Track privacy protection method based on buffering and position predicating mechanism
A prediction mechanism and privacy protection technology, applied in electrical components, transmission systems, etc., to reduce interactions, reduce risks, and reduce query overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0049] In this example, the user is used to represent the requesting client and neighboring clients.
[0050] Such as figure 1 and figure 2 As shown, a trajectory privacy protection method based on cache and location prediction mechanism mainly includes client cache lookup and query request, anonymizer cache lookup and location anonymization, LSP data query, anonymizer update and matching user result set, request client There are five processes of terminal update and refinement results, as follows:
[0051] Step 1: Client Cache Lookup and Query Requests
[0052] The system specifies a query range before the user queries, and the range can be defined by the coordinates of the lower left corner (x 1 ,y 1 ) and the coordinates of the upper right corner (x 2 ,y 2 ) is determined, and at the same time it is divided into m×m grids of equal size. Ther...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com