Facility site selection method and system based on encrypted position data
A facility and data technology, applied in data processing applications, digital data protection, electronic digital data processing, etc., can solve problems such as the inability of site selection to meet requirements, enterprises have no right to obtain them, etc., to protect privacy, improve accuracy, guarantee The effect of information security
Active Publication Date: 2020-06-16
SHANDONG NORMAL UNIV
13 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention provides a facility site selection method and system based on encrypted position data, a clustering calculation party, an auxiliary calculation party and a plurality of position providers. The clustering calculation party and the auxiliary calculation party cannot collude, and an enterprise can obtain an equipment site selection result but cannot obtain position information of any client; the auxiliary computing party only provides an auxiliary computing service and cannot obtain an equipment site selection result, the position of a client, other intermediate results and relatedinformation; according to the method, the client encrypts the position data before sharing the position data, so that privacy is protected, an enterprise can perform clustering calculation by utilizing the encrypted position data, the construction position of the facility is obtained, and the accuracy of facility site selection is greatly improved.
Application Domain
Character and pattern recognitionDigital data protection +1
Technology Topic
Location dataData mining +4
Image
Examples
- Experimental program(2)
Example Embodiment
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Ownership authentication and key transmission method without losing entropy in ciphertext duplication elimination scene
Owner:XIDIAN UNIV
Parking space sharing management and parking operation system based on internet of things
Owner:上海璟灿科技有限公司
SDN network multicast member information encryption method and system, terminal and storage medium
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Loudspeaker control method and device and electronic equipment
Owner:VIVO MOBILE COMM CO LTD
Classification and recommendation of technical efficacy words
- improve accuracy
- privacy protection
Golf club head with adjustable vibration-absorbing capacity
Owner:FUSHENG IND CO LTD
Stent delivery system with securement and deployment accuracy
Owner:BOSTON SCI SCIMED INC
Method for improving an HS-DSCH transport format allocation
Owner:NOKIA SOLUTIONS & NETWORKS OY
Catheter systems
Owner:ST JUDE MEDICAL ATRIAL FIBRILLATION DIV
Gaming Machine And Gaming System Using Chips
Owner:UNIVERSAL ENTERTAINMENT CORP