CN106792501A - A kind of LBS customer locations and privacy of identities guard method - Google Patents
A kind of LBS customer locations and privacy of identities guard method Download PDFInfo
- Publication number
- CN106792501A CN106792501A CN201611013779.6A CN201611013779A CN106792501A CN 106792501 A CN106792501 A CN 106792501A CN 201611013779 A CN201611013779 A CN 201611013779A CN 106792501 A CN106792501 A CN 106792501A
- Authority
- CN
- China
- Prior art keywords
- user
- lbs
- private
- public
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Development of Mobile Internet technology is being developed rapidly, become the core communication equipment in modern people's daily life, with number of devices increase and correlation technique it is increasingly ripe, emerge large quantities of application programs (Location Based Service) based on location-based service, ISP needs to know the position of user, could be according to position for it provides corresponding service, but positional information is not only included singly in the information that user provides, may also contain id, the privacy informations such as request Service Properties, but LBS service device is usually incredible, so these information are issued LBS service device by user, the danger of leakage of private information may be faced.The present invention regarding to the issue above, proposes a kind of LBS customer locations and privacy of identities guard method, and the method is encrypted by the position to user and privacy of identities, in effectively preventing the user request information from uploading to LBS service device on the way, is intercepted and captured by malicious attacker.And also prevent the deduction of attacker from attacking the encryption of LBS service device response message.
Description
Technical field
The present invention relates to mobile Internet security fields, more specifically, a kind of LBS customer locations and privacy of identities protection side
Method.
Background technology
Nowadays, development of Mobile Internet technology is being developed rapidly, and mobile device quantity is also growing day by day, becomes modern people
Core communication equipment in daily life, with number of devices increase and correlation technique it is increasingly ripe, emerge large quantities of
Application program (Location Based Service) based on location-based service, ISP needs to know the position of user,
Could accordingly be serviced for it is provided according to position, but positional information is not only included singly in the information of user's offer, it is also possible to wrapped
Containing id, the privacy information such as request Service Properties, but LBS service device is usually incredible, so user sends out these information
Give LBS service device, it is possible to face the danger of leakage of private information.If for example, user wants to look for neighbouring dining room,
Need the request in dining room near submitting to.In the data that wherein these are uploaded, the just sensitive information comprising user, including user body
Part, position, request Service Properties.Once these information are intercepted and captured by attacker, it is possible to which the privacy to user threatens,
Even severe patient is likely to result in grievous injury.
For customer location Privacy Protection in LBS, domestic and international researchers have carried out numerous studies work, its thought
Mainly, using extensive, fuzzy or the technical approach such as cover, the energy of attacker's identifying user position is reduced by customer location
Power.The K anonymities of relational database are incorporated into LBS secret protections field by Gruteser et al. at first, propose that K anonymity metrics refer to
Mark;Randomized technique also be used to protect privacy, such as DUMMY-Q methods, and it confuses attacker, increased by producing dummy argument
Attacker recognizes the uncertainty of actual position, but the method is negligent of considering the motion model of context and user, causes to produce
Raw dummy argument is larger with the inquiry difference of reality, so that attacker is easy for that real dummy argument can be recognized, does not have protection and looks into
Ask the effect of privacy.
Therefore, the present invention regarding to the issue above, proposes a kind of LBS customer locations and privacy of identities guard method, the method
Encrypted by the position to user and privacy of identities, in effectively preventing the user request information from uploading to LBS service device on the way, disliked
Meaning attacker intercept and capture.And also prevent the deduction of attacker from attacking the encryption of LBS service device response message.
The content of the invention
The present invention in order to solve LBS customer locations and privacy of identities safety problem in mobile Internet, protection user
While service, its sensitive information will not be recognized by attacker, propose a kind of LBS customer locations and privacy of identities protection side
Method.The purpose of double-encryption is finally reached, to sending message encryption, has been effective against intercepting and capturing and has been attacked;And response message is encrypted,
It is effective to prevent deduction to attack.
To achieve these goals, the present invention is achieved through the following technical solutions:
A kind of LBS customer locations and privacy of identities guard method method, including following steps:
S1:CA belongs to the key pair of user for a pair for each online user generation<Uprivate,Upublic>, wherein Uprivate
Private key for user is represented, for the encryption message decryption received to itself;UpublicRepresent client public key, and all users public affairs
Key UpublicCan all be found in public key storehouse disclosed in, be easy to other participants to search, and sent using the public key encryption
To its message;
S2:LBS service device generates a pair of RSA secret key pairs for every kind of attribute Service that may be inquired about<Aprivate,
Apublic>, wherein AprivateService private key is represented, LBS service device uses it to the correspondence encryption message decryption to receiving;Apublic
Represent that LBS service device is sent to the public key of user terminal, before user sends inquiry request, can be concurrent with corresponding public key encryption
Send;
S3:Before user terminal sends inquiry request information, according to the attribute for asking service, with corresponding public key to letter
Breath is encrypted;Wherein encryption includes encrypting the identity information and positional information of user.
S4:LBS service device is decrypted after the CIPHERING REQUEST is received using corresponding private key;
S5:For customer location and inquiry request, related database is searched, therefrom select suitable response message, and
The corresponding public key of user is found from public key storehouse, is sent after encrypted response message;
S6:User is received after message, and the service is obtained using private key decryption.
In step 3, user is encrypted to the information for sending, and specifically includes following steps:
3.1 first encode customer attribute information, the mapping set up between property value and digit strings, wherein property value
Id and positional information (latitude and longitude coordinates) including user, its specific form are as follows:
Above-mentioned form is a mapping process, and user id is the phoneNum after its 11 phone numbers, therefore mapping
It is 11.Location represents for longitude and latitude, wherein longitude range 0-180 (east longitude is E, and west longitude is W);Latitude scope 0-90
(north latitude is N, and south latitude is S), therefore longitude below is 4 expressions, (E, W) represents one of those, west longitude or east
Through;Latitude is 3 expressions, and (N, S) is of south latitude or north latitude.
Above-mentioned digit strings are pressed two one group by 3.2, are grouped, it is assumed that character string is k1k2k3…k11(h1h2h3(E)
g1g2(S)), wherein g, h, k represent of Arabic numerals 0 to 9, then form is as follows after being grouped:
k1k2 k3k4 k5k6 k7k8 k9k10 k11(h1h2 h3 Eg1g2S)
3.3 using the corresponding public key A of user's querying attributes valuepublicThe grouped data that will be obtained is encrypted, and presses afterwards
Order of packets is combined, and to be added and be sent to LBS service device after some necessary informations;Specific ciphering process is as follows:
3.3.1 A is assumedpublicPublic key is (m, n), using formula XXmThe packet that modn=YY, XX/n=Q are obtained 3.2
Data are calculated, and XX represents arbitrary two digits packet, and YY represents the encryption data for obtaining.Note wherein comparing special
Situation, has single numeral X after packet, then using formula XmModn=YY is calculated;
3.3.2 after all calculating, the data to obtaining are arranged, and obtain final transmission cipher-text message, including
Q values corresponding to each XX judge, if Q=0, cipher-text message is directly YY;Otherwise, cipher-text message is YY (Q), and form is such as
Under:
k1’k2 ’ k3’k4’k5’k6’(Q1)k7’k8’k9’k10’(Q2)k11’(h1’h2’h3’Eg1’g2’S)
3.3.3 above-mentioned cipher-text message and querying attributes service are sent jointly into LBS service device.
In the identity and positional information method for secret protection, the corresponding public key of each querying attributes generates two elements of n
Number is generated at random as requested by server;
In step 4, the user's request that LBS service device is received using the private key decryption of querying attributes, and response is searched, have
Body comprises the following steps:
4.1LBS servers receive the solicited message that user uploads, and request Service Properties in solicited message are transferred
Corresponding RSA private keys Aprivate;
The RSA private keys A that 4.2LBS server by utilizing is obtainedprivateThe request message that decrypted user is uploaded, to obtain user
Identity and the location of user, specifically include following steps:
4.2.1 assume that the corresponding private key for finding is AprivateIt is (w, n) that the cipher-text message that will first obtain is divided two-by-two
Group;
4.2.2 formula YY is utilizedwModn=ZZ, and judge whether there is Q after the YY, if it has, then ZZ=ZZ+Q*n, ZZ
For the clear packets that decryption is obtained;
4.2.3 arrange ZZ and obtain clear-text message k1k2k3…k100k11(0h1h2h3Eg1g2S), the phone for obtaining herein is noted
Number is 12 bit digitals, wherein the 11st is 0, is removed.First digital for 0 removes in position coordinates longitude, remaining 0 protects
Stay, the clear-text message that as user sends;
4.3, according to customer location and request attribute, search corresponding database, extract the Response List for meeting and requiring.
In the LBS user identity and location privacy protection method that the patent is write, RSA keys include RSA public keys ApublicWith
RSA private keysprivate。
In the LBS user identity and location privacy protection method that the patent is write, the service request that LBS user submits to may
It is one or more.
In step S5, LBS service device is included using client public key encrypted response information and sending, specific steps:
5.1LBS servers search the public key U of user according to the user id of decryption in public key storehousepublic;
The public key U of 5.2LBS server by utilizing userspublicResponse message is encrypted;
Cyphertext responses after encryption are sent to user terminal by 5.3LBS servers;
In the LBS user identity and location privacy protection method that the patent is write, public key storehouse is the user's public affairs issued by CA
What key was collectively constituted.
In the identity and positional information method for secret protection, the public private key pair of each user<Upublic,Uprivate>By recognizing
Card center CA is issued, and the public and private key of each user is distinctive.
Compared with prior art, beneficial effects of the present invention are:This patent is for based on the inquiry service in location-based service
Attribute, devises a kind of terminal user position method for secret protection.The method registers id and position for the application program of reality,
Propose to its AES, be effectively protected the id and location privacy of user.The advantage of the method is double-encryption, to hair
Message encryption is sent, has been effective against intercepting and capturing and has been attacked;And response message is encrypted, effectively prevent deduction to attack.
Brief description of the drawings
Fig. 1 is flow chart the step of privacy of user of the invention is protected;
Fig. 2 is customer instance ciphering process flow chart.
Specific embodiment
The present invention will be further described below in conjunction with the accompanying drawings, but embodiments of the present invention are not limited to this.
As shown in figure 1, using RSA Algorithm and Service Properties protection LBS customer locations and privacy of identities method is improved, in fact
The process of applying specifically includes following steps:
First, CA belongs to the key pair of user for a pair for each online user generation<Uprivate,Upublic>, and it is all
The public key U of userpublicCan all be found in public key storehouse disclosed in;
Then, LBS service device generates a pair of RSA secret key pairs for every kind of attribute that may be inquired about<Aprivate,Apublic>,
And the public key of querying attributes and the cipher key pair of generation is sent in online user terminal;
Then, before user terminal sends inquiry request information, according to the attribute for asking service, with corresponding public key pair
Information is encrypted;Wherein encryption includes encrypting the identity information and positional information of user.
Privacy information is encrypted with public key wherein, is comprised the following steps:
Customer attribute information is encoded first, the mapping set up between property value and digit strings, wherein property value bag
Include the id and positional information (latitude and longitude coordinates) of user;
By digit strings press two one group, be grouped, using the corresponding public key of querying attributes value by obtain divide
Group data are encrypted.Combined by order of packets and sent afterwards;
In the identity and positional information method for secret protection, the corresponding public key of each querying attributes generates two elements of n
Number is generated at random as requested by server;
Then, LBS service device after the CIPHERING REQUEST is received, is decrypted using corresponding private key in step 4;
Specifically, with private key decrypting ciphertext message, and response is searched, comprise the following steps:
LBS service device receives the solicited message that user uploads, and request Service Properties in solicited message transfer with
Corresponding RSA private keys;
The request message that LBS service device is uploaded using the RSA private keys decrypted user for obtaining, to determine the identity and use of user
The location of family;
Then, customer location and inquiry request are directed in step 5, related database is searched, suitable sound is therefrom selected
Message is answered, and the corresponding public key of user is found from public key storehouse, sent after encrypted response message;Specific implementation includes following step
Suddenly:
LBS service device searches the public key of user according to the user id of decryption in public key storehouse;
LBS service device is encrypted using the public key of user to response message;
Cyphertext responses after encryption are sent to user terminal by LBS service device;
Then, after user receives message, message is decrypted using the private key of oneself, obtains respective service.
In order to be better understood from, the application utilization improves RSA Algorithm and querying attributes protection LBS user identity and position is hidden
Private party's method, with user id as cell-phone number (13189340078), position is (98 (E), 45 (N)), and querying attributes are neighbouring automobile
Stand, correspondence RSA public keys are (3,33), as a example by private key is (7,33), to the LBS user identity of the application and location privacy protection side
Method is how to realize that user identity and the protection of location privacy are described in detail, and is specifically shown in Figure of description 2.
First, the bit digital of phone number 11 is grouped, one group two-by-two, is then grouped situation as follows:
13 18 93 40 07 8
User id is encrypted using public key (3,33) afterwards, result is obtained as follows:
19 24 15 13 13 17
Coordinate residing for user (98 (E), 45 (N)), is encrypted using public key (3,33) to it, obtains result as follows:
32 (E), 12 (N)
Then, building user's cipher-text message to be sent is:
T192415(2)13(1)131732(2)E12(1)Nbus station
LBS service device is received after user's ciphertext, and corresponding private key (7,33) is found according to bus station, decryption
Ciphertext is as a result as follows:
T131827(2)07(1)070832(2)E12(1)N
It is further processed, obtains
User id:13189340078, coordinate (98E, 45N)
Then correspondence database is searched, the results list is obtained, after being encrypted with client public key, user terminal is returned to, it
User terminal is decrypted using its private key to response message afterwards, obtains respective service.
In sum, this patent is directed to above-mentioned user identity and location privacy safety problem, proposes to utilize RSA Algorithm kimonos
Business attribute protection LBS customer locations and privacy of identities.First, CA belongs to the key of user for a pair for each online user generation
It is right<Uprivate,Upublic>, and all users public key UpublicCan all be found in public key storehouse disclosed in;LBS service
Device generates a pair of RSA secret key pairs for every kind of attribute that may be inquired about<Aprivate,Apublic>, and by querying attributes and generation
The public key of cipher key pair is sent in online user terminal;Before user terminal sends inquiry request information, according to being asked
The attribute of service, is encrypted with corresponding public key to information;LBS service device after the CIPHERING REQUEST is received, using correspondence
Private key be decrypted;And the list of user's corresponding requests is searched, and suitable response message is selected, find user couple from public key storehouse
Sent after the public key answered, and encrypted response message;User is received after message, and the service is obtained using private key decryption.The party
The advantage of method is double-encryption, to sending message encryption, has been effective against intercepting and capturing and has attacked;And response message is encrypted, effectively
Deduction is prevented to attack.
The implementation method of invention described above, is not intended to limit the scope of the present invention..It is any in this hair
Done modification, equivalent and improvement etc. within bright spiritual principles, should be included in claim protection of the invention
Within the scope of.
Claims (3)
1. a kind of LBS customer locations and privacy of identities guard method, it is characterised in that comprise the following steps:
S1:CA belongs to the key pair of user for a pair for each online user generation<Uprivate,Upublic>, and all users public affairs
Key UpublicCan all be found in public key storehouse disclosed in;
S2:LBS service device generates a pair of RSA secret key pairs for every kind of attribute that may be inquired about<Aprivate,Apublic>, inquiry is belonged to
The public key of property and the cipher key pair of generation is sent in online user terminal;
S3:Before user terminal sends inquiry request information, according to the attribute for asking service, information is entered with corresponding public key
Row encryption;Wherein encryption includes encrypting the identity information and positional information of user;
S4:LBS service device is decrypted after the CIPHERING REQUEST is received using corresponding private key;
S5:For customer location and inquiry request, related database is searched, select suitable response message, and from public key storehouse
The corresponding public key of user is found, is sent after encrypted response message;
S6:User is received after message, and the service is obtained using private key decryption.
2. customer location according to claim 1 and privacy of identities guard method, described step S3 uses corresponding public key
Information is encrypted, following steps are specifically included:
3.1 first encode customer attribute information, and the mapping set up between property value and digit strings, wherein property value include
The id and positional information of user, specific form are as follows:
Above-mentioned form is a mapping process, and user id is that the phoneNum after its 11 phone numbers, therefore mapping is 11
Position.Location represents that wherein longitude range 0-180, east longitude is E for longitude and latitude, and west longitude is W;Latitude scope 0-90, north latitude is
N, south latitude is S, therefore longitude below is 4 expressions, and (E, W) represents one of those, west longitude or east longitude;
Latitude is 3 expressions, and (N, S) is of south latitude or north latitude
The digit strings of above-mentioned form are pressed two one group by 3.2, are grouped, it is assumed that character string is k1k2k3…k11(h1h2h3
(E)g1g2(S)), wherein g, h, k represent of Arabic numerals 0 to 9, then form is as follows after being grouped:
k1k2 k3k4 k5k6 k7k8 k9k10 k11(h1h2 h3 Eg1g2S)
3.3 using the corresponding public key A of user's querying attributes valuepublicThe grouped data that will be obtained is encrypted, afterwards by packet
Sequential combination, to add and be sent to LBS service device after some necessary informations;Specific ciphering process is as follows:
3.3.1 A is assumedpublicPublic key is (m, n), using formula XXmModn=YY, XX/n=Q enter the grouped data that 3.2 obtain
Row is calculated, and XX represents arbitrary two digits packet, and YY represents the encryption data for obtaining;Single numeral X after packet,
Then utilize formula XmModn=YY is calculated;N is two secrecy prime number ps, the product of q.
3.3.2 after having calculated, the data to obtaining are arranged, and final transmission cipher-text message are obtained, including to each
The corresponding Q values of XX judge, if Q=0, cipher-text message is directly YY;Otherwise, cipher-text message is YY (Q), and form is as follows:
k1’k2’k3’k4’k5’k6’(Q1)k7’k8’k9’k10’(Q2)k11’(h1’h2’h3’Eg1’g2’S)
3.3.3 above-mentioned cipher-text message and querying attributes service are sent jointly into LBS service device.
3. customer location according to claim 2 and privacy of identities guard method, in described step S4, LBS service device
After the CIPHERING REQUEST is received, it is decrypted using corresponding private key, specifically includes following steps:
4.1LBS servers receive the solicited message that user uploads, and request Service Properties in solicited message are transferred therewith
Corresponding RSA private keys Aprivate;
The RSA private keys A that 4.2LBS server by utilizing is obtainedprivateThe request message that decrypted user is uploaded, to obtain the identity of user
The location of and user, specifically include following steps:
4.2.1 assume that the corresponding private key for finding is AprivateIt is (w, n) that the cipher-text message that will first obtain is pairwise grouping;
4.2.2 formula YY is utilizedwModn=ZZ, and judge whether there is Q after the YY, if it has, then ZZ=ZZ+Q*n, ZZ are solution
The close clear packets for obtaining;
4.2.3 arrange ZZ and obtain clear-text message k1k2k3…k100k11(0h1h2h3Eg1g2S), the telephone number for obtaining herein is noted
It is 12 bit digitals, wherein the 11st is 0, removes;First digital for 0 removes in position coordinates longitude, remaining 0 retains, i.e.,
For the clear-text message that user sends;
4.3, according to customer location and request attribute, search corresponding database, extract the Response List for meeting and requiring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611013779.6A CN106792501A (en) | 2016-11-17 | 2016-11-17 | A kind of LBS customer locations and privacy of identities guard method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611013779.6A CN106792501A (en) | 2016-11-17 | 2016-11-17 | A kind of LBS customer locations and privacy of identities guard method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106792501A true CN106792501A (en) | 2017-05-31 |
Family
ID=58969411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611013779.6A Pending CN106792501A (en) | 2016-11-17 | 2016-11-17 | A kind of LBS customer locations and privacy of identities guard method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106792501A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107749865A (en) * | 2017-12-07 | 2018-03-02 | 安徽大学 | Location privacy query method based on homomorphic encryption |
CN108566383A (en) * | 2018-03-22 | 2018-09-21 | 西安电子科技大学 | A kind of intimacy protection system and method towards service of calling a taxi online |
CN109218974A (en) * | 2018-09-18 | 2019-01-15 | 北京邮电大学 | It is a kind of cooperate secret protection node determine method and device |
CN110972070A (en) * | 2018-09-28 | 2020-04-07 | 苹果公司 | System and method for locating wireless accessories |
CN111510280A (en) * | 2020-04-21 | 2020-08-07 | 国网河北省电力有限公司信息通信分公司 | Universal Internet of things space L BS privacy security protection system and method |
CN112084411A (en) * | 2020-09-10 | 2020-12-15 | 绍兴文理学院 | User privacy protection method for personalized information retrieval |
WO2021093811A1 (en) * | 2019-11-14 | 2021-05-20 | 华为技术有限公司 | Network access method and related device |
CN113420228A (en) * | 2021-07-21 | 2021-09-21 | 北京沃东天骏信息技术有限公司 | Information generation method and device |
CN114125702A (en) * | 2021-11-12 | 2022-03-01 | 东南大学 | Position information fingerprinting protection method based on Monte Carlo algorithm |
US20220070667A1 (en) | 2020-08-28 | 2022-03-03 | Apple Inc. | Near owner maintenance |
US11863671B1 (en) | 2019-04-17 | 2024-01-02 | Apple Inc. | Accessory assisted account recovery |
US12073705B2 (en) | 2021-05-07 | 2024-08-27 | Apple Inc. | Separation alerts for notification while traveling |
US12106641B2 (en) | 2012-10-24 | 2024-10-01 | Apple Inc. | Devices and methods for locating accessories of an electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618995A (en) * | 2013-12-04 | 2014-03-05 | 西安电子科技大学 | Position privacy protection method based on dynamic pseudonyms |
CN104219245A (en) * | 2014-09-19 | 2014-12-17 | 西安电子科技大学 | System and method for location based service-orientated user privacy protection |
CN105354233A (en) * | 2015-10-08 | 2016-02-24 | 西安电子科技大学 | Linear SVM classification service query system and method with two-way privacy protection |
CN105471826A (en) * | 2014-09-04 | 2016-04-06 | 中电长城网际系统应用有限公司 | Ciphertext data query method, device and ciphertext query server |
-
2016
- 2016-11-17 CN CN201611013779.6A patent/CN106792501A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618995A (en) * | 2013-12-04 | 2014-03-05 | 西安电子科技大学 | Position privacy protection method based on dynamic pseudonyms |
CN105471826A (en) * | 2014-09-04 | 2016-04-06 | 中电长城网际系统应用有限公司 | Ciphertext data query method, device and ciphertext query server |
CN104219245A (en) * | 2014-09-19 | 2014-12-17 | 西安电子科技大学 | System and method for location based service-orientated user privacy protection |
CN105354233A (en) * | 2015-10-08 | 2016-02-24 | 西安电子科技大学 | Linear SVM classification service query system and method with two-way privacy protection |
Non-Patent Citations (2)
Title |
---|
刘洪志: "Linux环境网关中IPSec VPN的设计与实现", 《中国优秀硕士学位论文》 * |
陈昂: "云环境下LBS对称和非对称混合加密方案", 《中国优秀硕士学位论文》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12106641B2 (en) | 2012-10-24 | 2024-10-01 | Apple Inc. | Devices and methods for locating accessories of an electronic device |
CN107749865B (en) * | 2017-12-07 | 2019-11-15 | 安徽大学 | Location privacy query method based on homomorphic encryption |
CN107749865A (en) * | 2017-12-07 | 2018-03-02 | 安徽大学 | Location privacy query method based on homomorphic encryption |
CN108566383B (en) * | 2018-03-22 | 2020-11-10 | 西安电子科技大学 | Privacy protection system and method for online taxi-taking service |
CN108566383A (en) * | 2018-03-22 | 2018-09-21 | 西安电子科技大学 | A kind of intimacy protection system and method towards service of calling a taxi online |
CN109218974A (en) * | 2018-09-18 | 2019-01-15 | 北京邮电大学 | It is a kind of cooperate secret protection node determine method and device |
CN110972070A (en) * | 2018-09-28 | 2020-04-07 | 苹果公司 | System and method for locating wireless accessories |
CN110972070B (en) * | 2018-09-28 | 2022-07-15 | 苹果公司 | System and method for locating wireless accessories |
US12075313B2 (en) | 2018-09-28 | 2024-08-27 | Apple Inc. | System and method for locating wireless accessories |
US11641563B2 (en) | 2018-09-28 | 2023-05-02 | Apple Inc. | System and method for locating wireless accessories |
US11606669B2 (en) | 2018-09-28 | 2023-03-14 | Apple Inc. | System and method for locating wireless accessories |
US11863671B1 (en) | 2019-04-17 | 2024-01-02 | Apple Inc. | Accessory assisted account recovery |
WO2021093811A1 (en) * | 2019-11-14 | 2021-05-20 | 华为技术有限公司 | Network access method and related device |
CN111510280A (en) * | 2020-04-21 | 2020-08-07 | 国网河北省电力有限公司信息通信分公司 | Universal Internet of things space L BS privacy security protection system and method |
US20220070667A1 (en) | 2020-08-28 | 2022-03-03 | Apple Inc. | Near owner maintenance |
US11889302B2 (en) | 2020-08-28 | 2024-01-30 | Apple Inc. | Maintenance of wireless devices |
CN112084411B (en) * | 2020-09-10 | 2021-04-20 | 绍兴文理学院 | User privacy protection method for personalized information retrieval |
CN112084411A (en) * | 2020-09-10 | 2020-12-15 | 绍兴文理学院 | User privacy protection method for personalized information retrieval |
US12073705B2 (en) | 2021-05-07 | 2024-08-27 | Apple Inc. | Separation alerts for notification while traveling |
CN113420228A (en) * | 2021-07-21 | 2021-09-21 | 北京沃东天骏信息技术有限公司 | Information generation method and device |
CN114125702A (en) * | 2021-11-12 | 2022-03-01 | 东南大学 | Position information fingerprinting protection method based on Monte Carlo algorithm |
CN114125702B (en) * | 2021-11-12 | 2024-03-01 | 东南大学 | Monte Carlo algorithm-based position information fingerprint protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106792501A (en) | A kind of LBS customer locations and privacy of identities guard method | |
Wu et al. | A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks | |
Kumari et al. | Design of a provably secure biometrics-based multi-cloud-server authentication scheme | |
Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
CN104219245B (en) | System and method for location based service-orientated user privacy protection | |
CN103780393B (en) | Virtual-desktop security certification system and method facing multiple security levels | |
CN105187389B (en) | A kind of Web access method and system for obscuring encryption based on number | |
CN101282216B (en) | Method for switching three-partner key with privacy protection based on password authentication | |
CN109040060B (en) | Terminal matching method and system and computer equipment | |
CN109347626B (en) | Safety identity authentication method with anti-tracking characteristic | |
Zhu et al. | Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data | |
Yassin et al. | Efficient password-based two factors authentication in cloud computing | |
Li et al. | Traceable and controllable encrypted cloud image search in multi-user settings | |
CN110474908A (en) | Transaction monitoring and managing method and device, storage medium and computer equipment | |
Tsai et al. | A new password-based multi-server authentication scheme robust to password guessing attacks | |
Li et al. | A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. | |
Chen et al. | Enhanced authentication protocol for the Internet of Things environment | |
Backes et al. | Using mobile device communication to strengthen e-voting protocols | |
Wang et al. | One-round privacy-preserving meeting location determination for smartphone applications | |
Tao et al. | Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks | |
CN104618113B (en) | The method that the authentication of a kind of mobile terminal and safe lane are set up | |
CN106230840A (en) | A kind of command identifying method of high security | |
Yang et al. | A privacy model for RFID tag ownership transfer | |
CN106059767A (en) | Terminal private data protection system and method based on Internet | |
CN102833239B (en) | Method for implementing nesting protection of client account information based on network identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170531 |
|
WD01 | Invention patent application deemed withdrawn after publication |