date: 2006-11-16
TAM CHUNG +2
View PDF13 Cites 290 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One problem associated with Client-Server environments is that the server and the bandwidth required to service the number of request must also be able to scale with the growth of the number of third party devices seeking to access the server.
Peer-to-Peer environments are generally simpler to create and maintain than Client-Server environments and, at present, do not offer the same performance under heavy loads.
The problems associated with Peer-to-Peer networks involve, among others a lack of security, control and authenticity of the requested files.
There are no limits on access to these networks and therefore users have no way to ascertain the quality or source of the received file.
This lack of security hampers the utility of Peer-to-Peer environments because users are unwilling to allow strangers access to their systems.
However, Fanning et al. do not address the problems of security or control.
However, neither Weinreich nor Quinn address the creation of a flexible network based on the concept of social relationships in a Peer-to-Peer computing environment and do not address the issue of identification and authentication when accessing network services.
The disadvantage of this design is that it does not allow users to communicate with one another in a Peer-to-Peer environment.
The disadvantage of this design is that it requires a series of interactions between users on the network before a level of trust can truly be established.
In addition, the work of Yeager et al., does not provide a mechanism to identify and authenticate a user and relied on their defined “Trust mechanism”.
In contrast, the worst possible results for the group occur when each user acts in their own interest.
However, in a web-based system, a central computer is required which can be complicated to setup and maintain.
In a pure Peer-to-Peer system, the management of access control can be quite burdensome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for creating a secure trusted social network
  • System and method for creating a secure trusted social network
  • System and method for creating a secure trusted social network

Examples

Experimental program
Comparison scheme
Effect test

example 1f

Sharing Bookmarks and World Wide Web Links on a Trusted Network

[0243] In a more specific example of collaboration, User A uses a trusted Peer-to-Peer network to create and share a series of bookmarks and World Wide Web (WWW) links. User A first defines a collection of bookmarks or WWW links that they want to share with their trusted peers. User A then marks the collection of bookmarks with the appropriate access permissions, in this case N=0. User A further decides that other users can add to the bookmark collection but may not delete from the collection, nor delete the collection entirely. Access permissions for the collection are relayed to the editing server. The editing server sends a message to User A's contact list that there is a collaboration collection of bookmarks available. Trusted peers of User A within the degree of separation of N=0 can obtain the bookmarks from User A through the trusted network. Authorized persons can add to this collection as follows: A user access...

example 1h

Synchronization as Broadcasting

[0247] In this example, the initiator of the synchronization object retains the rights to modify the object while all other trusted individuals can duplicate the object but cannot modify it. In this example, the synchronization feature functions in a fashion that is analogous to broadcasting. In this example, User A has the following groups of trusted peers that have various degree of separation from the A (expressed as a value of “n”).

n = 0n = 1CommentBB1, B2, B3Trusted peers of BCC1, C2, C3Trusted peers of CDD1, D2, D3Trusted peers of DEE1, E2, E3Trusted peers of E

[0248] User A creates a synchronization object using the client software. User A also enters a description of the object, the degree of separation required to access the object (in this case, n=1) and defines this object as the “Master synchronization object”. The client software sends a message to the synchronization server including this information. All of the trusted peers of User A ...

example 2b

Market Based on Transfer of Digital Rights

[0260]FIG. 34 illustrates an electronic market built on a trusted social network based on the transfer of digital rights. In this case, the system requires the addition of a DRM (Digital Rights Management) server, to manage the rules and regulations governing the ownership of the object, for example copyrights, licenses and the like. The main components of this system are: [0261] 1. Authentication and Authorization User A 1 is the digital rights holder of an item (such as a digital music file protected by copyright) 120 on a shared folder. User A 1 must first be identified and receive authorization from the trusted servers 3 to access the network.

[0262] 2. Initial DRM information User A 1, sends the Digital Rights Management (DRM) 165 information to the DRM server 160.

[0263] 3. Trusted peer of User A can request and obtain item. A trusted peer of User A 1, defined as User B 9, who is already authorized to be on the system can now obtain t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system for a plurality of users to share resources with access, control and configuration based on pre-defined relationships of trust between the users of the system. A computer-based authority provides the services of authentication, identification and verification of each user within network. Processes are described that leads to the formation of an electronic community, which facilitates electronic communication and transactions in a defined manner.

Description

BACKGROUND [0001] The history of computing and computer network architecture can be viewed as a spectrum falling between a more centralized approach in a Client-Server environment and the decentralized approach of a Peer-to-Peer environment. Each architecture has been used to build electronic communities and create various forms of computer services. [0002] A simple example of a Client-Server environment is a website. A website is a service provided by a web server. Third party computing devices access the website by connecting to the web server through a network connection (via the Internet, through a Local Area Network or the like). One problem associated with Client-Server environments is that the server and the bandwidth required to service the number of request must also be able to scale with the growth of the number of third party devices seeking to access the server. [0003] Alternatively, Peer-to-Peer environments are networks in which each computing device connected to the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32
CPCG06Q30/06G06Q50/01H04L63/08H04L63/104H04L67/104G06F21/10G06Q40/03
Inventor TAM, CHUNGGILL, PARAMJITGILL, BARJINDERPAL
Owner TAM CHUNG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products