Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on user classification

A privacy protection and user technology, applied in the field of privacy protection, can solve problems such as difficult to accurately quantify user reputation and user credibility, user privacy leakage, and failure to achieve detailed evaluation, so as to ensure credibility and usability, and improve accuracy , the effect of enhancing possibility and feasibility

Active Publication Date: 2021-07-20
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method does not classify users, treats all users uniformly, and does not achieve detailed evaluation, so it is difficult to accurately quantify user reputation and user credibility; at the same time, how to effectively evaluate user reputation from other perspectives and establish what kind of user Issues such as the reputation evaluation mechanism have not been well resolved, so there is still a great risk of user privacy leakage under the traditional k-anonymity privacy protection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on user classification
  • Privacy protection method based on user classification
  • Privacy protection method based on user classification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] specific implementation plan

[0047] The implementation of the present invention is based on the existing centralized anonymous server-based privacy protection framework for privacy protection.

[0048] refer to figure 1 , the central anonymous server-based privacy protection architecture, including mobile users, anonymous servers and location servers LBS-S. The mobile user is an ordinary mobile user in the mobile Internet, and has a mobile device with a cache device, which is used for anonymous server to query a certain When a specific user implements k-anonymous privacy protection, a k-anonymous area is formed. The anonymous server is mainly used in the query service to evaluate the reputation value of each candidate user, select the appropriate user to realize k-anonymity, finally send the k-anonymous query request, and filter the candidate query results to return to the real query user, that is, the anonymous server first chooses to satisfy the real Query the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on user classification, which mainly solves the problem of leakage of user privacy in the prior art. The scheme is: the query user sends a query request to the anonymous server; after receiving the request, the anonymous server first divides each candidate user into a new user and an old user, and then predicts the position of each new user at the previous moment; Evaluate the static reputation, dynamic reputation, and overall reputation of the movement trend in adjacent time intervals; finally select the user group information with the highest overall reputation value and the smallest anonymous area, together with the real user information, to form a final query set and send it to the location server; After receiving the information, the location server forms a candidate result set and returns it to the anonymous server; the anonymous server screens the results required by the real user and returns them. The invention adopts reputation evaluation and user classification mechanism, ensures user credibility and usability, can resist location injection attack, and can be used in various continuous query location services.

Description

technical field [0001] The invention belongs to the field of wireless network security, and in particular relates to a privacy protection method, which can be used in various continuous location query services and mainly resists location injection attacks. Background technique [0002] Location service LBS, also known as positioning service, is a value-added service provided by the combination of mobile communication network and satellite positioning system. It obtains the location information of the mobile terminal through a set of positioning technologies, such as longitude and latitude coordinate data, and stores the location The information is provided to the mobile user himself, other people or the communication system to realize various location-related services. [0003] Location-based services can be applied in different fields. At the same time, under the trend of the rapid development of the mobile Internet, various applications are also flourishing. In particular...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L67/52
Inventor 牛俊朱晓妍马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products