CN113949988A - Position protection method and system, and storage medium - Google Patents

Position protection method and system, and storage medium Download PDF

Info

Publication number
CN113949988A
CN113949988A CN202111154755.3A CN202111154755A CN113949988A CN 113949988 A CN113949988 A CN 113949988A CN 202111154755 A CN202111154755 A CN 202111154755A CN 113949988 A CN113949988 A CN 113949988A
Authority
CN
China
Prior art keywords
client
anonymous
transaction bill
data
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111154755.3A
Other languages
Chinese (zh)
Other versions
CN113949988B (en
Inventor
向舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN202111154755.3A priority Critical patent/CN113949988B/en
Publication of CN113949988A publication Critical patent/CN113949988A/en
Application granted granted Critical
Publication of CN113949988B publication Critical patent/CN113949988B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses a position protection method and system and a storage medium, wherein the position protection system comprises a first client, a second client and a block chain platform; a first client sends an anonymous area construction request to a second client; the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill; the second client sends the first transaction bill to the first client through the blockchain platform; the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform; the block chain platform performs data synchronization processing according to the anonymous position data, so that the safety of position protection can be improved, and the information sharing efficiency is improved.

Description

Position protection method and system, and storage medium
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method and a system for location protection, and a storage medium.
Background
Location Based Services (LBS) uses various types of positioning technologies to obtain the current Location of the positioning device, and provides information resources and basic Services to the positioning device through the mobile internet.
The K-anonymity (K-anonymity) is the most common method for LBS position privacy protection, and the basic idea is that when an LBS query request is sent, a user firstly at least acquires real positions of other K-1 cooperative users and then constructs an anonymous area, and then the anonymous area replaces the real position of the user to submit to the LBS, so that the personal position of the user is effectively protected; however, in the prior art, the process of constructing the anonymous area may have the risk of information leakage, and meanwhile, certain hysteresis exists in data interaction; therefore, the prior art has the problems of poor safety and untimely information sharing in the aspect of position protection.
Disclosure of Invention
The embodiment of the application provides a position protection method and system and a storage medium, which can improve the safety of position protection and improve the information sharing efficiency.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a location protection method, where the method is applied to a location protection system, where the location protection system includes a first client, a second client, and a blockchain platform; the method comprises the following steps:
the first client sends an anonymous area construction request to the second client;
the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill;
the second client sends the first transaction bill to the first client through the blockchain platform;
the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform;
and the block chain platform performs data synchronization processing according to the anonymous position data.
In a second aspect, an embodiment of the present application provides a location protection system, where the location protection system includes a first client, a second client, and a blockchain platform; the position protection system comprises a first sending unit, a processing unit, a second sending unit, a construction unit and a synchronization unit,
the first sending unit is used for the first client side to send an anonymous area construction request to the second client side;
the processing unit is used for the second client side to preprocess the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill;
the second sending unit is used for sending the first transaction bill to the first client by the second client through the blockchain platform;
the constructing unit is used for the first client side to carry out anonymous area constructing processing according to the first transaction bill, obtain anonymous position data and send the anonymous position data to the block chain platform;
and the synchronization unit is used for the block chain platform to perform data synchronization processing according to the anonymous position data.
In a third aspect, an embodiment of the present application provides a location protection system, which further includes a processor, and a memory storing instructions executable by the processor, and when the instructions are executed by the processor, the location protection method as described above is implemented.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, on which a program is stored, and the program is applied to a location protection system, and when the program is executed by a processor, the program implements the location protection method as described above.
The embodiment of the application provides a position protection method and system and a storage medium, wherein the position protection system comprises a first client, a second client and a block chain platform; a first client sends an anonymous area construction request to a second client; the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill; the second client sends the first transaction bill to the first client through the blockchain platform; the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform; and the block chain platform performs data synchronization processing according to the anonymous position data. Therefore, in the application, when constructing the anonymous location data, the first client may send an anonymous area construction request to the second client, and after receiving the anonymous area construction request, the second client may preprocess the location information to obtain a first transaction bill, where the first transaction bill is used as a transaction bill on the block chain platform; the second client side sends the first transaction bill to the first client side through the block chain platform, the first client side conducts anonymous area construction processing based on the first transaction bill, anonymous position data are obtained, and protection of real position information of the first client side is achieved through the anonymous position data; furthermore, the block chain platform can also perform data synchronization processing on the anonymous position data so as to improve the data synchronization efficiency; that is to say, the location protection method provided by the application completes construction of anonymous location data mainly based on a blockchain platform, and relevant data information in the construction process is recorded in a first transaction bill, so that the protection of the construction process of the anonymous location data of a first client can be realized by utilizing the advantage that data cannot be tampered by using a blockchain, and the security of location protection is improved; meanwhile, data synchronization processing can be performed on the anonymous position data based on the block chain platform, so that the information sharing efficiency is improved.
Drawings
Fig. 1 is a first schematic structural diagram of a position protection system according to an embodiment of the present disclosure;
fig. 2 is a first schematic flow chart illustrating an implementation of a location protection method according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating an implementation flow of a position protection method according to an embodiment of the present application;
fig. 4 is a schematic flow chart illustrating an implementation of a position protection method according to an embodiment of the present application;
fig. 5 is a schematic flow chart illustrating an implementation of a position protection method according to an embodiment of the present application;
fig. 6 is a schematic diagram illustrating an implementation flow of the position protection method according to the embodiment of the present application;
fig. 7 is a schematic flowchart illustrating a sixth implementation flow of the position protection method according to the embodiment of the present application;
fig. 8 is a seventh schematic flow chart illustrating an implementation of the position protection method according to the embodiment of the present application;
fig. 9 is a schematic structural diagram of a second exemplary embodiment of a position protection system;
fig. 10 is a schematic flowchart eight illustrating an implementation flow of the position protection method according to the embodiment of the present application;
fig. 11 is a schematic structural diagram of a third component of the position protection system according to the embodiment of the present application;
fig. 12 is a schematic structural diagram of a fourth component of the position protection system according to the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the specific embodiments described herein are illustrative of the relevant application and are not limiting of the application. It should be noted that, for the convenience of description, only the parts related to the related applications are shown in the drawings.
The LBS provides the user with value-added services including point-of-interest inquiry, advertisement push and entertainment games based on the location information provided by the user with the support of the geographic information system platform. The K anonymity algorithm is the most common method in LBS position privacy protection, and the basic idea is that when an LBS inquiry request is sent, a user firstly at least acquires real positions of other K-1 cooperative users and then constructs an anonymity area, and then the anonymity area replaces the real position of the user to be submitted to the LBS, so that the personal position of the user is effectively protected; and (5) carrying out K anonymization algorithm processing on the data. The data attacker after the K anonymity algorithm processing cannot know whether a specific individual gives a person in the public data, and cannot confirm whether the attacker has a sensitive attribute and cannot confirm which person corresponds to a certain piece of data. The service provider processes the user data of the anonymous area through a specific algorithm to provide services, so that the mode can protect the security of the data to a certain extent.
However, in the prior art, the process of constructing the anonymous area may have a risk of information leakage, and moreover, some self-benefited requesting users may also leak the location information to a third party after receiving the real location provided by the cooperative user when constructing the anonymous area; or some malicious attackers can impersonate as the requesting user to acquire the real position of the cooperative user, so that the position privacy of the cooperative user is leaked; or some cooperative users provide false positions to requesting users, and the like, which can cause the problem of poor safety of position protection; in addition, the prior art has certain hysteresis in data interaction and the problem of untimely information sharing.
In order to solve the problems of the position protection method in the prior art, the position protection system in the application comprises a first client, a second client and a block chain platform; a first client sends an anonymous area construction request to a second client; the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill; the second client sends the first transaction bill to the first client through the blockchain platform; the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform; the block chain platform performs data synchronization processing according to the anonymous position data; the safety of position protection can be improved, and the information sharing efficiency is improved.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Example one
Fig. 1 is a schematic structural diagram of a location protection system provided in an embodiment of the present application, and as shown in fig. 1, a location protection system 10 includes a first client 11, a second client 12, and a block chain platform 13.
Fig. 2 is a first schematic flow chart illustrating an implementation process of a location protection method according to an embodiment of the present application, as shown in fig. 2, the location protection method may include the following steps:
step 101, a first client sends an anonymous area construction request to a second client.
In an embodiment of the present application, a first client in a location protection system sends an anonymous zone construction request to a second client.
It should be noted that, in the embodiment of the present application, the anonymous area configuration request is used to instruct the configuration of anonymous location data; the anonymous region construction request may include data such as a timestamp of the request initiated by the first client, identification information of the first client, a first number of times the first client participates in the anonymous region collaborative construction, identification information of a transaction bill of the first client participating in the anonymous region collaborative construction, and private key information for signing.
Further, in the embodiments of the present application, a client refers to a program that corresponds to a server and provides local services to a client; generally installed on a common client, and is required to be operated with a server.
Further, in an embodiment of the present application, the first client refers to a client that requests construction of anonymous location data.
Further, in the embodiment of the present application, the second client refers to a client that receives the anonymous area configuration request sent by the first client and assists the first client in completing the anonymous location data configuration.
It should be noted that, in the embodiment of the present application, the number of the second clients may be multiple; that is, the first client may send anonymous region construction requests to the plurality of second clients, such that the plurality of second clients assist the first client in completing anonymous location data construction.
And 102, the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill.
In an embodiment of the application, after the first client sends the anonymous area construction request to the second client, the second client may pre-process the location information of the second client according to the anonymous area construction request to obtain the first transaction bill.
It can be understood that, in the embodiment of the application, the location protection is performed based on the K anonymization algorithm, and the principle is that the real locations of K-1 second clients other than the first client need to be obtained, and finally, anonymized location data is constructed through the real locations of the K-1 second clients to replace the real location of the first client, so as to realize the location protection; therefore, after receiving the anonymous area construction request of the first client, the second client can realize the subsequent construction of anonymous location data based on the location information of the second client; that is, the location information of the second client refers to real location information of the second client.
It should be noted that, in the embodiment of the present application, the preprocessing includes performing encryption processing and signature processing on the location information of the second client.
Further, in the embodiment of the present application, the first transaction bill refers to data information obtained by preprocessing the location information of the second client, and the data information may be used as a transaction bill in the blockchain platform.
It can be understood that, in the embodiment of the present application, the process of constructing the anonymous location data can be regarded as a transaction on a blockchain, so that when the anonymous location is constructed, relevant data information generated in the process of constructing the anonymous location is written into a transaction bill; once the position leakage or the cheating behavior occurs, the transaction bill can be utilized for arbitration, so that the safety of position protection is improved.
For example, in an embodiment of the present application, after receiving an anonymous area construction request, a second client performs preprocessing on location information of the second client to obtain a first transaction bill; the first transaction bill may include the preprocessed location information and the identification information of the first client.
And 103, the second client sends the first transaction bill to the first client through the blockchain platform.
In an embodiment of the application, after the second client preprocesses the location information of the second client according to the anonymous region construction request to obtain the first transaction bill, the second client may send the first transaction bill to the first client through the blockchain platform.
It should be noted that, in the embodiment of the present application, the blockchain platform is used to complete the construction of anonymous location data, and may also be used to perform operations such as unified transaction bill processing, transaction bill saving, and data synchronization processing; that is, the first client and the second client implement the construction of anonymous location data based on the blockchain platform.
It can be understood that, in the embodiment of the present application, after obtaining the first transaction bill, the second client may send the first transaction bill to the blockchain platform, and then the first client obtains the first transaction bill through the blockchain platform, that is, the second client sends the first transaction bill to the first client through the blockchain platform.
And step 104, the first client side performs anonymous area construction processing according to the first transaction bill to obtain anonymous position data and sends the anonymous position data to the block chain platform.
In an embodiment of the application, after the second client sends the first transaction bill to the first client through the blockchain platform, the first client may perform anonymous area construction processing according to the first transaction bill to obtain anonymous location data, and send the anonymous location data to the blockchain platform.
It should be noted that, in the embodiment of the present application, the anonymous area configuration process is used to obtain anonymous location data; the process specifically includes the steps that the first client side carries out verification processing on the first transaction bill according to the public key information to obtain a verification result; if the verification result is that the verification is passed, the first transaction bill is decrypted according to the third private key to obtain the position information; and finally, obtaining anonymous position data according to a preset algorithm and the position information.
Further, in the embodiment of the application, when the first client performs the anonymous location data construction operation multiple times at the same location, or performs the anonymous location data construction operation continuously, the anonymous area construction request does not need to be sent multiple times, but the first transaction bill stored in the blockchain platform can be searched, so that the location information of the second client participating in the cooperative construction of the anonymous location data in the history can be quickly acquired, the anonymous location data can be efficiently constructed again, and the efficiency of the anonymous location data construction is improved.
And 105, carrying out data synchronization processing by the block chain platform according to the anonymous position data.
In the embodiment of the application, after a first client side performs anonymous area construction processing according to a first transaction bill to obtain anonymous position data and sends the anonymous position data to a block chain platform, the block chain platform performs data synchronization processing according to the anonymous position data.
It should be noted that, in the embodiment of the present application, the performing, by the blockchain platform, data synchronization processing according to the anonymous location data may specifically include initiating, by the blockchain platform, an authentication request; then the third client responds to the verification request, and performs verification processing on the anonymous position data to obtain a verification result; the third client is other clients in the position protection system except the first client and the second client; then, the third client generates a second transaction bill according to the verification result and the anonymous position data, and sends the second transaction bill to the block chain platform; and finally, the blockchain platform performs broadcast processing based on the second transaction bill.
It can be understood that, in the embodiment of the present application, there may be a certain hysteresis in the conventional data synchronization process, thereby affecting the information sharing efficiency; however, the blockchain platform can overcome the defect, and achieve data synchronization, thereby improving the information sharing efficiency.
Fig. 3 is a schematic diagram illustrating an implementation flow of the location protection method according to the embodiment of the present application, where as shown in fig. 3, the anonymous area configuration request includes a first number of times that the first client participates in the anonymous area cooperative configuration; before the second client pre-processes the location information of the second client according to the anonymous area construction request and obtains the first transaction bill, that is, before step 102, the location protection method may further include the steps of:
step 106, the second client acquires the second times and the punished transaction bill quantity of the first client from the blockchain platform; and the second times is the times recorded in the block chain platform and the times of the first client participating in the anonymous area cooperative construction.
In an embodiment of the application, before the second client side preprocesses the position information of the second client side according to the anonymous area construction request and obtains the first transaction bill, the second client side obtains the second times and the punished transaction bill quantity of the first client side from the blockchain platform; and the second times is the times recorded in the block chain platform and the times of the first client participating in the anonymous area cooperative construction.
It should be noted that, in the embodiment of the present application, before the second client performs the preprocessing on the location information, the second client further needs to perform corresponding verification to ensure the authenticity of the relevant data in the anonymous region construction request provided by the first client, and after the first client can meet the requirement of assisting the first client in constructing the anonymous location data, the second client performs the preprocessing.
Further, in the embodiment of the present application, the second client performs the verification in a manner of first obtaining a second number of times and a punished transaction bill quantity of the first client, and then determining whether to perform the preprocessing based on the second number of times and the punished transaction bill quantity.
It should be noted that, in the embodiment of the present application, the second number is the number of times that the first client participates in the anonymous area collaborative configuration, which is recorded in the blockchain platform; that is, the second number is a real number of times that the first client participates in the anonymous region collaborative configuration, which is recorded in the blockchain platform.
Further, in the embodiment of the present application, the amount of the punished transaction bill refers to the amount of the punished transaction bill of the first client recorded in the blockchain platform; the punished transaction bill is used for recording the existence of cheating behaviors of the client; that is, the amount of punished transaction bills can indicate whether fraud is present at the first client, reflecting the first client's credit.
And step 107, the second client judges whether the first processing condition is met according to the first times, the second times and the punished transaction bill quantity.
In an embodiment of the application, after the second client obtains the second number of times and the punished transaction bill quantity of the first client from the blockchain platform, the second client may determine whether the first processing condition is satisfied according to the first number of times, the second number of times and the punished transaction bill quantity.
It should be noted that, in the embodiment of the present application, the first processing condition means that the first number and the second number satisfy the second processing condition, and the punished transaction bill amount is zero.
Specifically, in an embodiment of the present application, the step of the second client determining whether the first processing condition is satisfied according to the first number of times, the second number of times, and the punished transaction bill quantity may include the second client determining whether the second processing condition is satisfied according to the first number of times, the second number of times, and a preset number threshold; and if the second processing condition is met and the punished transaction bill quantity is zero, the first processing condition is met.
And step 108, if the first processing condition is judged to be met, the second client determines to execute the preprocessing flow.
In the embodiment of the application, after the second client determines whether the first processing condition is met according to the first number, the second number and the punished transaction bill quantity, if the first processing condition is determined to be met, the second client determines to execute the preprocessing process.
It is understood that, in the embodiment of the present application, if it is determined that the first processing condition is satisfied, it means that the relevant data in the anonymous area construction request provided by the first client is real, and the first client meets the requirement that the second client assists the second client in constructing the anonymous location data; thus, the second client may determine to perform preprocessing.
It can also be understood that, in the embodiment of the present application, after the second client determines whether the first processing condition is satisfied according to the first number, the second number and the punished transaction bill quantity, if the second client determines that the first processing condition is not satisfied, the second client does not execute the flow of the preprocessing.
Fig. 4 is a third schematic flow chart illustrating an implementation process of the location protection method according to the embodiment of the present application, as shown in fig. 4, the second client determines whether the first processing condition is satisfied according to the first number, the second number, and the amount of the punished transaction bill, that is, the method provided in step 107 may include the following steps:
and step 107a, the second client judges whether the second processing condition is met according to the first frequency, the second frequency and a preset frequency threshold.
In an embodiment of the application, the second client determines whether the first processing condition is satisfied according to the first number, the second number and the punished transaction bill number, and specifically, the second client determines whether the second processing condition is satisfied according to the first number, the second number and a preset number threshold.
It should be noted that, in the embodiment of the present application, the preset time threshold is used to preferentially select the client with a large number of historical participation times in the construction of the anonymous location data, so that the client may be encouraged to participate in the cooperation of the anonymous location data, so as to improve the probability of being collaboratively participated in the construction of the anonymous location data by other clients.
Specifically, in the embodiment of the present application, the determining, by the second client, whether the second processing condition is satisfied according to the first number, the second number, and the preset number threshold may include determining that the second processing condition is satisfied if the first number is the same as the second number, and the first number is greater than or equal to the preset number threshold.
And step 107b, if the second processing condition is met and the punished transaction bill quantity is zero, the first processing condition is met.
In the embodiment of the application, after the second client determines whether the second processing condition is satisfied according to the first number, the second number and the preset number threshold, if it is determined that the second processing condition is satisfied and the punished transaction bill quantity is zero, it is determined that the first processing condition is satisfied.
It can be understood that, in the embodiment of the present application, if it is determined that the second processing condition is satisfied, it indicates that the first number of times in the anonymous area configuration request provided by the first client is real data, and meanwhile, the first number of times satisfies a requirement of the second client for anonymous location data collaboration; if the punished transaction bill number is zero, the first client side history record does not have cheating behavior, and the credit is good; thereby determining that the first processing condition is satisfied.
Fig. 5 is a fourth schematic flow chart illustrating an implementation process of the location protection method according to the embodiment of the present application, as shown in fig. 5, the second client determines whether the second processing condition is satisfied according to the first number of times, the second number of times, and a preset number of times threshold, that is, the method provided in step 107b may include the following steps:
step 107b1, if the first number of times is the same as the second number of times and the first number of times is greater than or equal to the preset number of times threshold, it is determined that the second processing condition is satisfied.
In an embodiment of the application, the second client determines whether the second processing condition is satisfied according to the first number, the second number, and a preset number threshold, specifically, if the first number is the same as the second number and the first number is greater than or equal to the preset number threshold, it is determined that the second processing condition is satisfied.
It should be noted that, in the embodiment of the present application, the first time and the second time are the same, that is, the number of times that the first client provides the anonymous location data structure for the second client about participation in the collaboration is the same as the number of times that the real client participates in the collaboration recorded in the blockchain platform.
Further, in the embodiment of the present application, if the first number is greater than or equal to the preset number threshold, it indicates that the number of times that the first client participates in the cooperative anonymous location data construction meets the requirement of the second client.
Therefore, in the embodiment of the application, when the first number of times is the same as the second number of times and the first number of times is greater than or equal to the preset number of times threshold, it is determined that the first client satisfies the second processing condition.
Fig. 6 is a schematic flow chart of an implementation process of the location protection method according to the embodiment of the present application, as shown in fig. 6, the second client performs preprocessing on the location information of the second client according to the anonymous area construction request to obtain the first transaction bill, that is, the method provided in step 102 may include the following steps:
and 102a, the second client encrypts the position information according to the first private key to obtain the encrypted position information.
In an embodiment of the application, the second client performs preprocessing on the location information of the second client according to the anonymous area construction request to obtain the first transaction bill, and specifically, the second client may perform encryption processing on the location information according to the first private key to obtain the encrypted location information.
It should be noted that, in the embodiment of the present application, the first private key is used for performing encryption processing; the first private key is a private key pre-distributed to the second client, and the first private key is stored locally by the second client.
And 102b, the second client signs the encrypted position information according to the second private key to obtain a first transaction bill.
In the embodiment of the application, after the second client encrypts the location information according to the first private key to obtain the encrypted location information, the second client signs the encrypted location information according to the second private key to obtain the first transaction bill.
It should be noted that, in the embodiment of the present application, the second private key is used for performing signature processing, the second private key is also a private key pre-allocated to the second client, and similarly, the second private key is stored locally by the second client.
Further, in the embodiment of the present application, after the encrypted location information is signed, the first transaction bill may be generated according to the data information.
Fig. 7 is a sixth schematic flow chart of an implementation flow of the location protection method according to the embodiment of the present application, and as shown in fig. 7, the method for the first client to perform anonymous area configuration processing according to the first transaction bill and obtain anonymous location data may include the following steps:
step 201, the first client performs verification processing on the first transaction bill according to the public key information to obtain a verification result.
In an embodiment of the application, the first client performs anonymous area configuration processing according to the first transaction bill to obtain anonymous location data, and specifically, the first client may perform verification processing on the first transaction bill according to public key information to obtain a verification result.
It should be noted that, in the embodiment of the present application, the public key information is stored in the blockchain platform, and the public key information corresponds to the identity of the client; when the client needs to be verified, corresponding public key information can be obtained from the block chain platform according to the identity of the client.
Further, in the embodiment of the present application, the public key information is mainly used for performing the verification process.
It is understood that, in the embodiment of the present application, the verification result reflects whether the transaction bill is tampered during the information transmission process.
Further, in the embodiments of the present application, the verification result may include verification pass and verification fail; when the verification result is that the verification is passed, the data tampering of the first transaction bill in the transmission process is proved, and when the verification result is that the verification is not passed, the data tampering of the first transaction bill in the transmission process is proved.
And step 202, if the verification result is that the verification is passed, decrypting the first transaction bill according to the third private key to obtain the position information.
In the embodiment of the application, after the first client side performs verification processing on the first transaction bill according to the public key information and obtains a verification result, if the verification result is that the verification is passed, the first transaction bill is decrypted according to the third private key to obtain the location information.
It should be noted that, in the embodiment of the present application, the third private key is used for performing decryption processing, and the third private key is also a private key that is pre-assigned to the first client, and the third private key is stored locally by the first client.
It can be understood that, in the embodiment of the present application, after performing decryption processing according to the third private key, the location information of the second client can be obtained, and the location information is the real location information of the second client.
And step 203, obtaining anonymous position data according to a preset algorithm and the position information.
In the embodiment of the application, if the verification result is that the verification is passed, the first client decrypts the first transaction bill according to the third private key, and after the location information is obtained, the first client may obtain anonymous location data according to a preset algorithm and the location information.
It should be noted that, in the embodiment of the present application, the preset algorithm may be an LBS algorithm; that is, after obtaining the location information of the second client, the first client may invoke the LBS algorithm to construct anonymous location data based on the location information of the second client.
Further, in the embodiments of the present application, the location information may include at least K-1 location information, that is, after the first client obtains the at least K-1 location information, anonymous location data may be constructed based on the LBS algorithm and the at least K-1 location information.
Illustratively, in the embodiment of the application, the first client obtains the location information of the K-1 second clients, and then anonymous location data is constructed and obtained based on the LBS algorithm and the location information of the K-1 second clients, so that the anonymous location data can be used to replace the real location information of the first client, thereby protecting the location information of the first client.
Fig. 8 is a seventh implementation flow diagram of the location protection method according to the embodiment of the present application, and as shown in fig. 8, the blockchain platform performs data synchronization processing according to the anonymous location data, that is, the method provided in step 105 may include the following steps:
step 105a, the blockchain platform initiates a verification request.
In an embodiment of the present application, the blockchain platform performs data synchronization processing according to the anonymous location data, and specifically, the blockchain platform may first initiate an authentication request.
It should be noted that, in the embodiment of the present application, the authentication request is used to indicate that the anonymous location data is authenticated.
Step 105b, the third client responds to the verification request, and performs verification processing on the anonymous position data to obtain a verification result; the third client is other clients in the position protection system except the first client and the second client.
In the embodiment of the application, after the blockchain platform initiates the verification request, the third client may respond to the verification request and perform verification processing on the anonymous location data to obtain a verification result; the third client is other clients in the position protection system except the first client and the second client.
It should be noted that, in the embodiment of the present application, the client responding to the authentication request may be another client besides the first client and the second client, that is, a third client; that is, the anonymous location data may be verified by the third client to further verify the authenticity of the anonymous location data.
Further, in the embodiment of the present application, the third client may be a plurality of clients, that is, after the blockchain platform initiates the authentication request, a plurality of third clients may respond to the authentication request to perform the authentication processing on the anonymous location data.
For example, in an embodiment of the present application, fig. 9 is a schematic structural diagram of a composition of the location protection system provided in the embodiment of the present application, and as shown in fig. 9, the location protection system 10 may further include a third client 14.
It should be noted that, in the embodiment of the present application, a third client that preferentially completes the authentication process may be given an award, which may be a corresponding token award or a point award on the blockchain, so that the client may be encouraged to participate in the construction of the anonymous location data.
And 105c, the third client generates a second transaction bill according to the verification result and the anonymous position data, and sends the second transaction bill to the block chain platform.
In the embodiment of the application, after the third client side responds to the verification request, the anonymous location data is verified, and the verification result is obtained, the third client side can generate a second transaction bill according to the verification result and the anonymous location data, and send the second transaction bill to the blockchain platform.
It should be noted that, in the embodiment of the present application, after the third client completes the verification process, the second transaction bill may be generated according to the verification result and the anonymous location data.
Further, in the embodiment of the present application, the verification result is different, and the information contained in the second transaction bill is different, so that the type of the second transaction bill is different; for example, when the verification result is that the verification passes, the second transaction bill comprises the verification result and the anonymous location data, and the second transaction bill is a normal transaction bill; and when the verification result is that the verification fails, the second transaction bill comprises the verification result of the verification failure and the anonymous location data, and the second transaction bill can be used as a punished transaction bill.
Further, in an embodiment of the present application, after the third client generates the second transaction bill, the second transaction bill may also be sent to the blockchain platform.
And 105d, the blockchain platform performs broadcast processing based on the second transaction bill.
In an embodiment of the application, after the third client generates a second transaction bill according to the verification result and the anonymous location data and sends the second transaction bill to the blockchain platform, the blockchain platform may perform broadcast processing based on the second transaction bill.
It should be noted that, in the embodiment of the present application, according to a difference in the verification result, that is, a difference in the type of the second transaction bill, a process of performing broadcast processing on the basis of the second transaction bill by the blockchain platform is also different; specifically, when the verification result is that the verification is passed, the process of performing broadcast processing on the basis of the second transaction bill by the blockchain platform may be that the blockchain platform obtains the packed data on the basis of the consensus mechanism and the second transaction bill; then the block chain platform broadcasts the packed data; and when the verification result is that the verification fails, the blockchain platform directly performs broadcast processing on a second transaction bill, wherein the second transaction bill is a punished transaction bill.
It can be understood that, in the embodiment of the present application, the blockchain platform performs broadcast processing based on the second transaction bill, so that all the clients in the location protection system can obtain the latest bill information in real time, thereby implementing efficient information sharing and improving the service quality of the location protection system.
Fig. 10 is an eighth schematic flow chart illustrating an implementation flow of the location protection method according to the embodiment of the present application, as shown in fig. 10, if the verification result is that the verification is passed, the blockchain platform performs broadcast processing based on the second transaction bill, that is, the method set forth in step 105d may include the following steps:
step 105d1, the blockchain platform obtains the packaged data based on the consensus mechanism and the second transaction bill.
In an embodiment of the application, if the verification result is that the verification is passed, the blockchain platform performs broadcast processing based on the second transaction bill, and specifically, the blockchain platform obtains the packed data based on the consensus mechanism and the second transaction bill.
It should be noted that, in the embodiment of the present application, the consensus mechanism refers to selecting a part of clients from a third client that preferentially completes verification based on a specific random number algorithm, then performing data packing processing on a second transaction bill corresponding to the part of clients, and obtaining data after the data packing processing, that is, packed data.
Step 105d2, the blockchain platform broadcasts the packaged data.
In an embodiment of the application, after the blockchain platform obtains the packed data based on the consensus mechanism and the second transaction bill, the blockchain platform broadcasts the packed data.
It can be understood that, in the embodiment of the present application, the blockchain platform enables all the clients in the location protection system to have the latest billing information by performing broadcast processing on the packed data, thereby achieving efficient information sharing.
The embodiment of the application provides a position protection method, wherein a position protection system comprises a first client, a second client and a block chain platform; a first client sends an anonymous area construction request to a second client; the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill; the second client sends the first transaction bill to the first client through the blockchain platform; the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform; and the block chain platform performs data synchronization processing according to the anonymous position data. Therefore, in the application, when constructing the anonymous location data, the first client may send an anonymous area construction request to the second client, and after receiving the anonymous area construction request, the second client may preprocess the location information to obtain a first transaction bill, where the first transaction bill is used as a transaction bill on the block chain platform; the second client side sends the first transaction bill to the first client side through the block chain platform, the first client side conducts anonymous area construction processing based on the first transaction bill, anonymous position data are obtained, and protection of real position information of the first client side is achieved through the anonymous position data; furthermore, the block chain platform can also perform data synchronization processing on the anonymous position data so as to improve the data synchronization efficiency; that is to say, the location protection method provided by the application completes construction of anonymous location data mainly based on a blockchain platform, and relevant data information in the construction process is recorded in a first transaction bill, so that the protection of the construction process of the anonymous location data of a first client can be realized by utilizing the advantage that data cannot be tampered by using a blockchain, and the security of location protection is improved; meanwhile, data synchronization processing can be performed on the anonymous position data based on the block chain platform, so that the information sharing efficiency is improved.
Example two
Based on the above embodiments, exemplarily, in another embodiment of the present application, the requesting user corresponds to a first client, and the collaborating user corresponds to a second client; when a requesting user needs to construct anonymous location data, an anonymous area construction request can be sent to a second client corresponding to a cooperative user through a first client; the anonymous region construction request comprises data such as a timestamp of a request initiated by a first client, identity identification information of the first client, a first number of times that the first client participates in the anonymous region cooperation construction, identification information of a transaction bill of the first client participating in the anonymous region cooperation construction, and private key information for signature.
Further, in the embodiment of the present application, after receiving the anonymous area configuration request sent by the first client, the second client may perform a verification process, including first obtaining a second number of times and a punished transaction bill amount of the first client from the blockchain platform; and the second times is the times recorded in the block chain platform and the times of the first client participating in the anonymous area cooperative construction.
Further, in the embodiment of the present application, the first number of times, the second number of times, and a preset number of times threshold are compared, and if the first number of times is the same as the second number of times and the first number of times is greater than or equal to the preset number of times threshold, it is determined that the second processing condition is satisfied.
Further, in the embodiment of the present application, if the second client determines that the second processing condition is met, and the punished transaction bill quantity is zero, it is determined that the first processing condition is met, which means that the relevant data in the anonymous area configuration request provided by the first client is true, and the first client meets the requirement that the second client assists the second client in configuring the anonymous location data; that is, the second client determines that the location information can be pre-processed to assist the first client in completing the construction of the anonymous location data.
Further, in an embodiment of the present application, the second client performs preprocessing on the location information of the second client according to the anonymous area construction request, and obtains the first transaction bill.
Specifically, in an embodiment of the present application, the preprocessing the location information by the second client to obtain the first transaction bill may include encrypting the location information by the second client according to the first private key to obtain the encrypted location information; and then the second client carries out signature processing on the encrypted position information according to the second private key to obtain a first transaction bill.
Further, in an embodiment of the present application, the second client sends the first transaction bill to the first client through the blockchain platform.
Further, in an embodiment of the application, the first client performs anonymous area construction processing according to the first transaction bill, obtains anonymous location data, and sends the anonymous location data to the blockchain platform.
Specifically, in an embodiment of the present application, the first client performs an anonymous area configuration process according to the first transaction bill, and the process of obtaining anonymous location data may include: the first client side carries out verification processing on the first transaction bill according to the public key information to obtain a verification result; if the verification result is that the verification is passed, the first transaction bill is decrypted according to the third private key to obtain the position information; and finally, obtaining anonymous position data according to a preset algorithm and the position information.
Further, in an embodiment of the present application, after receiving the anonymous location data, the blockchain platform may perform data synchronization processing according to the anonymous location data.
Specifically, in this embodiment of the present application, the process of performing data synchronization processing by the blockchain platform according to the anonymous location data may include: firstly, a block chain platform initiates a verification request; then the third client responds to the verification request, and performs verification processing on the anonymous position data to obtain a verification result; the third client is other clients in the position protection system except the first client and the second client; the third client generates a second transaction bill according to the verification result and the anonymous position data and sends the second transaction bill to the block chain platform; and the last block chain platform performs broadcast processing based on the second transaction bill.
Further, in the embodiment of the present application, according to a difference in the verification result, a process of performing broadcast processing on the blockchain platform based on the second transaction bill is also different; specifically, when the verification result is that the verification is passed, the process of performing broadcast processing on the basis of the second transaction bill by the blockchain platform may be that the blockchain platform obtains the packed data on the basis of the consensus mechanism and the second transaction bill; then the block chain platform broadcasts the packed data; and when the verification result is that the verification fails, the block chain platform directly performs broadcast processing on the second transaction bill, and the second transaction bill is a punished transaction bill, so that efficient information sharing is realized, and the service quality of the position protection system is improved.
In summary, in the embodiment of the present application, the anonymous location data is constructed based on the blockchain platform, data related in the construction process of the anonymous location data is recorded in a transaction bill, and a process in which a requesting user, that is, a first client, acquires a real location of a collaborative user, that is, a second client, is regarded as a transaction on the blockchain; when there is a false location provided by the second client or the first client reveals the true location of the second client, the transaction bill may be used as a credential for arbitration; once a location leak or fraud is confirmed, the user and corresponding client having the above behavior will not be helped by other users and corresponding clients in making anonymous location data constructions so that they cannot successfully construct an anonymous area. In addition, in order to incentivize users and corresponding clients to participate in the maintenance of the blockchain, the users and corresponding clients that generate the packaged data may obtain corresponding rewards on the blockchain.
The embodiment of the application provides a position protection method, wherein a position protection system comprises a first client, a second client and a block chain platform; a first client sends an anonymous area construction request to a second client; the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill; the second client sends the first transaction bill to the first client through the blockchain platform; the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform; and the block chain platform performs data synchronization processing according to the anonymous position data. Therefore, in the application, when constructing the anonymous location data, the first client may send an anonymous area construction request to the second client, and after receiving the anonymous area construction request, the second client may preprocess the location information to obtain a first transaction bill, where the first transaction bill is used as a transaction bill on the block chain platform; the second client side sends the first transaction bill to the first client side through the block chain platform, the first client side conducts anonymous area construction processing based on the first transaction bill, anonymous position data are obtained, and protection of real position information of the first client side is achieved through the anonymous position data; furthermore, the block chain platform can also perform data synchronization processing on the anonymous position data so as to improve the data synchronization efficiency; that is to say, the location protection method provided by the application completes construction of anonymous location data mainly based on a blockchain platform, and relevant data information in the construction process is recorded in a first transaction bill, so that the protection of the construction process of the anonymous location data of a first client can be realized by utilizing the advantage that data cannot be tampered by using a blockchain, and the security of location protection is improved; meanwhile, data synchronization processing can be performed on the anonymous position data based on the block chain platform, so that the information sharing efficiency is improved.
EXAMPLE III
Based on the foregoing embodiment, in another embodiment of the present application, fig. 11 is a schematic structural diagram of a composition of the location protection system proposed in the embodiment of the present application, and as shown in fig. 11, the location protection system 10 proposed in the embodiment of the present application may include a first sending unit 15, a processing unit 16, a second sending unit 17, a constructing unit 18, a synchronizing unit 19, an obtaining unit 1110, and a determining unit 111.
The first sending unit 15 is configured to send an anonymous area configuration request to the second client by the first client.
The processing unit 16 is configured to perform preprocessing on the location information of the second client by the second client according to the anonymous area construction request, so as to obtain a first transaction bill.
The second sending unit 17 is configured to send the first transaction bill to the first client through the blockchain platform by the second client.
Further, the constructing unit 18 is configured to perform anonymous area constructing processing on the first client according to the first transaction bill, obtain anonymous location data, and send the anonymous location data to the blockchain platform.
Further, the synchronization unit 19 is configured to perform data synchronization processing by the blockchain platform according to the anonymous location data.
Further, the obtaining unit 110 is configured to, before the second client preprocesses the location information of the second client according to the anonymous area configuration request to obtain the first transaction bill, obtain, by the second client, a second number of times and a quantity of punished transaction bills of the first client from the blockchain platform; and the second times are recorded in the block chain platform, and the times that the first client participates in the anonymous area cooperative construction.
Further, the determining unit 111 is configured to determine, by the second client, whether the first processing condition is met according to the first number of times, the second number of times, and the punished transaction bill quantity.
Further, the processing unit 16 is further configured to determine, if it is determined that the first processing condition is satisfied, to execute the flow of the preprocessing by the second client.
Further, the determining unit 111 is specifically configured to determine, by the second client, whether a second processing condition is satisfied according to the first number of times, the second number of times, and a preset number of times threshold; and if the second processing condition is met and the punished transaction bill quantity is zero, determining that the first processing condition is met.
Further, the determining unit 111 is further specifically configured to determine that the second processing condition is satisfied if the first number of times is the same as the second number of times and the first number of times is greater than or equal to the preset number of times threshold.
Further, the obtaining unit 110 is specifically configured to encrypt the location information according to a first private key by the second client, so as to obtain encrypted location information; and the second client carries out signature processing on the encrypted position information according to a second private key to obtain the first transaction bill.
Further, the constructing unit 18 is specifically configured to verify the first transaction bill by the first client according to public key information, so as to obtain a verification result; if the verification result is that the verification is passed, decrypting the first transaction bill according to a third private key to obtain the position information; and obtaining the anonymous position data according to a preset algorithm and the position information.
Further, the synchronization unit 19 is specifically configured to initiate an authentication request by the blockchain platform; the third client responds to the verification request, and verifies the anonymous position data to obtain a verification result; the third client is other clients in the position protection system except the first client and the second client; the third client generates a second transaction bill according to the verification result and the anonymous position data, and sends the second transaction bill to the block chain platform; the blockchain platform performs broadcast processing based on the second transaction bill.
Further, the synchronization unit 19 is further specifically configured to obtain the packaged data based on a consensus mechanism and the second transaction bill by the blockchain platform; and the block chain platform performs the broadcast processing on the packed data.
Fig. 12 is a schematic diagram illustrating a fourth composition structure of the position protection system according to the embodiment of the present disclosure, as shown in fig. 12, the position protection system 10 according to the embodiment of the present disclosure may further include a processor 112 and a memory 113 storing executable instructions of the processor 112, and further, the position protection system 10 may further include a communication interface 114, and a bus 115 for connecting the processor 112, the memory 113, and the communication interface 114.
In an embodiment of the present Application, the Processor 112 may be at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a ProgRAMmable Logic Device (PLD), a Field ProgRAMmable Gate Array (FPGA), a Central Processing Unit (CPU), a controller, a microcontroller, and a microprocessor. It is understood that the electronic devices for implementing the above processor functions may be other devices, and the embodiments of the present application are not limited in particular. The processor 112 may further comprise a memory 113, which memory 113 may be connected to the processor 112, wherein the memory 113 is adapted to store executable program code comprising computer operating instructions, and the memory 113 may comprise a high speed RAM memory and may further comprise a non-volatile memory, such as at least two disk memories.
In the embodiment of the present application, the bus 115 is used to connect the communication interface 114, the processor 112, and the memory 113 and the intercommunication among these devices.
In an embodiment of the present application, the memory 113 is used for storing instructions and data.
Further, in an embodiment of the present application, the location protection system includes a first client, a second client, and a blockchain platform; the processor 112, where the first client sends an anonymous area configuration request to the second client;
the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill;
the second client sends the first transaction bill to the first client through the blockchain platform;
the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform;
and the block chain platform performs data synchronization processing according to the anonymous position data.
In practical applications, the Memory 113 may be a volatile Memory (volatile Memory), such as a Random-Access Memory (RAM); or a non-volatile Memory (non-volatile Memory), such as a Read-Only Memory (ROM), a flash Memory (flash Memory), a Hard Disk (Hard Disk Drive, HDD) or a Solid-State Drive (SSD); or a combination of the above types of memories and provides instructions and data to the processor 112.
In addition, each functional module in this embodiment may be integrated in one analysis unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated unit can be realized in a form of hardware or a form of a software functional module.
Based on the understanding that the technical solution of the present embodiment essentially or a part contributing to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium, and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method of the present embodiment. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiment of the application provides a position protection system, which comprises a first client, a second client and a block chain platform; a first client sends an anonymous area construction request to a second client; the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill; the second client sends the first transaction bill to the first client through the blockchain platform; the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform; and the block chain platform performs data synchronization processing according to the anonymous position data. Therefore, in the application, when constructing the anonymous location data, the first client may send an anonymous area construction request to the second client, and after receiving the anonymous area construction request, the second client may preprocess the location information to obtain a first transaction bill, where the first transaction bill is used as a transaction bill on the block chain platform; the second client side sends the first transaction bill to the first client side through the block chain platform, the first client side conducts anonymous area construction processing based on the first transaction bill, anonymous position data are obtained, and protection of real position information of the first client side is achieved through the anonymous position data; furthermore, the block chain platform can also perform data synchronization processing on the anonymous position data so as to improve the data synchronization efficiency; that is to say, the location protection method provided by the application completes construction of anonymous location data mainly based on a blockchain platform, and relevant data information in the construction process is recorded in a first transaction bill, so that the protection of the construction process of the anonymous location data of a first client can be realized by utilizing the advantage that data cannot be tampered by using a blockchain, and the security of location protection is improved; meanwhile, data synchronization processing can be performed on the anonymous position data based on the block chain platform, so that the information sharing efficiency is improved.
Specifically, the program instructions corresponding to a location protection method in this embodiment may be stored in a storage medium such as an optical disc, a hard disc, a usb disk, and the like, and the location protection system includes a first client, a second client, and a blockchain platform; when program instructions in a storage medium corresponding to a location protection method are read or executed by an electronic device, comprising the steps of:
the first client sends an anonymous area construction request to the second client;
the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill;
the second client sends the first transaction bill to the first client through the blockchain platform;
the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform;
and the block chain platform performs data synchronization processing according to the anonymous position data.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of implementations of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks and/or flowchart block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks in the flowchart and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application.

Claims (10)

1. The method is applied to a position protection system, and the position protection system comprises a first client, a second client and a block chain platform; the method comprises the following steps:
the first client sends an anonymous area construction request to the second client;
the second client side preprocesses the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill;
the second client sends the first transaction bill to the first client through the blockchain platform;
the first client side conducts anonymous area construction processing according to the first transaction bill, anonymous position data are obtained, and the anonymous position data are sent to the block chain platform;
and the block chain platform performs data synchronization processing according to the anonymous position data.
2. The method of claim 1, wherein the anonymous zone configuration request comprises a first number of times that the first client participates in anonymous zone collaborative configuration; the second client side preprocesses the position information of the second client side according to the anonymous area construction request, and before obtaining a first transaction bill, the method further comprises the following steps:
the second client acquires a second number of times and a punished transaction bill quantity of the first client from the blockchain platform; the second times are recorded in the block chain platform, and the times that the first client participates in anonymous area cooperative construction;
the second client judges whether a first processing condition is met or not according to the first times, the second times and the punished transaction bill quantity;
and if the first processing condition is judged to be met, the second client determines to execute the preprocessing flow.
3. The method of claim 2, wherein the second client determining whether a first processing condition is satisfied according to the first number, the second number and the punished transaction bill quantity comprises:
the second client judges whether a second processing condition is met or not according to the first times, the second times and a preset time threshold;
and if the second processing condition is met and the punished transaction bill quantity is zero, determining that the first processing condition is met.
4. The method of claim 3, wherein the determining, by the second client, whether a second processing condition is met according to the first number of times, the second number of times, and a preset number threshold comprises:
and if the first times and the second times are the same and the first times is greater than or equal to the preset times threshold, judging that the second processing condition is met.
5. The method of claim 1, wherein the second client pre-processes the location information of the second client according to the anonymous zone construction request to obtain a first transaction bill, comprising:
the second client side encrypts the position information according to the first private key to obtain encrypted position information;
and the second client carries out signature processing on the encrypted position information according to a second private key to obtain the first transaction bill.
6. The method of claim 5, wherein the first client performs an anonymous region construction process according to the first transaction bill to obtain anonymous location data, comprising:
the first client side carries out verification processing on the first transaction bill according to the public key information to obtain a verification result;
if the verification result is that the verification is passed, decrypting the first transaction bill according to a third private key to obtain the position information;
and obtaining the anonymous position data according to a preset algorithm and the position information.
7. The method of claim 6, wherein the blockchain platform performs data synchronization processing according to the anonymous location data, and comprises:
the block chain platform initiates a verification request;
the third client responds to the verification request, and verifies the anonymous position data to obtain a verification result; the third client is other clients in the position protection system except the first client and the second client;
the third client generates a second transaction bill according to the verification result and the anonymous position data, and sends the second transaction bill to the block chain platform;
correspondingly, if the verification result is that the verification is passed, the blockchain platform performs broadcast processing based on the second transaction bill, including:
the blockchain platform obtains packed data based on a consensus mechanism and the second transaction bill;
and the block chain platform performs the broadcast processing on the packed data.
8. A location protection system, comprising a first client, a second client, and a blockchain platform; the position protection system comprises a first sending unit, a processing unit, a second sending unit, a construction unit and a synchronization unit,
the first sending unit is used for the first client side to send an anonymous area construction request to the second client side;
the processing unit is used for the second client side to preprocess the position information of the second client side according to the anonymous area construction request to obtain a first transaction bill;
the second sending unit is used for sending the first transaction bill to the first client by the second client through the blockchain platform;
the constructing unit is used for the first client side to carry out anonymous area constructing processing according to the first transaction bill, obtain anonymous position data and send the anonymous position data to the block chain platform;
and the synchronization unit is used for the block chain platform to perform data synchronization processing according to the anonymous position data.
9. A position protection system, further comprising a processor, a memory storing instructions executable by the processor, the instructions when executed by the processor implementing the method of any of claims 1-7.
10. A computer-readable storage medium, on which a program is stored, for use in a position protection system, which program, when executed by a processor, carries out the method according to any one of claims 1-7.
CN202111154755.3A 2021-09-29 2021-09-29 Position protection method and system and storage medium Active CN113949988B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111154755.3A CN113949988B (en) 2021-09-29 2021-09-29 Position protection method and system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111154755.3A CN113949988B (en) 2021-09-29 2021-09-29 Position protection method and system and storage medium

Publications (2)

Publication Number Publication Date
CN113949988A true CN113949988A (en) 2022-01-18
CN113949988B CN113949988B (en) 2024-01-05

Family

ID=79329892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111154755.3A Active CN113949988B (en) 2021-09-29 2021-09-29 Position protection method and system and storage medium

Country Status (1)

Country Link
CN (1) CN113949988B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117411730A (en) * 2023-09-28 2024-01-16 贵州大学 Distributed position cache cooperation method based on excitation mechanism

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826237A (en) * 2014-02-28 2014-05-28 西安电子科技大学 Method for establishing location privacy protection model for continuous location based service
CN108173805A (en) * 2017-11-24 2018-06-15 西安电子科技大学 The Distributed Anonymous area cooperatively construct method with privacy preservation based on block chain
US20190034919A1 (en) * 2017-12-29 2019-01-31 Intel Corporation Securing Electronic Wallet Transactions
CN110276613A (en) * 2019-06-20 2019-09-24 卓尔智联(武汉)研究院有限公司 Data processing equipment, method and computer readable storage medium based on block chain
CN110443067A (en) * 2019-07-30 2019-11-12 卓尔智联(武汉)研究院有限公司 Federal model building device, method and readable storage medium storing program for executing based on secret protection
CN110505217A (en) * 2019-08-05 2019-11-26 河北科技大学 A kind of location privacy protection method merged based on game theory with block chain
CN111209594A (en) * 2020-01-14 2020-05-29 广东工业大学 Position privacy protection method based on Chinese remainder theorem and intelligent contract
WO2020258060A2 (en) * 2019-06-25 2020-12-30 南京邮电大学 Blockchain-based privacy protection trust model for internet of vehicles
CN112801131A (en) * 2020-12-17 2021-05-14 长安大学 Semantic track anonymous region construction method based on density clustering
CN113225324A (en) * 2021-04-26 2021-08-06 安徽中科晶格技术有限公司 Block chain anonymous account creation method, system, device and storage medium
CN113269428A (en) * 2021-05-19 2021-08-17 贵州大学 Intelligent contract sway-removing position privacy protection method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826237A (en) * 2014-02-28 2014-05-28 西安电子科技大学 Method for establishing location privacy protection model for continuous location based service
CN108173805A (en) * 2017-11-24 2018-06-15 西安电子科技大学 The Distributed Anonymous area cooperatively construct method with privacy preservation based on block chain
US20190034919A1 (en) * 2017-12-29 2019-01-31 Intel Corporation Securing Electronic Wallet Transactions
CN110276613A (en) * 2019-06-20 2019-09-24 卓尔智联(武汉)研究院有限公司 Data processing equipment, method and computer readable storage medium based on block chain
WO2020258060A2 (en) * 2019-06-25 2020-12-30 南京邮电大学 Blockchain-based privacy protection trust model for internet of vehicles
CN110443067A (en) * 2019-07-30 2019-11-12 卓尔智联(武汉)研究院有限公司 Federal model building device, method and readable storage medium storing program for executing based on secret protection
CN110505217A (en) * 2019-08-05 2019-11-26 河北科技大学 A kind of location privacy protection method merged based on game theory with block chain
CN111209594A (en) * 2020-01-14 2020-05-29 广东工业大学 Position privacy protection method based on Chinese remainder theorem and intelligent contract
CN112801131A (en) * 2020-12-17 2021-05-14 长安大学 Semantic track anonymous region construction method based on density clustering
CN113225324A (en) * 2021-04-26 2021-08-06 安徽中科晶格技术有限公司 Block chain anonymous account creation method, system, device and storage medium
CN113269428A (en) * 2021-05-19 2021-08-17 贵州大学 Intelligent contract sway-removing position privacy protection method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117411730A (en) * 2023-09-28 2024-01-16 贵州大学 Distributed position cache cooperation method based on excitation mechanism
CN117411730B (en) * 2023-09-28 2024-04-02 贵州大学 Distributed position cache cooperation method based on excitation mechanism

Also Published As

Publication number Publication date
CN113949988B (en) 2024-01-05

Similar Documents

Publication Publication Date Title
CN111062716B (en) Method and device for generating block chain signature data and block chain transaction initiating system
CN111429254B (en) Business data processing method and device and readable storage medium
US11004067B2 (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
EP3685334B1 (en) Improving integrity of communications between blockchain networks and external data sources
CN110692214B (en) Method and system for ownership verification using blockchain
CA3060101C (en) Anti-replay attack authentication protocol
CN110519260B (en) Information processing method and information processing device
JP5680115B2 (en) Transaction auditing for data security devices
CN109845220A (en) For providing the method and apparatus of block chain participant's identity binding
CN111625829A (en) Application activation method and device based on trusted execution environment
CN102694794B (en) A kind of scene information guard method for Android application program
CN111107066A (en) Sensitive data transmission method and system, electronic equipment and storage medium
JP2008501176A (en) Information distribution system that protects privacy
CN111327564B (en) Access method and device for alliance chain
JP6533542B2 (en) Secret key replication system, terminal and secret key replication method
CN110365472B (en) Quantum communication service station digital signature method and system based on asymmetric key pool pair
CN113901520A (en) Data processing method, device, equipment and medium based on block chain
CN113949988B (en) Position protection method and system and storage medium
CN117436043A (en) Method and device for verifying source of file to be executed and readable storage medium
CN110839067B (en) Information providing method and device
CN114338091A (en) Data transmission method and device, electronic equipment and storage medium
CN112865981A (en) Token obtaining and verifying method and device
KR20210129981A (en) Blockchain-based authentication system and method for preventing interception hacking attacks
WO2021019783A1 (en) Proprietor identity confirmation system, terminal, and proprietor identity confirmation method
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant