CN104462285A - Privacy protection method for mobile service inquiry system - Google Patents

Privacy protection method for mobile service inquiry system Download PDF

Info

Publication number
CN104462285A
CN104462285A CN201410699891.4A CN201410699891A CN104462285A CN 104462285 A CN104462285 A CN 104462285A CN 201410699891 A CN201410699891 A CN 201410699891A CN 104462285 A CN104462285 A CN 104462285A
Authority
CN
China
Prior art keywords
user
solution software
mobile solution
mobile
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410699891.4A
Other languages
Chinese (zh)
Other versions
CN104462285B (en
Inventor
余荣
叶墩辉
程航
黄卓
谢胜利
赖粤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201410699891.4A priority Critical patent/CN104462285B/en
Publication of CN104462285A publication Critical patent/CN104462285A/en
Application granted granted Critical
Publication of CN104462285B publication Critical patent/CN104462285B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2468Fuzzy queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Fuzzy Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a privacy protection method for a mobile service inquiry system. A user sets a privacy protection mode in mobile application software; according to the privacy protection mode, the user or the mobile application software sets a fuzzy grade; the user sends an information search request to a service provider through the mobile application software, the mobile application software conducts fuzzification on the information search request according to the fuzzy grade, and the fuzzified information search request is sent to the service provider; the service provider processes the fuzzified information search request and returns information search results to the mobile application software; the mobile application software screens the information search results and returns information expected by the user to the user. By means of the method, even if the information search request is intercepted by an attacker, the attacker cannot easily grasp an original information inquiry intention of the user, the possibility that tracks of the user are exposed is reduced, and inquiry privacy of the user is protected effectively.

Description

A kind of method for secret protection of Information Mobile Service inquiry system
Technical field
The present invention relates to individual privacy protection field, more specifically, relate to a kind of method for secret protection of Information Mobile Service inquiry system.
Background technology
Information Mobile Service inquiry system is the necessity of the current such as mobile terminal such as mobile phone, panel computer application, and it can provide inquiry service and relevent information easily to people whenever and wherever possible.Such as, the inquiry location Based service such as hospital, restaurant, refuelling station, market nearby.The service of this type is exactly that the inquiry request of oneself is sent to server by user, and server according to type service and the inquiry request of user, returns the data query required for user again.This service, while bringing great advantage to the user, also also exists the incomplete defect of secret protection, and assailant can intercept and capture the inquiry request content of user, so just likely exposes whereabouts and the place to go of user.
Summary of the invention
The present invention, for overcoming the incomplete defect of secret protection described in above-mentioned prior art, provides a kind of method for secret protection effectively can avoiding the Information Mobile Service inquiry system of privacy leakage.
For solving the problems of the technologies described above, technical scheme of the present invention is as follows:
A kind of method for secret protection of Information Mobile Service inquiry system; described method is applied to Information Mobile Service inquiry system; in described Information Mobile Service inquiry system; user sends retrieving information request by Mobile solution software to service provider; the result of service provider return message retrieval, said method comprising the steps of:
S1: user sets privacy protection mode in Mobile solution software;
S2: according to privacy protection mode, is set fuzzy class by user or Mobile solution software;
S3: user sends retrieving information request by Mobile solution software to service provider, and Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request, and the retrieving information request of obfuscation is sent to service provider;
S4: the retrieving information request of service provider to obfuscation processes, and the result of information retrieval is returned to Mobile solution software;
S5: the result of Mobile solution software to information retrieval is screened, returns to user by the information that user expects.
In the preferred scheme of one, described Mobile solution software stores local semantic ambiguity data, and local semantic ambiguity data are divided into m class, comprises n respectively in each class data 1, n 2..., n mindividual data, wherein m, n 1, n 2..., n mfor positive integer.
In the preferred scheme of one, in step S3, described Mobile solution software according to fuzzy class to the method that obfuscation is carried out in retrieving information request is: the local semantic ambiguity data that Mobile solution software chooses some quantity according to fuzzy class are added in retrieving information request, generate the request of k bar retrieving information, k be greater than 1 integer.
In the preferred scheme of one; described privacy protection mode comprises User Defined pattern; under User Defined pattern; user independently sets fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q; k=m*q, wherein q is positive integer.
In the preferred scheme of one; described privacy protection mode comprises system self-adaption and recommends pattern; under system self-adaption recommendation pattern; the Mobile solution software network condition current according to user sets fuzzy class q automatically; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q; k=m*q, wherein q is positive integer.
In the preferred scheme of one; described privacy protection mode comprises intelligent mode; under intelligent mode; the fuzzy class p that Mobile solution software sets according to user and the current network condition s of user comprehensively determines fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q=(p*s)/ɑ; ɑ is constant, and p, s and q are positive integer.
In the preferred scheme of one, described method also comprises: in step S3, described Mobile solution software stores historical search record, the retrieving information request that user sends searched by Mobile solution software in historical search record, if find identical retrieving information request, then the information that the user of correspondence expects is returned to user.
In the preferred scheme of one, described method also comprises: in step S5, and the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record.
Compared with prior art; the beneficial effect of technical solution of the present invention is: the method for secret protection of Information Mobile Service inquiry system of the present invention; Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request; and the retrieving information request of obfuscation is sent to service provider; even if retrieving information request victim is intercepted and captured; assailant also cannot crack the original information inquiry intention of user easily; this reduces the possibility that user's whereabouts expose, effectively protect the inquiry privacy of user.
The method for secret protection of Information Mobile Service inquiry system of the present invention, comprise User Defined pattern, system self-adaption recommends pattern and intelligent mode, this Three models according to the number k of retrieving information request after the setting of user or the current network condition setting obfuscation of user, can average out between network data exchange amount and secret protection intensity; And in the present invention, the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record, when user sends same retrieving information request again, Mobile solution software is without the need to sending request to service provider, but directly the information that the user of correspondence expects is returned to user, reduce further the expense of network data and the risk of privacy leakage.
Accompanying drawing explanation
Fig. 1 is the local semantic ambiguity nomogram of embodiment 1.
Fig. 2 is the process flow diagram of the method for secret protection of embodiment 1 Information Mobile Service inquiry system.
The schematic diagram that Fig. 3 is under User Defined pattern, system self-adaption recommends pattern and intelligent mode.
Fig. 4 is that User Defined pattern and system self-adaption recommend mode effects analogous diagram.
Fig. 5 is the effect emulation figure of intelligent mode.
Embodiment
Accompanying drawing, only for exemplary illustration, can not be interpreted as the restriction to this patent; To those skilled in the art, in accompanying drawing, some known features and explanation thereof may be omitted is understandable.
Below in conjunction with drawings and Examples, technical scheme of the present invention is described further.
Embodiment 1
As shown in Figure 1; a kind of method for secret protection of Information Mobile Service inquiry system; described method is applied to Information Mobile Service inquiry system; in described Information Mobile Service inquiry system; user sends retrieving information request by Mobile solution software to service provider; the result of service provider return message retrieval; described Mobile solution software stores local semantic ambiguity data; as shown in Figure 1; local semantic ambiguity data are divided into m class; as class of doing shopping, amusement and recreation class, service for life class etc., in each class data, comprise n respectively 1, n 2..., n mindividual data, as contained clothes footwear bag, Jewelry Accessories, food tea, florist's shop etc., wherein m, n in shopping class 1, n 2..., n mfor positive integer, as shown in Figure 2, said method comprising the steps of:
S1: user sets privacy protection mode in Mobile solution software, privacy protection mode comprises User Defined pattern, system self-adaption recommends pattern and intelligent mode.
S2: according to privacy protection mode, is set fuzzy class by user or Mobile solution software.
S3: user sends retrieving information request by Mobile solution software to service provider, the present embodiment asks to retrieve hospital for user.Mobile solution software stores historical search record, and the retrieving information request of hospital searched by Mobile solution software in historical search record, if find the retrieving information request of hospital, then the information that the user of correspondence expects is returned to user; If do not find the retrieving information request of hospital, the local semantic ambiguity data that then Mobile solution software chooses some quantity according to fuzzy class are added in retrieving information request, generate the request of k bar retrieving information, k be greater than 1 integer, and the retrieving information request of obfuscation is sent to service provider, as shown in Figure 3, concrete mode is as follows:
Under User Defined pattern, user independently sets fuzzy class q, and Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, and wherein q is positive integer;
Under system self-adaption recommendation pattern, the Mobile solution software network condition current according to user sets fuzzy class q automatically, Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, and wherein q is positive integer;
Under intelligent mode, the fuzzy class p that Mobile solution software sets according to user and the current network condition s of user comprehensively determines fuzzy class q, Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q=(p*s)/ɑ, ɑ is constant, and p, s and q are positive integer.
Such as, if m=3, q=4, then arbitrary extracting 4 data in the local semantic ambiguity data of each class, wherein must comprise the hospital position that user inquires about, and generate the request of k bar retrieving information, k=m*q=12, wherein except the inquiry of all the other 11, hospital position is all pseudo-inquiry, even if retrieving information request victim is intercepted and captured like this, assailant also cannot crack the original information inquiry intention of user easily.
S4: the retrieving information request of service provider to obfuscation processes, and the result of information retrieval is returned to Mobile solution software;
S5: the result of Mobile solution software to information retrieval is screened, by the information that user expects, namely the information of hospital returns to user, and meanwhile, the retrieving information request of hospital and the information of hospital are generated one group of mapping relations by Mobile solution software to be carried out being stored into historical search record.
The method for secret protection of the present embodiment Information Mobile Service inquiry system can be assessed from the angle of information entropy, and for described method, the formula of information entropy is as follows:
Can abbreviation be: , wherein H represents information entropy, and k represents the number of retrieving information request after obfuscation, and Fig. 4 is that User Defined pattern and system self-adaption recommend mode effects analogous diagram, and transverse axis is fuzzy class q, span 1 ~ 5, and the longitudinal axis is information entropy H.As seen from Figure 4, along with the increase of fuzzy class, information entropy also increases thereupon, and what which illustrate that fuzzy class determines pseudo-inquiry obscures degree, and obscure degree higher, described method for secret protection is better to the protected effect of real information.
Fig. 5 is the effect emulation figure of intelligent mode, and transverse axis is the fuzzy class p that user sets, span 1 ~ 5, and the longitudinal axis is information entropy H, behalf network condition, span 1 ~ 5.As seen from Figure 5, no matter under which kind of network condition s, along with the lifting of the fuzzy class p of user's setting, information entropy H is increasing trend; When the fuzzy class p of user's setting is definite value, along with the rising of network condition grade s, information entropy H is also corresponding to be increased.In conjunction with this 2 point, Fig. 5 describes, and when user is when network environment is good, system can provide better secret protection to inquiry request voluntarily; Otherwise when the network environment residing for user is poor, system can corresponding reduction protection class, exchanges the balance of search efficiency for.
The method for secret protection of the present embodiment Information Mobile Service inquiry system; Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request; and the retrieving information request of obfuscation is sent to service provider; even if retrieving information request victim is intercepted and captured; assailant also cannot crack the original information inquiry intention of user easily; this reduces the possibility that user's whereabouts expose, effectively protect the inquiry privacy of user.
The method for secret protection of the present embodiment Information Mobile Service inquiry system, comprise User Defined pattern, system self-adaption recommends pattern and intelligent mode, this Three models according to the number k of retrieving information request after the setting of user or the current network condition setting obfuscation of user, can average out between network data exchange amount and secret protection intensity; And in the present embodiment, the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record, when user sends same retrieving information request again, Mobile solution software is without the need to sending request to service provider, but directly the information that the user of correspondence expects is returned to user, reduce further the expense of network data and the risk of privacy leakage.
The corresponding same or analogous parts of same or analogous label; The term describing position relationship in accompanying drawing, only for exemplary illustration, can not be interpreted as the restriction to this patent; Obviously, the above embodiment of the present invention is only for example of the present invention is clearly described, and is not the restriction to embodiments of the present invention.For those of ordinary skill in the field, can also make other changes in different forms on the basis of the above description.Here exhaustive without the need to also giving all embodiments.All any amendments done within the spirit and principles in the present invention, equivalent to replace and improvement etc., within the protection domain that all should be included in the claims in the present invention.

Claims (8)

1. the method for secret protection of an Information Mobile Service inquiry system; described method is applied to Information Mobile Service inquiry system; in described Information Mobile Service inquiry system; user sends retrieving information request by Mobile solution software to service provider; the result of service provider return message retrieval; it is characterized in that, said method comprising the steps of:
S1: user sets privacy protection mode in Mobile solution software;
S2: according to privacy protection mode, is set fuzzy class by user or Mobile solution software;
S3: user sends retrieving information request by Mobile solution software to service provider, and Mobile solution software carries out obfuscation according to fuzzy class to retrieving information request, and the retrieving information request of obfuscation is sent to service provider;
S4: the retrieving information request of service provider to obfuscation processes, and the result of information retrieval is returned to Mobile solution software;
S5: the result of Mobile solution software to information retrieval is screened, returns to user by the information that user expects.
2. the method for secret protection of Information Mobile Service inquiry system according to claim 1, is characterized in that, described Mobile solution software stores local semantic ambiguity data, and local semantic ambiguity data are divided into m class, comprises n respectively in each class data 1, n 2..., n mindividual data, wherein m, n 1, n 2..., n mfor positive integer.
3. the method for secret protection of Information Mobile Service inquiry system according to claim 2; it is characterized in that; in step S3; described Mobile solution software according to fuzzy class to the method that obfuscation is carried out in retrieving information request is: the local semantic ambiguity data that Mobile solution software chooses some quantity according to fuzzy class are added in retrieving information request; generate the request of k bar retrieving information, k be greater than 1 integer.
4. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that; described privacy protection mode comprises User Defined pattern; under User Defined pattern; user independently sets fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q is positive integer.
5. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that; described privacy protection mode comprises system self-adaption and recommends pattern; under system self-adaption recommendation pattern; the Mobile solution software network condition current according to user sets fuzzy class q automatically; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q, k=m*q, wherein q is positive integer.
6. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that; described privacy protection mode comprises intelligent mode; under intelligent mode; the fuzzy class p that Mobile solution software sets according to user and the current network condition s of user comprehensively determines fuzzy class q; Mobile solution software sets the number k of the retrieving information request sent to service provider according to fuzzy class q; k=m*q; wherein q=(p*s)/ɑ; ɑ is constant, and p, s and q are positive integer.
7. the method for secret protection of Information Mobile Service inquiry system according to claim 3; it is characterized in that described method also comprises: in step S3; described Mobile solution software stores historical search record; the retrieving information request that user sends searched by Mobile solution software in historical search record; if find identical retrieving information request, then the information that the user of correspondence expects is returned to user.
8. the method for secret protection of Information Mobile Service inquiry system according to claim 7; it is characterized in that; described method also comprises: in step S5, and the information that retrieving information request and user are expected is generated one group of mapping relations by Mobile solution software carries out being stored into historical search record.
CN201410699891.4A 2014-11-28 2014-11-28 A kind of method for secret protection of Information Mobile Service inquiry system Active CN104462285B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410699891.4A CN104462285B (en) 2014-11-28 2014-11-28 A kind of method for secret protection of Information Mobile Service inquiry system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410699891.4A CN104462285B (en) 2014-11-28 2014-11-28 A kind of method for secret protection of Information Mobile Service inquiry system

Publications (2)

Publication Number Publication Date
CN104462285A true CN104462285A (en) 2015-03-25
CN104462285B CN104462285B (en) 2017-10-10

Family

ID=52908321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410699891.4A Active CN104462285B (en) 2014-11-28 2014-11-28 A kind of method for secret protection of Information Mobile Service inquiry system

Country Status (1)

Country Link
CN (1) CN104462285B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017115168A1 (en) * 2015-12-30 2017-07-06 International Business Machines Corporation Curtailing search engines from obtaining and controlling information
CN107609419A (en) * 2017-09-12 2018-01-19 温州大学瓯江学院 A kind of digital library user browses preference method for secret protection and system
CN107871086A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 Sensitive information screen method, application server and computer-readable recording medium
CN109492430A (en) * 2018-10-30 2019-03-19 江苏东智数据技术股份有限公司 A kind of internet Keywork method for secret protection and device based on obfuscated manner
CN111083631A (en) * 2019-12-02 2020-04-28 兰州交通大学 Efficient query processing method for protecting location privacy and query privacy
CN111143674A (en) * 2019-12-20 2020-05-12 深圳前海微众银行股份有限公司 Data processing method and device
CN111414644A (en) * 2020-03-18 2020-07-14 支付宝(杭州)信息技术有限公司 Privacy protection query method based on block chain and block chain system
CN111737737A (en) * 2020-06-10 2020-10-02 西北工业大学 Privacy protection method for fine-grained position fuzzy measurement facing mobile crowd sensing
WO2021077860A1 (en) * 2019-10-25 2021-04-29 华为技术有限公司 Recommendation method and apparatus based on user private data, and medium and system
WO2021114935A1 (en) * 2019-12-11 2021-06-17 支付宝(杭州)信息技术有限公司 Data sharing method and apparatus for personal information protection, and electronic device
CN114598542A (en) * 2022-03-21 2022-06-07 深圳市远行科技股份有限公司 User information security processing method and device, intelligent terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087325A1 (en) * 2000-12-29 2002-07-04 Lee Victor Wai Leung Dialogue application computer platform
CN101682620A (en) * 2007-05-24 2010-03-24 国际商业机器公司 Mobile device with an obfuscated mobile device user identity
US20110106830A1 (en) * 2005-11-29 2011-05-05 Cisco Technology, Inc. Generating search results based on determined relationships between data objects and user connections to identified destinations
CN102163230A (en) * 2011-04-13 2011-08-24 浙江大学 Method for implementing personalized information retrieval system for customizing privacy protection
CN103279499A (en) * 2013-05-09 2013-09-04 北京信息科技大学 User privacy protection method in personalized information retrieval

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087325A1 (en) * 2000-12-29 2002-07-04 Lee Victor Wai Leung Dialogue application computer platform
US20110106830A1 (en) * 2005-11-29 2011-05-05 Cisco Technology, Inc. Generating search results based on determined relationships between data objects and user connections to identified destinations
CN101682620A (en) * 2007-05-24 2010-03-24 国际商业机器公司 Mobile device with an obfuscated mobile device user identity
CN102163230A (en) * 2011-04-13 2011-08-24 浙江大学 Method for implementing personalized information retrieval system for customizing privacy protection
CN103279499A (en) * 2013-05-09 2013-09-04 北京信息科技大学 User privacy protection method in personalized information retrieval

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017115168A1 (en) * 2015-12-30 2017-07-06 International Business Machines Corporation Curtailing search engines from obtaining and controlling information
US20190319988A1 (en) * 2015-12-30 2019-10-17 International Business Machines Corporation Curtailing search engines from obtaining and controlling information
US11916960B2 (en) * 2015-12-30 2024-02-27 International Business Machines Corporation Curtailing search engines from obtaining and controlling information
CN107609419A (en) * 2017-09-12 2018-01-19 温州大学瓯江学院 A kind of digital library user browses preference method for secret protection and system
CN107871086A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 Sensitive information screen method, application server and computer-readable recording medium
CN109492430A (en) * 2018-10-30 2019-03-19 江苏东智数据技术股份有限公司 A kind of internet Keywork method for secret protection and device based on obfuscated manner
WO2021077860A1 (en) * 2019-10-25 2021-04-29 华为技术有限公司 Recommendation method and apparatus based on user private data, and medium and system
CN111083631A (en) * 2019-12-02 2020-04-28 兰州交通大学 Efficient query processing method for protecting location privacy and query privacy
WO2021114935A1 (en) * 2019-12-11 2021-06-17 支付宝(杭州)信息技术有限公司 Data sharing method and apparatus for personal information protection, and electronic device
CN111143674A (en) * 2019-12-20 2020-05-12 深圳前海微众银行股份有限公司 Data processing method and device
CN111414644A (en) * 2020-03-18 2020-07-14 支付宝(杭州)信息技术有限公司 Privacy protection query method based on block chain and block chain system
CN111737737A (en) * 2020-06-10 2020-10-02 西北工业大学 Privacy protection method for fine-grained position fuzzy measurement facing mobile crowd sensing
CN114598542A (en) * 2022-03-21 2022-06-07 深圳市远行科技股份有限公司 User information security processing method and device, intelligent terminal and storage medium

Also Published As

Publication number Publication date
CN104462285B (en) 2017-10-10

Similar Documents

Publication Publication Date Title
CN104462285A (en) Privacy protection method for mobile service inquiry system
Chen et al. Exploiting spatio-temporal user behaviors for user linkage
CN106330849A (en) Method and device for preventing domain name hijack
US8756657B2 (en) Mobile or user device authentication and tracking
CN103473238B (en) Dispense address location system and method
CN104270521A (en) Method for processing incoming call number and mobile terminal
CN107734456A (en) A kind of method and apparatus for recommendation service information
CN103248677B (en) The Internet behavioural analysis system and method for work thereof
CN110611667B (en) Dynamic position privacy protection method and device in edge computing environment
US20160342674A1 (en) System and method for managing customer address information in electronic commerce using the internet
CN109302434A (en) Prompt information method for pushing and device, service platform and storage medium
CN107438111B (en) Method, server and the system of method and the domain name agency of inquiry of the domain name
CN107182098A (en) For realizing the method and apparatus that user equipment switches between WAP
CN108712712A (en) Wireless Fidelity WiFi network related information display methods and device
CN106254314A (en) A kind of position enquiring information on services guard method and system
CN103067532A (en) Method and system of unified identification management of mobile internet users
CN102103606A (en) Technology for realizing advanced search of commodities on mobile phone client
CN106779899B (en) Malicious order identification method and device
CN103179152B (en) Business information delivery method, system and business platform
CN107948312A (en) A kind of information categorization dissemination method and system using location point as information entrance
CN102214214B (en) Method and device for processing data relationship and mobile communication terminal
CN104408135B (en) The loading method and device of webpage thermodynamic
Miura et al. A hybrid method of user privacy protection for location based services
CN102685220A (en) Method and system for data interaction based on WEB page
CN104504022A (en) Push processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant