A privacy protection method for user demand trajectory
A privacy protection and user demand technology, applied in the field of privacy protection, can solve the problem that attackers cannot distinguish target users and infer user location, life impact, demand privacy leakage, etc., to protect query content trajectory privacy, service quality assurance, protection The effect of requiring privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The present invention will be further described below in conjunction with the description of the drawings and specific embodiments.
[0037] Such as figure 1 As shown, a user demand trajectory privacy protection method specifically includes the following content:
[0038] Suppose the user has M demands: S={s 1 ,s 2 ,...,s M}, the user's demand at time T={1,2,...} is represented as a discrete-time trajectory. An event is denoted as demand S at time t. The user's mobility is probabilistic. In the model of the present invention, the modeled user's mobility is a first-order Markov chain (or other mobility models).
[0039] The protection mechanism is the same as the single requirement protection mechanism, which is still replacement. The replacement set O is consistent with the user's real demand set S. The target event is S tar , for example, the user wants to protect the demand at time t-1 and t, that is, S tar =(s t-1 ,s t ). o pre Represents a subset of th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com