Position privacy protection method based on Chinese remainder theorem and intelligent contract

A Chinese remainder theorem and smart contract technology, applied in the fields of communication, computer, and blockchain, it can solve the problems of centralized user trust and service quality, and achieve the effect of improving generation efficiency, protecting location privacy data, and ensuring credibility.

Active Publication Date: 2020-05-29
GUANGDONG UNIV OF TECH
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of this application is to provide a location privacy protection method based on the Chinese remainder theorem and smart contracts to solve the problems of centralization, trust among users, and quality of service in existing location-oriented service privacy protection solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Position privacy protection method based on Chinese remainder theorem and intelligent contract
  • Position privacy protection method based on Chinese remainder theorem and intelligent contract
  • Position privacy protection method based on Chinese remainder theorem and intelligent contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Blockchain technology originated in 2008 and was proposed by a scholar named Satoshi Nakamoto in the foundational article of cryptocurrency, "Bitcoin: A Peer-to-Peer Electronic Cash System". It was originally known as the underlying supporting technology of cryptocurrency, and later recognized by people for its good distributed storage, data immutability and decentralization. As an important part of blockchain technology 2.0, smart contracts not only inherit good features such as decentralization, but also complete a series of interactions through code logic. The emergence of blockchain and smart contract technology provides new ideas for traditional location privacy protection solutions.

[0052] Aiming at the problems in the prior art mentioned in the background technology above, this application provides a location privacy protection method based on the Chinese remainder theorem and smart contracts. The overall idea of ​​the method is: when the requesting party wants...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a position privacy protection method based on the Chinese remainder theorem and an intelligent contract, and the method comprises the steps: enabling a requester to initiate the call to the intelligent contract deployed with an auction-based incentive mechanism when the requester wants to protect the safety of the position information of the requester, inputting related auction information, and initiating one auction; enabling the participant to add the quoted price into a certain auction, and enabling the intelligent contract to determine a bidder set according to thebid of each auction and return the bidder set to the requester; if the request is sent within the specified auction time and the sufficient bidder information is not received, calling the Chinese remainder theorem to generate the corresponding position equivalent set, so that the bidder set is supplemented. And finally, enabling the requester to send an aggregation request to the location serviceprovider to obtain corresponding service information, and determine a reward and punishment range. Compared with a traditional scheme, the generation efficiency of the K-anonymous hidden region is higher, and the location privacy of the requester can be better protected.

Description

technical field [0001] This application relates to the fields of computer, communication, and blockchain, and specifically relates to a location privacy protection method based on the Chinese remainder theorem and smart contracts. Background technique [0002] Location-Based Service (Location-Based Service, LBS) is a service that provides mobile users with information based on the location information provided by the user and with the support of the geographic information system platform. Its typical applications or services include map applications (such as high-speed Map of Germany), catering and entertainment applications (such as Meituan and Ele.me). With the rapid development of mobile communication networks and the continuous popularization of smart terminal devices, location-based services have been widely used in e-commerce, health care, military and mobile social networking, and have gradually become an indispensable part of people's daily life. According to statis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q30/08G06Q50/18
CPCG06F21/6245G06Q30/08G06Q50/188G06F2221/2111
Inventor 柳毅李宣凌捷罗玉欧毓毅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products