Privacy protection method and system based on high-risk frequent activity point replacement strategy

A privacy protection and replacement strategy technology, applied in the field of data security, can solve the problems of difficult to deal with large amount of spatial data, high computational complexity, complicated operation process, etc., to achieve the effect of clear protection purpose and low computational complexity

Active Publication Date: 2018-07-31
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method based on the entire trajectory data consumes a lot of resources and time, and it is difficult to guarantee the overall distortion of the data
At the same time, this protection method based on trajectory fragments has complex operation procedures and high computational complexity, making it difficult to deal with large amounts of spatial data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and system based on high-risk frequent activity point replacement strategy
  • Privacy protection method and system based on high-risk frequent activity point replacement strategy
  • Privacy protection method and system based on high-risk frequent activity point replacement strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0078] This method selects Shenzhen as the research area, and uses the mobile phone call data (CDR) of the research area in 2011 as the research data source. Adopt the method of the present invention to process data.

[0079] Table 1 Partial call records of mobile phone users whose user anonymous identification is "0000****50"

[0080] Anonymous identification of mobile phone users

The time when events such as making / receiving calls occurred

dimension coordinates

longitude coordinates

event type

area code

0000****50

2011 / 5 / 1 4:39

22.550833

114.125833

0

0755

0000****50

2011 / 5 / 1 5:45

22.542534

114.11719

0

0755

0000****50

2011 / 5 / 1 6:03

22.542534

114.11719

1

0755

0000****50

2011 / 5 / 1 9:42

22.542534

114.11719

1

0755

0000****50

2011 / 5 / 1 10:27

22.542534

114.11719

0

0755

[0081] 0000****50

2011 / 5 / 1 15:38

22.542534

114.11719

1

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection method and system based on a high-risk frequent active point replacement policy. The privacy protection method comprises the following steps: establishing a privacy model, grading individual risks into zero-risk individuals, low-risk individuals and high-risk individuals based on the privacy model, hiding the high-risk individuals in the low-risk individuals for privacy protection, and evaluating a privacy protection result. The method is simple, is low in calculation complexity and can be applicable to spatial data with large data sizes.

Description

technical field [0001] The technical field of data security of the present invention specifically relates to a privacy protection method and system based on a replacement strategy for high-risk frequent activity points. Background technique [0002] In the context of big data, it has become possible to identify individuals from call location data (CDR) by mining the spatial data of mobile phone user activities. With its detailed record list and powerful information contained in mobile phone positioning data, it has become a main research direction of various operators and scientific research institutions. At present, the identification of individual occupation and residence through mobile phone data, and the study of urban residents' activity patterns and urban spatial structure through mobile phone data have become a reality and have been scientifically verified. From the released mobile phone positioning data, using related mining algorithms to identify individuals with o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F2221/2107
Inventor 尹凌王倩汪伟胡金星林楠刘耿
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products