Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A location privacy protection method in sign-in service

A privacy protection, fake location technology, applied in the field of social network services, can solve the problem that the social network server cannot obtain the user's location information, does not take into account the needs of all the user's check-in records, and cannot issue the user's check-in reward to the user. The effect of stability, good location privacy protection, and good applicability

Active Publication Date: 2020-02-14
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, although the above scheme can guarantee the user's location privacy, it is not suitable for protecting the location privacy of users who expect to receive sign-in rewards
Because in this scheme, the location-based social network server cannot obtain any location information of the user, so the location-based social network server cannot issue the check-in reward of the user's real location to the user
Secondly, this method only considers the user's need to retrieve all the check-in records of a certain location, and does not take into account the user's need to quickly obtain all the check-in records of a friend

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A location privacy protection method in sign-in service
  • A location privacy protection method in sign-in service
  • A location privacy protection method in sign-in service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] figure 1 It is a flowchart of a location privacy protection method in a sign-in service of the present invention.

[0046] In this example, if figure 1 As shown, a location privacy protection method in a check-in service of the present invention comprises the following steps:

[0047] S1. The user maintains a local data table, which is used to store the places the user has checked in and the corresponding header table row number.

[0048] S2. Generate a false location candidate set

[0049] Let the number of locations sent to the social network server LBSN by the user's last check-in be k pre , and l real is the real position of the user at the current moment, therefore, there are k pre joint probabilities, respectively q(l pre_1 , l real ),...,q(l pre_kpre , l real ). Among them, l pre_1 ,...,l pre_kpre They are the k sent by the user to the LBSN during the last check-in pre locations. We find all positions satisfying the following two conditions, except ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a position privacy protection method in a sign-in service, which encrypts each user's sign-in record and numbers each sign-in node through k-anonymously generated position sets, so as to maintain the sign-in chain and protect position privacy for users ; At the same time, increase location privacy protection by adding fake sign-in nodes, and distinguish real sign-in nodes from fake sign-in nodes through the sign bits corresponding to sign-in record ciphertexts. In addition, a header table and Hash table, so that the node numbers contained in the header table and the hash table are the latest node numbers signed by the user and their corresponding decryption keys; in this way, by directly decrypting the ciphertext in the hash table, you can get all Check-in records, and at the same time, by searching the AVL tree, you can get all the friends who have checked in at a specific place and their corresponding head table line numbers, and decrypt the head table to get all the check-in records at a specific place. Therefore, it is also possible to provide two retrieval methods Improve location privacy protection requirements.

Description

technical field [0001] The invention belongs to the technical field of social networking services, and more specifically, relates to a location privacy protection method in a sign-in service. Background technique [0002] With the continuous development of location-based services and online social networks, a large number of location-based social network services have been created, for example, "check-in" services, attachment friends, stranger location queries and other services. At present, location-based social networking services have received a lot of attention, and Facebook and many other companies have embedded location-based social networking into their products or services. The "check-in" service is an important service in location-based social networks. Users can use the "check-in" service at any place, leave a personal opinion about the place, and share these opinions with their friends at the same time. In these views, his buddies can get suggestions on which pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06
CPCH04L63/0421H04L51/222H04L51/52
Inventor 孙罡谢喻霞廖丹孙健
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products