Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile user position privacy protection method for avoiding attacks performed through circular region overlapping parts

A mobile user and user technology, applied in the direction of location information-based services, security devices, electrical components, etc., can solve the problems of increasing user workload, privacy leakage, etc., to reduce query time, protect location privacy, and improve query efficiency Effect

Inactive Publication Date: 2016-05-04
NANJING UNIV OF INFORMATION SCI & TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is that when a mobile user queries the server for surrounding points of interest, since the user terminal needs to continuously send hidden areas to the server and screen the query results, the workload of the user terminal is greatly increased and privacy is easily leaked, thus proposing A method for protecting the location privacy of mobile users that avoids overlapping circle attacks is proposed. The workload of the user end is reduced by using the intermediate device, and the overlapping area attack is processed, which effectively protects the location privacy of the user and reduces the workload of the user end. Burden and improve query results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile user position privacy protection method for avoiding attacks performed through circular region overlapping parts
  • Mobile user position privacy protection method for avoiding attacks performed through circular region overlapping parts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Combine below attached drawing A further detailed description of the implementation of the technical solution of the implementation case:

[0018] This implementation case adopts user viewing record collection, user personal social relationship analysis, and program recommendation based on content matching to accurately provide personalized TV program push. Such as figure 1 , figure 2 As shown, this method includes the following steps:

[0019] Step 10, the user sends his own position l, the required confidence level cl and the number k of interest points to be queried to the intermediate device.

[0020] Step 20, the intermediate device performs fuzzy processing on the user's location, converts the real location l into a circular area CR, and processes the parameters, specifying a value greater than the execution level cl and the number of query results k required by the user cl' and k' (set the value of the execution level cl' to the maximum value 1, and set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile user position privacy protection method for avoiding attacks performed through circular region overlapping parts, and relates to the field of position privacy protection. The method comprises the following steps that: firstly, a user sends a request Q (a current position of the user, the number of query results and the like) to intermediate proxy equipment; the intermediate equipment converts a real position of the user into a circular region, specifies a value which is greater than a confidence level needed by the user and the number of query results, and sends a request Q' to an LBS (Location Based Service) server provider; an LBS finds points of interest satisfying a condition with a query processing method, puts the points of interest satisfying the condition into a set V', and returns the V' to the intermediate equipment; and the intermediate equipment screens the V', and returns a screening result to the user. Through adoption of the method, the attacks performed through the circular region overlapping parts are effectively avoided when the user queries a server, and the position privacy of the user can be protected more accurately. The mobile user position privacy protection method is suitable for protecting privacy of the user position when the user queries surrounding points of interest.

Description

technical field [0001] The invention belongs to the technical field of position privacy protection, and specifically relates to a method for protecting the position privacy of a user when searching for surrounding points of interest through a server. Background technique [0002] Social network refers to a relatively stable relationship system formed by interaction among individual members of society. With the vigorous development of Internet technology, online social network services and applications have become an indispensable part of our lives. Location-based services have been widely used in mobile users. Users can query points of interest around him through servers, but users need to send their accurate locations to obtain services, which may pose a threat to location privacy. Therefore, how to protect the location privacy of users while providing location-based services has become a research hotspot in recent years. [0003] R.Beresford and others proposed the mixed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W4/02
CPCH04W12/02H04W4/02
Inventor 马廷淮贾静金子龙薛羽钟水明曹杰
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products