Privacy protection method for mobile terminal during running position-based service

A technology for operating location and privacy protection, applied in the field of privacy protection, can solve problems such as the difficulty of technology and solutions to meet user requirements, and achieve the effect of shortening time, reducing burden, and improving service accuracy

Inactive Publication Date: 2015-07-01
CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of LBS and the improvement of user privacy awareness, existing technologies and solutions have become increasingly difficult to meet user requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method for mobile terminal during running position-based service
  • Privacy protection method for mobile terminal during running position-based service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0018] The privacy protection method of the mobile terminal when running the location service according to the present invention includes the following basic definitions:

[0019] Privacy protection system structure: The central anonymous server structure is the most common system structure in the location privacy protection model, which is suitable for processing large quantities of service requests. The structure consists of 3 parts: user, location anonymity server and location server.

[0020] Location privacy requirement Q: The location privacy requirement Q is defined in the form of a triple {Pos(x,y),k,dist}, where Pos(x,y) is the user's location coordinates in the plane space; the degree of anonymity k represents The anonymous area contains the minimum number of users. If the user satisfies the anonymity principle of position k, the probability ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection method for a mobile terminal during running position-based service. The privacy protection method makes an attacker cannot distinguish the position of a user through a k-anonymity principle so as to protect the position privacy. An anonymous server constructs a quad-tree data structure, a plane space is recursively divided into four square zones with the same area, each user in each square zone sends a position privacy requirement Q {Pos (x, y), k, dist} to the anonymous server, the anonymous server constructs a data structure for each leaf node of the quad-tree according to the anonymous privacy requirements of the users, wherein the position privacy requirements of all the users in each square zone are stored in the anonymous server, and the anonymous server can quickly query the users who meet the anonymity degree k and space tolerance dist in the zone with the user according to the data structure maintained by the leaf node of the user and form an anonymous zone.

Description

technical field [0001] The invention relates to a method for protecting privacy of a mobile terminal when running location services, in particular to a method for protecting location privacy by making an attacker unable to distinguish user locations through the k-anonymity principle. Background technique [0002] With the rapid development of positioning technology, ubiquitous computing and mobile computing technology, location-based services (LBS) have penetrated into every aspect of human life. Common positioning technologies include GPS positioning, base station positioning (GSM network, CDMA network), IP positioning, RFID / QR code and other label identification and positioning. The location-based service is that the user sends his own location information to the server when requesting the service. It is a service related to the location of the user's request, such as the area query "road traffic conditions at my location", the nearest neighbor query " Where is the neares...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/02H04W12/02
CPCH04W4/02H04W12/02
Inventor 王鹏飞李千目薛荧荧龙娟娟华超娴孙敏雅李慧林
Owner CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products