CN106792501A - A kind of LBS customer locations and privacy of identities guard method - Google Patents

A kind of LBS customer locations and privacy of identities guard method Download PDF

Info

Publication number
CN106792501A
CN106792501A CN201611013779.6A CN201611013779A CN106792501A CN 106792501 A CN106792501 A CN 106792501A CN 201611013779 A CN201611013779 A CN 201611013779A CN 106792501 A CN106792501 A CN 106792501A
Authority
CN
China
Prior art keywords
user
lbs
private
public
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611013779.6A
Other languages
Chinese (zh)
Inventor
程良伦
郭慧
徐金雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201611013779.6A priority Critical patent/CN106792501A/en
Publication of CN106792501A publication Critical patent/CN106792501A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Development of Mobile Internet technology is being developed rapidly, become the core communication equipment in modern people's daily life, with number of devices increase and correlation technique it is increasingly ripe, emerge large quantities of application programs (Location Based Service) based on location-based service, ISP needs to know the position of user, could be according to position for it provides corresponding service, but positional information is not only included singly in the information that user provides, may also contain id, the privacy informations such as request Service Properties, but LBS service device is usually incredible, so these information are issued LBS service device by user, the danger of leakage of private information may be faced.The present invention regarding to the issue above, proposes a kind of LBS customer locations and privacy of identities guard method, and the method is encrypted by the position to user and privacy of identities, in effectively preventing the user request information from uploading to LBS service device on the way, is intercepted and captured by malicious attacker.And also prevent the deduction of attacker from attacking the encryption of LBS service device response message.

Description

A kind of LBS customer locations and privacy of identities guard method
Technical field
The present invention relates to mobile Internet security fields, more specifically, a kind of LBS customer locations and privacy of identities protection side Method.
Background technology
Nowadays, development of Mobile Internet technology is being developed rapidly, and mobile device quantity is also growing day by day, becomes modern people Core communication equipment in daily life, with number of devices increase and correlation technique it is increasingly ripe, emerge large quantities of Application program (Location Based Service) based on location-based service, ISP needs to know the position of user, Could accordingly be serviced for it is provided according to position, but positional information is not only included singly in the information of user's offer, it is also possible to wrapped Containing id, the privacy information such as request Service Properties, but LBS service device is usually incredible, so user sends out these information Give LBS service device, it is possible to face the danger of leakage of private information.If for example, user wants to look for neighbouring dining room, Need the request in dining room near submitting to.In the data that wherein these are uploaded, the just sensitive information comprising user, including user body Part, position, request Service Properties.Once these information are intercepted and captured by attacker, it is possible to which the privacy to user threatens, Even severe patient is likely to result in grievous injury.
For customer location Privacy Protection in LBS, domestic and international researchers have carried out numerous studies work, its thought Mainly, using extensive, fuzzy or the technical approach such as cover, the energy of attacker's identifying user position is reduced by customer location Power.The K anonymities of relational database are incorporated into LBS secret protections field by Gruteser et al. at first, propose that K anonymity metrics refer to Mark;Randomized technique also be used to protect privacy, such as DUMMY-Q methods, and it confuses attacker, increased by producing dummy argument Attacker recognizes the uncertainty of actual position, but the method is negligent of considering the motion model of context and user, causes to produce Raw dummy argument is larger with the inquiry difference of reality, so that attacker is easy for that real dummy argument can be recognized, does not have protection and looks into Ask the effect of privacy.
Therefore, the present invention regarding to the issue above, proposes a kind of LBS customer locations and privacy of identities guard method, the method Encrypted by the position to user and privacy of identities, in effectively preventing the user request information from uploading to LBS service device on the way, disliked Meaning attacker intercept and capture.And also prevent the deduction of attacker from attacking the encryption of LBS service device response message.
The content of the invention
The present invention in order to solve LBS customer locations and privacy of identities safety problem in mobile Internet, protection user While service, its sensitive information will not be recognized by attacker, propose a kind of LBS customer locations and privacy of identities protection side Method.The purpose of double-encryption is finally reached, to sending message encryption, has been effective against intercepting and capturing and has been attacked;And response message is encrypted, It is effective to prevent deduction to attack.
To achieve these goals, the present invention is achieved through the following technical solutions:
A kind of LBS customer locations and privacy of identities guard method method, including following steps:
S1:CA belongs to the key pair of user for a pair for each online user generation<Uprivate,Upublic>, wherein Uprivate Private key for user is represented, for the encryption message decryption received to itself;UpublicRepresent client public key, and all users public affairs Key UpublicCan all be found in public key storehouse disclosed in, be easy to other participants to search, and sent using the public key encryption To its message;
S2:LBS service device generates a pair of RSA secret key pairs for every kind of attribute Service that may be inquired about<Aprivate, Apublic>, wherein AprivateService private key is represented, LBS service device uses it to the correspondence encryption message decryption to receiving;Apublic Represent that LBS service device is sent to the public key of user terminal, before user sends inquiry request, can be concurrent with corresponding public key encryption Send;
S3:Before user terminal sends inquiry request information, according to the attribute for asking service, with corresponding public key to letter Breath is encrypted;Wherein encryption includes encrypting the identity information and positional information of user.
S4:LBS service device is decrypted after the CIPHERING REQUEST is received using corresponding private key;
S5:For customer location and inquiry request, related database is searched, therefrom select suitable response message, and The corresponding public key of user is found from public key storehouse, is sent after encrypted response message;
S6:User is received after message, and the service is obtained using private key decryption.
In step 3, user is encrypted to the information for sending, and specifically includes following steps:
3.1 first encode customer attribute information, the mapping set up between property value and digit strings, wherein property value Id and positional information (latitude and longitude coordinates) including user, its specific form are as follows:
Above-mentioned form is a mapping process, and user id is the phoneNum after its 11 phone numbers, therefore mapping It is 11.Location represents for longitude and latitude, wherein longitude range 0-180 (east longitude is E, and west longitude is W);Latitude scope 0-90 (north latitude is N, and south latitude is S), therefore longitude below is 4 expressions, (E, W) represents one of those, west longitude or east Through;Latitude is 3 expressions, and (N, S) is of south latitude or north latitude.
Above-mentioned digit strings are pressed two one group by 3.2, are grouped, it is assumed that character string is k1k2k3…k11(h1h2h3(E) g1g2(S)), wherein g, h, k represent of Arabic numerals 0 to 9, then form is as follows after being grouped:
k1k2 k3k4 k5k6 k7k8 k9k10 k11(h1h2 h3 Eg1g2S)
3.3 using the corresponding public key A of user's querying attributes valuepublicThe grouped data that will be obtained is encrypted, and presses afterwards Order of packets is combined, and to be added and be sent to LBS service device after some necessary informations;Specific ciphering process is as follows:
3.3.1 A is assumedpublicPublic key is (m, n), using formula XXmThe packet that modn=YY, XX/n=Q are obtained 3.2 Data are calculated, and XX represents arbitrary two digits packet, and YY represents the encryption data for obtaining.Note wherein comparing special Situation, has single numeral X after packet, then using formula XmModn=YY is calculated;
3.3.2 after all calculating, the data to obtaining are arranged, and obtain final transmission cipher-text message, including Q values corresponding to each XX judge, if Q=0, cipher-text message is directly YY;Otherwise, cipher-text message is YY (Q), and form is such as Under:
k1’k2 k3’k4’k5’k6’(Q1)k7’k8’k9’k10’(Q2)k11’(h1’h2’h3’Eg1’g2’S)
3.3.3 above-mentioned cipher-text message and querying attributes service are sent jointly into LBS service device.
In the identity and positional information method for secret protection, the corresponding public key of each querying attributes generates two elements of n Number is generated at random as requested by server;
In step 4, the user's request that LBS service device is received using the private key decryption of querying attributes, and response is searched, have Body comprises the following steps:
4.1LBS servers receive the solicited message that user uploads, and request Service Properties in solicited message are transferred Corresponding RSA private keys Aprivate
The RSA private keys A that 4.2LBS server by utilizing is obtainedprivateThe request message that decrypted user is uploaded, to obtain user Identity and the location of user, specifically include following steps:
4.2.1 assume that the corresponding private key for finding is AprivateIt is (w, n) that the cipher-text message that will first obtain is divided two-by-two Group;
4.2.2 formula YY is utilizedwModn=ZZ, and judge whether there is Q after the YY, if it has, then ZZ=ZZ+Q*n, ZZ For the clear packets that decryption is obtained;
4.2.3 arrange ZZ and obtain clear-text message k1k2k3…k100k11(0h1h2h3Eg1g2S), the phone for obtaining herein is noted Number is 12 bit digitals, wherein the 11st is 0, is removed.First digital for 0 removes in position coordinates longitude, remaining 0 protects Stay, the clear-text message that as user sends;
4.3, according to customer location and request attribute, search corresponding database, extract the Response List for meeting and requiring.
In the LBS user identity and location privacy protection method that the patent is write, RSA keys include RSA public keys ApublicWith RSA private keysprivate
In the LBS user identity and location privacy protection method that the patent is write, the service request that LBS user submits to may It is one or more.
In step S5, LBS service device is included using client public key encrypted response information and sending, specific steps:
5.1LBS servers search the public key U of user according to the user id of decryption in public key storehousepublic
The public key U of 5.2LBS server by utilizing userspublicResponse message is encrypted;
Cyphertext responses after encryption are sent to user terminal by 5.3LBS servers;
In the LBS user identity and location privacy protection method that the patent is write, public key storehouse is the user's public affairs issued by CA What key was collectively constituted.
In the identity and positional information method for secret protection, the public private key pair of each user<Upublic,Uprivate>By recognizing Card center CA is issued, and the public and private key of each user is distinctive.
Compared with prior art, beneficial effects of the present invention are:This patent is for based on the inquiry service in location-based service Attribute, devises a kind of terminal user position method for secret protection.The method registers id and position for the application program of reality, Propose to its AES, be effectively protected the id and location privacy of user.The advantage of the method is double-encryption, to hair Message encryption is sent, has been effective against intercepting and capturing and has been attacked;And response message is encrypted, effectively prevent deduction to attack.
Brief description of the drawings
Fig. 1 is flow chart the step of privacy of user of the invention is protected;
Fig. 2 is customer instance ciphering process flow chart.
Specific embodiment
The present invention will be further described below in conjunction with the accompanying drawings, but embodiments of the present invention are not limited to this.
As shown in figure 1, using RSA Algorithm and Service Properties protection LBS customer locations and privacy of identities method is improved, in fact The process of applying specifically includes following steps:
First, CA belongs to the key pair of user for a pair for each online user generation<Uprivate,Upublic>, and it is all The public key U of userpublicCan all be found in public key storehouse disclosed in;
Then, LBS service device generates a pair of RSA secret key pairs for every kind of attribute that may be inquired about<Aprivate,Apublic>, And the public key of querying attributes and the cipher key pair of generation is sent in online user terminal;
Then, before user terminal sends inquiry request information, according to the attribute for asking service, with corresponding public key pair Information is encrypted;Wherein encryption includes encrypting the identity information and positional information of user.
Privacy information is encrypted with public key wherein, is comprised the following steps:
Customer attribute information is encoded first, the mapping set up between property value and digit strings, wherein property value bag Include the id and positional information (latitude and longitude coordinates) of user;
By digit strings press two one group, be grouped, using the corresponding public key of querying attributes value by obtain divide Group data are encrypted.Combined by order of packets and sent afterwards;
In the identity and positional information method for secret protection, the corresponding public key of each querying attributes generates two elements of n Number is generated at random as requested by server;
Then, LBS service device after the CIPHERING REQUEST is received, is decrypted using corresponding private key in step 4;
Specifically, with private key decrypting ciphertext message, and response is searched, comprise the following steps:
LBS service device receives the solicited message that user uploads, and request Service Properties in solicited message transfer with Corresponding RSA private keys;
The request message that LBS service device is uploaded using the RSA private keys decrypted user for obtaining, to determine the identity and use of user The location of family;
Then, customer location and inquiry request are directed in step 5, related database is searched, suitable sound is therefrom selected Message is answered, and the corresponding public key of user is found from public key storehouse, sent after encrypted response message;Specific implementation includes following step Suddenly:
LBS service device searches the public key of user according to the user id of decryption in public key storehouse;
LBS service device is encrypted using the public key of user to response message;
Cyphertext responses after encryption are sent to user terminal by LBS service device;
Then, after user receives message, message is decrypted using the private key of oneself, obtains respective service.
In order to be better understood from, the application utilization improves RSA Algorithm and querying attributes protection LBS user identity and position is hidden Private party's method, with user id as cell-phone number (13189340078), position is (98 (E), 45 (N)), and querying attributes are neighbouring automobile Stand, correspondence RSA public keys are (3,33), as a example by private key is (7,33), to the LBS user identity of the application and location privacy protection side Method is how to realize that user identity and the protection of location privacy are described in detail, and is specifically shown in Figure of description 2.
First, the bit digital of phone number 11 is grouped, one group two-by-two, is then grouped situation as follows:
13 18 93 40 07 8
User id is encrypted using public key (3,33) afterwards, result is obtained as follows:
19 24 15 13 13 17
Coordinate residing for user (98 (E), 45 (N)), is encrypted using public key (3,33) to it, obtains result as follows:
32 (E), 12 (N)
Then, building user's cipher-text message to be sent is:
T192415(2)13(1)131732(2)E12(1)Nbus station
LBS service device is received after user's ciphertext, and corresponding private key (7,33) is found according to bus station, decryption Ciphertext is as a result as follows:
T131827(2)07(1)070832(2)E12(1)N
It is further processed, obtains
User id:13189340078, coordinate (98E, 45N)
Then correspondence database is searched, the results list is obtained, after being encrypted with client public key, user terminal is returned to, it User terminal is decrypted using its private key to response message afterwards, obtains respective service.
In sum, this patent is directed to above-mentioned user identity and location privacy safety problem, proposes to utilize RSA Algorithm kimonos Business attribute protection LBS customer locations and privacy of identities.First, CA belongs to the key of user for a pair for each online user generation It is right<Uprivate,Upublic>, and all users public key UpublicCan all be found in public key storehouse disclosed in;LBS service Device generates a pair of RSA secret key pairs for every kind of attribute that may be inquired about<Aprivate,Apublic>, and by querying attributes and generation The public key of cipher key pair is sent in online user terminal;Before user terminal sends inquiry request information, according to being asked The attribute of service, is encrypted with corresponding public key to information;LBS service device after the CIPHERING REQUEST is received, using correspondence Private key be decrypted;And the list of user's corresponding requests is searched, and suitable response message is selected, find user couple from public key storehouse Sent after the public key answered, and encrypted response message;User is received after message, and the service is obtained using private key decryption.The party The advantage of method is double-encryption, to sending message encryption, has been effective against intercepting and capturing and has attacked;And response message is encrypted, effectively Deduction is prevented to attack.
The implementation method of invention described above, is not intended to limit the scope of the present invention..It is any in this hair Done modification, equivalent and improvement etc. within bright spiritual principles, should be included in claim protection of the invention Within the scope of.

Claims (3)

1. a kind of LBS customer locations and privacy of identities guard method, it is characterised in that comprise the following steps:
S1:CA belongs to the key pair of user for a pair for each online user generation<Uprivate,Upublic>, and all users public affairs Key UpublicCan all be found in public key storehouse disclosed in;
S2:LBS service device generates a pair of RSA secret key pairs for every kind of attribute that may be inquired about<Aprivate,Apublic>, inquiry is belonged to The public key of property and the cipher key pair of generation is sent in online user terminal;
S3:Before user terminal sends inquiry request information, according to the attribute for asking service, information is entered with corresponding public key Row encryption;Wherein encryption includes encrypting the identity information and positional information of user;
S4:LBS service device is decrypted after the CIPHERING REQUEST is received using corresponding private key;
S5:For customer location and inquiry request, related database is searched, select suitable response message, and from public key storehouse The corresponding public key of user is found, is sent after encrypted response message;
S6:User is received after message, and the service is obtained using private key decryption.
2. customer location according to claim 1 and privacy of identities guard method, described step S3 uses corresponding public key Information is encrypted, following steps are specifically included:
3.1 first encode customer attribute information, and the mapping set up between property value and digit strings, wherein property value include The id and positional information of user, specific form are as follows:
Above-mentioned form is a mapping process, and user id is that the phoneNum after its 11 phone numbers, therefore mapping is 11 Position.Location represents that wherein longitude range 0-180, east longitude is E for longitude and latitude, and west longitude is W;Latitude scope 0-90, north latitude is N, south latitude is S, therefore longitude below is 4 expressions, and (E, W) represents one of those, west longitude or east longitude; Latitude is 3 expressions, and (N, S) is of south latitude or north latitude
The digit strings of above-mentioned form are pressed two one group by 3.2, are grouped, it is assumed that character string is k1k2k3…k11(h1h2h3 (E)g1g2(S)), wherein g, h, k represent of Arabic numerals 0 to 9, then form is as follows after being grouped:
k1k2 k3k4 k5k6 k7k8 k9k10 k11(h1h2 h3 Eg1g2S)
3.3 using the corresponding public key A of user's querying attributes valuepublicThe grouped data that will be obtained is encrypted, afterwards by packet Sequential combination, to add and be sent to LBS service device after some necessary informations;Specific ciphering process is as follows:
3.3.1 A is assumedpublicPublic key is (m, n), using formula XXmModn=YY, XX/n=Q enter the grouped data that 3.2 obtain Row is calculated, and XX represents arbitrary two digits packet, and YY represents the encryption data for obtaining;Single numeral X after packet, Then utilize formula XmModn=YY is calculated;N is two secrecy prime number ps, the product of q.
3.3.2 after having calculated, the data to obtaining are arranged, and final transmission cipher-text message are obtained, including to each The corresponding Q values of XX judge, if Q=0, cipher-text message is directly YY;Otherwise, cipher-text message is YY (Q), and form is as follows:
k1’k2’k3’k4’k5’k6’(Q1)k7’k8’k9’k10’(Q2)k11’(h1’h2’h3’Eg1’g2’S)
3.3.3 above-mentioned cipher-text message and querying attributes service are sent jointly into LBS service device.
3. customer location according to claim 2 and privacy of identities guard method, in described step S4, LBS service device After the CIPHERING REQUEST is received, it is decrypted using corresponding private key, specifically includes following steps:
4.1LBS servers receive the solicited message that user uploads, and request Service Properties in solicited message are transferred therewith Corresponding RSA private keys Aprivate
The RSA private keys A that 4.2LBS server by utilizing is obtainedprivateThe request message that decrypted user is uploaded, to obtain the identity of user The location of and user, specifically include following steps:
4.2.1 assume that the corresponding private key for finding is AprivateIt is (w, n) that the cipher-text message that will first obtain is pairwise grouping;
4.2.2 formula YY is utilizedwModn=ZZ, and judge whether there is Q after the YY, if it has, then ZZ=ZZ+Q*n, ZZ are solution The close clear packets for obtaining;
4.2.3 arrange ZZ and obtain clear-text message k1k2k3…k100k11(0h1h2h3Eg1g2S), the telephone number for obtaining herein is noted It is 12 bit digitals, wherein the 11st is 0, removes;First digital for 0 removes in position coordinates longitude, remaining 0 retains, i.e., For the clear-text message that user sends;
4.3, according to customer location and request attribute, search corresponding database, extract the Response List for meeting and requiring.
CN201611013779.6A 2016-11-17 2016-11-17 A kind of LBS customer locations and privacy of identities guard method Pending CN106792501A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611013779.6A CN106792501A (en) 2016-11-17 2016-11-17 A kind of LBS customer locations and privacy of identities guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611013779.6A CN106792501A (en) 2016-11-17 2016-11-17 A kind of LBS customer locations and privacy of identities guard method

Publications (1)

Publication Number Publication Date
CN106792501A true CN106792501A (en) 2017-05-31

Family

ID=58969411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611013779.6A Pending CN106792501A (en) 2016-11-17 2016-11-17 A kind of LBS customer locations and privacy of identities guard method

Country Status (1)

Country Link
CN (1) CN106792501A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107749865A (en) * 2017-12-07 2018-03-02 安徽大学 Location privacy query method based on homomorphic encryption
CN108566383A (en) * 2018-03-22 2018-09-21 西安电子科技大学 A kind of intimacy protection system and method towards service of calling a taxi online
CN109218974A (en) * 2018-09-18 2019-01-15 北京邮电大学 It is a kind of cooperate secret protection node determine method and device
CN110972070A (en) * 2018-09-28 2020-04-07 苹果公司 System and method for locating wireless accessories
CN111510280A (en) * 2020-04-21 2020-08-07 国网河北省电力有限公司信息通信分公司 Universal Internet of things space L BS privacy security protection system and method
CN112084411A (en) * 2020-09-10 2020-12-15 绍兴文理学院 User privacy protection method for personalized information retrieval
WO2021093811A1 (en) * 2019-11-14 2021-05-20 华为技术有限公司 Network access method and related device
CN113420228A (en) * 2021-07-21 2021-09-21 北京沃东天骏信息技术有限公司 Information generation method and device
CN114125702A (en) * 2021-11-12 2022-03-01 东南大学 Position information fingerprinting protection method based on Monte Carlo algorithm
US20220070667A1 (en) 2020-08-28 2022-03-03 Apple Inc. Near owner maintenance
US11863671B1 (en) 2019-04-17 2024-01-02 Apple Inc. Accessory assisted account recovery
US12073705B2 (en) 2021-05-07 2024-08-27 Apple Inc. Separation alerts for notification while traveling
US12106641B2 (en) 2012-10-24 2024-10-01 Apple Inc. Devices and methods for locating accessories of an electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618995A (en) * 2013-12-04 2014-03-05 西安电子科技大学 Position privacy protection method based on dynamic pseudonyms
CN104219245A (en) * 2014-09-19 2014-12-17 西安电子科技大学 System and method for location based service-orientated user privacy protection
CN105354233A (en) * 2015-10-08 2016-02-24 西安电子科技大学 Linear SVM classification service query system and method with two-way privacy protection
CN105471826A (en) * 2014-09-04 2016-04-06 中电长城网际系统应用有限公司 Ciphertext data query method, device and ciphertext query server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618995A (en) * 2013-12-04 2014-03-05 西安电子科技大学 Position privacy protection method based on dynamic pseudonyms
CN105471826A (en) * 2014-09-04 2016-04-06 中电长城网际系统应用有限公司 Ciphertext data query method, device and ciphertext query server
CN104219245A (en) * 2014-09-19 2014-12-17 西安电子科技大学 System and method for location based service-orientated user privacy protection
CN105354233A (en) * 2015-10-08 2016-02-24 西安电子科技大学 Linear SVM classification service query system and method with two-way privacy protection

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘洪志: "Linux环境网关中IPSec VPN的设计与实现", 《中国优秀硕士学位论文》 *
陈昂: "云环境下LBS对称和非对称混合加密方案", 《中国优秀硕士学位论文》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12106641B2 (en) 2012-10-24 2024-10-01 Apple Inc. Devices and methods for locating accessories of an electronic device
CN107749865B (en) * 2017-12-07 2019-11-15 安徽大学 Location privacy query method based on homomorphic encryption
CN107749865A (en) * 2017-12-07 2018-03-02 安徽大学 Location privacy query method based on homomorphic encryption
CN108566383B (en) * 2018-03-22 2020-11-10 西安电子科技大学 Privacy protection system and method for online taxi-taking service
CN108566383A (en) * 2018-03-22 2018-09-21 西安电子科技大学 A kind of intimacy protection system and method towards service of calling a taxi online
CN109218974A (en) * 2018-09-18 2019-01-15 北京邮电大学 It is a kind of cooperate secret protection node determine method and device
CN110972070A (en) * 2018-09-28 2020-04-07 苹果公司 System and method for locating wireless accessories
CN110972070B (en) * 2018-09-28 2022-07-15 苹果公司 System and method for locating wireless accessories
US12075313B2 (en) 2018-09-28 2024-08-27 Apple Inc. System and method for locating wireless accessories
US11641563B2 (en) 2018-09-28 2023-05-02 Apple Inc. System and method for locating wireless accessories
US11606669B2 (en) 2018-09-28 2023-03-14 Apple Inc. System and method for locating wireless accessories
US11863671B1 (en) 2019-04-17 2024-01-02 Apple Inc. Accessory assisted account recovery
WO2021093811A1 (en) * 2019-11-14 2021-05-20 华为技术有限公司 Network access method and related device
CN111510280A (en) * 2020-04-21 2020-08-07 国网河北省电力有限公司信息通信分公司 Universal Internet of things space L BS privacy security protection system and method
US20220070667A1 (en) 2020-08-28 2022-03-03 Apple Inc. Near owner maintenance
US11889302B2 (en) 2020-08-28 2024-01-30 Apple Inc. Maintenance of wireless devices
CN112084411B (en) * 2020-09-10 2021-04-20 绍兴文理学院 User privacy protection method for personalized information retrieval
CN112084411A (en) * 2020-09-10 2020-12-15 绍兴文理学院 User privacy protection method for personalized information retrieval
US12073705B2 (en) 2021-05-07 2024-08-27 Apple Inc. Separation alerts for notification while traveling
CN113420228A (en) * 2021-07-21 2021-09-21 北京沃东天骏信息技术有限公司 Information generation method and device
CN114125702A (en) * 2021-11-12 2022-03-01 东南大学 Position information fingerprinting protection method based on Monte Carlo algorithm
CN114125702B (en) * 2021-11-12 2024-03-01 东南大学 Monte Carlo algorithm-based position information fingerprint protection method

Similar Documents

Publication Publication Date Title
CN106792501A (en) A kind of LBS customer locations and privacy of identities guard method
Wu et al. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
Kumari et al. Design of a provably secure biometrics-based multi-cloud-server authentication scheme
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
CN104219245B (en) System and method for location based service-orientated user privacy protection
CN103780393B (en) Virtual-desktop security certification system and method facing multiple security levels
CN105187389B (en) A kind of Web access method and system for obscuring encryption based on number
CN101282216B (en) Method for switching three-partner key with privacy protection based on password authentication
CN109040060B (en) Terminal matching method and system and computer equipment
CN109347626B (en) Safety identity authentication method with anti-tracking characteristic
Zhu et al. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data
Yassin et al. Efficient password-based two factors authentication in cloud computing
Li et al. Traceable and controllable encrypted cloud image search in multi-user settings
CN110474908A (en) Transaction monitoring and managing method and device, storage medium and computer equipment
Tsai et al. A new password-based multi-server authentication scheme robust to password guessing attacks
Li et al. A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
Chen et al. Enhanced authentication protocol for the Internet of Things environment
Backes et al. Using mobile device communication to strengthen e-voting protocols
Wang et al. One-round privacy-preserving meeting location determination for smartphone applications
Tao et al. Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks
CN104618113B (en) The method that the authentication of a kind of mobile terminal and safe lane are set up
CN106230840A (en) A kind of command identifying method of high security
Yang et al. A privacy model for RFID tag ownership transfer
CN106059767A (en) Terminal private data protection system and method based on Internet
CN102833239B (en) Method for implementing nesting protection of client account information based on network identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531

WD01 Invention patent application deemed withdrawn after publication