[go: up one dir, main page]

WO2019169878A1 - User privacy-protective position information publishing system - Google Patents

User privacy-protective position information publishing system Download PDF

Info

Publication number
WO2019169878A1
WO2019169878A1 PCT/CN2018/112217 CN2018112217W WO2019169878A1 WO 2019169878 A1 WO2019169878 A1 WO 2019169878A1 CN 2018112217 W CN2018112217 W CN 2018112217W WO 2019169878 A1 WO2019169878 A1 WO 2019169878A1
Authority
WO
WIPO (PCT)
Prior art keywords
privacy
location information
user
location
clusterable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2018/112217
Other languages
French (fr)
Chinese (zh)
Inventor
张千里
王继龙
李星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Publication of WO2019169878A1 publication Critical patent/WO2019169878A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present invention relates to the field of computer network technologies, and in particular, to a location information publishing system for protecting user privacy.
  • Geographical location is usually presented in the form of longitude and latitude. Due to the existence of binary or even more metadata such as height, such data is usually not convenient for storage and presentation. When the Internet is used, it is inconvenient to use due to the complicated data structure. It is usually wrapped in a complex data structure over HTTP (HyperText Transfer Protoco).
  • the Geolocation API uses GPS (Global Positioning System, Global Positioning System), IP (Internet Protocol), RFID (Radio Frequency Identification), WiFi (WIreless-Fidelity). , wireless network), Bluetooth MAC address, GSM (Global System for Mobile communication) / CDMA (Code Division Multiple Access) card ID (Identification, identification number) and other information, get longitude and The location information represented by the latitude is then returned to the browser.
  • the present invention aims to solve at least one of the technical problems in the related art to some extent.
  • an object of the present invention is to provide a location information distribution system that protects user privacy, and the system can effectively implement location information distribution based on privacy of location information.
  • an embodiment of the present invention provides a location information distribution system for protecting user privacy, including: a location information acquisition module, configured to acquire user location information, where the location information acquisition module specifically includes: a client End, for processing the location information of the user by using a de-privacy processing method, to obtain a clusterable location code after de-privacy processing; and a server, configured to receive the convergence after the de-privacy processing sent by the client Class location coding, and recovering the de-privacy-processable clusterable location code by using a recovery method corresponding to the de-privacy processing method to obtain location information of the user; and a location information publishing module, configured to pass The hierarchical location privacy protection method separately publishes different precision information of the user location according to different authorization rights.
  • the location information issuance system for protecting user privacy ensures that applications with different authorizations are obtained through the hierarchical protection mechanism of the user location privacy. By using different parameters, location information with different precision can be obtained, and the location information is obtained by using the location information.
  • the clusterable coded representation after de-privacy processing enables the network application to obtain location information with different degrees of accuracy according to its own authorization authority, thereby effectively implementing location information release based on the protection of location information privacy.
  • the location information distribution system for protecting user privacy may further have the following additional technical features:
  • the client accesses the server through a WWW, and the server queries the location information of the user by calling an interface, and the client sends the convergence of the de-privacy process.
  • Class location code
  • the client embeds the clusterable location code of the de-privacy processing into the last 64 bits of the IPv6 unicast address, and recovers the content according to parameters preset by the user.
  • the clustering position code of the privacy process is obtained to obtain the location information of the user.
  • the clusterable position coding algorithm satisfies:
  • F(p,n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit
  • Hm(C) is a m-length unit before the position code of the length unit is intercepted.
  • the de-privacy processing method is:
  • the de-privacy processing function F is a mapping from ⁇ 0, 1 ⁇ n to ⁇ 0, 1 ⁇ n .
  • the method for recovering the post-privacy clusterable location code corresponding to the de-privacy processing method is:
  • the location information publishing module is further configured to obtain the location information of the user obtained by deprivation processing of multiple access rights to obtain The clusterable location code after the privacy process is released before the release.
  • the location information issuing module is further configured to recover the clusterable location code after the pre-release privacy processing, to obtain location information of the user, and issue the User's location information.
  • the previous part of the pre-release clusterable location code is not subjected to de-privacy processing, and the remaining part is subjected to de-privacy processing by the password preset by the user on the server. .
  • the system further includes: a rights management module, configured to separately grant a visitor to view rights according to different rights of different visitors, to obtain location information of the user according to the viewing rights.
  • a rights management module configured to separately grant a visitor to view rights according to different rights of different visitors, to obtain location information of the user according to the viewing rights.
  • FIG. 1 is a schematic structural diagram of a location information publishing system for protecting user privacy according to an embodiment of the present invention
  • FIG. 2 is a diagram of a method for generating clusterable position codes according to an embodiment of the present invention
  • FIG. 3 is a flow chart of location information release through de-privacy processing according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an algorithm for embedding a position code c into 64 bits after IPv6 according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of an algorithm for embedding a position code c into 64 bits after IPv6 according to an embodiment of the present invention
  • FIG. 7 is a flow diagram of multi-level de-privacy processing using a password of a client on a server, in accordance with one embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of a location information publishing system for protecting user privacy according to an embodiment of the present invention.
  • the location information issuance system 10 for protecting user privacy includes: a location information acquisition module 100 and a location information distribution module 200.
  • the location information obtaining module 100 is configured to obtain user location information, where the location information obtaining module 100 specifically includes: a client and a server.
  • the client is configured to process the location information of the user by using a de-privacy processing method to obtain the clusterable location code after the privacy processing;
  • the server is configured to receive the clusterable location code sent by the client after the privacy process, and
  • the clusterable location code after the de-privacy processing is restored by the recovery method corresponding to the de-privacy processing method to obtain the location information of the user.
  • the location information issuance module 200 is configured to separately publish different accuracy information of the user location according to different authorization rights by using the hierarchical location privacy protection method.
  • the system 10 of the embodiment of the present invention presents the location information in a clusterable code after de-privacy processing, so that the network application can obtain location information with different degrees of accuracy according to its own authorization authority, thereby realizing the protection of the location information privacy. Location information is posted.
  • the embodiment of the present invention relates to an internet device that knows the geographical location of its own, encodes its own geographic location, and the location range of the code that satisfies the longer prefix calibration is included in the location described by the shorter prefix.
  • This encoding can be multi-level de-private processing and can be shared with servers and other connected devices.
  • the embodiment of the present invention can realize the position information expression of different positional precision by using the clusterable position coding. For the same position, the more the number of bits used, the higher the positional accuracy and the higher the positional accuracy. Position-coded positional accuracy with positional coding with lower positional accuracy.
  • users with different authorization information can be guaranteed to obtain different precision location information for the same privacy location code, thereby protecting the user's location privacy security.
  • the client provides its own de-privatized clusterable location code to the server, and the server decodes the location code after the privacy-removal process to learn the location information of the client.
  • the client can be a variety of Internet devices such as mobile phones and computers.
  • the client provides the server with the clustered location code after the privacy process, and the server can restore the location code after the privacy process to the original location code according to the previously learned parameters, and then decode the data. Know the location information of the client. Other users cannot get accurate location information or even obtain location information without these pre-know parameters.
  • the clusterable position coding algorithm satisfies:
  • F(p,n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit
  • Hm(C) is a m-length unit before the position code of the length unit is intercepted.
  • the clusterable position coding satisfies the condition that F(p, n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit, and Hm(C) is a
  • the most important feature of the clusterable position coding algorithm is that the position range of the longer prefix calibration is included in the range of positions described by the shorter prefix. Obviously, simply connecting the latitude and longitude latitude does not satisfy this: assuming that the binary representation of longitude is a 1 a 2 ... a n and the binary representation of latitude is b 1 b 2 ... b n , then the 4-bit encoding is a 1 a 2 b 1 b 2 , and 2n bits are encoded as a 1 a 2 ... a n b 1 b 2 ... b n , whose first 4 bits are not a 1 a 2 b 1 b 2 .
  • the longitude and latitude are converted into binary representations of n bits, and the binary representations of longitude and latitude are crossed to form a positional code.
  • the method of converting the longitude to n-bit binary is to use 1 bit to represent the symbol, 8 bits to represent the data to the left of the decimal point, and the remaining n-9 bits to represent the data to the right of the decimal point; the conversion method for the latitude is One bit is used to represent the symbol, 7 bits are used to represent the data to the left of the decimal point, and the remaining n-8 bits are used to represent the data to the right of the decimal point.
  • the binary representation of equal length latitude and longitude is cross-combined to form the final position code.
  • the client accesses the server through the WWW, and the server queries the location information of the client by calling the interface, and the client returns a clusterable location code that has undergone de-privacy processing.
  • the specific steps are:
  • S101 The client accesses a WWW server.
  • S102 The server queries the location information of the client through a call interface such as Javascript or HTML5.
  • S103 The client obtains a clusterable position code of the current location information according to longitude and latitude.
  • S104 The client performs de-privacy processing on the clusterable location code and returns to the server.
  • S105 The server restores the de-privatization-processable clusterable location code to the original clusterable location code.
  • S106 The server extracts location information from the clusterable location code.
  • the client embeds the clusterable location code of the de-privacy process into the last 64 bits of the IPv6 unicast address, and restores the clustering of the privacy process according to the parameters preset by the user. Position code to get the user's location information.
  • the client can embed the clusterable location code of the IPv6 unicast address into the last 64 bits of the IPv6 unicast address, so that the server can recover the clusterable location code according to the previously known parameters, thereby obtaining Customer location information.
  • Other systems on the Internet cannot obtain accurate location information or even location information without these pre-known parameters.
  • the 7th bit of the 64-bit IPv6 address (also referred to as the interface identifier of the IPv6 address) is set to 1, the 40th bit of the last 64 bits is set to 1, and the rest is used to store the position code after de-privacy processing. . Since the EUI64 specification in the 64-bit generation scheme after the IPv6 address requires the 7th bit to be 1, and the 4th-5th byte is 0xFFFE, the above generation scheme can identify that the interface identifier contains location information.
  • IPv6 address also referred to as the interface identifier of the IPv6 address
  • the rest is used for the rest.
  • An important advantage of issuing location information by the above location coding is that it is convenient to adopt hierarchical location privacy protection measures, so that different precision information can be provided with different precision for different authorizations.
  • the method of de-privacy processing is:
  • the de-privacy processing function F is a mapping from ⁇ 0, 1 ⁇ n to ⁇ 0, 1 ⁇ n .
  • the embodiment of the present invention relates to a privacy protection measure for clusterable location coding as above.
  • the clusterable location code is deprived.
  • f 0 is a constant, and define the de-privacy processing function F to be a slave ⁇ 0,1 ⁇
  • the mapping of n to ⁇ 0,1 ⁇ n is defined as follows:
  • the algorithm for de-privacy processing is a de-privacy algorithm that maintains the prefix, that is, for any two position codes, if the first k bits are the same before de-privacy, then the first k bits are the same after the privacy.
  • the method for recovering the post-privacy clusterable location code corresponding to the de-privacy processing method is:
  • the present invention relates to a method for recovering the clusterable position code after de-privacy, as described above.
  • S304 Represents an XOR operation.
  • S502 Represents an XOR operation.
  • the location information issuance module 200 is further configured to obtain the location information of the user obtained through the de-privacy processing of the multiple access rights to obtain the privacy process before the release.
  • the latter can be clustered position code.
  • the embodiment of the present invention relates to a multi-level privacy protection measure for clusterable coding as above.
  • E A block encryption algorithm
  • K the encryption key
  • Specific steps are as follows:
  • S603 Perform the de-privacy processing on the N i-1 +1 to N i-1 + n i bits of a with the parameter S i using the steps S201 to S205 or the steps S301 to S305.
  • the location information issuance module 200 is further configured to recover the clusterable location code after the privacy process is released, to obtain the location information of the user, and publish the location information of the user.
  • S703 Restore the N i-1 +1 to N i-1 + n i bits of a with the parameter S i using the steps S401 to S405 or the steps S501 to S505.
  • the encryption algorithm may be an AES algorithm, where the encryption algorithm may be 128, 192 or 256 bits.
  • the encryption algorithm therein may not perform any encryption, which is equivalent to not performing privacy processing.
  • the previous part of the clusterable position code before the release is not subjected to the de-privacy process, and the remaining part is subjected to the privacy process by the password preset by the user on the server.
  • the system 10 of the embodiment of the present invention further includes: a rights management module.
  • the rights management module is configured to respectively grant the access rights to the visitor according to the different rights of different visitors, so as to obtain the location information of the user according to the viewing rights.
  • embodiments of the present invention relate to a method for a client to provide location information of a hierarchical authority to a server in an internetwork.
  • the server needs to know the location of the client, the client reports to the server a clusterable location code that has been de-privatized.
  • the first part of the client does not perform privacy processing, and the latter part uses the password of the user on the server.
  • the agreed-to-private algorithm performs de-privacy processing so that other users on the network can only know the approximate scope of the user, and the server can know the exact location of the user according to the user's password.
  • the client replies the de-privatized clusterable location code to the server or embeds it into the IPv6 unicast address to implement location information release based on the privacy protection.
  • the specific steps are as follows:
  • S801 The client obtains its own location information.
  • S804 Perform de-privacy processing on the remaining bits of the clusterable position code, where the key is an authentication password of the client on the server, and the encryption algorithm is an appointment algorithm.
  • S806 The result is handed to the server or embedded in the last 64 bits of IPv6.
  • the location information issuance system for protecting user privacy ensures that applications with different authorizations are obtained through the hierarchical protection mechanism of user location privacy. By using different parameters, location information with different precision can be obtained.
  • the location information is presented in a clusterable code after de-privacy processing, so that the network application can obtain location information with different degrees of accuracy according to its own authorization authority, thereby effectively implementing location information release based on the protection of location information privacy.
  • first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
  • features defining “first” or “second” may include at least one of the features, either explicitly or implicitly.
  • the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise.
  • the terms “installation”, “connected”, “connected”, “fixed” and the like shall be understood broadly, and may be either a fixed connection or a detachable connection, unless explicitly stated and defined otherwise. , or integrated; can be mechanical or electrical connection; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of two elements or the interaction of two elements, unless otherwise specified Limited.
  • the specific meanings of the above terms in the present invention can be understood on a case-by-case basis.
  • the first feature "on” or “under” the second feature may be a direct contact of the first and second features, or the first and second features may be indirectly through an intermediate medium, unless otherwise explicitly stated and defined. contact.
  • the first feature "above”, “above” and “above” the second feature may be that the first feature is directly above or above the second feature, or merely that the first feature level is higher than the second feature.
  • the first feature “below”, “below” and “below” the second feature may be that the first feature is directly below or obliquely below the second feature, or merely that the first feature level is less than the second feature.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Provided in the present invention is a user privacy-protective position information publishing system, comprising: a position information acquisition module for acquiring position information of a user, and specifically comprising: a client for processing the position information of the user by means of a privacy-removal processing method, so as to obtain a privacy-removed clusterable position code; a server for receiving the privacy-removed clusterable position code sent by the client, and using a recovery method corresponding to the privacy-removal processing method to restore the privacy-removed clusterable position code, so as to obtain the position information of the user; and a position information publishing module for publishing, according to different authorization permissions, user position information having different degrees of precision by means of a hierarchical position privacy protection method. Said system displays position information as a privacy-removed clusterable code, and obtains position information having different degrees of precision according to authorization permissions, thereby publishing position information while protecting position information privacy.

Description

保护用户隐私的位置信息发布系统Location information publishing system for protecting user privacy

相关申请的交叉引用Cross-reference to related applications

本申请要求清华大学于2018年03月26日提交的、发明名称为“保护用户隐私的位置信息发布系统”的、中国专利申请号“201810183549.7”的优先权。The present application claims priority from the Chinese Patent Application No. "201810183549.7" filed by Tsinghua University on March 26, 2018, entitled "Location Information Release System for Protecting User Privacy".

技术领域Technical field

本发明涉及计算机网络技术领域,特别涉及一种保护用户隐私的位置信息发布系统。The present invention relates to the field of computer network technologies, and in particular, to a location information publishing system for protecting user privacy.

背景技术Background technique

地理位置通常以经度、纬度的方式呈现,由于有二元甚至更多元数据如高度的存在,这样的数据通常不便于存储、呈现,在互联网使用时,由于数据结构较为复杂,因此不便于使用,通常是通过HTTP(HyperText Transfer Protoco,超文本传输协议)之上用复杂的数据结构来进行包装呈现。在HTML5的实现中,Geolocation API通过使用GPS(GlobalPositioning System,全球定位系统)、IP(Internet Protocol,网络之间互连的协议)地址、RFID(Radio Frequency Identification,射频识别)、WiFi(WIreless-Fidelity,无线网)、蓝牙MAC地址、GSM(Global System for Mobile communication,全球移动通信系统)/CDMA(Code Division Multiple Access,码分多址)卡ID(Identification,身份标识号)等信息,得到经度和纬度所代表的位置信息,然后返回给浏览器。Geographical location is usually presented in the form of longitude and latitude. Due to the existence of binary or even more metadata such as height, such data is usually not convenient for storage and presentation. When the Internet is used, it is inconvenient to use due to the complicated data structure. It is usually wrapped in a complex data structure over HTTP (HyperText Transfer Protoco). In the implementation of HTML5, the Geolocation API uses GPS (Global Positioning System, Global Positioning System), IP (Internet Protocol), RFID (Radio Frequency Identification), WiFi (WIreless-Fidelity). , wireless network), Bluetooth MAC address, GSM (Global System for Mobile communication) / CDMA (Code Division Multiple Access) card ID (Identification, identification number) and other information, get longitude and The location information represented by the latitude is then returned to the browser.

然而,随着用户对位置隐私保护意识的逐渐增强,用户倾向于不暴露自己精确的位置信息,而是只提交足够网络应用继续开展的模糊的位置信息,且用户出于隐私保护的考虑不允许位置信息的发布,反而限制了位置相关应用的发展。However, as users become more aware of the protection of location privacy, users tend not to expose their precise location information, but only submit fuzzy location information that is sufficient for the network application to continue, and the user does not allow privacy protection considerations. The release of location information limits the development of location-related applications.

发明内容Summary of the invention

本发明旨在至少在一定程度上解决相关技术中的技术问题之一。The present invention aims to solve at least one of the technical problems in the related art to some extent.

为此,本发明的一个目的在于提出一种保护用户隐私的位置信息发布系统,该系统可以有效实现在保护位置信息隐私基础上的位置信息发布。To this end, an object of the present invention is to provide a location information distribution system that protects user privacy, and the system can effectively implement location information distribution based on privacy of location information.

为达到上述目的,本发明一方面实施例提出了一种保护用户隐私的位置信息发布系统,包括:位置信息获取模块,用于获取用户位置信息,其中,所述位置信息获取模块具体包括:客户端,用于通过去隐私处理方法处理所述用户的位置信息,以获取去隐私处理后的可聚类位置编码;服务器,用于接收所述客户端发送的所述去隐私处理后的可聚类位置编 码,并通过与所述去隐私处理方法对应的恢复方法将所述去隐私处理后的可聚类位置编码进行恢复,以得到所述用户的位置信息;位置信息发布模块,用于通过分级位置隐私保护方法根据不同的授权权限,分别发布用户位置不同精度信息。To achieve the above objective, an embodiment of the present invention provides a location information distribution system for protecting user privacy, including: a location information acquisition module, configured to acquire user location information, where the location information acquisition module specifically includes: a client End, for processing the location information of the user by using a de-privacy processing method, to obtain a clusterable location code after de-privacy processing; and a server, configured to receive the convergence after the de-privacy processing sent by the client Class location coding, and recovering the de-privacy-processable clusterable location code by using a recovery method corresponding to the de-privacy processing method to obtain location information of the user; and a location information publishing module, configured to pass The hierarchical location privacy protection method separately publishes different precision information of the user location according to different authorization rights.

本发明实施例的保护用户隐私的位置信息发布系统,通过建立的用户位置隐私的分级保护机制保证了具有不同授权的应用,通过使用不同的参数,可以得到不同精度的位置信息,通过将位置信息以去隐私处理后的可聚类编码呈现,使得网络应用能够根据自己的授权权限,得到不同精确程度的位置信息,从而有效实现在保护位置信息隐私基础上的位置信息发布。The location information issuance system for protecting user privacy according to the embodiment of the present invention ensures that applications with different authorizations are obtained through the hierarchical protection mechanism of the user location privacy. By using different parameters, location information with different precision can be obtained, and the location information is obtained by using the location information. The clusterable coded representation after de-privacy processing enables the network application to obtain location information with different degrees of accuracy according to its own authorization authority, thereby effectively implementing location information release based on the protection of location information privacy.

另外,根据本发明上述实施例的保护用户隐私的位置信息发布系统还可以具有以下附加的技术特征:In addition, the location information distribution system for protecting user privacy according to the above-described embodiments of the present invention may further have the following additional technical features:

进一步地,在本发明的一个实施例中,所述客户端通过WWW访问所述服务器,所述服务器通过调用接口询问所述用户的位置信息,所述客户端发送所述去隐私处理的可聚类位置编码。Further, in an embodiment of the present invention, the client accesses the server through a WWW, and the server queries the location information of the user by calling an interface, and the client sends the convergence of the de-privacy process. Class location code.

进一步地,在本发明的一个实施例中,所述客户端通过将所述去隐私处理的可聚类位置编码嵌入IPv6单播地址的后64比特,并根据用户预设的参数恢复所述去隐私处理的可聚类位置编码,以得到所述用户的位置信息。Further, in an embodiment of the present invention, the client embeds the clusterable location code of the de-privacy processing into the last 64 bits of the IPv6 unicast address, and recovers the content according to parameters preset by the user. The clustering position code of the privacy process is obtained to obtain the location information of the user.

进一步地,在本发明的一个实施例中,所述可聚类位置编码算法满足:Further, in an embodiment of the invention, the clusterable position coding algorithm satisfies:

Hm(F(p,n))=F(p,m),Hm(F(p,n))=F(p,m),

其中,F(p,n)是一个从位置空间P到长度为n长度单位的编码值S C空间的一个编码算法,Hm(C)是一个将长度单位为n的位置编码截取前m长度单位的映射。 Where F(p,n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit, and Hm(C) is a m-length unit before the position code of the length unit is intercepted. Mapping.

进一步地,在本发明的一个实施例中,所述去隐私处理方法为:Further, in an embodiment of the present invention, the de-privacy processing method is:

a=a 1 a 2…a n;F(a)=a 1’ a 2’…a n’, a=a 1 a 2 ...a n ;F(a)=a 1 ' a 2 '...a n ',

其中,

Figure PCTCN2018112217-appb-000001
代表异或操作,i=1,2,…n,f i是一个从{0,1} i到{0,1}的映射,i=1,2…n-1;f 0是常数,定义去隐私处理函数F是一个从{0,1} n到{0,1} n的映射。 among them,
Figure PCTCN2018112217-appb-000001
Represents the XOR operation, i = 1, 2, ... n, f i is a mapping from {0, 1} i to {0, 1}, i = 1, 2...n-1; f 0 is a constant, defined The de-privacy processing function F is a mapping from {0, 1} n to {0, 1} n .

进一步地,在本发明的一个实施例中,所述去隐私处理方法对应的去隐私后的可聚类位置编码的恢复方法为:Further, in an embodiment of the present invention, the method for recovering the post-privacy clusterable location code corresponding to the de-privacy processing method is:

Figure PCTCN2018112217-appb-000002
代表异或操作。
Figure PCTCN2018112217-appb-000002
Represents an XOR operation.

Figure PCTCN2018112217-appb-000003
代表异或操作。
Figure PCTCN2018112217-appb-000003
Represents an XOR operation.

进一步地,在本发明的一个实施例中,在所述用户位置信息发布前,所述位置信息发布模块还用于通过多个访问权限的去隐私处理获取的所述用户的位置信息,以获取发布前去隐私处理后的可聚类位置编码。Further, in an embodiment of the present invention, before the user location information is released, the location information publishing module is further configured to obtain the location information of the user obtained by deprivation processing of multiple access rights to obtain The clusterable location code after the privacy process is released before the release.

进一步地,在本发明的一个实施例中,所述位置信息发布模块进一步用于对所述发布 前去隐私处理后的可聚类位置编码进行恢复,以获取用户的位置信息,并发布所述用户的位置信息。Further, in an embodiment of the present invention, the location information issuing module is further configured to recover the clusterable location code after the pre-release privacy processing, to obtain location information of the user, and issue the User's location information.

进一步地,在本发明的一个实施例中,所述发布前的可聚类位置编码的前一部分未进行去隐私处理,剩余部分通过所述用户在所述服务器上预设的密码进行去隐私处理。Further, in an embodiment of the present invention, the previous part of the pre-release clusterable location code is not subjected to de-privacy processing, and the remaining part is subjected to de-privacy processing by the password preset by the user on the server. .

进一步地,在本发明的一个实施例中,上述系统还包括:权限管理模块,用于根据不同的访问者的不同权限分别授予访问者查看权限,以根据查看权限获取所述用户的位置信息。Further, in an embodiment of the present invention, the system further includes: a rights management module, configured to separately grant a visitor to view rights according to different rights of different visitors, to obtain location information of the user according to the viewing rights.

本发明附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。The additional aspects and advantages of the invention will be set forth in part in the description which follows.

附图说明DRAWINGS

本发明上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present invention will become apparent and readily understood from

图1为根据本发明一个实施例的保护用户隐私的位置信息发布系统的结构示意图;1 is a schematic structural diagram of a location information publishing system for protecting user privacy according to an embodiment of the present invention;

图2为根据本发明一个实施例的可聚类的位置编码的生成方法;2 is a diagram of a method for generating clusterable position codes according to an embodiment of the present invention;

图3为根据本发明一个实施例的经过去隐私处理的位置信息发布的流程图;3 is a flow chart of location information release through de-privacy processing according to an embodiment of the present invention;

图4为根据本发明一个实施例的将位置编码c嵌入到IPv6后64比特的算法示意图;4 is a schematic diagram of an algorithm for embedding a position code c into 64 bits after IPv6 according to an embodiment of the present invention;

图5为根据本发明一个实施例的将位置编码c嵌入到IPv6后64比特的算法示意图;5 is a schematic diagram of an algorithm for embedding a position code c into 64 bits after IPv6 according to an embodiment of the present invention;

图6为根据本发明一个实施例的将位置编码c嵌入到IPv6后64比特的算法;6 is an algorithm for embedding a position code c into 64 bits after IPv6 according to an embodiment of the present invention;

图7为根据本发明一个实施例的利用客户端在服务器上的密码进行的多级去隐私处理的流程图。7 is a flow diagram of multi-level de-privacy processing using a password of a client on a server, in accordance with one embodiment of the present invention.

具体实施方式Detailed ways

下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。The embodiments of the present invention are described in detail below, and the examples of the embodiments are illustrated in the drawings, wherein the same or similar reference numerals are used to refer to the same or similar elements or elements having the same or similar functions. The embodiments described below with reference to the drawings are intended to be illustrative of the invention and are not to be construed as limiting.

下面参照附图描述根据本发明实施例提出的保护用户隐私的位置信息发布系统。A location information distribution system for protecting user privacy according to an embodiment of the present invention will be described below with reference to the accompanying drawings.

图1是本发明一个实施例的保护用户隐私的位置信息发布系统的结构示意图。FIG. 1 is a schematic structural diagram of a location information publishing system for protecting user privacy according to an embodiment of the present invention.

如图1所示,该保护用户隐私的位置信息发布系统10包括:位置信息获取模块100和位置信息发布模块200。As shown in FIG. 1, the location information issuance system 10 for protecting user privacy includes: a location information acquisition module 100 and a location information distribution module 200.

其中,位置信息获取模块100用于获取用户位置信息,其中,位置信息获取模块100具体包括:客户端和服务器。其中,客户端用于通过去隐私处理方法处理用户的位置信息, 以获取去隐私处理后的可聚类位置编码;服务器用于接收客户端发送的去隐私处理后的可聚类位置编码,并通过与去隐私处理方法对应的恢复方法将去隐私处理后的可聚类位置编码进行恢复,以得到用户的位置信息。位置信息发布模块200用于通过分级位置隐私保护方法根据不同的授权权限,分别发布用户位置不同精度信息。本发明实施例的系统10通过将位置信息以去隐私处理后的可聚类编码呈现,使得网络应用能够根据自己的授权权限,得到不同精确程度的位置信息,从而实现在保护位置信息隐私基础上的位置信息发布。The location information obtaining module 100 is configured to obtain user location information, where the location information obtaining module 100 specifically includes: a client and a server. The client is configured to process the location information of the user by using a de-privacy processing method to obtain the clusterable location code after the privacy processing; the server is configured to receive the clusterable location code sent by the client after the privacy process, and The clusterable location code after the de-privacy processing is restored by the recovery method corresponding to the de-privacy processing method to obtain the location information of the user. The location information issuance module 200 is configured to separately publish different accuracy information of the user location according to different authorization rights by using the hierarchical location privacy protection method. The system 10 of the embodiment of the present invention presents the location information in a clusterable code after de-privacy processing, so that the network application can obtain location information with different degrees of accuracy according to its own authorization authority, thereby realizing the protection of the location information privacy. Location information is posted.

可以理解的是,本发明实施例涉及知晓其自身所在的地理位置的上网设备,将自己的地理位置进行编码,且该编码满足更长前缀标定的位置范围包含于具有更短前缀所描述的位置范围中。该编码可以进行多级去隐私处理,并且可以分享给服务器和其他上网设备。It can be understood that the embodiment of the present invention relates to an internet device that knows the geographical location of its own, encodes its own geographic location, and the location range of the code that satisfies the longer prefix calibration is included in the location described by the shorter prefix. In the scope. This encoding can be multi-level de-private processing and can be shared with servers and other connected devices.

也就是说,本发明实施例通过使用可聚类的位置编码,可以实现不同位置精度的位置信息表达,对于同一个位置而言,使用的比特数越多,则位置精度越高,具有更高位置精度的位置编码,含有具有较低位置精度的位置编码。通过使用基于密码学的去隐私算法,可以保证具有不同授权信息的用户,针对同一个隐私化后的位置编码,能够得到不同精度的位置信息,从而保护了用户的位置隐私安全。That is to say, the embodiment of the present invention can realize the position information expression of different positional precision by using the clusterable position coding. For the same position, the more the number of bits used, the higher the positional accuracy and the higher the positional accuracy. Position-coded positional accuracy with positional coding with lower positional accuracy. By using the cryptography-based de-privacy algorithm, users with different authorization information can be guaranteed to obtain different precision location information for the same privacy location code, thereby protecting the user's location privacy security.

在本发明的一个实施例中,客户端向服务器提供自己的经过去隐私处理后的可聚类位置编码,服务器通过将该去隐私处理后的位置编码进行解码,从而得知客户端的位置信息。其中,客户端可以为手机、电脑等各种上网设备。In an embodiment of the present invention, the client provides its own de-privatized clusterable location code to the server, and the server decodes the location code after the privacy-removal process to learn the location information of the client. Among them, the client can be a variety of Internet devices such as mobile phones and computers.

具体地,客户端向服务器提供自己的经过去隐私处理后的可聚类位置编码,服务器根据预先得知的参数可以将去隐私处理后的位置编码恢复为原来的位置编码,然后进行解码从而得知客户端的位置信息。其他用户在没有这些预先得知的参数的基础上,无法得到精确的位置信息,甚至无法得到位置信息。Specifically, the client provides the server with the clustered location code after the privacy process, and the server can restore the location code after the privacy process to the original location code according to the previously learned parameters, and then decode the data. Know the location information of the client. Other users cannot get accurate location information or even obtain location information without these pre-know parameters.

进一步地,在本发明的一个实施例中,可聚类位置编码算法满足:Further, in an embodiment of the invention, the clusterable position coding algorithm satisfies:

Hm(F(p,n))=F(p,m),Hm(F(p,n))=F(p,m),

其中,F(p,n)是一个从位置空间P到长度为n长度单位的编码值S C空间的一个编码算法,Hm(C)是一个将长度单位为n的位置编码截取前m长度单位的映射。 Where F(p,n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit, and Hm(C) is a m-length unit before the position code of the length unit is intercepted. Mapping.

具体而言,可聚类位置编码满足如下条件,令F(p,n)是一个从位置空间P到长度为n长度单位的编码值S C空间的一个编码算法,Hm(C)是一个将长度单位为n的位置编码截取前m长度单位的映射,则可聚类位置编码算法满足Hm(F(p,n))=F(p,m)。 Specifically, the clusterable position coding satisfies the condition that F(p, n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit, and Hm(C) is a The position coding unit of length n is a mapping of the m length units before interception, and the clusterable position coding algorithm satisfies Hm(F(p, n))=F(p, m).

可聚类位置编码算法的最主要的特征就是更长前缀标定的位置范围包含于具有更短前缀所描述的位置范围中。显然,简单的将经度纬度连接起来并不满足这一点:假设经度的二进制表示为a 1 a 2…a n,纬度的二进制表示为b 1 b 2…b n,则4比特编码为a 1 a 2 b 1 b 2,而2n比特编码为a 1 a 2…a n b 1 b 2 …b n,它的前4比特不是a 1 a 2 b 1 b 2The most important feature of the clusterable position coding algorithm is that the position range of the longer prefix calibration is included in the range of positions described by the shorter prefix. Obviously, simply connecting the latitude and longitude latitude does not satisfy this: assuming that the binary representation of longitude is a 1 a 2 ... a n and the binary representation of latitude is b 1 b 2 ... b n , then the 4-bit encoding is a 1 a 2 b 1 b 2 , and 2n bits are encoded as a 1 a 2 ... a n b 1 b 2 ... b n , whose first 4 bits are not a 1 a 2 b 1 b 2 .

举例而言,如图2所示,以下是一个具有这样特征的位置编码:For example, as shown in Figure 2, the following is a position code with such features:

将经度和纬度转为二进制定长为n比特的表示,再将经度和纬度的二进制表示交叉形成位置编码。经度转换为n比特二进制的方法为,使用1个比特来表示符号,使用8个比特表示小数点左侧的数据,余下的n-9比特用于表示小数点右侧的数据;对于纬度的转换方法为,使用1个比特来表示符号,使用7个比特表示小数点左侧的数据,余下的n-8比特用于表示小数点右侧的数据。等长的经纬度的二进制表示进行交叉合并,形成最后的位置编码。The longitude and latitude are converted into binary representations of n bits, and the binary representations of longitude and latitude are crossed to form a positional code. The method of converting the longitude to n-bit binary is to use 1 bit to represent the symbol, 8 bits to represent the data to the left of the decimal point, and the remaining n-9 bits to represent the data to the right of the decimal point; the conversion method for the latitude is One bit is used to represent the symbol, 7 bits are used to represent the data to the left of the decimal point, and the remaining n-8 bits are used to represent the data to the right of the decimal point. The binary representation of equal length latitude and longitude is cross-combined to form the final position code.

进一步地,在本发明的一个实施例中,客户端通过WWW访问服务器,服务器通过调用接口询问客户的位置信息,客户端返回一个经过去隐私处理的可聚类位置编码。如图3所示,具体步骤为:Further, in an embodiment of the present invention, the client accesses the server through the WWW, and the server queries the location information of the client by calling the interface, and the client returns a clusterable location code that has undergone de-privacy processing. As shown in Figure 3, the specific steps are:

S101:客户端访问某个WWW服务器。S101: The client accesses a WWW server.

S102:服务器通过Javascript或HTML5等调用接口来询问客户的位置信息。S102: The server queries the location information of the client through a call interface such as Javascript or HTML5.

S103:客户端根据经度和纬度得到当前位置信息的可聚类位置编码。S103: The client obtains a clusterable position code of the current location information according to longitude and latitude.

S104:客户端对这一可聚类位置编码进行去隐私处理并返回给服务器。S104: The client performs de-privacy processing on the clusterable location code and returns to the server.

S105:服务器将该经过去隐私处理的可聚类位置编码恢复为原来的可聚类位置编码。S105: The server restores the de-privatization-processable clusterable location code to the original clusterable location code.

S106:服务器从这一可聚类位置编码中提取出位置信息。S106: The server extracts location information from the clusterable location code.

进一步地,在本发明的一个实施例中,客户端通过将去隐私处理的可聚类位置编码嵌入IPv6单播地址的后64比特,并根据用户预设的参数恢复去隐私处理的可聚类位置编码,以得到用户的位置信息。Further, in an embodiment of the present invention, the client embeds the clusterable location code of the de-privacy process into the last 64 bits of the IPv6 unicast address, and restores the clustering of the privacy process according to the parameters preset by the user. Position code to get the user's location information.

举例而言,客户端通过将经过去隐私处理的可聚类位置编码嵌入IPv6单播地址的后64比特,使得服务器可以根据预先得知的参数,恢复出其中的可聚类位置编码,从而得到客户的位置信息。其他互联网上的系统在没有这些预先得知的参数的基础上,无法得到精确的位置信息,甚至无法得到位置信息。For example, the client can embed the clusterable location code of the IPv6 unicast address into the last 64 bits of the IPv6 unicast address, so that the server can recover the clusterable location code according to the previously known parameters, thereby obtaining Customer location information. Other systems on the Internet cannot obtain accurate location information or even location information without these pre-known parameters.

另外,如图4所示,一种可能的嵌入方式如下:In addition, as shown in Figure 4, one possible embedding method is as follows:

将IPv6地址后64比特(也被称为IPv6地址的接口标识)的第7比特设置为1,将后64比特中的第25到39比特当中的某一个比特(如第25比特)设置为0,其余部分用于存放经过去隐私处理的位置编码。由于IPv6地址后64比特生成方案中的EUI64规范要求第7比特为1,且第4-5字节为0xFFFE,因此以上的生成方案可以标识出该接口标识含有位置信息。Set the 7th bit of the 64-bit IPv6 address (also referred to as the interface identifier of the IPv6 address) to 1, and set one of the 25th to 39th bits of the last 64 bits (such as the 25th bit) to 0. The rest is used to store the location code that has been de-private processed. Since the EUI64 specification in the 64-bit generation scheme after the IPv6 address requires the 7th bit to be 1, and the 4th-5th byte is 0xFFFE, the above generation scheme can identify that the interface identifier contains location information.

进一步地,如图5所示,另一种可能的嵌入方式如下:Further, as shown in FIG. 5, another possible embedding method is as follows:

将IPv6地址后64比特(也被称为IPv6地址的接口标识)的第7比特设置为1,将后64比特中的第40比特设置为1,其余部分用于存放经过去隐私处理的位置编码。由于IPv6 地址后64比特生成方案中的EUI64规范要求第7比特为1,且第4-5字节为0xFFFE,因此以上的生成方案可以标识出该接口标识含有位置信息。The 7th bit of the 64-bit IPv6 address (also referred to as the interface identifier of the IPv6 address) is set to 1, the 40th bit of the last 64 bits is set to 1, and the rest is used to store the position code after de-privacy processing. . Since the EUI64 specification in the 64-bit generation scheme after the IPv6 address requires the 7th bit to be 1, and the 4th-5th byte is 0xFFFE, the above generation scheme can identify that the interface identifier contains location information.

进一步地,如图6所示(其中0x0001仅用于示例,实施中可以选取任何非0xFFFE的值),再一种可能的嵌入方式如下:Further, as shown in FIG. 6 (where 0x0001 is only used as an example, any value other than 0xFFFE may be selected in the implementation), and another possible embedding method is as follows:

将IPv6地址后64比特(也被称为IPv6地址的接口标识)的第7比特设置为1,将后64比特中的第25到40比特设置为一个非)0xFFFE的其他值,其余部分用于存放经过去隐私处理的位置编码。这样不仅可以和EUI64规范相区分,同时也为其他可能的扩展预留了空间。Set the 7th bit of the 64 bits after the IPv6 address (also referred to as the interface identifier of the IPv6 address) to 1, and set the 25th to 40th bits of the last 64 bits to a value other than 0xFFFE, and the rest is used for the rest. Stores the location code that has been de-private processed. This not only distinguishes it from the EUI64 specification, but also reserves space for other possible extensions.

通过如上位置编码来发布位置信息,一个重要的优点是便于采用分级位置隐私保护措施,从而能够针对不同的授权,只用同样的编码值,提供不同精度的位置信息。An important advantage of issuing location information by the above location coding is that it is convenient to adopt hierarchical location privacy protection measures, so that different precision information can be provided with different precision for different authorizations.

进一步地,在本发明的一个实施例中,去隐私处理方法为:Further, in an embodiment of the present invention, the method of de-privacy processing is:

a=a 1 a 2…a n;F(a)=a 1’ a 2’…a n’, a=a 1 a 2 ...a n ;F(a)=a 1 ' a 2 '...a n ',

其中,

Figure PCTCN2018112217-appb-000004
代表异或操作,i=1,2,…n,f i是一个从{0,1} i到{0,1}的映射,i=1,2…n-1;f 0是常数,定义去隐私处理函数F是一个从{0,1} n到{0,1} n的映射。 among them,
Figure PCTCN2018112217-appb-000004
Represents the XOR operation, i = 1, 2, ... n, f i is a mapping from {0, 1} i to {0, 1}, i = 1, 2...n-1; f 0 is a constant, defined The de-privacy processing function F is a mapping from {0, 1} n to {0, 1} n .

可以理解的是,本发明实施例涉及一种针对如上的可聚类位置编码的隐私保护措施,为了保护用户的位置隐私,对该可聚类位置编码进行去隐私处理。设f i是一个从{0,1} i到{0,1}的映射,i=1,2…n-1;f 0是常数,定义去隐私处理函数F是一个从{0,1} n到{0,1} n的映射,定义如下: It can be understood that the embodiment of the present invention relates to a privacy protection measure for clusterable location coding as above. In order to protect the location privacy of the user, the clusterable location code is deprived. Let f i be a mapping from {0,1} i to {0,1}, i=1,2...n-1; f 0 is a constant, and define the de-privacy processing function F to be a slave {0,1} The mapping of n to {0,1} n is defined as follows:

对于a=a 1 a 2…a n;F(a)=a 1’ a 2’…a n’,其中 For a = a 1 a 2 ... a n ; F(a) = a 1 ' a 2 '... a n ', where

Figure PCTCN2018112217-appb-000005
代表异或操作,i=1,2,…n。
Figure PCTCN2018112217-appb-000005
Represents an XOR operation, i=1, 2,...n.

该去隐私处理的算法为保持前缀的去隐私算法,也就是说,对于任何两个位置编码,如果在去隐私前它们前k比特是相同的,那么去隐私后前k比特也相同。The algorithm for de-privacy processing is a de-privacy algorithm that maintains the prefix, that is, for any two position codes, if the first k bits are the same before de-privacy, then the first k bits are the same after the privacy.

进一步地,在本发明的一个实施例中,去隐私处理方法对应的去隐私后的可聚类位置编码的恢复方法为:Further, in an embodiment of the present invention, the method for recovering the post-privacy clusterable location code corresponding to the de-privacy processing method is:

Figure PCTCN2018112217-appb-000006
代表异或操作。
Figure PCTCN2018112217-appb-000006
Represents an XOR operation.

Figure PCTCN2018112217-appb-000007
代表异或操作。
Figure PCTCN2018112217-appb-000007
Represents an XOR operation.

可以理解的是,本发明涉及一种针对如上的去隐私后的可聚类位置编码的恢复方法,针对该保持前缀的去隐私算法处理后的位置编码,可以采用如下的方法进行恢复:对于位置编码a=a 1 a 2…a n,以保持前缀的方式去隐私处理为a 1’ a 2’…a n’,那么若已知f i,i=0,1,…n-1,原来的位置编码可以用如下的过程恢复。 It can be understood that the present invention relates to a method for recovering the clusterable position code after de-privacy, as described above. For the position code processed by the de-privacy algorithm of the hold prefix, the following method may be used for recovery: Encoding a=a 1 a 2 ... a n , and the privacy is treated as a 1 ' a 2 '...a n ' in the manner of maintaining the prefix, then if f i , i=0,1,...n-1 is known, the original The location code can be recovered using the following procedure.

Figure PCTCN2018112217-appb-000008
代表异或操作。
Figure PCTCN2018112217-appb-000008
Represents an XOR operation.

Figure PCTCN2018112217-appb-000009
代表异或操作。
Figure PCTCN2018112217-appb-000009
Represents an XOR operation.

举例而言,对于每个输入的可聚类n比特位置编码a=a 1 a 2…a n,一种实现该去隐私处理的算法如下: For example, for each input clusterable n-bit position code a = a 1 a 2 ... a n , an algorithm for implementing the de-privacy process is as follows:

S201:首先初始化形成一个2 n比特字符串S,令i=1,P(a,0)=1。 S201: Initially form a 2 n- bit string S, so that i=1, P(a, 0)=1.

S202:如果a的第i比特a i为1,则P(a,i)=(P(a,i-1)<<1)+1,否则为(P(a,i-1)<<1)+2。 S202: If the i-th bit a i of a is 1, P(a, i)=(P(a, i-1)<<1)+1, otherwise (P(a, i-1)<< 1) +2.

S203:令B(S,i)=((S[i>>3]&(0x80>>(i&0x07)))!=0)。其中>>为向右移东若干比特,<<为向左移动若干比特,&表示按位与。S203: Let B(S, i)=((S[i>>3]&(0x80>>(i&0x07)))!=0). Where >> is a number of bits shifted to the right, << is to move left a few bits, and & means bitwise AND.

S204:

Figure PCTCN2018112217-appb-000010
代表异或操作。 S204:
Figure PCTCN2018112217-appb-000010
Represents an XOR operation.

S205:令i=i+1,重复S202至S205直到完成整个位置编码的去隐私处理。S205: Let i=i+1, and repeat S202 to S205 until the de-privacy processing of the entire position encoding is completed.

对于每个输入的可聚类n比特位置编码a=a 1 a 2…a n,一种实现该去隐私处理的算法如下: For each input clusterable n-bit position code a = a 1 a 2 ... a n , an algorithm for implementing the de-privacy process is as follows:

S301:首先初始化形成一个2 n比特字符串S,令i=1,P(a,0)=1。 S301: Initially form a 2 n- bit character string S, so that i=1, P(a, 0)=1.

S302:如果a的第i比特a i为1,则P(a,i)=(P(a,i-1)+(1<<(n-i)),否则为((P(a,i-1)<<1)+1)。 S302: If the i-th bit a i of a is 1, P(a, i)=(P(a, i-1)+(1<<(ni)), otherwise ((P(a, i-) 1) <<1) +1).

S303:令B(S,i)=((S[i>>3]&(0x80>>(i&0x07)))!=0)。其中>>为向右移东若干比特,<<为向左移动若干比特,&表示按位与。S303: Let B(S,i)=((S[i>>3]&(0x80>>(i&0x07)))!=0). Where >> is a number of bits shifted to the right, << is to move left a few bits, and & means bitwise AND.

S304:

Figure PCTCN2018112217-appb-000011
代表异或操作。 S304:
Figure PCTCN2018112217-appb-000011
Represents an XOR operation.

S305:令i=i+1,重复S302至S305直到完成整个位置编码的去隐私处理。S305: Let i=i+1, and repeat S302 to S305 until the de-privacy processing of the entire position encoding is completed.

对于每个输入的经过S201-S205去隐私处理的a’=a 1’ a 2’…a n’,一种恢复出a=a 1 a 2…a n的算法如下: For each input a'=a 1 ' a 2 '...a n ' after S201-S205 de-privacy processing, an algorithm for recovering a=a 1 a 2 ... a n is as follows:

S401:首先初始化形成一个2 n比特字符串S,令i=1,P(a,0)=1。 S401: Initially form a 2 n- bit character string S, so that i=1, P(a, 0)=1.

S402:

Figure PCTCN2018112217-appb-000012
代表异或操作。 S402:
Figure PCTCN2018112217-appb-000012
Represents an XOR operation.

S403:如果a的第i比特a i为1,则P(a,i)=(P(a,i-1)<<1)+1,否则为(P(a,i-1)<<1)+2。 S403: If the i-th bit a i of a is 1, P(a, i)=(P(a, i-1)<<1)+1, otherwise (P(a, i-1)<< 1) +2.

S404:令B(S,i)=((S[i>>3]&(0x80>>(i&0x07)))!=0)。其中>>为向右移东若干比特,<<为向左移动若干比特,&表示按位与。S404: Let B(S,i)=((S[i>>3]&(0x80>>(i&0x07)))!=0). Where >> is a number of bits shifted to the right, << is to move left a few bits, and & means bitwise AND.

S405:令i=i+1,重复S402至S405直到完成整个位置编码的恢复。S405: Let i=i+1, and repeat S402 to S405 until the restoration of the entire position code is completed.

对于每个输入的经过S301-S305去隐私处理的a’=a 1’ a 2’…a n’,一种恢复出a=a 1 a 2…a n的算法如下: For each input a'=a 1 ' a 2 '...a n ' after S301-S305 de-privacy processing, an algorithm for recovering a=a 1 a 2 ... a n is as follows:

S501:首先初始化形成一个2 n比特字符串S,令i=1,P(a,0)=1。 S501: Initially form a 2 n- bit string S, so that i=1, P(a, 0)=1.

S502:

Figure PCTCN2018112217-appb-000013
代表异或操作。 S502:
Figure PCTCN2018112217-appb-000013
Represents an XOR operation.

S503:如果a的第i比特a i为1,则P(a,i)=(P(a,i-1)+(1<<(n-i)),否则为((P(a,i-1)<<1)+1)。 S503: If the i-th bit a i of a is 1, P(a, i)=(P(a, i-1)+(1<<(ni)), otherwise ((P(a, i-) 1) <<1) +1).

S504:令B(S,i)=((S[i>>3]&(0x80>>(i&0x07)))!=0)。其中>>为向右移东若干比特,<<为向左移动若干比特,&表示按位与。S504: Let B(S, i)=((S[i>>3]&(0x80>>(i&0x07)))!=0). Where >> is a number of bits shifted to the right, << is to move left a few bits, and & means bitwise AND.

S505:令i=i+1,重复S502至S505直到完成整个位置编码的去隐私处理。S505: Let i=i+1, and repeat S502 to S505 until the de-privacy processing of the entire position encoding is completed.

进一步地,在本发明的一个实施例中,在用户位置信息发布前,位置信息发布模块200还用于通过多个访问权限的去隐私处理获取的用户的位置信息,以获取发布前去隐私处理后的可聚类位置编码。Further, in an embodiment of the present invention, before the user location information is released, the location information issuance module 200 is further configured to obtain the location information of the user obtained through the de-privacy processing of the multiple access rights to obtain the privacy process before the release. The latter can be clustered position code.

具体而言,本发明实施例涉及一种针对如上的可聚类编码的多级隐私保护措施,为了保护用户的位置隐私,在发布之前,进行具有多个访问权限的去隐私处理,令E为一个块加密算法,K为加密密钥,Ψ=U m i=1(E i,K i,n i)。,其中U表示并集,并满足块加密算法E i的每块比特数大于2的n i次方比特,可以对可聚类位置编码的a=a 1 a 2…a n前∑ m i=1n i比特进行去隐私处理。具体步骤如下: Specifically, the embodiment of the present invention relates to a multi-level privacy protection measure for clusterable coding as above. In order to protect the location privacy of a user, before the release, a privacy process with multiple access rights is performed, so that E is A block encryption algorithm, K is the encryption key, Ψ = U m i = 1 (E i , K i , n i ). Where U represents a union and satisfies the n i power of each block of the block encryption algorithm E i greater than 2, and can encode the clusterable position a = a 1 a 2 ... a n before ∑ m i = 1 n i bits for de-privacy processing. Specific steps are as follows:

S601:令i=1,N 0=0。 S601: Let i=1, N 0 =0.

S602:提取前

Figure PCTCN2018112217-appb-000014
比特的可聚类位置编码,使用E i算法、K i密钥进行加密,得到字符串S i。 S602: before extraction
Figure PCTCN2018112217-appb-000014
The clusterable position code of the bit is encrypted using the E i algorithm and the K i key to obtain the string S i .

S603:使用S201到S205的步骤或第S301到S305的步骤,用参数S i对a的第N i-1+1到N i-1+n i比特进行去隐私处理。 S603: Perform the de-privacy processing on the N i-1 +1 to N i-1 + n i bits of a with the parameter S i using the steps S201 to S205 or the steps S301 to S305.

S604:N i=n i+N i-1,然后令i=i+1,重复S602至S604直到完成位置编码的去隐私处理。 S604: N i = n i + N i-1 , then let i=i+1, and repeat S602 to S604 until the de-privacy processing of the position encoding is completed.

进一步地,在本发明的一个实施例中,位置信息发布模块200进一步用于对发布前去隐私处理后的可聚类位置编码进行恢复,以获取用户的位置信息,并发布用户的位置信息。Further, in an embodiment of the present invention, the location information issuance module 200 is further configured to recover the clusterable location code after the privacy process is released, to obtain the location information of the user, and publish the location information of the user.

具体而言,本发明实施例涉及一种针对多级隐私保护处理后的可聚类编码的恢复,令E为一个块加密算法,K为加密密钥,Ψ=U m i=1(E i,K i,n i)。,其中U表示并集,并满足块加密算法E i的每块比特数大于2的n i次方比特,可以对进行多隐私保护处理后的可聚类位置编码a’=a 1’ a 2’…a n’的前∑ m i=1n i比特进行恢复。具体步骤如下: Specifically, the embodiment of the present invention relates to recovery of clusterable coding after multi-level privacy protection processing, where E is a block encryption algorithm, K is an encryption key, and Ψ=U m i=1 (E i , K i , n i ). Where U represents a union and satisfies the n i power of each block of the block encryption algorithm E i greater than 2, and can encode the clusterable position after the multi-privacy protection process a'=a 1 ' a 2 The front ∑ m i=1 n i bit of '...a n ' is restored. Specific steps are as follows:

S701:令i=1,N 0=0。 S701: Let i=1, N 0 =0.

S702:提取前

Figure PCTCN2018112217-appb-000015
比特的已经恢复的可聚类位置编码a,使用E i算法、K i密钥进行加密,得到字符串S i。 S702: before extraction
Figure PCTCN2018112217-appb-000015
The recovered clusterable position code a of the bit is encrypted using the E i algorithm and the K i key to obtain the string S i .

S703:使用S401到S405的步骤或第S501到S505的步骤,用参数S i恢复a的第N i-1+1到N i-1+n i比特。 S703: Restore the N i-1 +1 to N i-1 + n i bits of a with the parameter S i using the steps S401 to S405 or the steps S501 to S505.

S704:N i=n i+N i-1,然后令i=i+1,重复S702至S704直到完成位置编码的去隐私处理。 S704: N i = n i + N i-1 , then let i=i+1, and repeat S702 to S704 until the de-privacy processing of the position encoding is completed.

需要说明的是,其中的加密算法可以为AES算法,其中的加密算法可以是128、192或256比特。另外,其中的加密算法也可以是不进行任何加密,这样相当于不进行去隐私处理。It should be noted that the encryption algorithm may be an AES algorithm, where the encryption algorithm may be 128, 192 or 256 bits. In addition, the encryption algorithm therein may not perform any encryption, which is equivalent to not performing privacy processing.

进一步地,在本发明的一个实施例中,发布前的可聚类位置编码的前一部分未进行去隐私处理,剩余部分通过用户在服务器上预设的密码进行去隐私处理。Further, in an embodiment of the present invention, the previous part of the clusterable position code before the release is not subjected to the de-privacy process, and the remaining part is subjected to the privacy process by the password preset by the user on the server.

进一步地,在本发明的一个实施例中,本发明实施例系统10还包括:权限管理模块。 其中,权限管理模块用于根据不同的访问者的不同权限分别授予访问者查看权限,以根据查看权限获取用户的位置信息。Further, in an embodiment of the present invention, the system 10 of the embodiment of the present invention further includes: a rights management module. The rights management module is configured to respectively grant the access rights to the visitor according to the different rights of different visitors, so as to obtain the location information of the user according to the viewing rights.

具体而言,本发明实施例涉及一个互联网络中客户向服务器提供分级权限的位置信息的方法。当服务器需要了解客户的位置时,客户向服务器报告一个经过去隐私处理的可聚类位置编码,它的前一部分并未进行去隐私处理,后一部分使用了该用户在该服务器上的密码,使用约定的去隐私算法进行去隐私处理,这样网络上面的其他用户只能了解到该用户的大致范围,而服务器则可以根据用户的密码了解用户所在的精确位置。客户端将这一经过去隐私处理的可聚类位置编码回复给服务器或者嵌入到IPv6单播地址中,实现位置信息在隐私保护基础上的位置信息发布。如图7所示,具体步骤如下:Specifically, embodiments of the present invention relate to a method for a client to provide location information of a hierarchical authority to a server in an internetwork. When the server needs to know the location of the client, the client reports to the server a clusterable location code that has been de-privatized. The first part of the client does not perform privacy processing, and the latter part uses the password of the user on the server. The agreed-to-private algorithm performs de-privacy processing so that other users on the network can only know the approximate scope of the user, and the server can know the exact location of the user according to the user's password. The client replies the de-privatized clusterable location code to the server or embeds it into the IPv6 unicast address to implement location information release based on the privacy protection. As shown in Figure 7, the specific steps are as follows:

S801:客户端得到自己的位置信息。S801: The client obtains its own location information.

S802:对位置信息进行可聚类位置编码。S802: Perform clusterable position coding on the location information.

S803:对可聚类位置编码的的前m比特,不进行去隐私处理。S803: No de-privacy processing is performed on the first m bits of the clusterable position coding.

S804:对可聚类位置编码的余下比特进行去隐私处理,密钥为该客户在服务器上的认证密码,加密算法为约定算法。S804: Perform de-privacy processing on the remaining bits of the clusterable position code, where the key is an authentication password of the client on the server, and the encryption algorithm is an appointment algorithm.

S805:重复S804直到对可聚类位置编码余下比特都进行了去隐私处理。S805: Repeat S804 until the remaining bits of the clusterable position code are deprived.

S806:将结果交给服务器或者嵌入到IPv6的后64比特中。S806: The result is handed to the server or embedded in the last 64 bits of IPv6.

根据本发明实施例提出的保护用户隐私的位置信息发布系统,通过建立的用户位置隐私的分级保护机制保证了具有不同授权的应用,通过使用不同的参数,可以得到不同精度的位置信息,通过将位置信息以去隐私处理后的可聚类编码呈现,使得网络应用能够根据自己的授权权限,得到不同精确程度的位置信息,从而有效实现在保护位置信息隐私基础上的位置信息发布。The location information issuance system for protecting user privacy according to the embodiment of the present invention ensures that applications with different authorizations are obtained through the hierarchical protection mechanism of user location privacy. By using different parameters, location information with different precision can be obtained. The location information is presented in a clusterable code after de-privacy processing, so that the network application can obtain location information with different degrees of accuracy according to its own authorization authority, thereby effectively implementing location information release based on the protection of location information privacy.

在本发明的描述中,需要理解的是,术语“中心”、“纵向”、“横向”、“长度”、“宽度”、“厚度”、“上”、“下”、“前”、“后”、“左”、“右”、“竖直”、“水平”、“顶”、“底”“内”、“外”、“顺时针”、“逆时针”、“轴向”、“径向”、“周向”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "transverse", "length", "width", "thickness", "upper", "lower", "front", " After, "Left", "Right", "Vertical", "Horizontal", "Top", "Bottom", "Inside", "Outside", "Clockwise", "Counterclockwise", "Axial", The orientation or positional relationship of the "radial", "circumferential" and the like is based on the orientation or positional relationship shown in the drawings, and is merely for convenience of description of the present invention and simplified description, and does not indicate or imply the indicated device or component. It must be constructed and operated in a particular orientation, and is not to be construed as limiting the invention.

此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。Moreover, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, features defining "first" or "second" may include at least one of the features, either explicitly or implicitly. In the description of the present invention, the meaning of "a plurality" is at least two, such as two, three, etc., unless specifically defined otherwise.

在本发明中,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”、“固定”等术语应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或成一体;可以是机械 连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通或两个元件的相互作用关系,除非另有明确的限定。对于本领域的普通技术人员而言,可以根据具体情况理解上述术语在本发明中的具体含义。In the present invention, the terms "installation", "connected", "connected", "fixed" and the like shall be understood broadly, and may be either a fixed connection or a detachable connection, unless explicitly stated and defined otherwise. , or integrated; can be mechanical or electrical connection; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of two elements or the interaction of two elements, unless otherwise specified Limited. For those skilled in the art, the specific meanings of the above terms in the present invention can be understood on a case-by-case basis.

在本发明中,除非另有明确的规定和限定,第一特征在第二特征“上”或“下”可以是第一和第二特征直接接触,或第一和第二特征通过中间媒介间接接触。而且,第一特征在第二特征“之上”、“上方”和“上面”可是第一特征在第二特征正上方或斜上方,或仅仅表示第一特征水平高度高于第二特征。第一特征在第二特征“之下”、“下方”和“下面”可以是第一特征在第二特征正下方或斜下方,或仅仅表示第一特征水平高度小于第二特征。In the present invention, the first feature "on" or "under" the second feature may be a direct contact of the first and second features, or the first and second features may be indirectly through an intermediate medium, unless otherwise explicitly stated and defined. contact. Moreover, the first feature "above", "above" and "above" the second feature may be that the first feature is directly above or above the second feature, or merely that the first feature level is higher than the second feature. The first feature "below", "below" and "below" the second feature may be that the first feature is directly below or obliquely below the second feature, or merely that the first feature level is less than the second feature.

在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of the present specification, the description with reference to the terms "one embodiment", "some embodiments", "example", "specific example", or "some examples" and the like means a specific feature described in connection with the embodiment or example. A structure, material or feature is included in at least one embodiment or example of the invention. In the present specification, the schematic representation of the above terms is not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in a suitable manner in any one or more embodiments or examples. In addition, various embodiments or examples described in the specification, as well as features of various embodiments or examples, may be combined and combined.

尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。Although the embodiments of the present invention have been shown and described, it is understood that the above-described embodiments are illustrative and are not to be construed as limiting the scope of the invention. The embodiments are subject to variations, modifications, substitutions and variations.

Claims (10)

一种保护用户隐私的位置信息发布系统,其特征在于,包括:A location information publishing system for protecting user privacy, comprising: 位置信息获取模块,用于获取用户位置信息,其中,所述位置信息获取模块具体包括:a location information obtaining module, configured to acquire user location information, where the location information acquiring module specifically includes: 客户端,用于通过去隐私处理方法处理所述用户的位置信息,以获取去隐私处理后的可聚类位置编码;a client, configured to process location information of the user by using a de-privacy processing method to obtain a clusterable location code after de-privacy processing; 服务器,用于接收所述客户端发送的所述去隐私处理后的可聚类位置编码,并通过与所述去隐私处理方法对应的恢复方法将所述去隐私处理后的可聚类位置编码进行恢复,以得到所述用户的位置信息;以及a server, configured to receive the de-privatization-processable clusterable location code sent by the client, and encode the de-privatization-processable clusterable location by using a recovery method corresponding to the de-privacy processing method Recovering to obtain location information of the user; 位置信息发布模块,用于通过分级位置隐私保护方法根据不同的授权权限,分别发布用户位置不同精度信息。The location information publishing module is configured to separately publish different precision information of the user location according to different authorization rights by using the hierarchical location privacy protection method. 根据权利要求1所述的保护用户隐私的位置信息发布系统,其特征在于,所述客户端通过WWW访问所述服务器,所述服务器通过调用接口询问所述用户的位置信息,所述客户端发送所述去隐私处理的可聚类位置编码。The location information issuance system for protecting user privacy according to claim 1, wherein the client accesses the server through a WWW, and the server queries the location information of the user by calling an interface, and the client sends The clusterable location code of the de-privacy process. 根据权利要求1所述的保护用户隐私的位置信息发布系统,其特征在于,所述客户端通过将所述去隐私处理的可聚类位置编码嵌入IPv6单播地址的后64比特,并根据用户预设的参数恢复所述去隐私处理的可聚类位置编码,以得到所述用户的位置信息。The location information issuance system for protecting user privacy according to claim 1, wherein the client embeds the clusterable location code of the de-privacy process into the last 64 bits of the IPv6 unicast address, and according to the user The preset parameters are restored to the clusterable position code of the de-privacy process to obtain location information of the user. 根据权利要求1所述的保护用户隐私的位置信息发布系统,其特征在于,所述可聚类位置编码算法满足:The location information issuance system for protecting user privacy according to claim 1, wherein the clusterable position coding algorithm satisfies: Hm(F(p,n))=F(p,m),Hm(F(p,n))=F(p,m), 其中,F(p,n)是一个从位置空间P到长度为n长度单位的编码值S C空间的一个编码算法,Hm(C)是一个将长度单位为n的位置编码截取前m长度单位的映射。 Where F(p,n) is an encoding algorithm from the position space P to the coded value S C space of length n length unit, and Hm(C) is a m-length unit before the position code of the length unit is intercepted. Mapping. 根据权利要求1所述的保护用户隐私的位置信息发布系统,其特征在于,所述去隐私处理方法为:The location information issuance system for protecting user privacy according to claim 1, wherein the de-privacy processing method is: a=a 1 a 2…a n;F(a)=a 1’a 2’…a n’, a=a 1 a 2 ...a n ;F(a)=a 1 'a 2 '...a n ', 其中,
Figure PCTCN2018112217-appb-100001
代表异或操作,i=1,2,…n,f i是一个从{0,1} i到{0,1}的映射,i=1,2…n-1;f 0是常数,定义去隐私处理函数F是一个从{0,1} n到{0,1} n的映射。
among them,
Figure PCTCN2018112217-appb-100001
Represents the XOR operation, i = 1, 2, ... n, f i is a mapping from {0, 1} i to {0, 1}, i = 1, 2...n-1; f 0 is a constant, defined The de-privacy processing function F is a mapping from {0, 1} n to {0, 1} n .
根据权利要求5所述的保护用户隐私的位置信息发布系统,其特征在于,所述去隐私处理方法对应的去隐私后的可聚类位置编码的恢复方法为:The location information issuance system for protecting user privacy according to claim 5, wherein the method for restoring the clusterable location code corresponding to the de-privacy processing method is:
Figure PCTCN2018112217-appb-100002
Figure PCTCN2018112217-appb-100002
Figure PCTCN2018112217-appb-100003
Figure PCTCN2018112217-appb-100003
根据权利要求1所述的保护用户隐私的位置信息发布系统,其特征在于,在所述用 户位置信息发布前,所述位置信息发布模块还用于通过多个访问权限的去隐私处理获取的所述用户的位置信息,以获取发布前去隐私处理后的可聚类位置编码。The location information issuance system for protecting user privacy according to claim 1, wherein the location information issuance module is further configured to obtain a location obtained by deprivation processing of multiple access rights before the user location information is released. The location information of the user is obtained to obtain the clusterable location code after the privacy process is released. 根据权利要求7所述的保护用户隐私的位置信息发布系统,其特征在于,所述位置信息发布模块进一步用于对所述发布前去隐私处理后的可聚类位置编码进行恢复,以获取用户的位置信息,并发布所述用户的位置信息。The location information issuance system for protecting user privacy according to claim 7, wherein the location information issuance module is further configured to recover the clusterable location code after the pre-release privacy process to obtain a user. Location information and publish the location information of the user. 根据权利要求7所述的保护用户隐私的位置信息发布系统,其特征在于,所述发布前的可聚类位置编码的前一部分未进行去隐私处理,剩余部分通过所述用户在所述服务器上预设的密码进行去隐私处理。The location information issuance system for protecting user privacy according to claim 7, wherein the pre-release clusterable location code is not subjected to de-privacy processing, and the remaining portion is passed by the user on the server. The default password is used for privacy processing. 根据权利要求1-9任一项保护用户隐私的位置信息发布系统,其特征在于,还包括:A location information distribution system for protecting user privacy according to any one of claims 1-9, further comprising: 权限管理模块,用于根据不同的访问者的不同权限分别授予访问者查看权限,以根据查看权限获取所述用户的位置信息。The rights management module is configured to respectively grant the access rights to the visitor according to the different rights of different visitors, so as to obtain the location information of the user according to the viewing rights.
PCT/CN2018/112217 2018-03-06 2018-10-26 User privacy-protective position information publishing system Ceased WO2019169878A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810183549.7 2018-03-06
CN201810183549.7A CN108566373B (en) 2018-03-06 2018-03-06 Location information publishing system for protecting user privacy

Publications (1)

Publication Number Publication Date
WO2019169878A1 true WO2019169878A1 (en) 2019-09-12

Family

ID=63531354

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/112217 Ceased WO2019169878A1 (en) 2018-03-06 2018-10-26 User privacy-protective position information publishing system

Country Status (2)

Country Link
CN (1) CN108566373B (en)
WO (1) WO2019169878A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115297471A (en) * 2022-04-14 2022-11-04 青岛科技大学 PKI structure-based mobile user location privacy protection method and system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566373B (en) * 2018-03-06 2020-06-12 清华大学 Location information publishing system for protecting user privacy
CN111050021A (en) * 2019-12-17 2020-04-21 中国科学技术大学 Image privacy protection method based on two-dimensional code and reversible visual watermarking
CN119893426A (en) * 2021-09-29 2025-04-25 北京小米移动软件有限公司 Position-related information reporting and receiving method and device
CN115622764A (en) * 2022-10-09 2023-01-17 深圳市君思科技有限公司 A method for discovering and classifying private data in web traffic

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7006835B2 (en) * 2001-01-11 2006-02-28 Sanyo Electric Co., Ltd. Method of and system for providing position information
CN102026090A (en) * 2010-07-09 2011-04-20 北京哈工大计算机网络与信息安全技术研究中心 Node positioning method in IOT (Internet of things) and node
CN103678334A (en) * 2012-09-03 2014-03-26 人人游戏网络科技发展(上海)有限公司 Method and apparatus for computing a digital digest of geographic information
CN104684073A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 User position positioning method and user position positioning device
CN104780501A (en) * 2014-01-13 2015-07-15 腾讯科技(深圳)有限公司 Location privacy protection method and device
CN106453049A (en) * 2016-10-11 2017-02-22 福建师范大学 Neighbor detection method capable of protecting position privacy
CN108566373A (en) * 2018-03-06 2018-09-21 清华大学 Protect the location information delivery system of privacy of user

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2127300B1 (en) * 2007-01-26 2018-04-18 InterDigital Technology Corporation Method and apparatus for securing location information and access control using the location information
CN104298740B (en) * 2014-10-09 2018-04-20 清华大学 Communication means based on improved geographical location coding
CN104581625B (en) * 2014-11-12 2018-04-24 华中科技大学 A kind of location privacy protection method and system based on granularity control
CN105791516B (en) * 2014-12-22 2019-10-01 华为技术有限公司 Terminal positional information guard method and intelligent terminal
CN105554704B (en) * 2015-12-21 2018-12-21 西安电子科技大学 Location privacy protection method based on false track in recommender system
CN105681362B (en) * 2016-04-01 2018-07-10 公安部第三研究所 The client and server communications method of the geographical location privacy of protection
CN106649532B (en) * 2016-10-31 2020-12-11 电子科技大学 A data desensitization method for address information
CN107204984B (en) * 2017-06-22 2020-05-19 石家庄铁道大学 Position privacy protection method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7006835B2 (en) * 2001-01-11 2006-02-28 Sanyo Electric Co., Ltd. Method of and system for providing position information
CN102026090A (en) * 2010-07-09 2011-04-20 北京哈工大计算机网络与信息安全技术研究中心 Node positioning method in IOT (Internet of things) and node
CN103678334A (en) * 2012-09-03 2014-03-26 人人游戏网络科技发展(上海)有限公司 Method and apparatus for computing a digital digest of geographic information
CN104684073A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 User position positioning method and user position positioning device
CN104780501A (en) * 2014-01-13 2015-07-15 腾讯科技(深圳)有限公司 Location privacy protection method and device
CN106453049A (en) * 2016-10-11 2017-02-22 福建师范大学 Neighbor detection method capable of protecting position privacy
CN108566373A (en) * 2018-03-06 2018-09-21 清华大学 Protect the location information delivery system of privacy of user

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115297471A (en) * 2022-04-14 2022-11-04 青岛科技大学 PKI structure-based mobile user location privacy protection method and system

Also Published As

Publication number Publication date
CN108566373B (en) 2020-06-12
CN108566373A (en) 2018-09-21

Similar Documents

Publication Publication Date Title
WO2019169878A1 (en) User privacy-protective position information publishing system
JP4958246B2 (en) Method, apparatus and system for fast searchable encryption
US10083311B2 (en) Cryptographic key
CN111431716B (en) Data transmission method and device, computer equipment and storage medium
JP7323004B2 (en) Data extraction system, data extraction method, registration device and program
CN106792501A (en) A kind of LBS customer locations and privacy of identities guard method
US11381395B2 (en) System and methods for encryption based on environmental factors
US20170171293A1 (en) Compact content delivery via a restricted-bandwidth communication channel
CN115834025B (en) Data encryption method, equipment and storage medium of automobile diagnosis platform
CN117828009B (en) System and method for generating and querying an index associated with a target communication
CN111277605B (en) Data sharing method and device, computer equipment and storage medium
JP6061634B2 (en) Wireless communication device
WO2018157667A1 (en) Method and device for generating password
WO2019179313A1 (en) Method and apparatus for managing passwords, and computer storage medium
CN111901447B (en) Domain name data management method, device, equipment and storage medium
CN111310198B (en) Heterogeneous data privacy protection and reliability judgment method in mobile group perception
WO2017030117A1 (en) Communication data encryption/decryption method and system
Borse et al. Geo-Encryption: A location based encryption technique for data security
CN120710810B (en) Encrypted communication methods, systems, and quantum computers
CN109274765B (en) Data transmission method, equipment and system
HK40023715B (en) Method and device for sharing data, computer apparatus and storage medium
HK40023715A (en) Method and device for sharing data, computer apparatus and storage medium
KR20240035315A (en) Apparatus for privacy preserving text search using homomorphic encryption and method thereof
CN116846604A (en) Information protection method, device, equipment and storage medium
CN119544033A (en) Information transmission method, device, system, computer equipment, storage medium and computer program product

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18909095

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18909095

Country of ref document: EP

Kind code of ref document: A1