TWI480819B - Peer-to-peer based reputation system and method for social network - Google Patents

Peer-to-peer based reputation system and method for social network Download PDF

Info

Publication number
TWI480819B
TWI480819B TW100135853A TW100135853A TWI480819B TW I480819 B TWI480819 B TW I480819B TW 100135853 A TW100135853 A TW 100135853A TW 100135853 A TW100135853 A TW 100135853A TW I480819 B TWI480819 B TW I480819B
Authority
TW
Taiwan
Prior art keywords
component
identification code
trust value
identifier
component identifier
Prior art date
Application number
TW100135853A
Other languages
Chinese (zh)
Other versions
TW201316271A (en
Inventor
Phone Lin
Ku Lun Chang
Original Assignee
Univ Nat Taiwan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Taiwan filed Critical Univ Nat Taiwan
Priority to TW100135853A priority Critical patent/TWI480819B/en
Publication of TW201316271A publication Critical patent/TW201316271A/en
Application granted granted Critical
Publication of TWI480819B publication Critical patent/TWI480819B/en

Links

Description

基於社群網路之同儕式信譽系統與方法Peer-based reputation system and method based on social network

本發明係有關於一種同儕式信譽系統與方法,特別是一種基於社群網路之同儕式信譽系統與方法。The present invention relates to a peer-to-peer reputation system and method, and more particularly to a peer-to-peer reputation system and method based on a social network.

信譽系統經由網路使用者歷史電子交易行為與互動結合信任評價來建立使用者的信譽。信譽系統已被廣泛應用於電子商務系統,例如eBay、Amazon和Yahoo,但尚未應用於現今的社群網路上,像是Facebook、Twitter和Plurk。這是因為既有的信譽系統評價依賴於每次的電子交易結果,但是社群網路之行為並非交易形式,所以既有的信譽系統無法直接應用於社群網路上。而且中央伺服器式的社群網站需要大量的計算能力,將信譽系統加入至社群網路,此舉將會造成社群網路擁有者耗費大量的成本實作。The reputation system establishes the reputation of the user through the online user history electronic transaction behavior and interaction combined with the trust evaluation. Reputation systems have been widely used in e-commerce systems such as eBay, Amazon, and Yahoo, but have not been applied to today's social networks, such as Facebook, Twitter, and Plurk. This is because the existing reputation system evaluation relies on the results of each electronic transaction, but the behavior of the social network is not a transaction, so the existing reputation system cannot be directly applied to the social network. And the central server-style social networking site requires a lot of computing power to add the reputation system to the social network, which will cause the social network owners to spend a lot of cost.

所以,存在一種需求,如何可以使得現今之社群網路可具有信譽系統,卻不會造成中央伺服器處理之負擔,實為目前研究發展之一重要方向。Therefore, there is a demand, how can make the current social network can have a reputation system, but it will not cause the burden of the central server processing, which is an important direction of current research and development.

本申請案係有關於一種基於社群網路之同儕式信譽系統與方法,其藉由將中央伺服器的計算負擔分散到各使用者,使得於不增加中央伺服器負擔的情況下,實現基於社群網路之信譽系統。The present application relates to a peer-to-peer reputation system and method based on a social network, which distributes the computational burden of the central server to each user so that the burden is not increased without increasing the burden on the central server. The reputation system of the social network.

根據本發明之一方面,提出一種基於社群網路之同儕式信譽方法。此基於社群網路之同儕式信譽方法包括下列步驟:一起始端將一待查元件識別碼以一詢問訊息傳送至一第一端,其中該第一端具有一第一元件識別碼與一第一樹狀結構資料,該第一樹狀結構資料儲存與該第一元件識別碼相關之信任值;該第一端判斷該第一樹狀結構資料是否存有與該待查元件識別碼相關之信任值;以及當該第一樹狀結構資料儲存與該待查元件識別碼相關之信任值,該第一端將與該待查元件識別碼相關之信任值回傳至該起始端。According to an aspect of the present invention, a peer-to-peer reputation method based on a social network is proposed. The peer-to-peer reputation method based on the social network includes the following steps: a start end transmits a to-be-checked component identification code to a first end by an inquiry message, wherein the first end has a first component identifier and a first a tree structure data, the first tree structure data storing a trust value associated with the first component identification code; the first end determining whether the first tree structure data is associated with the component identifier to be inspected a trust value; and when the first tree structure data stores a trust value associated with the component identifier to be checked, the first end returns a trust value associated with the component identifier to be checked back to the start end.

根據本發明另一方面,提出一種基於社群網路之同儕式信譽系統,包括一第一裝置。此第一裝置具有一第一元件識別碼與一第一樹狀結構資料,該第一樹狀結構資料儲存與該第一元件識別碼相關之信任值,其中該第一裝置接收一起始裝置所傳送之一詢問訊息,該詢問訊息包括一待查元件識別碼。其中該第一裝置判斷該第一樹狀結構資料是否存有與該待查元件識別碼相關之信任值,當該第一樹狀結構資料儲存與該待查元件識別碼相關之信任值,該第一裝置將與該待查元件識別碼相關之信任值回傳至該起始裝置。According to another aspect of the present invention, a peer-to-peer reputation system based on a social network is proposed, including a first device. The first device has a first component identification code and a first tree structure data, the first tree structure data storing a trust value associated with the first component identification code, wherein the first device receives an initial device An inquiry message is transmitted, the inquiry message including a component identification code to be checked. The first device determines whether the first tree structure data has a trust value associated with the component identification code to be inspected, and when the first tree structure data stores a trust value associated with the component identifier to be inspected, The first device transmits back the trust value associated with the component identification code to be checked to the initiating device.

為讓本發明之上述內容能更明顯易懂,下文特舉一較佳實施例,並配合所附圖式,作詳細說明如下:In order to make the above-mentioned contents of the present invention more comprehensible, a preferred embodiment will be described below, and in conjunction with the drawings, a detailed description is as follows:

雖然本發明將參閱含有本發明較佳實施例之所附圖式予以充份描述,但在此描述之前應瞭解熟悉本行之人士可修改在本文中所描述之發明,同時獲致本發明之功效。因此,須瞭解以下之描述對熟悉本行技藝之人士而言為一廣泛之揭示,且其內容不在於限制本發明。Although the invention will be fully described with reference to the preferred embodiments of the invention, it should be understood that those skilled in the art can modify the invention described herein while achieving the effect of the invention. . Therefore, it is to be understood that the following description is a broad disclosure of those skilled in the art and is not intended to limit the invention.

請參照第一圖,其係根據本發明一實施例所繪示之同儕式信譽系統100。於一實施例中,同儕式信譽系統100例如是包括起始端110、第一端120以及第二端130。起始端110、第一端120以及第二端130例如是各別包括起始樹狀結構資料111、第一樹狀結構資料121以及第二樹狀結構資料131。Please refer to the first figure, which is a peer-to-peer reputation system 100 according to an embodiment of the invention. In an embodiment, the peer reputation system 100 includes, for example, a start end 110, a first end 120, and a second end 130. The start end 110, the first end 120, and the second end 130 respectively include, for example, a starting tree structure data 111, a first tree structure data 121, and a second tree structure data 131.

於一實施例中,起始端110、第一端120以及第二端130例如係不相同之電子裝置,例如是起始裝置、第一裝置與第二裝置,此處所指之電子裝置包括手持式行動通訊裝置、電腦、家電用品等。凡是具有運算及儲存能力之電子裝置,皆屬於本發明之範圍。然而,於另一實施例中,起始端110、第一端120以及第二端130例如是虛擬之識別帳號,其資料可儲存於同一伺服器中,凡是指不相同之帳號,皆屬於本發明之範圍。此外,每一裝置例如是個別具有一識別碼,舉例來說,起始端110例如是具有一起始元件識別碼,第一端120例如是具有一第一元件識別碼,第二端130例如是具有一第二元件識別碼。In an embodiment, the start end 110, the first end 120, and the second end 130 are, for example, different electronic devices, such as an initiating device, a first device, and a second device. The electronic device referred to herein includes a handheld device. Mobile communication devices, computers, home appliances, etc. All electronic devices having computing and storage capabilities are within the scope of the present invention. However, in another embodiment, the start end 110, the first end 120, and the second end 130 are, for example, virtual identification accounts, and the data can be stored in the same server, and any account that is not the same belongs to the present invention. The scope. In addition, each device has, for example, an identification code, for example, the start end 110 has, for example, a start component identifier, the first end 120 has, for example, a first component identifier, and the second terminal 130 has, for example, A second component identification code.

樹狀結構資料例如是用以儲存電子裝置之相關資料。於一實施例中,例如是用以儲存與此電子裝置相關之關係資料。The tree structure data is, for example, related material for storing electronic devices. In an embodiment, for example, it is used to store relationship data related to the electronic device.

請參照第二圖,其繪示基於社群網路之同儕式信譽方法200,請同時參照第一圖。於步驟S210中,起始端110將一待查元件識別碼以一詢問訊息傳送至第一端120,其中第一端120具有一第一元件識別碼與一第一樹狀結構資料121,第一樹狀結構資料121儲存與該第一元件識別碼相關之信任值。Please refer to the second figure, which illustrates the peer-to-peer reputation method 200 based on the social network, please refer to the first figure at the same time. In step S210, the initiating end 110 transmits a to-be-checked component identification code to the first end 120 by an interrogation message, wherein the first end 120 has a first component identification code and a first tree structure data 121, first The tree structure data 121 stores a trust value associated with the first component identification code.

舉例來說,起始端110欲得知待查元件識別碼的可信度,起始端110可先搜尋起始樹狀結構資料111是否具有與此待查元件識別碼相關之信任度。若未於起始樹狀結構資料111搜尋到此待查元件識別碼相關之資訊,可向其它裝置發送詢問請求,例如是將具有此待查元件識別碼之詢問訊息傳送至第一端120。For example, the originating end 110 is to know the credibility of the component identification code to be checked, and the starting end 110 may first search whether the starting tree structure data 111 has the trust degree associated with the component identification code to be inspected. If the information related to the component identifier to be inspected is not found in the initial tree structure data 111, an inquiry request may be sent to other devices, for example, the inquiry message having the component identifier to be inspected is transmitted to the first terminal 120.

此外,此處所指之信任值,舉例來說,例如是與第一元件識別碼相關之信任值。信任值之計算方式,例如是依據第一元件識別碼與其它元件識別碼各別之一互動所計算出,其中該互動係以類別來分類。Further, the trust value referred to herein is, for example, a trust value associated with the first component identification code. The trust value is calculated, for example, based on the interaction of the first component identification code with one of the other component identification codes, wherein the interaction is classified by category.

舉例來說,第一元件識別碼與其它元件識別碼係登錄至facebook之社群網路上,第一元件識別碼可主動至其它元件識別碼所對應之訊息牆上留言,由於第一元件識別碼係主動執行此動作,所以代表第一元件識別碼對於此其它元件識別碼係相當的信任,故此行為可解讀為第一元件識別碼係相當信任其它元件識別碼。值得注意的是,第一元件識別碼主動執行的動作,係解讀為第一元件識別碼對其它元件識別碼的信任度,然此信任度不等於其它元件識別碼對第一元件識別碼的信任度。其它元件識別碼對第一元件識別碼的信任度仍端賴視其它元件識別碼「主動地」與第一元件識別碼之互動程度而定。For example, the first component identification code and the other component identification code are registered on the social network of facebook, and the first component identification code can actively send a message to the message wall corresponding to the other component identification code, because the first component identification code This action is actively performed, so that the first component identification code has a considerable trust for the other component identification code system, so the behavior can be interpreted as the first component identification code system trusting other component identification codes. It should be noted that the action actively performed by the first component identification code is interpreted as the trust degree of the first component identification code to other component identification codes, but the trust degree is not equal to the trust of the other component identification codes to the first component identification code. degree. The trust of the other component identification code with respect to the first component identification code depends on the degree of interaction of the other component identification codes "actively" with the first component identification code.

再者,兩識別碼互動之行動至少可分為第一類別與第二類別。然本發明不限於此,若分為兩個類別以上,仍屬於本發明之範圍。於一實施例中,第一類別具有一第一權重,第二類別具有一第二權重,與第一元件識別碼相關之信任值係依據第一類別的互動之量值乘以該第一權重與第二類別的互動之量值乘以該第二權重所得。信任值之計算方式可如下式所示:Furthermore, the actions of the two identification codes interacting can be divided into at least a first category and a second category. However, the present invention is not limited thereto, and it is still within the scope of the present invention if it is divided into two or more categories. In an embodiment, the first category has a first weight, the second category has a second weight, and the trust value associated with the first component identifier is multiplied by the first weight according to the magnitude of the interaction of the first category. The magnitude of the interaction with the second category is multiplied by the second weight. The trust value can be calculated as follows:

信任值=ΣW x C ( j , i ) x  (式一);Trust value = Σ W x C ( j , i ) x (Formula 1);

其中,Wx代表權重,x代表類別。舉例來說,W1代表的是第一類別的第一權重,W2代表的是第二類別的第二權重。C(j,i)代表的是第j元件識別碼對第i元件識別碼的行為。C(j,i)x代表的是第j元件識別碼對第i元件識別碼執行第x類別的行為。值得注意的是,C(j,i)不等於C(i,j)。而藉由上述之計算式,即可計算出與第j元件識別碼相關之信任值。Where Wx stands for weight and x stands for category. For example, W1 represents the first weight of the first category and W2 represents the second weight of the second category. C(j, i) represents the behavior of the jth component identification code to the i-th component identification code. C(j,i)x represents the behavior of the jth element identification code performing the xth class on the i-th element identification code. It is worth noting that C(j,i) is not equal to C(i,j). With the above calculation formula, the trust value associated with the j-th component identification code can be calculated.

此外,此處之第一類別與第二類別,指的是將不同之行為分為不同之類別。舉例來說,第j元件識別碼將與第i元件識別碼相關之照片貼至第i元件識別碼之訊息牆,可視為第j元件識別碼對第i元件識別碼相當的信任,故此行為可分類為第一類別,而第一類別之行為的權重可較高,代表第一類別之行為顯示出較大的信任。而若第j元件識別碼僅是單純的將某些新聞貼至第i元件識別碼的訊息牆,由於新聞並不代表重大意義,可分類為第二類別,而第二類別之行為的權重可較低。In addition, the first category and the second category herein refer to different behaviors into different categories. For example, the j-th component identification code attaches the photo related to the i-th component identification code to the message wall of the i-th component identification code, and can be regarded as the trust of the j-th component identification code to the i-th component identification code, so the behavior can be The classification is the first category, and the behavior of the first category can be higher, and the behavior representing the first category shows greater trust. If the j-th component identification code is simply a message wall that affixes some news to the i-th component identification code, since the news does not represent significant significance, it can be classified into the second category, and the weight of the behavior of the second category can be Lower.

再者,即使第二類別之權重較低,但若第j元件識別碼對第i元件識別碼執行一定次數的第二類別之行為,由於信任值係累計,所執行第二類別之行為的次數將累計為信任值,故雖第二類別行為之權重較低,但多次第二類別之行為累計起來的信任值也有一定程度,也可理解第j元件識別碼相當程度的信任第i元件識別碼。Furthermore, even if the weight of the second category is low, if the j-th component identification code performs a certain number of second category behaviors on the i-th component identification code, since the trust value is accumulated, the number of times the behavior of the second category is performed It will be accumulated as the trust value, so although the weight of the second category behavior is lower, but the trust value accumulated by the behavior of the second category is also a certain degree, it can also be understood that the j-element identification code has a considerable degree of trust. code.

於步驟S220中,第一端120判斷該第一樹狀結構資料121是否存有與待查元件識別碼相關之信任值。In step S220, the first end 120 determines whether the first tree structure data 121 has a trust value associated with the component identification code to be checked.

於步驟S230中,當該第一樹狀結構資料121儲存與該待查元件識別碼相關之信任值,第一端120將與待查元件識別碼相關之信任值回傳至起始端110。In step S230, when the first tree structure data 121 stores the trust value associated with the component identification code to be checked, the first end 120 returns the trust value associated with the component identification code to be checked back to the start end 110.

而起始端110可依據第一元件識別碼與待查元件識別碼之信任值來判斷待查元件識別碼之信任度。也就是說,起始端110可不管其與第一元件識別碼彼此之間的信任度,可端視第一元件識別碼與待查元件識別碼彼此之間的信任度來判斷待查元件識別碼的信任度。The starting end 110 can determine the trust degree of the component identification code to be checked according to the trust value of the first component identifier and the component identifier to be checked. That is to say, the originating terminal 110 can determine the identity of the component to be inspected by considering the degree of trust between the first component identifier and the component identifier to be inspected, regardless of the degree of trust between the first component identifier and the first component identifier. Trust.

然於另一實施例中,起始端110除依據第一元件識別碼與待查元件識別碼之信任值外,再依據起始元件識別碼與第一元件識別碼之信任值來判斷待查元件識別碼之信任度。舉例來說,請參照下述信任值計算式:In another embodiment, the start terminal 110 determines the component to be checked according to the trust value of the first component identifier and the component identifier to be checked, according to the trust value of the first component identifier and the first component identifier. The trustworthiness of the identification code. For example, please refer to the following trust value calculation formula:

信任值=ΣW x C ( j , i ) x W request  (式二);Trust value = Σ W x C ( j , i ) x W request (Formula 2);

其中Wx、x與C(j,i)之意義如前所述,於此不再贅述。而Wrequest代表起始端110,也就是詢問訊息發送端對第j元件識別碼之信任度。舉例來說,第i元件識別碼可為此待查元件識別碼,而第j元件識別碼為起始端所發送之詢問訊息接收端。於一實施例中,雖然第j元件識別碼相當程度的信任第i元件識別碼,然若詢問訊息發送端對第j元件識別碼並不大信任,例如是Wrequest之值相當的低,則即使第j元件識別碼相當地信任第i元件識別碼,依照上述之計算式,起始端仍不會相信第i元件識別碼。The meanings of Wx, x and C(j, i) are as described above and will not be described here. Wrequest represents the starting end 110, that is, the trust level of the message sender to the j-component identification code. For example, the i-th component identification code may be the component identification code to be checked, and the j-th component identification code is the inquiry message receiving end sent by the originating end. In an embodiment, although the j-th component identification code trusts the i-th component identification code to a considerable extent, if the inquiry message transmitting end does not trust the j-component identification code, for example, the value of Wrequest is relatively low, even if The j-th element identification code substantially trusts the i-th element identification code, and according to the above calculation formula, the starting end still does not trust the i-th element identification code.

綜上所述,雖然起始端110並不認識此待查元件識別碼,然藉由第一端120之資訊提供,可初步了解此待查元件識別碼之言行是否可信任,如此可不必藉由社群網路之中央伺服器之協助,即可獲得此待查元件識別碼之信任評價,此即為本申請書所提出之方法的優點之一。In summary, although the starting end 110 does not recognize the component identification code to be inspected, the information provided by the first terminal 120 can be used to initially know whether the words and deeds of the component ID to be checked are trustworthy, so that it is not necessary to With the assistance of the central server of the social network, the trust evaluation of the component identification code to be checked can be obtained, which is one of the advantages of the method proposed in the application.

回至第二圖之流程圖,於步驟S240中,當第一端120判斷第一樹狀結構資料121未存有與待查元件識別碼相關之信任值,第一端120依據該詢問訊息中之路徑將詢問訊息傳送至一第二端130。Returning to the flowchart of the second figure, in step S240, when the first end 120 determines that the first tree structure data 121 does not have a trust value associated with the component identification code to be checked, the first end 120 is in accordance with the query message. The path transmits the challenge message to a second end 130.

於步驟S250中,當第二端130判斷該第二樹狀結構資料131存有與待查元件識別碼相關之信任值,第二端130依據詢問訊息中之路徑回傳至起始端110。雖於此以於第二端130即搜尋到與此待查元件識別碼相關之信任值為例來做說明,然本發明不限於此,若第二端130仍未搜尋到與此待查元件識別碼相關之信任值,第二端130仍可依據詢問訊息中之路徑將詢問訊息傳送至其它端,例如是一第三端、第四端等。而無論係於第n端方搜尋到此待查元件識別碼相關之信任值,皆屬於本發明之範圍。In step S250, when the second end 130 determines that the second tree structure data 131 has a trust value associated with the component identification code to be checked, the second end 130 returns to the originating end 110 according to the path in the inquiry message. Although the second terminal 130 searches for the trust value associated with the component identification code to be inspected as an example, the present invention is not limited thereto, and if the second terminal 130 has not found the component to be inspected yet The second terminal 130 can still transmit the inquiry message to other terminals according to the path in the inquiry message, for example, a third end, a fourth end, and the like. It is within the scope of the present invention to search for the trust value associated with the component identification code to be inspected at the nth end.

然值得注意的是,詢問訊息可設定欲搜尋的階層,舉例來說,詢問訊息可設定當由第一端詢問至第四端,也就是詢問了四個端點,仍未搜尋到此待查元件識別碼相關之信任值,則可放棄搜尋,以避免無止盡的搜尋動作,造成系統資源浪費。However, it is worth noting that the inquiry message can set the level to be searched. For example, the inquiry message can be set to be inquired from the first end to the fourth end, that is, four endpoints are inquired, and the inquiry is still not found. The trust value associated with the component identification code can abandon the search to avoid endless search actions and waste system resources.

於一實施例中,起始端110可依據起始元件識別碼與第一元件識別碼之信任值來判斷待查元件識別碼之信任度。於此實施例中,起始端110無視起始端110與第一元件識別碼之間的信任值,起始端110也無視第二元件識別碼與待查元件識別碼之間的信任值,起始端110可直接將第二元件識別碼對待查元件識別碼的信任值拿來取用,作為待查元件識別碼之信任值參考。In an embodiment, the starting end 110 can determine the trust degree of the component identification code to be checked according to the trust value of the starting component identifier and the first component identifier. In this embodiment, the start end 110 ignores the trust value between the start end 110 and the first component identifier, and the start end 110 also ignores the trust value between the second component identifier and the component identifier to be checked. The start end 110 The trust value of the second component identification code to be checked for the component identification code can be directly used as a reference for the trust value of the component identification code to be checked.

於另一實施例中,起始端110依據起始元件識別碼與第一元件識別碼之信任值、第一元件識別碼與第二元件識別碼之信任值、以及第二元件識別碼與待查元件識別碼之信任值,來判斷待查元件識別碼之信任度。In another embodiment, the start end 110 is based on the trust value of the start component identifier and the first component identifier, the trust value of the first component identifier and the second component identifier, and the second component identifier and the to-be-checked The trust value of the component identification code is used to determine the trust degree of the component identification code to be checked.

舉例來說,請參照式二,當第二元件識別碼搜尋到與待查元件識別碼相關之信任值並回傳至起始端110時,起始端110並不會直接採用,而係會再計算起始元件識別碼與第二元件識別碼之間的信任值,也就是計算出Wrequest之權重並予以考慮。然而,由於起始元件識別碼與第二元件識別碼彼此之間並無關係,所以需藉由第三方之識別碼;於此實施例中,係藉由第一元件識別碼與起始元件識別碼、第二元件識別碼之關係而計算出Wrequest值,例如是直接將「起始元件識別碼對第一元件識別碼之信任值」乘以「第一元件識別碼對第二元件識別碼之信任值」而推得。雖於此係以上述方式來計算出Wrequest之權重,然本發明不限於此,只要係依據「起始元件識別碼對第一元件識別碼之信任值」與「第一元件識別碼對第二元件識別碼之信任值」來推得Wrequest,皆屬於本發明之範圍。For example, referring to Equation 2, when the second component identifier searches for the trust value associated with the component identifier to be checked and returns it to the originating end 110, the starting end 110 is not directly used, and the system recalculates The trust value between the start component identifier and the second component identifier, that is, the weight of the Wrequest is calculated and considered. However, since the initial component identification code and the second component identification code are not related to each other, an identification code of a third party is required; in this embodiment, the first component identification code and the initial component are identified. Calculating the Wrequest value by the relationship between the code and the second component identification code, for example, directly multiplying the "the initial component identification code to the trust value of the first component identification code" by "the first component identification code to the second component identification code" Trust value is pushed. Although the weight of the Wrequest is calculated in the above manner, the present invention is not limited thereto, as long as the "trust value of the first component identification code of the initial component identification code" and the "first component identification code pair" are used. It is within the scope of the present invention to derive Wrequest from the trust value of the component identification code.

如此一來,藉由信任值可讓使用者判斷其他使用者訊息的真實程度與使用者之信譽,降低了惡意使用者(malicious peer)的惡意行為之機率。再者,本申請所提出之搜尋信譽之方式,改善了傳統在同儕式網路上的洪流搜尋法,降低了冗餘的搜尋訊息,因此增加了搜尋的效率。In this way, the trust value allows the user to judge the true degree of other user messages and the reputation of the user, and reduces the probability of malicious behavior of the malicious user. Furthermore, the search reputation method proposed in the present application improves the traditional flood search method on the same-type network, and reduces redundant search information, thereby increasing the efficiency of the search.

此外,藉由同儕式網路,把信任值分取於多個使用者中。則當一個使用者異常,其信任值依然可以存取。如此一來,可避免中央伺服器式網路結構伺服器異常時,所有使用者信任值無法存取之問題。In addition, the trust value is divided among multiple users by the peer-to-peer network. Then when a user is abnormal, the trust value can still be accessed. In this way, the problem that all user trust values cannot be accessed when the central server network structure server is abnormal can be avoided.

綜上所述,雖然本發明已以一較佳實施例揭露如上,然其並非用以限定本發明。本發明所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾。因此,本發明之保護範圍當視後附之申請專利範圍所界定者為準。In view of the above, the present invention has been disclosed in a preferred embodiment, and is not intended to limit the present invention. A person skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.

100...同儕式信譽系統100. . . Peer-to-peer reputation system

110‧‧‧起始端110‧‧‧Starting end

111‧‧‧起始樹狀結構資料111‧‧‧Starting tree structure data

120‧‧‧第一端120‧‧‧ first end

121‧‧‧第一樹狀結構資料121‧‧‧First tree structure data

130‧‧‧第二端130‧‧‧second end

131‧‧‧第二樹狀結構資料131‧‧‧Second tree structure data

S210~S250‧‧‧流程步驟S210~S250‧‧‧ Process steps

第一圖係根據本發明一實施例所繪示之同儕式信譽系統。The first figure is a peer-to-peer reputation system according to an embodiment of the invention.

第二圖係繪示基於社群網路之同儕式信譽方法。The second picture shows the peer-to-peer reputation method based on the social network.

100...同儕式信譽系統100. . . Peer-to-peer reputation system

110...起始端110. . . Starting end

111...起始樹狀結構資料111. . . Starting tree structure data

120...第一端120. . . First end

121...第一樹狀結構資料121. . . First tree structure data

130...第二端130. . . Second end

131...第二樹狀結構資料131. . . Second tree structure data

Claims (17)

一種基於社群網路之同儕式信譽方法,包括:一起始端將一待查元件識別碼以一詢問訊息傳送至一第一端,其中該第一端具有一第一元件識別碼與一第一樹狀結構資料,該第一樹狀結構資料儲存與該第一元件識別碼相關之信任值;該第一端判斷該第一樹狀結構資料是否存有與該待查元件識別碼相關之信任值;當該第一樹狀結構資料儲存與該待查元件識別碼相關之信任值,該第一端將與該待查元件識別碼相關之信任值回傳至該起始端;以及當該第一端判斷該第一樹狀結構資料未存有與該待查元件識別碼相關之信任值,該第一端依據該詢問訊息中之路徑將該詢問訊息傳送至一第二端。 A peer-to-peer reputation method based on a social network, comprising: a start end transmitting a to-be-checked component identification code to a first end by an inquiry message, wherein the first end has a first component identification code and a first a tree structure data, the first tree structure data storing a trust value associated with the first component identifier; the first end determining whether the first tree structure data has a trust associated with the component identifier to be checked a value; when the first tree structure data stores a trust value associated with the component identifier to be checked, the first end returns a trust value associated with the component identifier to be checked back to the start end; and when the first The first end determines that the first tree structure data does not have a trust value associated with the component ID to be checked, and the first end transmits the query message to a second end according to the path in the query message. 如申請專利範圍第1項所述之方法,其中與該第一元件識別碼相關之信任值,係依據該第一元件識別碼與其它元件識別碼各別之一互動所計算出,其中該互動係以類別來分類。 The method of claim 1, wherein the trust value associated with the first component identifier is calculated based on interaction of the first component identifier with one of the other component identifiers, wherein the interaction Classified by category. 如申請專利範圍第2項所述之方法,其中該互動至少分為一第一類別與一第二類別,該第一類別具有一第一權重,該第二類別具有一第二權重,與該第一元件識別碼相關之信任值係依據該第一類別的互動之量值乘以該第一權重與該第二類別的互動之量值乘以該第二權重所得。 The method of claim 2, wherein the interaction is at least divided into a first category and a second category, the first category having a first weight, the second category having a second weight, and the The trust value associated with the first component identifier is obtained by multiplying the magnitude of the interaction of the first category by the magnitude of the interaction of the first weight and the second category by the second weight. 如申請專利範圍第1項所述之方法,其中該起始端依據該第一元件識別碼與該待查元件識別碼之信任值來判 斷該待查元件識別碼之信任度。 The method of claim 1, wherein the starting end is judged according to the first component identifier and the trust value of the component identifier to be checked. Break the trust of the component identification code to be checked. 如申請專利範圍第1項所述之方法,其中該起始端具有一起始元件識別碼,該起始端依據該第一元件識別碼與該待查元件識別碼之信任值,以及該起始元件識別碼與該第一元件識別碼之信任值來判斷該待查元件識別碼之信任度。 The method of claim 1, wherein the starting end has an initial component identification code, and the starting end is based on the first component identification code and the trust value of the component identifier to be inspected, and the initial component identification The code and the trust value of the first component identifier determine the trust degree of the component identifier to be checked. 如申請專利範圍第1項所述之方法,其中該第二端具有一第二元件識別碼與一第二樹狀結構資料,該第二樹狀結構資料儲存與該第二元件識別碼相關之信任值;其中當該第二端判斷該第二樹狀結構資料存有與該待查元件識別碼相關之信任值,該第二端依據該詢問訊息中之路徑回傳至該起始端。 The method of claim 1, wherein the second end has a second component identification code and a second tree structure data, and the second tree structure data is associated with the second component identification code. a trust value; wherein when the second end determines that the second tree structure data has a trust value associated with the component identifier to be checked, the second end returns to the start end according to the path in the query message. 如申請專利範圍第6項所述之方法,其中該起始端具有一起始元件識別碼,該起始端依據該起始元件識別碼與該第一元件識別碼之信任值來判斷該待查元件識別碼之信任度。 The method of claim 6, wherein the starting end has an initial component identification code, and the starting end determines the component to be inspected according to the initial component identifier and the trust value of the first component identifier The trust of the code. 如申請專利範圍第6項所述之方法,其中該起始端具有一起始元件識別碼,該起始端依據該起始元件識別碼與該第一元件識別碼之信任值、該第一元件識別碼與該第二元件識別碼之信任值、以及該第二元件識別碼與該待查元件識別碼之信任值,來判斷該待查元件識別碼之信任度。 The method of claim 6, wherein the start end has a start component identifier, and the start end is based on the start component identifier and the trust value of the first component identifier, the first component identifier And the trust value of the second component identifier and the trust value of the second component identifier and the identifier of the component to be checked to determine the trust degree of the component identifier to be checked. 如申請專利範圍第1項所述之方法,其中該起始端與該第一端係不同之裝置。 The method of claim 1, wherein the starting end is different from the first end. 一種基於社群網路之同儕式信譽系統,包括:一第一裝置,具有一第一元件識別碼與一第一樹狀結 構資料,該第一樹狀結構資料儲存與該第一元件識別碼相關之信任值,其中該第一裝置接收一起始裝置所傳送之一詢問訊息,該詢問訊息包括一待查元件識別碼;其中該第一裝置判斷該第一樹狀結構資料是否存有與該待查元件識別碼相關之信任值,當該第一樹狀結構資料儲存與該待查元件識別碼相關之信任值,該第一裝置將與該待查元件識別碼相關之信任值回傳至該起始裝置,更包括:一第二裝置;其中當該第一裝置判斷該樹狀結構資料未存有與該待查元件識別碼相關之信任值,該第一裝置依據該詢問訊息中之路徑將該詢問訊息傳送至該第二裝置。 A peer-to-peer reputation system based on a social network, comprising: a first device having a first component identification code and a first tree knot Constructing data, the first tree structure data storing a trust value associated with the first component identifier, wherein the first device receives an inquiry message transmitted by an initiating device, the query message including a to-be-checked component identification code; The first device determines whether the first tree structure data has a trust value associated with the component identification code to be inspected, and when the first tree structure data stores a trust value associated with the component identifier to be inspected, The first device returns the trust value associated with the component ID to be checked back to the initiating device, and further includes: a second device; wherein when the first device determines that the tree structure data does not exist and the to-be-checked The component identifier is associated with the trust value, and the first device transmits the query message to the second device according to the path in the query message. 如申請專利範圍第10項所述之系統,其中與該第一元件識別碼相關之信任值,係依據該第一元件識別碼與其它元件識別碼各別之一互動所計算出,其中該互動係以類別來分類。 The system of claim 10, wherein the trust value associated with the first component identifier is calculated based on interaction of the first component identifier with one of the other component identifiers, wherein the interaction Classified by category. 如申請專利範圍第11項所述之系統,其中該互動至少分為一第一類別與一第二類別,該第一類別具有一第一權重,該第二類別具有一第二權重,與該第一元件識別碼相關之信任值係依據該第一類別的互動之量值乘以該第一權重與該第二類別的互動之量值乘以該第二權重所得。 The system of claim 11, wherein the interaction is at least divided into a first category and a second category, the first category having a first weight, the second category having a second weight, and the The trust value associated with the first component identifier is obtained by multiplying the magnitude of the interaction of the first category by the magnitude of the interaction of the first weight and the second category by the second weight. 如申請專利範圍第10項所述之系統,其中該起始裝置依據該第一元件識別碼與該待查元件識別碼之信任值來判斷該待查元件識別碼之信任度。 The system of claim 10, wherein the initiating device determines the trust degree of the inspected component identification code according to the first component identification code and the trust value of the inspected component identification code. 如申請專利範圍第10項所述之系統,其中該起始 裝置具有一起始元件識別碼,該起始裝置依據該第一元件識別碼與該待查元件識別碼之信任值,以及該起始元件識別碼與該第一元件識別碼之信任值來判斷該待查元件識別碼之信任度。 The system of claim 10, wherein the The device has an initial component identification code, and the initial device determines the trust value according to the first component identifier and the identifier of the component identifier to be checked, and the trust component of the first component identifier and the first component identifier The trustworthiness of the component identification code to be checked. 如申請專利範圍第10項所述之系統,其中該第二裝置具有一第二元件識別碼與一第二樹狀結構資料,該第二樹狀結構資料儲存與該第二元件識別碼相關之信任值;其中當該第二裝置判斷該第二樹狀結構資料存有與該待查元件識別碼相關之信任值,該第二裝置依據該詢問訊息中之路徑回傳至該起始裝置。 The system of claim 10, wherein the second device has a second component identification code and a second tree structure data, the second tree structure data storage associated with the second component identification code a trust value; wherein when the second device determines that the second tree structure data has a trust value associated with the component identifier to be checked, the second device returns to the initiating device according to the path in the query message. 如申請專利範圍第15項所述之系統,其中該起始裝置具有一起始元件識別碼,該起始裝置依據該起始元件識別碼與該第一元件識別碼之信任值來判斷該待查元件識別碼之信任度。 The system of claim 15, wherein the initiating device has an initial component identification code, and the initiating device determines the inquiring based on the initial component identifier and the trust value of the first component identifier The trustworthiness of the component identification code. 如申請專利範圍第15項所述之系統,其中該起始裝置具有一起始元件識別碼,該起始裝置依據該起始元件識別碼與該第一元件識別碼之信任值、該第一元件識別碼與該第二元件識別碼之信任值、以及該第二元件識別碼與該待查元件識別碼之信任值,來判斷該待查元件識別碼之信任度。 The system of claim 15, wherein the initiating device has an initial component identification code, and the initial device is based on the initial component identifier and a trust value of the first component identifier, the first component The trust value of the identifier and the second component identifier, and the trust value of the second component identifier and the component identifier to be checked are used to determine the trust degree of the component identifier to be checked.
TW100135853A 2011-10-04 2011-10-04 Peer-to-peer based reputation system and method for social network TWI480819B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100135853A TWI480819B (en) 2011-10-04 2011-10-04 Peer-to-peer based reputation system and method for social network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100135853A TWI480819B (en) 2011-10-04 2011-10-04 Peer-to-peer based reputation system and method for social network

Publications (2)

Publication Number Publication Date
TW201316271A TW201316271A (en) 2013-04-16
TWI480819B true TWI480819B (en) 2015-04-11

Family

ID=48803066

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100135853A TWI480819B (en) 2011-10-04 2011-10-04 Peer-to-peer based reputation system and method for social network

Country Status (1)

Country Link
TW (1) TWI480819B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1288795A1 (en) * 2001-08-24 2003-03-05 BRITISH TELECOMMUNICATIONS public limited company Query systems
US20090271428A1 (en) * 2007-05-09 2009-10-29 The Go Daddy Group, Inc. Tracking digital identity related reputation data
TW201001179A (en) * 2008-06-27 2010-01-01 Ind Tech Res Inst System and method for establishing personal social network, trusted network and social networking system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1288795A1 (en) * 2001-08-24 2003-03-05 BRITISH TELECOMMUNICATIONS public limited company Query systems
US20090271428A1 (en) * 2007-05-09 2009-10-29 The Go Daddy Group, Inc. Tracking digital identity related reputation data
TW201001179A (en) * 2008-06-27 2010-01-01 Ind Tech Res Inst System and method for establishing personal social network, trusted network and social networking system

Also Published As

Publication number Publication date
TW201316271A (en) 2013-04-16

Similar Documents

Publication Publication Date Title
Al-Oufi et al. A group trust metric for identifying people of trust in online social networks
Gu et al. Privacy on the edge: Customizable privacy-preserving context sharing in hierarchical edge computing
US20150106905A1 (en) Login method for client application and corresponding server
Li et al. Leveraging social networks to combat collusion in reputation systems for peer-to-peer networks
Zhang et al. A novel multiple-level trust management framework for wireless sensor networks
JP2015167026A (en) Method and apparatus for sending authentication request message in social network
CN106412140A (en) Short link address generating method and system thereof
Wishart et al. SuperstringRep: reputation-enhanced service discovery
WO2012039085A1 (en) Attribute information processing device, attribute information processing method and attribute information evaluation system
WO2009094086A2 (en) A feedback augmented object reputation service
TW201712581A (en) Method, apparatus and system for preventing cross-site request forgery
CN112804358B (en) Method and device for transferring data in cross-link mode based on relay equipment network
JP2019507424A5 (en)
US20150222649A1 (en) Method and apparatus for processing a webpage
CN101216829B (en) Content search system, apparatus and method
CN107426266B (en) Data processing method and server
Bahutair et al. Multi-use trust in crowdsourced iot services
US20140324957A1 (en) Method, system and device for obtaining potential friends information
TWI480819B (en) Peer-to-peer based reputation system and method for social network
Chang et al. Trustworthy service discovery for mobile social network in proximity
CN110517104A (en) Account association discovery method, apparatus, server and medium
CN113888170A (en) Address tracing method, device and equipment
Tian et al. An efficient attack-resistant trust model for P2P networks
TWI462534B (en) Information transmission method and device in instant messaging
TWI575470B (en) A global relationship model and a relationship search method for internet social networks