Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Location privacy protection method in check-in service

A privacy protection and false location technology, applied in the field of social network services, can solve the problems that social network servers cannot obtain user location information, do not consider the needs of all user sign-in records, and cannot issue user sign-in rewards to users, etc., to achieve high applicability Sex, good location privacy protection, good applicability

Active Publication Date: 2017-07-18
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, although the above scheme can guarantee the user's location privacy, it is not suitable for protecting the location privacy of users who expect to receive sign-in rewards
Because in this scheme, the location-based social network server cannot obtain any location information of the user, so the location-based social network server cannot issue the check-in reward of the user's real location to the user
Secondly, this method only considers the user's need to retrieve all the check-in records of a certain location, and does not take into account the user's need to quickly obtain all the check-in records of a friend

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location privacy protection method in check-in service
  • Location privacy protection method in check-in service
  • Location privacy protection method in check-in service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] figure 1 It is a flowchart of a location privacy protection method in a sign-in service of the present invention.

[0046] In this example, if figure 1 As shown, a location privacy protection method in a check-in service of the present invention comprises the following steps:

[0047] S1. The user maintains a local data table, which is used to store the places the user has checked in and the corresponding header table row number.

[0048] S2. Generate a false location candidate set

[0049] Let the number of locations sent to the social network server LBSN by the user's last check-in be k pre , and l real is the real position of the user at the current moment, therefore, there are k pre joint probabilities, respectively q(l pre_1 , l real ),...,q(l pre_kpre , l real ). Among them, l pre_1 ,...,l pre_kpre They are the k sent by the user to the LBSN during the last check-in pre locations. We find all positions satisfying the following two conditions, except ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a location privacy protection method in a check-in service. Check-in records of each user are encrypted and each check-in node is numbered via a location set generated by K-anoymity for achieving the purpose of maintaining a check-in chain for the user and protecting location privacy; meanwhile, the location privacy protection is increased by adding a false check-in node, the true check-in node and the false check-in node are distinguished via a zone bit corresponding to a check-in record ciphertext, and in addition, a header table and a Hash table are maintained for the user, so that node numbers included in the header table and the Hash table are the number of the node that the user checks in latest and a corresponding decryption key; therefore, all the check-in records of friends can be acquired by directly decrypting the ciphertext in the Hash table, meanwhile, all the friends checked in at a specific site and corresponding header table line numbers can be acquired by searching an AVL tree, the check-in records of all the specific sites can be acquired by decrypting the header table, and thus the location privacy protection can also be improved in the case of providing two search modes.

Description

technical field [0001] The invention belongs to the technical field of social networking services, and more specifically, relates to a location privacy protection method in a sign-in service. Background technique [0002] With the continuous development of location-based services and online social networks, a large number of location-based social network services have been created, for example, "check-in" services, attachment friends, stranger location queries and other services. At present, location-based social networking services have received a lot of attention, and Facebook and many other companies have embedded location-based social networking into their products or services. The "check-in" service is an important service in location-based social networks. Users can use the "check-in" service at any place, leave a personal opinion about the place, and share these opinions with their friends at the same time. In these views, his buddies can get suggestions on which pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58H04L29/06
CPCH04L63/0421H04L51/222H04L51/52
Inventor 孙罡谢喻霞廖丹孙健
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products