Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
A privacy protection and location service technology, applied in the field of trajectory privacy protection based on neighbor node forwarding query, can solve the problem of not fully protecting user trajectory location privacy, and achieves protection of location privacy and trajectory privacy, strong anti-attack ability, and easy implementation. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0032] Describe in detail below in conjunction with accompanying drawing and embodiment:
[0033] 1. Trajectory privacy protection system based on neighbor node forwarding query (referred to as this system)
[0034] like figure 1 , the system includes a user area 20 and a location server 30, and is provided with a trajectory privacy protection module 10; the user area 20, the trajectory privacy protection module 10 and the location server 30 are connected in sequence;
[0035] The trajectory privacy protection module 10 includes an authentication server 11, a pseudonym server 12 and a location anonymity module 13; the interaction relationship is:
[0036] The authentication server 11 verifies the credibility and legitimacy of the user who makes the request to ensure that the user responsible for forwarding the request can find a trusted neighbor node;
[0037] The pseudonym server 12 assigns a pseudonym to each trusted user, and the user's service request information include...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap