A personalized location privacy protection method based on location k-anonymity
A privacy protection and privacy technology, which is applied in the field of privacy protection of network information security, can solve problems such as inability to achieve k-anonymity, vulnerability to reverse attacks, etc., achieve powerful computing and storage capabilities, improve security, and reduce size.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0041] The present invention adopts the system framework of multiple anonymous servers to cooperate, solves the semi-trusted problem of third-party anonymous servers, realizes the security protection of user location privacy and improves the service quality. The specific process of the present invention will be described in detail below using specific implementation methods.
[0042] Please refer to figure 1 and figure 2 , a personalized location privacy protection method based on location k-anonymity, including the following steps:
[0043]S1. System initialization. The LBS server grids the map space to form grid units of the same size. Each grid unit has at least one location point that is less sensitive to the user's real location.
[0044] S2. Generate a user query request Q according to the user's privacy requirements u ,
[0045] The specific process includes the following sub-steps:
[0046] S2-1. Query users First, generate the privacy requirements of the user's l...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com