Privacy protection method based on user classification
A privacy protection and user technology, applied in the field of privacy protection, it can solve problems such as difficulty in accurately quantifying user reputation and user credibility, failure to achieve detailed evaluation, and leakage of user privacy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] specific implementation plan
[0047] The implementation of the present invention is based on the existing centralized anonymous server-based privacy protection framework for privacy protection.
[0048] refer to figure 1 , the central anonymous server-based privacy protection architecture, including mobile users, anonymous servers and location servers LBS-S. The mobile user is an ordinary mobile user in the mobile Internet, and has a mobile device with a cache device, which is used for anonymous server to query a certain When a specific user implements k-anonymous privacy protection, a k-anonymous area is formed. The anonymous server is mainly used in the query service to evaluate the reputation value of each candidate user, select the appropriate user to realize k-anonymity, finally send the k-anonymous query request, and filter the candidate query results to return to the real query user, that is, the anonymous server first chooses to satisfy the real Query the c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com