A Near Neighbor Detection Method Based on Wireless AP

A detection method and wireless technology, applied in wireless communication, access restrictions, electrical components, etc., can solve problems such as leaking user location information and endangering user privacy, and achieve the effect of ensuring location privacy security and great practical value

Active Publication Date: 2018-05-04
FUJIAN NORMAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a wireless AP-based neighbor detection method to solve the problem that the traditional neighbor detection method will leak the user's location information and will endanger the user's privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Near Neighbor Detection Method Based on Wireless AP
  • A Near Neighbor Detection Method Based on Wireless AP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0014] The present invention proposes a neighbor detection method based on wireless AP, such as figure 1 As shown, the querying user first searches for nearby wireless APs, and sends the MAC address list of the searched APs (that is, the AP list) to the server together with the query request; the server searches and queries the user's AP by searching the AP list submitted by other users. List other users whose intersection exists, and return the search result set as the query result to the query user.

[0015] In this example, the mobile user in the social network can search not only the signal of the AP that he or she accesses, but also the signal sent by other nearby APs. When the user sends a request to find nearby neighbors, he also sends a list consisting of the MAC addresses of each AP that he has found to the server. After the user send...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The objective of the invention is to provide a neighbor detection method based on a wireless AP, and the method is characterized in that the method comprises the following steps that S1, a search user firstly searches a nearby wireless AP, and enables an MAC address list of the searched AP to serve as an AP list; S2, the AP list and a query request are transmitted to a server; S3, the server searches other users which have intersections with the AP list of the search user through searching AP list submitted by other users; S4, a search result serves as a query result and is returned to the search user. The method solves a problem that a conventional neighbor detection method will cause the leakage of the position information of a user, and the privacy of the user will be leaked. The method does not need the user to submit the position information, can guarantee the safety of the position privacy of the user, and is very high in practical value in a social network application environment.

Description

technical field [0001] The invention relates to a wireless AP-based neighbor detection method, which is suitable for social networks and finds nearby neighbors for users on the premise of protecting the user's location privacy. Background technique [0002] A hash table (Hash table, also called a hash table) is a data structure that is directly accessed according to the key code value (Key--value). That is, it accesses records by mapping a key value to a location in the table. The checked records can be obtained directly without comparison, so as to speed up the search. This mapping function is called a hash function. Commonly used methods for constructing hash functions are: 1) direct addressing method; 2) digital analysis method; 3) square method; 4) folding method; 5) division and retention method; 6) random number method. In addition, different keywords may be mapped to the same hash address, this phenomenon is called collision. Therefore, a method for dealing with c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/00H04W48/16
CPCH04W8/005H04W48/16
Inventor 叶阿勇陈秋玲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products