CN104462285A - Privacy protection method for mobile service inquiry system - Google Patents
Privacy protection method for mobile service inquiry system Download PDFInfo
- Publication number
- CN104462285A CN104462285A CN201410699891.4A CN201410699891A CN104462285A CN 104462285 A CN104462285 A CN 104462285A CN 201410699891 A CN201410699891 A CN 201410699891A CN 104462285 A CN104462285 A CN 104462285A
- Authority
- CN
- China
- Prior art keywords
- user
- solution software
- mobile solution
- mobile
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2468—Fuzzy queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Physics (AREA)
- Fuzzy Systems (AREA)
- Computer Security & Cryptography (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Probability & Statistics with Applications (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Telephonic Communication Services (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a privacy protection method for a mobile service inquiry system. A user sets a privacy protection mode in mobile application software; according to the privacy protection mode, the user or the mobile application software sets a fuzzy grade; the user sends an information search request to a service provider through the mobile application software, the mobile application software conducts fuzzification on the information search request according to the fuzzy grade, and the fuzzified information search request is sent to the service provider; the service provider processes the fuzzified information search request and returns information search results to the mobile application software; the mobile application software screens the information search results and returns information expected by the user to the user. By means of the method, even if the information search request is intercepted by an attacker, the attacker cannot easily grasp an original information inquiry intention of the user, the possibility that tracks of the user are exposed is reduced, and inquiry privacy of the user is protected effectively.
Description
Technical field
The present invention relates to individual privacy protection field, more specifically, relate to a kind of method for secret protection of Information Mobile Service inquiry system.
Background technology
Information Mobile Service inquiry system is the necessity of the current such as mobile terminal such as mobile phone, panel computer application, and it can provide inquiry service and relevent information easily to people whenever and wherever possible.Such as, the inquiry location Based service such as hospital, restaurant, refuelling station, market nearby.The service of this type is exactly that the inquiry request of oneself is sent to server by user, and server according to type service and the inquiry request of user, returns the data query required for user again.This service, while bringing great advantage to the user, also also exists the incomplete defect of secret protection, and assailant can intercept and capture the inquiry request content of user, so just likely exposes whereabouts and the place to go of user.
Summary of the invention
The present invention, for overcoming the incomplete defect of secret protection described in above-mentioned prior art, provides a kind of method for secret protection effectively can avoiding the Information Mobile Service inquiry system of privacy leakage.
For solving the problems of the technologies described above, technical scheme of the present invention is as follows:
A kind of method for secret protection of Information Mobile Service inquiry system; described method is applied to Information Mobile Service inquiry system; in described Information Mobile Service inquiry system; user sends retrieving information request by Mobile solution software to service provider; the result of service provider return message retrieval, said method comprising the steps of:
S1: user sets privacy protection mode in Mobile solution software;
S2: according to privacy protection mode, is set fuzzy class by user or Mobile solution software;
S3: user sends retrieving information request by Mobile solution software to service provider, and Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request, and the retrieving information request of obfuscation is sent to service provider;
S4: the retrieving information request of service provider to obfuscation processes, and the result of information retrieval is returned to Mobile solution software;
S5: the result of Mobile solution software to information retrieval is screened, returns to user by the information that user expects.
In the preferred scheme of one, described Mobile solution software stores local semantic ambiguity data, and local semantic ambiguity data are divided into m class, comprises n respectively in each class data
1, n
2..., n
mindividual data, wherein m, n
1, n
2..., n
mfor positive integer.
In the preferred scheme of one, in step S3, described Mobile solution software according to fuzzy class to the method that obfuscation is carried out in retrieving information request is: the local semantic ambiguity data that Mobile solution software chooses some quantity according to fuzzy class are added in retrieving information request, generate the request of k bar retrieving information, k be greater than 1 integer.
In the preferred scheme of one; described privacy protection mode comprises User Defined pattern; under User Defined pattern; user independently sets fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q; k=m*q, wherein q is positive integer.
In the preferred scheme of one; described privacy protection mode comprises system self-adaption and recommends pattern; under system self-adaption recommendation pattern; the Mobile solution software network condition current according to user sets fuzzy class q automatically; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q; k=m*q, wherein q is positive integer.
In the preferred scheme of one; described privacy protection mode comprises intelligent mode; under intelligent mode; the fuzzy class p that Mobile solution software sets according to user and the current network condition s of user comprehensively determines fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q=(p*s)/ɑ; ɑ is constant, and p, s and q are positive integer.
In the preferred scheme of one, described method also comprises: in step S3, described Mobile solution software stores historical search record, the retrieving information request that user sends searched by Mobile solution software in historical search record, if find identical retrieving information request, then the information that the user of correspondence expects is returned to user.
In the preferred scheme of one, described method also comprises: in step S5, and the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record.
Compared with prior art; the beneficial effect of technical solution of the present invention is: the method for secret protection of Information Mobile Service inquiry system of the present invention; Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request; and the retrieving information request of obfuscation is sent to service provider; even if retrieving information request victim is intercepted and captured; assailant also cannot crack the original information inquiry intention of user easily; this reduces the possibility that user's whereabouts expose, effectively protect the inquiry privacy of user.
The method for secret protection of Information Mobile Service inquiry system of the present invention, comprise User Defined pattern, system self-adaption recommends pattern and intelligent mode, this Three models according to the number k of retrieving information request after the setting of user or the current network condition setting obfuscation of user, can average out between network data exchange amount and secret protection intensity; And in the present invention, the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record, when user sends same retrieving information request again, Mobile solution software is without the need to sending request to service provider, but directly the information that the user of correspondence expects is returned to user, reduce further the expense of network data and the risk of privacy leakage.
Accompanying drawing explanation
Fig. 1 is the local semantic ambiguity nomogram of embodiment 1.
Fig. 2 is the process flow diagram of the method for secret protection of embodiment 1 Information Mobile Service inquiry system.
The schematic diagram that Fig. 3 is under User Defined pattern, system self-adaption recommends pattern and intelligent mode.
Fig. 4 is that User Defined pattern and system self-adaption recommend mode effects analogous diagram.
Fig. 5 is the effect emulation figure of intelligent mode.
Embodiment
Accompanying drawing, only for exemplary illustration, can not be interpreted as the restriction to this patent; To those skilled in the art, in accompanying drawing, some known features and explanation thereof may be omitted is understandable.
Below in conjunction with drawings and Examples, technical scheme of the present invention is described further.
Embodiment 1
As shown in Figure 1; a kind of method for secret protection of Information Mobile Service inquiry system; described method is applied to Information Mobile Service inquiry system; in described Information Mobile Service inquiry system; user sends retrieving information request by Mobile solution software to service provider; the result of service provider return message retrieval; described Mobile solution software stores local semantic ambiguity data; as shown in Figure 1; local semantic ambiguity data are divided into m class; as class of doing shopping, amusement and recreation class, service for life class etc., in each class data, comprise n respectively
1, n
2..., n
mindividual data, as contained clothes footwear bag, Jewelry Accessories, food tea, florist's shop etc., wherein m, n in shopping class
1, n
2..., n
mfor positive integer, as shown in Figure 2, said method comprising the steps of:
S1: user sets privacy protection mode in Mobile solution software, privacy protection mode comprises User Defined pattern, system self-adaption recommends pattern and intelligent mode.
S2: according to privacy protection mode, is set fuzzy class by user or Mobile solution software.
S3: user sends retrieving information request by Mobile solution software to service provider, the present embodiment asks to retrieve hospital for user.Mobile solution software stores historical search record, and the retrieving information request of hospital searched by Mobile solution software in historical search record, if find the retrieving information request of hospital, then the information that the user of correspondence expects is returned to user; If do not find the retrieving information request of hospital, the local semantic ambiguity data that then Mobile solution software chooses some quantity according to fuzzy class are added in retrieving information request, generate the request of k bar retrieving information, k be greater than 1 integer, and the retrieving information request of obfuscation is sent to service provider, as shown in Figure 3, concrete mode is as follows:
Under User Defined pattern, user independently sets fuzzy class q, and Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, and wherein q is positive integer;
Under system self-adaption recommendation pattern, the Mobile solution software network condition current according to user sets fuzzy class q automatically, Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, and wherein q is positive integer;
Under intelligent mode, the fuzzy class p that Mobile solution software sets according to user and the current network condition s of user comprehensively determines fuzzy class q, Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q=(p*s)/ɑ, ɑ is constant, and p, s and q are positive integer.
Such as, if m=3, q=4, then arbitrary extracting 4 data in the local semantic ambiguity data of each class, wherein must comprise the hospital position that user inquires about, and generate the request of k bar retrieving information, k=m*q=12, wherein except the inquiry of all the other 11, hospital position is all pseudo-inquiry, even if retrieving information request victim is intercepted and captured like this, assailant also cannot crack the original information inquiry intention of user easily.
S4: the retrieving information request of service provider to obfuscation processes, and the result of information retrieval is returned to Mobile solution software;
S5: the result of Mobile solution software to information retrieval is screened, by the information that user expects, namely the information of hospital returns to user, and meanwhile, the retrieving information request of hospital and the information of hospital are generated one group of mapping relations by Mobile solution software to be carried out being stored into historical search record.
The method for secret protection of the present embodiment Information Mobile Service inquiry system can be assessed from the angle of information entropy, and for described method, the formula of information entropy is as follows:
Can abbreviation be:
, wherein H represents information entropy, and k represents the number of retrieving information request after obfuscation, and Fig. 4 is that User Defined pattern and system self-adaption recommend mode effects analogous diagram, and transverse axis is fuzzy class q, span 1 ~ 5, and the longitudinal axis is information entropy H.As seen from Figure 4, along with the increase of fuzzy class, information entropy also increases thereupon, and what which illustrate that fuzzy class determines pseudo-inquiry obscures degree, and obscure degree higher, described method for secret protection is better to the protected effect of real information.
Fig. 5 is the effect emulation figure of intelligent mode, and transverse axis is the fuzzy class p that user sets, span 1 ~ 5, and the longitudinal axis is information entropy H, behalf network condition, span 1 ~ 5.As seen from Figure 5, no matter under which kind of network condition s, along with the lifting of the fuzzy class p of user's setting, information entropy H is increasing trend; When the fuzzy class p of user's setting is definite value, along with the rising of network condition grade s, information entropy H is also corresponding to be increased.In conjunction with this 2 point, Fig. 5 describes, and when user is when network environment is good, system can provide better secret protection to inquiry request voluntarily; Otherwise when the network environment residing for user is poor, system can corresponding reduction protection class, exchanges the balance of search efficiency for.
The method for secret protection of the present embodiment Information Mobile Service inquiry system; Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request; and the retrieving information request of obfuscation is sent to service provider; even if retrieving information request victim is intercepted and captured; assailant also cannot crack the original information inquiry intention of user easily; this reduces the possibility that user's whereabouts expose, effectively protect the inquiry privacy of user.
The method for secret protection of the present embodiment Information Mobile Service inquiry system, comprise User Defined pattern, system self-adaption recommends pattern and intelligent mode, this Three models according to the number k of retrieving information request after the setting of user or the current network condition setting obfuscation of user, can average out between network data exchange amount and secret protection intensity; And in the present embodiment, the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record, when user sends same retrieving information request again, Mobile solution software is without the need to sending request to service provider, but directly the information that the user of correspondence expects is returned to user, reduce further the expense of network data and the risk of privacy leakage.
The corresponding same or analogous parts of same or analogous label; The term describing position relationship in accompanying drawing, only for exemplary illustration, can not be interpreted as the restriction to this patent; Obviously, the above embodiment of the present invention is only for example of the present invention is clearly described, and is not the restriction to embodiments of the present invention.For those of ordinary skill in the field, can also make other changes in different forms on the basis of the above description.Here exhaustive without the need to also giving all embodiments.All any amendments done within the spirit and principles in the present invention, equivalent to replace and improvement etc., within the protection domain that all should be included in the claims in the present invention.
Claims (8)
1. the method for secret protection of an Information Mobile Service inquiry system; described method is applied to Information Mobile Service inquiry system; in described Information Mobile Service inquiry system; user sends retrieving information request by Mobile solution software to service provider; the result of service provider return message retrieval; it is characterized in that, said method comprising the steps of:
S1: user sets privacy protection mode in Mobile solution software;
S2: according to privacy protection mode, is set fuzzy class by user or Mobile solution software;
S3: user sends retrieving information request by Mobile solution software to service provider, and Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request, and the retrieving information request of obfuscation is sent to service provider;
S4: the retrieving information request of service provider to obfuscation processes, and the result of information retrieval is returned to Mobile solution software;
S5: the result of Mobile solution software to information retrieval is screened, returns to user by the information that user expects.
2. the method for secret protection of Information Mobile Service inquiry system according to claim 1, is characterized in that, described Mobile solution software stores local semantic ambiguity data, and local semantic ambiguity data are divided into m class, comprises n respectively in each class data
1, n
2..., n
mindividual data, wherein m, n
1, n
2..., n
mfor positive integer.
3. the method for secret protection of Information Mobile Service inquiry system according to claim 2; it is characterized in that; in step S3; described Mobile solution software according to fuzzy class to the method that obfuscation is carried out in retrieving information request is: the local semantic ambiguity data that Mobile solution software chooses some quantity according to fuzzy class are added in retrieving information request; generate the request of k bar retrieving information, k be greater than 1 integer.
4. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that; described privacy protection mode comprises User Defined pattern; under User Defined pattern; user independently sets fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q is positive integer.
5. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that; described privacy protection mode comprises system self-adaption and recommends pattern; under system self-adaption recommendation pattern; the Mobile solution software network condition current according to user sets fuzzy class q automatically; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q is positive integer.
6. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that; described privacy protection mode comprises intelligent mode; under intelligent mode; the fuzzy class p that Mobile solution software sets according to user and the current network condition s of user comprehensively determines fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q; k=m*q; wherein q=(p*s)/ɑ; ɑ is constant, and p, s and q are positive integer.
7. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that described method also comprises: in step S3; described Mobile solution software stores historical search record; the retrieving information request that user sends searched by Mobile solution software in historical search record; if find identical retrieving information request, then the information that the user of correspondence expects is returned to user.
8. the method for secret protection of Information Mobile Service inquiry system according to claim 7; it is characterized in that; described method also comprises: in step S5, and the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410699891.4A CN104462285B (en) | 2014-11-28 | 2014-11-28 | A kind of method for secret protection of Information Mobile Service inquiry system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410699891.4A CN104462285B (en) | 2014-11-28 | 2014-11-28 | A kind of method for secret protection of Information Mobile Service inquiry system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104462285A true CN104462285A (en) | 2015-03-25 |
CN104462285B CN104462285B (en) | 2017-10-10 |
Family
ID=52908321
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410699891.4A Active CN104462285B (en) | 2014-11-28 | 2014-11-28 | A kind of method for secret protection of Information Mobile Service inquiry system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104462285B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017115168A1 (en) * | 2015-12-30 | 2017-07-06 | International Business Machines Corporation | Curtailing search engines from obtaining and controlling information |
CN107609419A (en) * | 2017-09-12 | 2018-01-19 | 温州大学瓯江学院 | A kind of digital library user browses preference method for secret protection and system |
CN107871086A (en) * | 2017-10-13 | 2018-04-03 | 平安科技(深圳)有限公司 | Sensitive information screen method, application server and computer-readable recording medium |
CN109492430A (en) * | 2018-10-30 | 2019-03-19 | 江苏东智数据技术股份有限公司 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
CN111083631A (en) * | 2019-12-02 | 2020-04-28 | 兰州交通大学 | Efficient query processing method for protecting location privacy and query privacy |
CN111143674A (en) * | 2019-12-20 | 2020-05-12 | 深圳前海微众银行股份有限公司 | Data processing method and device |
CN111414644A (en) * | 2020-03-18 | 2020-07-14 | 支付宝(杭州)信息技术有限公司 | Privacy protection query method based on block chain and block chain system |
CN111737737A (en) * | 2020-06-10 | 2020-10-02 | 西北工业大学 | Privacy protection method for fine-grained position fuzzy measurement facing mobile crowd sensing |
WO2021077860A1 (en) * | 2019-10-25 | 2021-04-29 | 华为技术有限公司 | Recommendation method and apparatus based on user private data, and medium and system |
WO2021114935A1 (en) * | 2019-12-11 | 2021-06-17 | 支付宝(杭州)信息技术有限公司 | Data sharing method and apparatus for personal information protection, and electronic device |
CN114598542A (en) * | 2022-03-21 | 2022-06-07 | 深圳市远行科技股份有限公司 | User information security processing method and device, intelligent terminal and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020087325A1 (en) * | 2000-12-29 | 2002-07-04 | Lee Victor Wai Leung | Dialogue application computer platform |
CN101682620A (en) * | 2007-05-24 | 2010-03-24 | 国际商业机器公司 | Mobile device with an obfuscated mobile device user identity |
US20110106830A1 (en) * | 2005-11-29 | 2011-05-05 | Cisco Technology, Inc. | Generating search results based on determined relationships between data objects and user connections to identified destinations |
CN102163230A (en) * | 2011-04-13 | 2011-08-24 | 浙江大学 | Method for implementing personalized information retrieval system for customizing privacy protection |
CN103279499A (en) * | 2013-05-09 | 2013-09-04 | 北京信息科技大学 | User privacy protection method in personalized information retrieval |
-
2014
- 2014-11-28 CN CN201410699891.4A patent/CN104462285B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020087325A1 (en) * | 2000-12-29 | 2002-07-04 | Lee Victor Wai Leung | Dialogue application computer platform |
US20110106830A1 (en) * | 2005-11-29 | 2011-05-05 | Cisco Technology, Inc. | Generating search results based on determined relationships between data objects and user connections to identified destinations |
CN101682620A (en) * | 2007-05-24 | 2010-03-24 | 国际商业机器公司 | Mobile device with an obfuscated mobile device user identity |
CN102163230A (en) * | 2011-04-13 | 2011-08-24 | 浙江大学 | Method for implementing personalized information retrieval system for customizing privacy protection |
CN103279499A (en) * | 2013-05-09 | 2013-09-04 | 北京信息科技大学 | User privacy protection method in personalized information retrieval |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017115168A1 (en) * | 2015-12-30 | 2017-07-06 | International Business Machines Corporation | Curtailing search engines from obtaining and controlling information |
US20190319988A1 (en) * | 2015-12-30 | 2019-10-17 | International Business Machines Corporation | Curtailing search engines from obtaining and controlling information |
US11916960B2 (en) * | 2015-12-30 | 2024-02-27 | International Business Machines Corporation | Curtailing search engines from obtaining and controlling information |
CN107609419A (en) * | 2017-09-12 | 2018-01-19 | 温州大学瓯江学院 | A kind of digital library user browses preference method for secret protection and system |
CN107871086A (en) * | 2017-10-13 | 2018-04-03 | 平安科技(深圳)有限公司 | Sensitive information screen method, application server and computer-readable recording medium |
CN109492430A (en) * | 2018-10-30 | 2019-03-19 | 江苏东智数据技术股份有限公司 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
WO2021077860A1 (en) * | 2019-10-25 | 2021-04-29 | 华为技术有限公司 | Recommendation method and apparatus based on user private data, and medium and system |
CN111083631A (en) * | 2019-12-02 | 2020-04-28 | 兰州交通大学 | Efficient query processing method for protecting location privacy and query privacy |
WO2021114935A1 (en) * | 2019-12-11 | 2021-06-17 | 支付宝(杭州)信息技术有限公司 | Data sharing method and apparatus for personal information protection, and electronic device |
CN111143674A (en) * | 2019-12-20 | 2020-05-12 | 深圳前海微众银行股份有限公司 | Data processing method and device |
CN111414644A (en) * | 2020-03-18 | 2020-07-14 | 支付宝(杭州)信息技术有限公司 | Privacy protection query method based on block chain and block chain system |
CN111737737A (en) * | 2020-06-10 | 2020-10-02 | 西北工业大学 | Privacy protection method for fine-grained position fuzzy measurement facing mobile crowd sensing |
CN114598542A (en) * | 2022-03-21 | 2022-06-07 | 深圳市远行科技股份有限公司 | User information security processing method and device, intelligent terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN104462285B (en) | 2017-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104462285A (en) | Privacy protection method for mobile service inquiry system | |
Chen et al. | Exploiting spatio-temporal user behaviors for user linkage | |
CN106330849A (en) | Method and device for preventing domain name hijack | |
US8756657B2 (en) | Mobile or user device authentication and tracking | |
CN103473238B (en) | Dispense address location system and method | |
CN104270521A (en) | Method for processing incoming call number and mobile terminal | |
CN107734456A (en) | A kind of method and apparatus for recommendation service information | |
CN103248677B (en) | The Internet behavioural analysis system and method for work thereof | |
CN110611667B (en) | Dynamic position privacy protection method and device in edge computing environment | |
US20160342674A1 (en) | System and method for managing customer address information in electronic commerce using the internet | |
CN109302434A (en) | Prompt information method for pushing and device, service platform and storage medium | |
CN107438111B (en) | Method, server and the system of method and the domain name agency of inquiry of the domain name | |
CN107182098A (en) | For realizing the method and apparatus that user equipment switches between WAP | |
CN108712712A (en) | Wireless Fidelity WiFi network related information display methods and device | |
CN106254314A (en) | A kind of position enquiring information on services guard method and system | |
CN103067532A (en) | Method and system of unified identification management of mobile internet users | |
CN102103606A (en) | Technology for realizing advanced search of commodities on mobile phone client | |
CN106779899B (en) | Malicious order identification method and device | |
CN103179152B (en) | Business information delivery method, system and business platform | |
CN107948312A (en) | A kind of information categorization dissemination method and system using location point as information entrance | |
CN102214214B (en) | Method and device for processing data relationship and mobile communication terminal | |
CN104408135B (en) | The loading method and device of webpage thermodynamic | |
Miura et al. | A hybrid method of user privacy protection for location based services | |
CN102685220A (en) | Method and system for data interaction based on WEB page | |
CN104504022A (en) | Push processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |