Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Position information hiding method and position server

A location information and server technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of sparse users, inability to guarantee the availability and accuracy of location services, and increase the calculation overhead of location services

Active Publication Date: 2019-02-12
CHINA MOBILE COMM GRP CO LTD +1
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above three location anonymity methods can achieve a certain degree of privacy protection, but the method of generating false users will increase the computational overhead of location services; the use of spatial anonymity methods and spatiotemporal anonymity methods has the problem of sparse users, that is, when users are sparse The availability and accuracy of location services cannot be guaranteed in the area of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Position information hiding method and position server
  • Position information hiding method and position server
  • Position information hiding method and position server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] In a specific embodiment of the invention, figure 1 It is a schematic flowchart of the first realization of the location information concealment method in the embodiment of the present invention. Such as figure 1 As shown, the concealment method of location information may include the following steps:

[0058] Step 101. After receiving the current query request for the target user, obtain the real location information of the target user and the false location information fed back by the last query request for the target user.

[0059] In the specific implementation of the present invention, the location server first receives the current query request for the target user; wherein, the current query request may carry the location identifier of the target user. In a specific embodiment of the present invention, the location server may store the false location information of the target user corresponding to each query. Therefore, after receiving the current query request...

Embodiment 2

[0087] Image 6 It is a schematic flowchart of the second implementation of the location information concealment method in the embodiment of the present invention. Such as Image 6 As shown, the concealment method of location information may include the following steps:

[0088] Step 601. After receiving the current query request for the target user, obtain the real location information of the target user and the false location information fed back by the last query request for the target user.

[0089] In the specific implementation of the present invention, the location server receives the current location request sent by the inquiring user; wherein, the current inquiring request may carry the location identifier of the target user. In a specific embodiment of the present invention, the query user and the target user may be the same user or different users.

[0090] Step 602. Record the current query time when the current query request is received.

[0091] In a specific...

Embodiment 3

[0121] Figure 11 It is a schematic structural diagram of the first component of the location server in the embodiment of the present invention. Such as Figure 11 As shown, the location server includes: an acquisition unit 1101 and a concealment unit 1102; wherein,

[0122] The obtaining unit 1101 is configured to obtain the real location information of the target user after receiving the current query request for the target user, and the false location information fed back by the last query request for the target user;

[0123] The concealment unit 1102 is configured to conceal the real location information through the false location information when the false location information satisfies a preset anonymity condition.

[0124] Figure 12 It is a schematic diagram of the second component structure of the location server in the embodiment of the present invention. Such as Figure 12 As shown, the concealment unit 1102 includes: a determination subunit 11021 and a concea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a position information hiding method and a position server. The method comprises the following steps: after receiving a current query request aiming at a target user, acquiring real position information of the target user, and false position information fed back aiming at last query request of the target user; and when the false position information satisfies a preset anonymity condition, hiding the real position information through the false position information.

Description

technical field [0001] The invention relates to the field of location services, in particular to an anonymity method based on location information and a location server. Background technique [0002] With the popularization of smart mobile terminals and the development of network technology, operators can obtain location information through signaling data, business application systems, their own positioning platforms and user online logs. Mobile Location-Based Services (LBS), as an important part of mobile communication value-added services, has gradually become an indispensable part of people's lives. Users can use portable mobile devices, such as mobile phones, PDAs, Palms, etc. , to query all kinds of required location information, so that important information such as the user's intention, activity pattern, and potential hobbies can be continuously mined from these location information. However, the threat of privacy leakage caused by location information leakage is als...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L67/52
Inventor 曾瑞邵波张译丹刘芳张威孙芳杰
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products