Supercharge Your Innovation With Domain-Expert AI Agents!

Location privacy protection method based on virtual trajectory generation mechanism

A technology of virtual trajectory and generation mechanism, applied in location-based services, security devices, electrical components, etc., can solve the problems of inaccurate results, leakage of mobile user location privacy, large computing overhead, etc., to achieve short time and guaranteed experience Level, the effect of protecting location privacy

Active Publication Date: 2022-08-09
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Mobile users send encrypted location information to location service providers, which will cause a huge computational overhead on the server.
2. In the location privacy protection scheme based on space-time concealment, mobile users send a large-scale range instead of their actual location to the location service provider, which will lead to inaccurate user query results and reduce the user's service quality level
However, with the development of big data, artificial intelligence and other technologies, the k-anonymity method cannot resist data mining attacks, which will lead to the leakage of mobile users' location privacy.
Even if some privacy protection technologies are used in the LBS query process, some of these methods will generate huge computing overhead, some will reduce the user's service quality level, and some will not be able to resist data mining attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location privacy protection method based on virtual trajectory generation mechanism
  • Location privacy protection method based on virtual trajectory generation mechanism
  • Location privacy protection method based on virtual trajectory generation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0060] like Figure 1 to Figure 3 As shown in the figure, the location privacy protection method based on the virtual trajectory generation mechanism is configured on the mobile terminal used by the user, and uses the AutoNavi map APP as the map data base, including client initialization, trajectory preprocessing, interest point mapping, trajectory simulation, customer There are five main processes such as client request query. The specific process is as follows:

[0061] Client initialization

[0062] Step S10, initialize and generate k-1 virtual users and their corresponding cities; when the client system just starts running, the user selects k-1 different cities {city 1 , city 2 ,…,city k-1 }, used to represent the cities where k-1 virtual users are located. At the same time, users can choose to import their own historical tracks, or they can choose not to import them. This embodiment mainly introduces the case where the user chooses not to import.

[0063] Trajector...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a position privacy protection method based on a virtual track generation mechanism, which comprises the following steps of: generating k-1 virtual users living in different places and indistinguishable from a real user by using the virtual track generation mechanism at a client according to a user portrait of the real user and a map API (Application Program Interface); and generating a false track which is indistinguishable from the real track for a user to use in LBS query. According to the method, the interest point information of the real user and the public interest point information of the known map are combined through a virtual track generation mechanism, the virtual user with the same behavior and moving mode as the real user is generated, and the position privacy of the real user is effectively protected in continuous LSP query.

Description

technical field [0001] The present invention relates to the field of computer science and technology, in particular to a method for protecting location privacy based on a virtual trajectory generation mechanism. Background technique [0002] In recent years, with the development of mobile Internet technology, the application of Location Based Service (LBS) has widely benefited the fields of commerce, people's livelihood, and medical care. Mobile users can obtain the current location or Point of Interest (POI) information near a certain location through the mobile application provided by the Location-based Service Provider (LSP). The app searches for nearby restaurants, hotels, movie theaters, and more. However, when the user makes continuous location service requests, the attacker can infer the user's personal privacy information, such as home address, living habits, religious beliefs and other information, based on the user's continuous location information. The "delistin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/021H04W4/02H04W12/02H04W12/63
CPCH04W4/021H04W4/025H04W12/02H04W12/63Y02D10/00
Inventor 李雄李远飞罗向阳
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More