Location privacy protection method based on coordinate transformation
A technology of coordinate transformation and privacy protection, applied in location-based services, security devices, electrical components, etc., can solve the problems of security threats to user location privacy, system security weaknesses, etc., to reduce security requirements and improve privacy protection security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The location privacy protection method based on coordinate transformation of the present invention comprises the following steps:
[0023] (1) For users requesting location services, the parameter generator distributes coordinate transformation parameters for users and location servers. In order to improve security, the coordinate transformation parameter distribution process needs to be encrypted. All users and location servers share a pair of keys with the parameter generator. In addition, the parameter generator will periodically update the coordinate transformation parameters.
[0024] (2) The user uses the coordinate transformation parameters to perform coordinate transformation on its location coordinates, and uses the transformed location coordinates to initiate a location service request to the anonymous server.
[0025] (3) The anonymous server establishes an anonymous group and an anonymous area based on the transformed location coordinates, generates an anony...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
