CN109714766B - Position sharing method and device - Google Patents

Position sharing method and device Download PDF

Info

Publication number
CN109714766B
CN109714766B CN201910100739.2A CN201910100739A CN109714766B CN 109714766 B CN109714766 B CN 109714766B CN 201910100739 A CN201910100739 A CN 201910100739A CN 109714766 B CN109714766 B CN 109714766B
Authority
CN
China
Prior art keywords
client
security level
target
position information
location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910100739.2A
Other languages
Chinese (zh)
Other versions
CN109714766A (en
Inventor
石颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SF Technology Co Ltd
Original Assignee
SF Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SF Technology Co Ltd filed Critical SF Technology Co Ltd
Priority to CN201910100739.2A priority Critical patent/CN109714766B/en
Publication of CN109714766A publication Critical patent/CN109714766A/en
Application granted granted Critical
Publication of CN109714766B publication Critical patent/CN109714766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a position sharing method and a device, comprising the following steps: acquiring and storing position information of a first client and a second client; determining a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, wherein the security level policy table comprises a corresponding relation between a determination factor and the security level; and sending the target position information of the second client to the first client and/or sending the target position information of the first client to the second client based on the target security level and the position information of the first client and/or the second client, wherein the target security level is used for indicating the precision range of the target position information. The embodiment of the application provides the safety level customization information sent according to different safety level strategy tables or a party participating in position sharing, automatic unified setting of the safety level is carried out, operation complexity is reduced, user experience is improved, and protection of user privacy data is achieved.

Description

Position sharing method and device
Technology neighborhood
The present application relates generally to the field of network security technologies, and in particular, to a location sharing method and apparatus.
Background
When two or more parties meet at an appointed position, the geographic position information of each party needs to be acquired in real time and mutually transmitted to the party needing meeting so as to promote the physical meeting of each party. When the position sharing is carried out on the communication terminals of multiple parties, the position information of the communication terminals is exposed in real time, so that the position sharing between two or more clients is realized.
At present, in order to protect the information security of the participants who participate in the location sharing and prevent the information leakage of the participants during the location sharing process, each participant needs to manually set a security level for protecting the information security of the participant during the location sharing process or before the location sharing process.
For each client participating in location sharing, when the setting of the security level is manually completed, the user operation is complicated, and therefore the user experience is reduced.
Disclosure of Invention
In view of the foregoing drawbacks and deficiencies of the prior art, it is desirable to provide a location sharing method and apparatus to improve user experience.
In a first aspect, an embodiment of the present application provides a location sharing method, where the method includes:
acquiring and storing position information of a first client and a second client;
determining a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, wherein the security level policy table comprises a corresponding relation between a determination factor and a security level, the security level customization message is sent by the first client, and the security level customization message comprises the target security level of the first client and/or the second client;
and sending target location information of the second client to the first client and/or sending target location information of the first client to the second client based on the target security level and the location information of the first client and/or the second client, wherein the target security level is used for indicating the precision range of the target location information.
In a second aspect, an embodiment of the present application provides a location sharing apparatus, including:
the acquisition module is used for acquiring and storing the position information of the first client and the second client;
a determining module, configured to determine a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, where the security level policy table includes a correspondence between a determination factor and a security level, the security level customization message is sent by the first client, and the security level customization message includes the target security level of the first client and/or the second client;
and the sending module is used for sending the target position information of the second client to the first client and/or sending the target position information of the first client to the second client based on the target security level and the position information of the first client and/or the second client, wherein the target security level is used for indicating the precision range of the target position information.
To sum up, according to the location sharing method and device provided by the embodiment of the application, after the server obtains the location information of the first client and the second client participating in location sharing, the server completes the determination of the current security level through a preset security level policy or a security level customization message sent by one client participating in location sharing, so that the unified automatic setting of the security level is realized, each client participating in location sharing is prevented from setting the own security level in the server, the operation complexity is reduced, the user experience is improved, and further, according to the set security level, the target location information corresponding to the set security level precision is sent to the sharer, and the privacy data of the sharer is protected.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic flow chart of a location sharing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a location sharing method according to another embodiment of the present application;
FIG. 3 is a schematic flow chart of a location sharing method according to another embodiment of the present application;
FIG. 4 is a schematic flow chart of a location sharing method according to another embodiment of the present application;
FIG. 5 is a schematic flow chart of a location sharing method according to another embodiment of the present application;
FIG. 6 is a schematic illustration of a client display of location sharing according to an embodiment of the present application;
FIG. 7 is a schematic structural diagram of a location sharing device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer system of a server according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant application and are not limiting of the application. It should be noted that, for the convenience of description, only the portions relevant to the application are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
It is understood that the plurality of clients participating in location sharing in the embodiments of the present application may be applications running on a hardware device with data processing capabilities, such as a mobile terminal or a computer. The small program loaded on other application programs with instant messaging functions, such as the small program loaded on the WeChat, can also be used.
It will also be appreciated that the mobile terminal running the applet may be a mobile terminal having a positioning function, such as a terminal having a bluetooth positioning function. For example, the beacon may be a dedicated beacon or a mobile phone terminal supporting the iBeacon protocol.
Correspondingly, in the embodiment of the present application, a bluetooth base station and a server may be configured. Multiple databases may be configured in the server. The system comprises a map information database, a position information database, a safety level database and the like. The Bluetooth base station is used for receiving the geographic position information of the client side acquired and sent by the Bluetooth positioning terminal and sending the geographic position information to the server. The map information database configured in the server can be used for storing map information data, and can be a grid map or a vector map. The map data of multiple map layers such as basic map information, path information, connection information between building floors, user interest points and the like can be included. The location information database may be configured to store the received geographic location information of the client, may include high-precision positioning information of the client, such as a room, a floor, or a building where the client is located, and may further include real-time data, historical data, static data, and the like in a time dimension. The historical data may be information such as an activity track and a range of the client within a certain time difference, for example, 0.5 h. The security level database can be used for storing data such as the current security level corresponding to each client and the security level policy set in the server. The security level indicates the accuracy range of the client sharing the position information of the client in the position sharing process.
The server in the embodiment of the application can be used for receiving the geographic position information sent by the Bluetooth base station, checking and calling data in the database, after the current security level is determined, carrying out fuzzy processing on the geographic position information of the client participating in position sharing, and finally sending the geographic position information to other clients so as to realize the setting of the security level of the client uniformly and automatically in the position sharing process and realize the privacy protection of the client.
An application scenario of the embodiment of the present application, for example, an organization or an enterprise needs to invite other partners or clients to visit the plant equipment or participate in a meeting. The inviting party may configure a location sharing system, such as an applet, in the server. The generated applet can be sent to the participants through broadcasting and the like, for example, in a two-dimensional code mode, so that the client of the invited participant runs the applet by identifying the two-dimensional code to become the client capable of participating in location sharing. Such as running the applet using a WeChat or the like.
In this scenario, assume that the client of the inviter is the first client and the client of the invitee is the second client. The user initiating the invitation may preset a security level policy table in a security level database of the server, so that in the location sharing process, the server may determine current target security levels of the first client and the second client participating in the location sharing according to the preset security level policy table; or the inviter sends a security level customization message to the server through the first client, so that the server directly sets the security levels of the first client and the second client participating in the location sharing according to the security level customization message. The server may also prompt the second client to accept and sign the electronic agreement of the security level and time period of itself and the first client when sharing the location, wherein the second client may accept or may reject and require additional negotiation. When the position is shared, the position information of the client and all the second clients can be displayed on the first client according to the set safety level, the position information of the client and the first client can be displayed on the second client, and auxiliary functions of schedule reminding, second client track inquiry, conference sign-in and the like are provided.
It will be appreciated that the inviter may set the scope of application of the security level policy in the server so that different clients have different security levels. For example, the inviting party may set the security level policies of some or all of the clients participating in the location sharing in the security level database of the server. Or when the inviter sends the security level customization message to the server through the first client, the security level customization message carries part or all of the security levels of the clients participating in the location sharing.
Through the selective setting, only the security level of the first client can be set in the server, and the data security of the server is ensured. And for other invitees second clients participating in the position sharing, the second clients have a fixed security level which is default by the server so as to report the accurate position to the first client in real time. Or when the security level is set by using the security level customization message, the user negotiates with other second client users to determine the security level or the preliminary security level of each second client, so as to protect the information security of the second client.
The second client may view and sign the electronic agreement of the security level and time period of the shared location information upon receiving the access invitation, i.e., when the applet that runs the location sharing for the first time becomes the second client. And when the position is shared, displaying the position information of the first client and the first client according to the set security level, and providing auxiliary functions of navigation, conference sign-in and the like.
It will be appreciated that in this scenario, an administrator client may also be provided, which may be used to set or modify the security level policy table in the security level database, and may also be used to view current and historical location information of the second client of the invitees, such as current visitor location distribution, historical track of specified visitors, visitor location out-of-bounds records, and so on.
In another scenario, including multiple first clients and multiple second clients, where mutual location sharing is required, security levels may be negotiated together, and the security level setting of each client is completed in the server by any party. For example, the security level of all or part of the participation in location sharing may be set in the server by some first client or its user.
For convenience of understanding and explanation, in the location sharing process in the embodiment of the present application, protection of location information of the client initiating the invitation and the client corresponding to the invited party is performed, and the location sharing method and apparatus provided in the embodiment of the present application are described in detail below with reference to fig. 1 to 8.
Fig. 1 is a schematic flowchart illustrating a location sharing method according to an embodiment of the present application, where as shown in fig. 1, the method includes:
s110, position information of the first client and the second client is obtained and stored.
Specifically, the server may obtain current location information of a plurality of clients participating in location sharing. The location information may include spatial information, temporal information, and/or velocity information.
For example, a plurality of clients participating in location sharing operate on a bluetooth positioning terminal, the bluetooth positioning terminal may be a dedicated beacon or a mobile phone terminal supporting the iBeacon protocol, and the server may receive location information reported by each bluetooth positioning terminal.
After the server receives the position information of the first client and the second client, the server can use the map information database inside the server to match with the map information in the map information database, and then the current positions of the first client and the second client are obtained through calculation. Further, the calculated user location may be stored, such as in a location information database stored in a server.
For example, in the application scenario described above, the first client is an initiator and the one or more second clients are invitees. After the sharing position starts, the server may obtain and store position information reported by the first client and the second client, where the position information indicates a current spatial position, a current time, and a current speed of the first client and the second client.
And S120, determining a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message.
Specifically, after the server obtains and stores the current space, time, speed, and other information of each client, the current target security level of each client may be determined according to a preset security level policy table or a received security level customization message. The target security level is used to indicate the accuracy range of the location information shared to the other party during the location sharing process.
Optionally, in the above application scenario, the inviter user may set a security level policy table in advance in the server, where the security level policy table may include a correspondence between the security level and the determination factor. The security level may include a plurality of levels ranging from obfuscation to precision, and a plurality of security levels may be set for spatial dimensions, temporal dimensions, and/or velocity dimensions of different precision. As shown in table 1 below, L4 is the highest precision level, which is accurate to the time precision and the space precision of the current time and meter level, and the precision is sequentially reduced, namely L3, L2, L1 and L0. Correspondingly, the safety factor is gradually improved from L4, L3, L2, L1 and L0.
TABLE 1 safety level Table
Figure BDA0001965605620000061
Figure BDA0001965605620000071
The above-mentioned determination factors may include distance, time, and location. That is, the security level policy table may include a distance security level comparison table, a time difference security level comparison table, and/or a location security level comparison table. Can be as shown in tables 2-4 below:
TABLE 2 distance safety class LUT
Distance (distance between sharers) Safety level (time dimension/space dimension)
>1000m L1
500m-1000m L2
100m-500m L3
<100m L4
TABLE 3 time difference safety class LUT
Time (difference from preset time) Safety level (time dimension/space dimension)
>2h L0
1h-1.5h L1
0.5h-1h L2
10min-30min L3
0-10min L4
TABLE 4 position safety level comparison table
Location (spatial location of invited party) Safety level (time dimension/space dimension)
Parking lot L1
Hall L2
Office area L3
Alert zone L4
In the above comparison table, the security level corresponding to each determination factor may be the temporal and spatial security levels in table 1.
It can be understood that one or more of the security level policy tables may be selectively set in the server, and the corresponding security levels may be determined to be more finely divided according to actual situations, which is not limited in this embodiment of the present application.
For example, different security level policy tables may be set in the server for different clients. If the time difference safety level comparison table is set for the first client, the distance level safety comparison table is set for other second clients. Alternatively, a plurality of different security level policy tables may be set for the same client. If the time and distance safety level comparison table is set for the first client, and the priority of the time difference safety level comparison table is higher than that of the distance safety belt energy level comparison table before the preset moment. If the conference starts at two points in the afternoon, twelve am may be set as a preset time, so that before twelve am, the second client participating in the conference cannot obtain the accurate position of the first client in a certain way.
After the server obtains the location information of the plurality of clients participating in location sharing, the server may determine a target security level currently corresponding to each client according to the security level policy table.
Likewise, the determined target security level may be a target security level of the first client, i.e., the first client needs to protect its information security with respect to the second client. The target security level may also be a security level of the second client, that is, the second client also needs to protect its security information, and does not need the first client to master its real-time dynamic message.
For example, when the first client is an inviter and the second clients are invitees, and when only one lookup table, such as a distance security level lookup table, is stored in the server, the target security level may be determined by using the distance between the second client of the invitee and the first client. When the server is provided with the distance safety level comparison table and the time difference safety level comparison table which are arranged before twelve am and have higher priority, the target safety level is determined by checking the time difference safety level comparison table before twelve am. After twelve points, the first client's accurate location information may be viewed using the distance safety lookup table.
Optionally, the server may also customize the message by receiving a security level sent by a certain client. The security level customization message is utilized to determine a security level currently corresponding to each client. The security level customization message may include its own target security level or may include the current target security levels of all clients.
For example, in the above embodiment, when an organization needs to hold a meeting, the first client of the inviter may send a security level customization message to the server. And the server customizes the message according to the security level sent by the first client and determines the security level of the second client and the first client of each participant. I.e., determining the security level of each client participating in the location sharing.
S130, based on the target security level and the position information of the first client and the second client, sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
Specifically, after the target security level and the current location information of each client are determined, the target location information may be sent to each client participating in location sharing according to the target security level.
For example, for the application scenario described above, the second client and the current target security level of the second client are both determined by the security level customization message to be L4 in time and space.
As shown in fig. 6, for the second client, such as the elevator currently located at the first floor, the server may directly send the current location information of the second client as the target location information to the first client, and send the location information of the first client as the target location information to the second client. As may be displayed on the first client: the second client is located in the elevator No. 1 of the first floor of the No. 3 building, and the current speed is 3 m/s. For the first client, currently located in the office of floor 5, then: the first client is located in the office of building 3, building 5 301, and the current speed is 0 m/s.
For another example, according to the location security level comparison table shown in table 4, since the second client is located in the first floor lobby, the target security level of the second client and the target security level of the first client are determined to be L2. The server may perform fuzzy processing on the location information of the first client and the second client, and generate target location information of the first client and the second client, so that the target location information is displayed at the first client: the second client is located in floor 3, floor xxxx, the current speed is 0-10m/s, and the second client displays that: the first client is located on floor 3, floor 5 xxxx, and the current speed is 0-10 m/s.
It will be appreciated that the first client may also display its current location information, as well as the second client.
Or, the map can be called at the first client and the second client, and the map is displayed in the form of icons. And e.g. on the map, displaying a dark area for the position of floor 3 to indicate that the second client is in floor 3.
For the convenience of understanding and explaining the detailed process of location sharing by a plurality of clients, the determination of the target security level and the generation of the target information are explained below by fig. 2 to 5.
S210, receiving a security level customization message sent by the first client.
S220, pushing the safety level customization message to the second client.
And S230, receiving a confirmation message of the security level customization message sent by the second client.
S240, acquiring the position information of the first client and the second client.
And S250, determining a target security level of the first client and/or the second client based on the security level customization message.
S260, preprocessing the position information of the first client and/or the second client based on the target security level, and generating target position information of the first client and/or the second client.
And S270, sending the target position information of the second client to the first client, and sending the target position information of the first client to the second client.
In this embodiment, in the above application scenario, the first client is an inviter initiating location sharing, and the at least one second client is an invitee. The first client may first generate and send a security level customization message to the server. It is to be understood that the security level customization message includes at least a target security level of the first client and/or the second client.
The target security level may be for the first client and/or the second client. That is, the first client may customize the security level for itself, so that the second client of the invited party cannot obtain the accurate information of the first client in real time. The information security of the invited party can be considered, and the security level information is customized for the invited party, so that the first client cannot acquire the position information of the second client in real time.
After receiving the security level customization message sent by the first client, the server can push the security level customization message customized by the first client to the multiple clients of the invited party. The second client may return an acknowledgement message to the server in response to the security level customization message.
For example, when the user of the second client agrees with the security level specified in the security level customization message, an acknowledgement message may be fed back to the server, and if not, an offline negotiation may be performed with the user of the first client. After the unification is achieved, the first client side can modify the target security level in the customized message, so that the server pushes a new security level customized message to the second client side again, and at the moment, the second client side can feed back a confirmation message to the server.
It is understood that in another example, the server may directly perform S240 without pushing the security customized message to the second client, that is, obtain the location information of the first client and the second client.
Specifically, after the target security level is determined, the accurate location information may be directly sent to the client participating in location sharing according to the determined target security level and the acquired location information. Or, the position information may be subjected to fuzzy processing to generate target position information matched with the accuracy of the target security level, and the target position information is sent to the corresponding client.
It is understood that, when sending the security level customization message, the first client may complete the setting of the security level of the whole location sharing process once before the location sharing starts. Or, the security level customization message can be sent at any time in the location sharing process, so that the server realizes the real-time adjustment of the security level.
It is also understood that the first client may include one or more target security levels in the security level customization message. That is, different security levels may be set in the server for different clients. For example, a first target security level corresponding to the first client and a second target security level corresponding to the second client may be included. The first target security level and the second target security level may be the same security level, and may be different security levels, so that different clients have different security levels.
According to the position sharing method, the server receives the safety level customization message sent by the first client, and then the target safety level of the first client and/or the second client is determined according to the safety level customization message, so that the position message can be sent to other clients after being subjected to fuzzy processing according to the target safety level of the client participating in sharing, position sharing is completed, information protection of different clients is achieved, and operation complexity is reduced.
Fig. 3 is a schematic flow chart of a location sharing method according to another embodiment of the present application, as shown in the figure, the method may include:
s310, position information of the first client and the second client is obtained.
S320, determining the current distance between the first client and the second client according to the position information of the first client and the second client.
S330, determining the target security level of the first client and/or the second client according to the current distance and the distance security level comparison table.
S340, preprocessing the position information of the first client and/or the second client based on the target security level, and generating target position information of the first client and/or the second client.
And S350, sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
Specifically, in the embodiment of the present application, when the security level policy table set in the server by the first client is a distance security level comparison table, in the location sharing process, after the server obtains the location information of the first client and the second client, the distance between the first client and the second client may be calculated, and then the distance security level comparison table is searched to determine the target security levels of the first client and the second client.
For example, when the distance between the first client and the second client is calculated to be 500m, the target security level in space and time of the first client and the second client may be determined to be L1 as shown in table 2.
It can be understood that a plurality of distance security level comparison tables may be preset in the server, for example, two distance security level comparison tables, one distance security level comparison table corresponding to the first client, and one distance security level comparison table corresponding to the second client may be set. The two distance security level comparison tables can have the same or different security level corresponding relations. Therefore, different target security levels of the first client and the second client can be determined after the distance between the first client and the second client is obtained.
After the target security level is determined, the accurate position information can be directly sent to the client participating in position sharing according to the determined target security level and the acquired position information. Or, the position information may be subjected to fuzzy processing to generate target position information matched with the accuracy of the target security level, and the target position information is sent to the corresponding client.
In the embodiment of the application, after the distance between the first client and the second client is obtained through calculation, the target security level of the first client and/or the second client can be determined by using a distance security level comparison table preset in the server, and then the position information of the second client and the position information of the second client can be sent to each other after fuzzy processing according to the determined target security level, so that position sharing is completed, flexible adjustment of the target security level is realized, operation complexity is reduced, and user experience is improved.
Fig. 4 is a schematic flow chart of a location sharing method according to another embodiment of the present application, where as shown in the figure, the method includes:
s410, acquiring the position information of the first client and the second client.
And S420, determining the current position of the second client based on the position information of the second client.
S430, determining the target security level of the first client and/or the second client based on the current position of the second client and the position security level comparison table.
S440, preprocessing the position information of the first client and/or the second client based on the target security level, and generating target position information of the first client and/or the second client.
S450, sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
Specifically, in the embodiment of the present application, a location security level comparison table may be preset in the server, as shown in table 4. After the spatial location of the second client is obtained, the location security level comparison table can be checked to determine the current target security levels of the first client and the second client.
For example, when it is determined that the current location of the second client is in the parking lot, the current target security level is determined to be L0 according to the location security level comparison table.
After the target security level is determined, the accurate location information can be directly sent to the client participating in location sharing according to the determined target security level and the acquired location information. I.e., S440 is not performed. Or, the position information may be subjected to fuzzy processing to generate target position information matched with the accuracy of the target security level, and the target position information is sent to the corresponding client.
In the embodiment of the application, after the position information of the second client is acquired, the current target safety level is searched and determined through the preset position safety level comparison table, and then the position sharing can be completed according to the determined target safety level, so that the flexible adjustment of the safety level in the position sharing process is realized, the operation complexity is reduced, and the user experience is improved.
Fig. 5 is a schematic flow chart of a location sharing method according to another embodiment of the present application, where as shown in the figure, the method includes:
s510, position information of the first client and the second client is obtained.
And S520, determining the current time.
S530, determining a time difference based on the current time and a preset time.
And S540, determining the target security level of the first client and/or the second client according to the comparison table of the time difference, the time security and the like.
And S550, preprocessing the position information of the first client and/or the second client based on the target security level, and generating target position information of the first client and/or the second client.
And S560, sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
Specifically, in the embodiment of the present application, in the location sharing process, when the security level policy table in the server is set as the time difference security level comparison table shown in table 3, the current target security level may be determined by determining the time difference between the current time and the preset time and checking the time difference security level comparison table.
For example, when the conference starts at two pm, the preset time is two pm. The target security level may be determined based on the time difference between the current time of day and two o' clock in the afternoon. Assuming that the current time is noon, the time difference is determined to be 3h, i.e., greater than 2h, and the target security level of the first client and/or the second client is determined to be L0.
After the target security level is determined, the position information may be subjected to fuzzy processing according to the determined target security level and the obtained position information, so as to generate target position information matching the accuracy of the target security level L0, and send the target position information to the corresponding client. And if the target position information of the first client is sent to the second client, the target position information of the second client is sent to the first client.
If the determined target security level is L4, it is possible to directly transmit accurate location information to the clients participating in location sharing without performing S540.
In the embodiment of the application, the target safety level is determined by calculating the time difference between the current time and the preset time, so that the safety level is flexibly adjusted in the position sharing process, the operation complexity is reduced, and the user experience is improved.
Fig. 7 is a schematic structural diagram of a location sharing device according to an embodiment of the present application, where the device may include:
an obtaining module 710, configured to obtain and store location information of a first client and a second client;
a determining module 720, configured to determine a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, where the security level policy table includes a corresponding relationship between a determination factor and a security level;
the sharing module 730 is configured to send the target location information of the second client to the first client and/or send the target location information of the first client to the second client based on the target security level and the location information of the first client and/or the second client, where the target security level is used to indicate a precision range of the target location information.
Optionally, in the location sharing apparatus in the embodiment of the present application, the determining module 720 is specifically configured to:
determining a current distance between the first client and the second client based on the location information of the first client and the second client;
determining a security level corresponding to the current distance based on the current distance and the distance security level comparison table, and using the security level as a target security level of the first client and/or the second client;
or
Determining the time difference between the current time and a preset time;
determining a security level corresponding to the time difference based on the time difference and the time difference security level comparison table, and taking the security level corresponding to the time difference as a target security level of the first client and/or the second client;
or
Determining the current position of the second client based on the position information of the second client;
and determining the security level corresponding to the current position as the target security level of the first client and/or the second client based on the current position of the second client and the position security level comparison table.
Optionally, in the position sharing apparatus according to the embodiment of the present application, the sharing module 730 is specifically configured to:
and based on the target security level, performing fuzzy processing on the position information of the first client and the second client to generate the target position information of the first client and/or the second client.
And sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
Optionally, the position sharing apparatus in the embodiment of the present application further includes:
a sending module 740, configured to push the security level customization message to the second client;
a receiving module 750, configured to receive the acknowledgement message sent by the second client.
On the other hand, embodiments of the present application further provide that the server includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the location sharing method as described above when executing the program.
Referring now to FIG. 8, shown is a block diagram of a computer system 800 suitable for use in implementing a server according to embodiments of the present application.
As shown in fig. 8, the computer system 800 includes a Central Processing Unit (CPU)801 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 803 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data necessary for the operation of the system 800 are also stored. The CPU 801, ROM 802, and RAM 803 are connected to each other via a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
The following components are connected to the I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as needed. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
In particular, according to embodiments of location sharing disclosed herein, the processes described above with reference to fig. 1-5 may be implemented as computer software programs. For example, embodiments of location sharing disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method of fig. 1. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, and may be described as: a processor includes an acquisition module, a determination module, and a sharing module. Where the names of these units or modules do not in some cases constitute a limitation of the units or modules themselves, the determining module may also be described as a "module for determining a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message", for example.
As another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the foregoing device in the foregoing embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein for determining location sharing, and in particular:
acquiring and storing position information of a first client and a second client;
determining a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, wherein the security level policy table comprises a corresponding relation between a determination factor and a security level, the security level customization message is sent by the first client, and the security level customization message comprises the target security level of the first client and/or the second client;
and sending target location information of the second client to the first client and/or sending target location information of the first client to the second client based on the target security level and the location information of the first client and/or the second client, wherein the target security level is used for indicating the precision range of the target location information.
To sum up, according to the location sharing method and device provided by the embodiment of the application, after the server obtains the location information of the first client and the second client participating in location sharing, the server completes the determination of the current security level through a preset security level policy or a security level customization message sent by one client participating in location sharing, so that the unified automatic setting of the security level is realized, each client participating in location sharing is prevented from setting the own security level in the server, the operation complexity is reduced, the user experience is improved, and further, according to the set security level, the target location information corresponding to the set security level precision is sent to the sharer, and the privacy data of the sharer is protected.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the application referred to in the present application is not limited to the particular combination of features described above, but also covers other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (9)

1. A method of location sharing, comprising:
acquiring and storing position information of a first client and a second client, wherein the first client is a conference inviter, and the second client is a conference invitee;
determining a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, wherein the security level policy table comprises a corresponding relation between a determination factor and a security level, the security level customization message is sent by the first client, the security level customization message comprises the target security level of the first client and/or the second client, the determination factor comprises a distance, a time and a position, the security level policy table comprises a distance security level comparison table, a time difference security level comparison table and/or a position security level comparison table, and the first client or the second client is configured with one or more than one security level policy table;
and sending the target position information of the second client to the first client and/or sending the target position information of the first client to the second client based on the target security level and the position information of the first client and the second client, wherein the target security level is used for indicating the precision ranges of the target position information and the action track.
2. The location sharing method according to claim 1, wherein the determining the target security level of the first client and/or the second client based on a preset security level policy table comprises:
determining a current distance between the first client and the second client based on the location information of the first client and the second client;
searching the distance safety level comparison table, and determining the safety level corresponding to the current distance as the target safety level of the first client and/or the second client;
or
Determining a time difference between the current time and a preset time;
searching the time difference safety level comparison table, and determining the safety level corresponding to the time difference as a target safety level of the first client and/or the second client;
or
Determining the current position of the second client based on the position information of the second client;
and searching the position security level comparison table, and determining the security level corresponding to the current position as the target security level of the first client and/or the second client.
3. The method according to claim 1 or 2, wherein the sending the target location information of the second client to the first client and/or the sending the target location information of the first client to the second client based on the target security level and the location information of the first client and the second client comprises:
based on the target security level, performing fuzzy processing on the position information of the first client and the second client to generate target position information of the first client and/or the second client;
and sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
4. The location sharing method according to claim 1, wherein before acquiring and storing the location information of the first client and the second client, further comprising:
receiving a security level customization message sent by the first client;
pushing the security level customization message to the second client;
and receiving a confirmation message sent by the second client in response to the safety level customization message.
5. The location sharing method according to any of claims 1 to 4, wherein the target location information comprises location data, time data and/or velocity data.
6. A location sharing apparatus, the apparatus comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring and storing position information of a first client and a second client, the first client is a conference inviter, and the second client is a conference invitee;
a determining module, configured to determine a target security level of the first client and/or the second client based on a preset security level policy table or a received security level customization message, where the security level policy table includes a correspondence between a determination factor and a security level, the security level customization message is sent by the first client, the security level customization message includes the target security level of the first client and/or the second client, the determination factor includes a distance, a time, and a location, the security level policy table includes a distance security level comparison table, a time difference security level comparison table, and/or a location security level comparison table, and the first client or the second client is configured with one or more than one security level policy table;
and the sharing module is used for sending the target position information of the second client to the first client and/or sending the target position information of the first client to the second client based on the target security level and the position information of the first client and/or the second client, wherein the target security level is used for indicating the target position information and the precision range of the action track.
7. The location sharing apparatus according to claim 6, wherein the determining module is specifically configured to:
determining a current distance between the first client and the second client based on the location information of the first client and the second client;
searching the distance safety level comparison table, and determining the safety level corresponding to the current distance as the target safety level of the first client and/or the second client;
or
Determining a time difference between the current time and a preset time;
searching the time difference safety level comparison table, and determining the safety level corresponding to the time difference as a target safety level of the first client and/or the second client;
or
Determining the current position of the second client based on the position information of the second client;
and searching the position security level comparison table, and determining the security level corresponding to the current position as the target security level of the first client and/or the second client.
8. The location sharing device according to any one of claims 6 or 7, wherein the sharing module is specifically configured to:
based on the target security level, performing fuzzy processing on the position information of the first client and the second client to generate target position information of the first client and/or the second client;
and sending the target position information of the second client to the first client, and/or sending the target position information of the first client to the second client.
9. The position sharing apparatus according to claim 6, further comprising:
the sending module is used for pushing the security level customization message to the second client;
the receiving module is used for receiving the security level customization message sent by the first client; and the second client is also used for receiving a confirmation message sent by the second client in response to the security level customization message.
CN201910100739.2A 2019-01-31 2019-01-31 Position sharing method and device Active CN109714766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910100739.2A CN109714766B (en) 2019-01-31 2019-01-31 Position sharing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910100739.2A CN109714766B (en) 2019-01-31 2019-01-31 Position sharing method and device

Publications (2)

Publication Number Publication Date
CN109714766A CN109714766A (en) 2019-05-03
CN109714766B true CN109714766B (en) 2022-06-03

Family

ID=66264176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910100739.2A Active CN109714766B (en) 2019-01-31 2019-01-31 Position sharing method and device

Country Status (1)

Country Link
CN (1) CN109714766B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114025047B (en) * 2021-11-05 2024-05-14 北京达佳互联信息技术有限公司 Message processing method, device, system, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868968A (en) * 2011-05-23 2013-01-09 苹果公司 Identifying and locating users on a mobile network
CN103202001A (en) * 2010-08-26 2013-07-10 苹果公司 Variable precision location sharing
CN104301998A (en) * 2014-10-10 2015-01-21 北京天一众合科技股份有限公司 Electronic device and electronic positioning system
CN104581625A (en) * 2014-11-12 2015-04-29 华中科技大学 Position privacy protection method and system based on particle size control
CN105554699A (en) * 2015-12-11 2016-05-04 中科创达软件股份有限公司 Method and device for terminal positioning
US9720555B2 (en) * 2011-12-23 2017-08-01 Gary SORDEN Location-based services

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026090B (en) * 2010-07-09 2014-07-16 北京哈工大计算机网络与信息安全技术研究中心 Node positioning method in IOT (Internet of things) and node
CN104684073A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 User position positioning method and user position positioning device
CN103957520A (en) * 2014-03-29 2014-07-30 华为技术有限公司 Device and method for controlling position accuracy

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103202001A (en) * 2010-08-26 2013-07-10 苹果公司 Variable precision location sharing
CN102868968A (en) * 2011-05-23 2013-01-09 苹果公司 Identifying and locating users on a mobile network
US9720555B2 (en) * 2011-12-23 2017-08-01 Gary SORDEN Location-based services
CN104301998A (en) * 2014-10-10 2015-01-21 北京天一众合科技股份有限公司 Electronic device and electronic positioning system
CN104581625A (en) * 2014-11-12 2015-04-29 华中科技大学 Position privacy protection method and system based on particle size control
CN105554699A (en) * 2015-12-11 2016-05-04 中科创达软件股份有限公司 Method and device for terminal positioning

Also Published As

Publication number Publication date
CN109714766A (en) 2019-05-03

Similar Documents

Publication Publication Date Title
CN103327063B (en) User there is detection and event finds
CN102868968B (en) The method and system of user is identified and positioned in a mobile network
US9338400B1 (en) Systems and methods for using equivalence classes to identify and manage participants and resources in a conference room
US20070233785A1 (en) Communicating using collaboration spaces
US20150200978A1 (en) Meeting Conflict Indicator
CN104160654A (en) Identifying meeting attendees using information from devices
CN107018138B (en) Method and device for determining rights
JP6190391B2 (en) Displaying remotely available users according to work status elsewhere
CN111429091A (en) Resource allocation method and device, electronic equipment and storage medium
CN110569057A (en) gray scale distribution method and device, electronic equipment and computer readable medium
CN113888104B (en) Schedule sharing method, device and equipment
US20220398544A1 (en) Tracking intended and actual participation in a meeting
CN112311841A (en) Information pushing method and device, electronic equipment and computer readable medium
CN105874481A (en) Method and system for scheduling of time-restricted shared assets
KR20150044087A (en) System and method for arranging a meeting, service apparatus applied to the same and computer readable medium having computer program recorded therefor
CN109714766B (en) Position sharing method and device
US20050004923A1 (en) Community service providing system and method
CN108234471B (en) Group entry verification method, group entry verification device, computer device and computer-readable storage medium
US20120239768A1 (en) Contacting an unavailable user through a proxy using instant messaging
CN115237533A (en) Information display method, device, equipment and medium
CN109547337A (en) For sending information, display position information, the method and apparatus for showing information
KR20120137617A (en) System for providing a social network service based on a position using a smart phone
CN113283830B (en) Method, device, equipment and computer readable medium for generating waybill information sequence
KR102533673B1 (en) Method and apparatus for providing group activity service
CN114827060A (en) Interaction method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant