Anonymous area generation method, electronic device, storage medium and system
A technology for generating systems and areas, applied in the field of information security, can solve problems such as low service quality and too large anonymous area, and achieve the effect of protecting location privacy, reducing query overhead, and improving query service quality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Below, the present invention will be further described in conjunction with the accompanying drawings and specific implementation methods. It should be noted that, under the premise of not conflicting, the various embodiments described below or the technical features can be combined arbitrarily to form new embodiments. .
[0033] Anonymous region generation methods such as figure 1 shown, including the following steps:
[0034] Receive user service requests, receive service requests sent by users, service requests include user identity, location coordinates, query radius, query points of interest, privacy protection requirements; preferably, privacy protection requirements include k users and the minimum area of anonymous areas, k Users include the user currently sending the service request and k-1 irrelevant users. When a user requests a service, the anonymous server fuzzes the real location of the user into an anonymous area and sends it to the LSP, which contains ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

