CN104581625B - A kind of location privacy protection method and system based on granularity control - Google Patents
A kind of location privacy protection method and system based on granularity control Download PDFInfo
- Publication number
- CN104581625B CN104581625B CN201410634786.2A CN201410634786A CN104581625B CN 104581625 B CN104581625 B CN 104581625B CN 201410634786 A CN201410634786 A CN 201410634786A CN 104581625 B CN104581625 B CN 104581625B
- Authority
- CN
- China
- Prior art keywords
- lbs
- application programs
- position precision
- transferred
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of location privacy protection method based on granularity control, including:Judge whether be stored with a LBS the application list in mobile equipment, if being then that each LBS application programs set privacy class, it corresponds to the position precision that the LBS application programs will obtain, and judge whether there are privacy policy storehouse in mobile equipment, and if so, lasting monitor the LBS requests for coming from LBS application programs, and obtained and the corresponding positional information of LBS requests when receiving LBS requests, the corresponding position precision of LBS application programs is read from privacy policy storehouse, and determined whether to carry out Fuzzy processing to the positional information according to the position precision, step is transferred to if necessary, and corresponding positional information is asked according to the LBS, and the corresponding position precision of the LBS application programs obtains fuzz locating information.The present invention can solve personalized technical problem poor, efficiency is low, real-time is poor, insincere third party relies on present in existing method.
Description
Technical field
The invention belongs to computer safety field, more particularly it relates to which a kind of position based on granularity control is hidden
Private guard method and system.
Background technology
The fast development of wireless communication and move database technology so that mobile subscriber inquires about at any time and place to be appointed
The imagination of meaning information becomes a reality.The fast development of position sensing equipment (such as portable phone, GPS, RFID etc.) triggers
One new research field --- lookup, friendship based on location-based service (LBSs), such as location-based shop or dining room (s)
Circular announcement and location-based advertisement etc., Chinese mugwort matchmaker's advisory data show that, by the second quarter in 2012, China mobile phone LBS adds up
User, which reaches 2.17 hundred million, LBS, already becomes an interesting and useful new industry in mobile Internet.Location Based service
It is required that user to location Based service device when proposing service request, it is necessary to the position of itself is provided to location Based service device
Confidence ceases, and server handles location-based inquiry that user proposes and by query result according to the positional information that user provides
Return to user.Although location Based service and location technology provide great convenience for mobile subscriber, position is based on
Server need first to obtain the positional information of mobile subscriber corresponding service could be provided mobile subscriber, it is and location-based
Service system does not ensure that server is not revealed or illegally uses the positional information of user.Therefore, location Based service is given
The location privacy protection of user brings great challenge:User needs to obtain high quality on the premise of privacy information is not exposed
Service.
Existing location privacy protection method is mainly the following:
1) K hides method (K-anonymity):K- anonymous methods was proposed by Sweeney in 2002, was a kind of extensive use
The technology of data-privacy protection in data publication.This method carries out the non-sensitive attribute of every record extensive so that hair
Every record in data after cloth all cannot be at least distinguished with mono- 1 records of other k.All non-sensitive property values are identical
The collection of record be collectively referred to as an equivalence class.K- anonymous methods has been cut off in some individual and database between certain physical record
Contact, protect the privacies of data to a certain extent.
2) Mixed Zone (Mix Zone):Beresford and Stajano proposes this important identity guarantor of Mix Zone
Maintaining method, the method define two kinds of region:Application region and Mixed Zone.The region of both types is all one
Area of space.In application region, user can propose service request and receive information on services;But in Mixed Zone, user
There is no any communication.The validity of this method is user's pseudonymity.In order to preferably protect the location privacy of user, use
Family is using same assumed name no more than the regular hour.
3) position Anonymizer:Mokbel proposes a kind of location privacy protection problem that can handle a large amount of concurrent users
Method.This method combines two methods of k- anonymous and the thought of compartmentalization positional information and introduces a third party --- position
Put Anonymizer.Before the accurate location information of user is sent to server, position Anonymizer will be used using the thought of k- anonymities
The accurate location information at family is substituted for an area of space so that proposes the user of service request in the area of space at least not
It can be distinguished with other k-1 users.In server end, there is provided one to be capable of looking into for processing space site polling at the same time
Processor is ask, the area of space for being supplied to server according to position Anonymizer is inquired about, and query result Candidate Set is returned
To user.
However, there are following problem for the location privacy protection method of the above:
1st, in the data that K anonymous methods requires to issue availability of data is reduced there are certain amount.At the same time using extensive
Technology will cause the bulk information in initial data to be lost;
2nd, the anonymity used in the method for Mixed Zone brings obstacle to authentication and personalization, while to user's space
Region there are certain requirements, and real-time can not ensure;
3rd, since third party is fly-by-night in the Anonymizer of position, it may be revealed is collected into from each data source
Information, so as to jeopardize the privacy of data.Time-consuming for the user of third-party server processing at the same time request, to server requirement
Height, real-time are poor.
The content of the invention
For the disadvantages described above or Improvement requirement of the prior art, the present invention provides a kind of position based on granularity control is hidden
Private guard method and system, it is intended that personalization is poor, efficiency is low, real-time is poor, can not present in solution existing method
Believe the technical problem that third party relies on, and its location privacy classification mechanism provided can efficiently use the position letter of mobile equipment
Breath, the customization service of personalization is provided for LBS application programs, real-time and efficiently protects the location privacy of user, and completely not
Rely on any third party.
To achieve the above object, a kind of one side according to the invention, there is provided location privacy based on granularity control
Guard method, comprises the following steps:
(1) judge whether be stored with a LBS the application list in mobile equipment, it is no if being then transferred to step (2)
A LBS the application list is then created, is then transferred to step (2);
(2) privacy class is set for each LBS application programs, it corresponds to the position that the LBS application programs will obtain
Accuracy, and judge whether there are privacy policy storehouse in mobile equipment, and if so, being transferred to step (4), otherwise turn
Enter step (3);
(3) privacy policy storehouse is established in a mobile device;
(4) it is lasting to monitor the LBS requests for coming from LBS application programs, and obtained and the LBS when receiving LBS requests
Corresponding positional information is asked, and indicates which LBS application program it comes from LBS requests;
(5) the corresponding position precision of LBS application programs is read from privacy policy storehouse, and according to the position precision
Determine whether to carry out Fuzzy processing to the positional information, be transferred to step (6) if necessary, be otherwise transferred to step (7);
(6) corresponding positional information and the corresponding position precision of the LBS application programs is asked to obtain according to the LBS
Fuzz locating information,
(7) fuzz locating information is returned into LBS application programs, and return to step (4).
Preferably, step (3) using SQL database specifically, establish a table as privacy policy storehouse, wherein being stored with
Mapping relations between all LBS application programs and its corresponding position precision.
Preferably, LBS asks corresponding positional information to ask corresponding longitude and latitude information for the LBS.
Preferably, the process for a LBS the application list being created in step (1) includes following sub-step:
All application programs in the mobile equipment of (1-1) scanning, to obtain the authority information of each application program;
(1-2) sets counter i=1;
(1-3) searches whether to meet LBS application features in the authority information of i-th of application program of acquisition
Authority, if being then transferred to step (1-4), is otherwise transferred to step (1-5);
The application program is added in LBS the application lists by (1-4);
(1-5) sets counter i=i+1, and judges whether i is equal to the sum of application program, and if it is process terminates,
Otherwise return to step (1-3).
Preferably, position precision includes Precise order, architectural grade, street-level and cities and towns level.
Preferably, step (6) includes following sub-step:
(6-1) receives the LBS and asks corresponding positional information, its longitude is x, latitude y;
(6-2) generates angle [alpha] at random, its value is 0 ° of 360 ° of < α <;
(6-3) is according to the corresponding position precision generation radius R of LBS application programs;Specifically, for position precision
For architectural grade, its radius R value ranges are 90m≤R≤100m;For position precision for street-level, its radius R values
Scope is 900m≤R≤1.1km;It is cities and towns level for position precision, its radius R value ranges are 9km≤R≤11km;
(6-4) uses x and y, as variable, new fuzz locating information x ' to be generated using trigonometric function as origin, α and R
And y ';
The fuzz locating information is returned to LBS application programs by (6-5).
It is another aspect of this invention to provide that a kind of location privacy protection system based on granularity control is provided, including:
First module, for judging whether be stored with a LBS the application list in mobile equipment, if being then transferred to
Second module, otherwise creates a LBS the application list, is then transferred to the second module;
Second module, for setting privacy class for each LBS application programs, it will corresponding to the LBS application programs
The position precision of acquisition, and judge whether there are privacy policy storehouse in mobile equipment, and if so, being transferred to the 4th
Module, is otherwise transferred to the 3rd module;
3rd module, for establishing privacy policy storehouse in a mobile device;
4th module, the LBS requests of LBS application programs are come from for persistently monitoring, and are obtained when receiving LBS requests
Take with the corresponding positional information of LBS requests, and the LBS request in indicate which LBS application program it comes from;
5th module, for reading the corresponding position precision of LBS application programs from privacy policy storehouse, and according to this
Position precision determines whether to carry out Fuzzy processing to the positional information, is transferred to the 6th module if necessary, otherwise turns
Enter the 7th module;
6th module, for asking corresponding positional information and the corresponding position of LBS application programs according to the LBS
Accuracy obtains fuzz locating information,
7th module, for the fuzz locating information to be returned to LBS application programs, and returns to the 4th module.
In general, by the contemplated above technical scheme of the present invention compared with prior art, it can obtain down and show
Beneficial effect:
1. the location privacy protection mode based on granularity of design:According to the characteristics of location information data, the present invention carries first
Go out and be classified privacy information, be no longer it is simple and crude by positional information to or not to application program, but can according to
The demand at family assigns the right that application program accesses positional information to some extent.The present invention is because employ step (2) and step
Suddenly (3), can solve the problem of availability of data is low, and the bulk information in initial data is lost, personalized difference.Position at the same time
Privacy classification is otherwise using intuitively Precise order, architectural grade, block level, street-level and cities and towns level etc. so that Yong Hugeng
The protection that location privacy is subject to can be realized;
2. real time position secret protection:It is poor can to solve real-time because employing step (5) and step (6) by the present invention
The problem of.Need not again as meeting some condition in traditional method after, positional information could be handled, and positional information is cut
After obtaining, it is blurred immediately by position processing module, this process need to only perform a few row instruction codes, spent time
It is minimum, application service end is immediately sent to after processing, user can not almost experience the delay that processing procedure is brought;
3. break away from third party's dependence, easily deployment:The present invention can solve the 3rd because employing step (1) and step (3)
The problem of side relies on.User breaks away from the trouble and worry for fearing that third-party server steals oneself location privacy, privacy safe to use
Protection system.In addition brush machine refitting system is not required in system, can be used after installation, convenient and efficient, for following market
There is good prospect.
4. privacy policy custom model:The present invention provided to the user privacy customization service, user can according to itself
Needing to assign the different privacy class of application program, (for example navigation application is arranged to higher privacy class, weather forecast application
It is arranged to relatively low), simultaneity factor analyzes application program common on mass market, forms the privacy class strategy for recommending acquiescence
Storehouse, to wonder that the user of attention provides strong help;
5. local privacy policy protection:Present system size of code is small, and executive overhead is low, the processing operation to positional information
In local completion, very little is born caused by original resource with regard to limited mobile equipment, so as to more efficiently more permanent
Protect the location privacy of user in ground;
Brief description of the drawings
Fig. 1 is the flow chart of location privacy protection method of the present invention based on granularity control.
Fig. 2 is the refined flow chart of step in the method for the present invention (1).
Fig. 3 is the refined flow chart of step in the method for the present invention (6).
Fig. 4 is the configuring condition of this method LBS application programs different on to mobile equipment.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.As long as in addition, technical characteristic involved in each embodiment of invention described below
Not forming conflict each other can be mutually combined.
As shown in Figure 1, location privacy protection method of the present invention based on granularity control comprises the following steps:
(1) judge whether be stored with a LBS the application list in mobile equipment, it is no if being then transferred to step (2)
A LBS the application list is then created, is then transferred to step (2);
(2) privacy class is set for each LBS application programs, it corresponds to the position that the LBS application programs will obtain
Accuracy, and judge whether there are privacy policy storehouse in mobile equipment, and if so, being transferred to step (4), otherwise turn
Enter step (3);Specifically, position precision includes Precise order, architectural grade, street-level and cities and towns level;
(3) privacy policy storehouse is established in a mobile device;Specifically, a table is established using SQL database, which is
For privacy policy storehouse, wherein being stored with the mapping relations between all LBS application programs and its corresponding position precision;
(4) it is lasting to monitor the LBS requests for coming from LBS application programs, and obtained and the LBS when receiving LBS requests
Corresponding positional information is asked, and indicates which LBS application program it comes from LBS requests;Specifically, position is believed
Breath is that the LBS asks corresponding longitude and latitude information;
(5) the corresponding position precision of LBS application programs is read from privacy policy storehouse, and according to the position precision
Determine whether to carry out Fuzzy processing to the positional information, be transferred to step (6) if necessary, be otherwise transferred to step (7);Tool
For body, if the position precision is Precise order, Fuzzy processing need not be carried out to the positional information, otherwise then needed
Fuzzy processing is carried out to the positional information;
(6) corresponding positional information and the corresponding position precision of the LBS application programs is asked to obtain according to the LBS
Fuzz locating information,
(7) fuzz locating information is returned into LBS application programs, and return to step (4).
As shown in Fig. 2, the process of a LBS the application list is created in the step of the method for the present invention (1) including following
Sub-step:
All application programs in the mobile equipment of (1-1) scanning, to obtain the authority of each application program
(permission) information;
(1-2) sets counter i=1;
(1-3) searches whether to meet LBS application features in the authority information of i-th of application program of acquisition
Authority, if being then transferred to step (1-4), is otherwise transferred to step (1-5);Specifically, the power of LBS application features is met
Limit entitled ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION or ACCESS_LOCATION_EXTRA_
COMMANDS;
The application program is added in LBS the application lists by (1-4);
(1-5) sets counter i=i+1, and judges whether i is equal to the sum of application program, and if it is process terminates,
Otherwise return to step (1-3).
As shown in figure 4, the step (6) of the present invention includes following sub-step:
(6-1) receives the LBS and asks corresponding positional information, its longitude is x, latitude y;
(6-2) generates angle [alpha] at random, its value is 0 ° of 360 ° of < α <;
(6-3) is according to the corresponding position precision generation radius R of LBS application programs;Specifically, for position precision
For architectural grade, its radius R value ranges are 90m≤R≤100m;For position precision for street-level, its radius R values
Scope is 900m≤R≤1.1km;It is cities and towns level for position precision, its radius R value ranges are 9km≤R≤11km;
(6-4) uses x and y, as variable, new fuzz locating information x ' to be generated using trigonometric function as origin, α and R
And y ';
The fuzz locating information is returned to LBS application programs by (6-5).
Illustrate the configuring condition of this method LBS application programs different on to mobile equipment below.
We devise the policy library of protection customer location privacy in strategy protocol.Policy library is divided into two parts, one
It is default setting strategy to divide, and another part is self-defined setting strategy.Self-defined setting strategy is that user is provided in system
What is set on user interface each applies corresponding privacy class, and same is also classified into life kind, social class, navigation type three
Classification.After User Defined designs certain LBS application program as certain rank, its application name is added to corresponding classification by strategy
In list.In LBS application requests geographical location privacy, whole user-defined data table is scanned first, if match hit, puts back to phase
The positional information rank of rank is answered, if match hit, then scans default setting strategy.Default setting strategy is according to position plan
Slightly scheme, initialization assignment is carried out to common LBS application programs.Some common LBS application programs are categorized into often by we
In one row.When the LBS application requests geographical location privacy, if not matching life in self-defined setting strategy
In, then scanning default setting strategy one by one, each is arranged, and the positional information rank of appropriate level is put back to if match hit, if not
Match hit then returns to most rough cities and towns level position information.
Location privacy protection method of the present invention based on granularity control, it can not only allow user to enjoy cloud storage to the full and bring
Service, and can protect customer location privacy information not compromised to greatest extent.The present invention is by by location privacy number
Be supplied to LBS application programs according to different ranks is divided into, do not depend on it is any it is third-party in the case of, to the exact position of user
Privacy information is protected in real time, and user need not worry that the precise position information of oneself is leaked to attacker or malice again
ISP, while ensure the user experience of LBS application services.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to
The limitation present invention, all any modification, equivalent and improvement made within the spirit and principles of the invention etc., should all include
Within protection scope of the present invention.
Claims (5)
1. a kind of location privacy protection method based on granularity control, it is characterised in that comprise the following steps:
(1) judge whether be stored with a LBS the application list in mobile equipment, if being then transferred to step (2), otherwise create
A LBS the application list is built, is then transferred to step (2);
(2) privacy class is set for each LBS application programs, it is accurate that it corresponds to the position that the LBS application programs will obtain
Degree, and judge whether there are privacy policy storehouse in mobile equipment, and if so, being transferred to step (4), otherwise it is transferred to step
Suddenly (3);
(3) privacy policy storehouse is established in a mobile device;
(4) it is lasting to monitor the LBS requests for coming from LBS application programs, and obtain when receiving LBS requests and asked with the LBS
Corresponding positional information, and indicate which LBS application program it comes from LBS requests;
(5) the corresponding position precision of LBS application programs is read from privacy policy storehouse, and is judged according to the position precision
Whether Fuzzy processing is carried out to the positional information, be transferred to step (6) if necessary, be otherwise transferred to step (7);
(6) corresponding positional information and the corresponding position precision of LBS application programs is asked to be obscured according to the LBS
Positional information, wherein, position precision includes Precise order, architectural grade, street-level and cities and towns level;
Step (6) includes following sub-step:
(6-1) receives the LBS and asks corresponding positional information, its longitude is x, latitude y;
(6-2) generates angle [alpha] at random, its value is 0 ° of 360 ° of < α <;
(6-3) is according to the corresponding position precision generation radius R of LBS application programs;Specifically, it is to build for position precision
Level is built, its radius R value ranges are 90m≤R≤100m;For position precision for street-level, its radius R value ranges
It is 900m≤R≤1.1km;It is cities and towns level for position precision, its radius R value ranges are 9km≤R≤11km;
(6-4) uses x and y as origin, α and R as variable, using trigonometric function generate new fuzz locating information x ' and
y’;
The fuzz locating information is returned to LBS application programs by (6-5);
(7) fuzz locating information is returned into LBS application programs, and return to step (4).
2. location privacy protection method according to claim 1, it is characterised in that step (3) is specifically, use SQL numbers
Establish a table as privacy policy storehouse according to storehouse, wherein be stored with all LBS application programs position precision corresponding with its it
Between mapping relations.
3. location privacy protection method according to claim 1, it is characterised in that LBS asks the corresponding positional information to be
The LBS asks corresponding longitude and latitude information.
4. location privacy protection method according to claim 1, it is characterised in that a LBS application is created in step (1)
The process of program listing includes following sub-step:
All application programs in the mobile equipment of (1-1) scanning, to obtain the authority information of each application program;
(1-2) sets counter i=1;
(1-3) searches whether the power for meeting LBS application features in the authority information of i-th of application program of acquisition
Limit, if being then transferred to step (1-4), is otherwise transferred to step (1-5);
The application program is added in LBS the application lists by (1-4);
(1-5) sets counter i=i+1, and judges whether i is equal to the sum of application program, and if it is process terminates, otherwise
Return to step (1-3).
A kind of 5. location privacy protection system based on granularity control, it is characterised in that including:
First module, for judging whether be stored with a LBS the application list in mobile equipment, if being then transferred to second
Module, otherwise creates a LBS the application list, is then transferred to the second module;
Second module, for setting privacy class for each LBS application programs, it, which corresponds to the LBS application programs, to obtain
Position precision, and judge whether there are privacy policy storehouse in mobile equipment, and if so, be transferred to the 4th module,
Otherwise it is transferred to the 3rd module;
3rd module, for establishing privacy policy storehouse in a mobile device;
4th module, come from for persistently monitoring LBS application programs LBS request, and receive LBS request when obtain with
The LBS asks corresponding positional information, and indicates which LBS application program it comes from LBS requests;
5th module, for reading the corresponding position precision of LBS application programs from privacy policy storehouse, and according to the position
Accuracy determines whether to carry out Fuzzy processing to the positional information, is transferred to the 6th module if necessary, is otherwise transferred to the
Seven modules;
6th module, for asking corresponding positional information and the corresponding position of LBS application programs accurate according to the LBS
Degree obtains fuzz locating information, wherein, position precision includes Precise order, architectural grade, street-level and cities and towns level;
6th module is specifically used for performing following operation:
(6-1) receives the LBS and asks corresponding positional information, its longitude is x, latitude y;
(6-2) generates angle [alpha] at random, its value is 0 ° of 360 ° of < α <;
(6-3) is according to the corresponding position precision generation radius R of LBS application programs;Specifically, it is to build for position precision
Level is built, its radius R value ranges are 90m≤R≤100m;For position precision for street-level, its radius R value ranges
It is 900m≤R≤1.1km;It is cities and towns level for position precision, its radius R value ranges are 9km≤R≤11km;
(6-4) uses x and y as origin, α and R as variable, using trigonometric function generate new fuzz locating information x ' and
y’;
The fuzz locating information is returned to LBS application programs by (6-5);
7th module, for the fuzz locating information to be returned to LBS application programs, and returns to the 4th module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410634786.2A CN104581625B (en) | 2014-11-12 | 2014-11-12 | A kind of location privacy protection method and system based on granularity control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410634786.2A CN104581625B (en) | 2014-11-12 | 2014-11-12 | A kind of location privacy protection method and system based on granularity control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104581625A CN104581625A (en) | 2015-04-29 |
CN104581625B true CN104581625B (en) | 2018-04-24 |
Family
ID=53096632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410634786.2A Active CN104581625B (en) | 2014-11-12 | 2014-11-12 | A kind of location privacy protection method and system based on granularity control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104581625B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106331035A (en) * | 2015-06-30 | 2017-01-11 | 北京壹人壹本信息科技有限公司 | Tracking prevention method and terminal |
CN105072259A (en) * | 2015-07-20 | 2015-11-18 | 清华大学深圳研究生院 | Method for preventing the geographic position of a mobile terminal from leaking |
CN105184149B (en) * | 2015-08-11 | 2018-07-06 | 广东欧珀移动通信有限公司 | A kind of method and system for preventing rogue program from frequently obtaining customer position information |
CN106295396A (en) * | 2016-07-29 | 2017-01-04 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
KR20180067139A (en) * | 2016-12-12 | 2018-06-20 | 삼성전자주식회사 | Electronic device and method for providing location information |
CN106850634A (en) * | 2017-02-13 | 2017-06-13 | 上海斐讯数据通信技术有限公司 | A kind of position service method and system based on safe class |
WO2019051685A1 (en) * | 2017-09-13 | 2019-03-21 | 深圳传音通讯有限公司 | Location information protecting method of terminal, terminal, and computer readable storage medium |
CN108012233A (en) * | 2017-12-05 | 2018-05-08 | 北京元心科技有限公司 | Method and apparatus for providing location services |
CN108566373B (en) * | 2018-03-06 | 2020-06-12 | 清华大学 | Location information publishing system for protecting user privacy |
CN109714766B (en) * | 2019-01-31 | 2022-06-03 | 顺丰科技有限公司 | Position sharing method and device |
CN109905386A (en) * | 2019-02-20 | 2019-06-18 | 徐建红 | A kind of station address protection system and its working method based on user information safety |
CN111083629A (en) * | 2019-05-13 | 2020-04-28 | 中兴通讯股份有限公司 | Positioning method and device based on binary periodic sequence |
CN111737737A (en) * | 2020-06-10 | 2020-10-02 | 西北工业大学 | Privacy protection method for fine-grained position fuzzy measurement facing mobile crowd sensing |
CN112329060A (en) * | 2020-11-05 | 2021-02-05 | 华为技术有限公司 | Privacy information generation method and terminal equipment |
CN113805140B (en) * | 2021-08-12 | 2022-10-28 | 荣耀终端有限公司 | Positioning method and electronic equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7088237B2 (en) * | 2003-02-14 | 2006-08-08 | Qualcomm Incorporated | Enhanced user privacy for mobile station location services |
WO2010083654A1 (en) * | 2009-01-23 | 2010-07-29 | 阿尔卡特朗讯公司 | Method and related device for realizing protection of the privacy of user location information |
-
2014
- 2014-11-12 CN CN201410634786.2A patent/CN104581625B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN104581625A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104581625B (en) | A kind of location privacy protection method and system based on granularity control | |
EP1220510B1 (en) | Method and system for context-aware network policy determination and enforcement | |
US10178548B2 (en) | Method for protecting terminal location information and intelligent terminal | |
US20150281382A1 (en) | Group creating and joining method, client, server , and system | |
US9578457B2 (en) | Privacy-based device location proximity | |
US8874594B2 (en) | Search with my location history | |
Dewri et al. | Exploiting service similarity for privacy in location-based search queries | |
US20140129693A1 (en) | Zone Oriented Applications, Systems and Methods | |
US20140195664A1 (en) | Zone Oriented Applications, Systems and Methods | |
US20150033330A1 (en) | Collection and analysis of customer data from application programming interface usage | |
WO2014042556A1 (en) | System for performing a personalized information search | |
JP5849155B2 (en) | User content acquisition method and acquisition system | |
CN111402400A (en) | Pipeline engineering display method, device, equipment and storage medium | |
CN111190950A (en) | Asset retrieval method and device | |
Tadakaluru | Context optimized and spatial aware dummy locations generation framework for location privacy | |
CN106888433B (en) | Identical service request position privacy protection method based on Thiessen polygon | |
CN108920973A (en) | The method and apparatus of query information in location based service | |
WO2014169498A1 (en) | Method and system for third-party service platform login | |
CN110489669B (en) | Information pushing method and device | |
Miura et al. | A hybrid method of user privacy protection for location based services | |
US9449110B2 (en) | Geotiles for finding relevant results from a geographically distributed set | |
Zhao et al. | EPLA: efficient personal location anonymity | |
CN105577614A (en) | Anonymous information issuing processing method, apparatus, and system, and terminal | |
CN105574438B (en) | Privacy of user guard method and system | |
CN113923184A (en) | IP positioning reference point extraction method, device and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |