CN105430033A - Method and device for protecting position of terminal - Google Patents
Method and device for protecting position of terminal Download PDFInfo
- Publication number
- CN105430033A CN105430033A CN201410476281.8A CN201410476281A CN105430033A CN 105430033 A CN105430033 A CN 105430033A CN 201410476281 A CN201410476281 A CN 201410476281A CN 105430033 A CN105430033 A CN 105430033A
- Authority
- CN
- China
- Prior art keywords
- terminal
- application
- location
- virtual
- moment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a method and device for protecting the position of a terminal, and relates to the technical field of electronic information. The method and device can guarantee privacy and security of a user. The method comprises the following steps: when an application makes an application to obtain the position of a terminal, the terminal obtains the package name of the application and determines whether the application is a target application according to the package name of the application; if the application is a target application, the terminal obtains the actual position of the terminal and generates the virtual position of the terminal on the basis of the actual position, the virtual position being different from the actual position; and the terminal reports the virtual position of the terminal to the application. The method and device for protecting the position of a terminal are suitable for scenes in which the position of a terminal is reported to an application.
Description
Technical field
The present invention relates to electronic information technical field, particularly relate to a kind of method and apparatus protecting terminal location.
Background technology
Along with the development of electronic information technology, all kinds of terminal applies emerges in an endless stream, and wherein, some application needs to obtain terminal location.
In the prior art, when application needs to obtain terminal location, to location-based service application location authority, thus the authority obtaining terminal location will be had.When after this application success application location authority, navigation system positions terminal, and reports this application by locating the terminal physical location obtained, and makes application learn terminal physical location.
In the prior art, as long as position authority has been applied in application, the physical location of self can have been reported this application by terminal.But this application may utilize terminal physical location to carry out some malicious operation, send swindle information etc. as utilized terminal physical location to terminal; If terminal physical location is revealed by this application, other application or hacker etc. may utilize the terminal physical location of leakage to carry out malicious operation to terminal in addition, thus bring hidden danger for the personal secrets of terminal use, are difficult to the personal secrets of guarantee terminal use.
Summary of the invention
Embodiments of the invention provide a kind of method and apparatus protecting terminal location, can prevent the physical location revealing terminal use, ensure the personal secrets of terminal use.
For achieving the above object, embodiments of the invention adopt following technical scheme:
On the one hand, the embodiment of the present invention provides a kind of method protecting terminal location, comprising:
When applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
When described be applied as described target application time, described terminal obtains the physical location of described terminal, and according to described physical location, generates the virtual location of described terminal, and described virtual location is different from described physical location;
Described terminal reports the described virtual location of described terminal to described application.
On the other hand, the embodiment of the present invention provides a kind of device protecting terminal location, comprising:
Target determination module, for when applying application and obtaining the position of terminal, obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
First generation module, for when described in be applied as described target application time, obtain the physical location of described terminal, and according to described physical location, generate the virtual location of described terminal, described virtual location is different from described physical location;
Reporting module, for reporting the described virtual location of described terminal to described application.
A kind of method and apparatus protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
A kind of flow chart protecting the method for terminal location that Fig. 1 provides for the embodiment of the present invention;
A kind of flow chart protecting a kind of implementation of the method for terminal location that Fig. 2 provides for the embodiment of the present invention;
A kind of flow chart protecting the another kind of implementation of the method for terminal location that Fig. 3 provides for the embodiment of the present invention;
Fig. 3 a for the embodiment of the present invention provide a kind of choose virtual location region illustrate schematic diagram;
What Fig. 3 b chose virtual location region for another kind that the embodiment of the present invention provides illustrates schematic diagram;
A kind of flow chart protecting another implementation of the method for terminal location that Fig. 4 provides for the embodiment of the present invention;
The flow chart of the method for the another kind protection terminal location that Fig. 5 provides for the embodiment of the present invention;
A kind of generating virtual position that Fig. 5 a provides for the embodiment of the present invention illustrate schematic diagram;
The another kind of generating virtual position that Fig. 5 b provides for the embodiment of the present invention illustrate schematic diagram;
A kind of structural representation protecting the device of terminal location that Fig. 6 provides for the embodiment of the present invention;
A kind of structural representation protecting a kind of implementation of the device of terminal location that Fig. 7 provides for the embodiment of the present invention;
A kind of structural representation protecting the another kind of implementation of the device of terminal location that Fig. 8 provides for the embodiment of the present invention;
A kind of structural representation protecting another implementation of the device of terminal location that Fig. 9 provides for the embodiment of the present invention;
The structural representation of the device of the another kind protection terminal location that Figure 10 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
The technical scheme that the embodiment of the present invention provides is applied to the scene of terminal to the position of application reporting terminal, the present invention is by being undertaken virtual by the physical location of terminal, and the virtual location of generation is reported application, prevent the leakage of the physical location of terminal use, ensure the personal secrets of terminal use.Wherein, terminal can be mobile phone, panel computer etc.The physical location of terminal is the true place at the current place of terminal, and corresponding virtual location is the random place in the preset range centered by physical location, and virtual location is a dummy location of terminal, and namely physical location and virtual location are different positions.When applying the position needing to obtain mobile phone, mobile phone will obtain its physical location, and this physical location is carried out virtual, draw virtual location, such as: the physical location of acquisition is Shuangqing Road, Haidian District, Beijing City, undertaken virtual by physical location, the virtual location obtained is Zhichun Road, Haidian District, Beijing City.
Embodiments provide a kind of method protecting terminal location, as shown in Figure 1, comprising:
101, when applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application.
Wherein, when application needs to obtain terminal location, will to location-based service application location authority, position authority is for obtaining the position of terminal, and this position authority is specifically as follows ACCESSFINELOCATION (acquisition exact position) authority.After application success application location authority, access GPS (GlobalPositioningSystem, global positioning system), when accessing GPS, terminal system needs to verify the position authority of application, and the bag name namely by obtaining application judges whether this application is target application.Wherein, terminal reports virtual location to target application, and namely target application is the application of the actual position needing reporting terminal.
102, when described be applied as described target application time, described terminal obtains the physical location of described terminal, and according to described physical location, generates the virtual location of described terminal.
Wherein, virtual location is different from physical location.After obtaining the physical location of terminal, centered by physical location, choose a virtual location region, random selecting virtual location do not overlapped with physical location in this virtual location region, as the virtual location of terminal.When application is not target application, terminal does not carry out the operation of generating virtual position, after obtaining the physical location of terminal, physical location is reported application.
103, described terminal reports the described virtual location of described terminal to described application.
Wherein, after generating the virtual location of terminal, the virtual location of generation is reported application, the position of the terminal that this application obtains is virtual location, instead of the physical location of terminal.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.
Further; to report the alternative of virtual location to application in order to increase terminal; on the basis of the scheme shown in Fig. 1; the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location; the further refinement of the implementation of this programme to 101 in the scheme shown in Fig. 1, wherein, 101 can be implemented as 1011-1014; as shown in Figure 2, comprising:
1011, when described application application obtains the position of described terminal, described terminal obtains the application identities of described application.
Wherein, application identities is for identifying application.The application identities of application can be the UID (UserIdentification, user identity proves) of application, application and UID one_to_one corresponding.As shown in table 1, the application identities of application 1 is UID1, and the application identities of application 2 is UID2 etc.
Table 1
Application | Application identities |
Application 1 | UID1 |
Application 2 | UID2 |
… | … |
1012, according to described application identities, and be stored in the application identities of terminal and the mapping relations of bag name, obtain the bag name corresponding with described application identities.
Wherein, application identities and bag name have relation one to one.As shown in table 2, application identities is that the bag that UID1 is corresponding is called bag name 1, and application identities is that the bag that UID2 is corresponding is called bag name 2 etc.
Table 2
Application identities | Bag name |
UID1 | Bag name 1 |
UID2 | Bag name 2 |
… | … |
In addition, the mapping relations of application identities and bag name have been come by mapping function, and mapping function, application identities and bag name are all stored in application package manager.Known applications mark and mapping relations, utilize mapping function, then can obtain the bag name corresponding with application identities.
1013, whether the bag name detected in the Bao Mingyu virtualization applications list of described application is consistent.
Wherein, the storage area in terminal can be divided into system partitioning and user data subregion.Virtualization applications list can be stored in any one file in system partitioning, and when the application request in virtual list obtains terminal location, terminal all needs the virtual location to application reporting terminal.The bag name of target application can be comprised in virtualization applications list, the out of Memory about target application can also be comprised, as the type etc. of target application.
It should be noted that, after terminal completes application installation, terminal can obtain the authority information of application from the broadcast of application, when applying the authority of having applied for obtaining terminal location, whether terminal can be pointed out and undertaken virtual by the position of terminal to be reported, if terminal use selects the position of terminal to carry out virtual, then terminal can record the bag name of application, and this bag name is stored in virtualization applications list.
It should be noted that, when needing the virtual location of terminal to report application, terminal can receive the instruction of user, and according to the instruction of user, adds in virtualization applications list by information such as the bag names of this application; When not needing the virtual location of terminal to report application, terminal can receive the instruction of user, and according to the instruction of user, the information such as the bag name of this application is deleted from virtualization applications list.
1014, if the bag name in virtualization applications list described in the Bao Mingyu of described application is consistent, then using described application as described target application.
Wherein, target application is the application of the virtual location that reporting terminal generates.When the bag name in the virtual list of Bao Mingyu of applying is consistent, the virtual location needed to this application reporting terminal is described.When the bag name in the Bao Mingyu virtualization applications list of applying is inconsistent, then this application is not target application, does not need the virtual location to this application reporting terminal.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By judging that the bag name of the application that terminal obtains is whether in virtualization applications list, determines whether to carry out virtual to terminal physical location, thus can selectively to the virtual location of application reporting terminal.
Further; on the basis of the scheme shown in Fig. 2; the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location; the further refinement of the implementation of this programme to 102 in the scheme shown in Fig. 2; the virtual location specifically how generating terminal is described, wherein, 102 can be implemented as 1021-1022; as shown in Figure 3, comprising:
1021, described terminal obtains the physical location of described terminal, and sets the first radius and the second radius.
Wherein, terminal can utilize location (position) to obtain function and obtain the current longitude and latitude of terminal, and converts the longitude and latitude of acquisition to metric geodetic coordinates, and this geodetic coordinates is the physical location of terminal.
It should be noted that, second radius is greater than the first radius, first radius is more than or equal to the first preset value, namely the minimum value that the first radius is desirable is the first preset value, second radius is less than or equal to the second preset value, namely the maximum that the second radius is desirable is the second preset value, and the first preset value and the second preset value collectively define the scope at the place, region choosing virtual location.Such as: the first preset value is 1 kilometer, and the first radius can be set to 1.5 kilometers, the second preset value is 10 kilometers, and the second radius can be set to 9.5 kilometers.
1022, with described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
Wherein, taking physical location as the center of circle, first radius is inner circle radius, second radius is in the circle ring area of exradius, during the virtual location of random selecting a bit as terminal, because selected region does not comprise physical location, in this region during chosen position, the position chosen can not overlap with physical location, is namely all virtual location.
In specific implementation process, terminal can utilize location (position) to obtain function and obtain the current longitude and latitude of terminal, and convert the longitude and latitude of acquisition to metric geodetic coordinates, with this geodetic coordinates for the center of circle, with the first radius for inner circle radius, second radius is that exradius forms a circle ring area, and carries out random position in this circle ring area.Such as: as shown in Figure 3 a, the first radius is 1 kilometer, and the second radius is 2 kilometers, and O point is the physical location of terminal, and OA is the first radius, and OB is the second radius.Circle ring area between inner circle and cylindrical is the region of virtual location, and random selecting 1 C is as virtual location in this region.
In addition, the region of virtual location can be circle ring area, can be also the region of similar annular that rectangle is formed, and the shape, size etc. in the region of virtual location are at this and be not construed as limiting.Such as: as shown in Figure 3 b, the region between interior rectangle and outer rectangle is the region of virtual location.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By with terminal physical location for the center of circle, with the first radius for inner circle radius, second radius is that exradius forms some virtual location as terminal of random selecting in a circle ring area, thus one can be obtained close to terminal physical location, and don't the virtual location that can overlap with physical location, and then report more rational virtual location to application.
Optionally, in order to ensure the reasonability of the virtual location chosen, on the basis of the scheme shown in Fig. 3, the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location, and this programme can increase 104 after 1022, as shown in Figure 4, comprising:
104, when the virtual location of the described terminal generated overlaps with described unreasonable position, again choose a bit in described circle ring area, as the virtual location reported to described application.
Wherein, the virtual location reported to application does not overlap with unreasonable position.Some irrational positions are stored in terminal, when the virtual location generated overlaps with the unreasonable position stored in terminal, cast out irrational virtual location of generation, and regenerate virtual location, until regenerate virtual for position all do not overlap with unreasonable some time, the virtual location regenerated is reported application.Such as: when the virtual location generated is the summit in Mountain Everest, the summit due to Mountain Everest is the irrational position stored in terminal, so the summit in Mountain Everest is cast out, and chosen position in annulus again.Again such as: when terminal use is in coastal area, the virtual location of generation is marine, because sea is the irrational position stored in terminal, so sea is cast out, and chosen position in annulus again.
It should be noted that, irrational position of tag memory storage can carry out adding, delete or changing according to the instruction of terminal use, and the renewal prompting that also can provide according to network side is selected to upgrade.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.When the virtual location of the terminal generated is unreasonable position, by again choosing the virtual location of a rational position as terminal in circle ring area, and the rational virtual location this again chosen reports application, thus ensure that the reasonability of the virtual location chosen.
Optionally, in order to ensure the reasonability of the virtual location generated, the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location, as shown in Figure 5, comprising:
201, when applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application.
202, when described be applied as described target application time, whether the time interval detected between the first moment and the second moment is more than or equal to Preset Time.
Wherein, the first moment was moment of the position of the current application terminal of target application, and the second moment was moment of the position of target application last time application terminal.Such as, the first moment was the 9:30 of 2014-9-1, and the second moment was the 10:35 of 2014-9-1.
203, if between the first moment and the second moment interval greater than equaling Preset Time, then obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal.
Wherein, between the first moment and the second moment interval greater than when equaling Preset Time, terminal may be far away in the position in the second moment and the distance between the position in the first moment, in order to ensure the reasonability of the virtual location of the present terminal generated, obtain the physical location of present terminal, and according to the physical location of present terminal, generate the virtual location of present terminal.
Such as: the first moment was the 9:30 of 2014-9-1, second moment was the 13:35 of 2014-9-1, Preset Time is 1 hour, so between the first moment and the second moment interval greater than 1 hour, as shown in Figure 5 a, P point is the virtual location of the terminal that the second moment generated, Q point is the physical location of the first moment terminal, with Q point for the center of circle, first radius is inner circle radius, second radius is in the circle ring area of exradius, and in the circle ring area that the broken circle namely in figure forms, random selecting 1 R is as the virtual location of present terminal.
204, if the time interval between the first moment and the second moment is less than Preset Time, then the virtual location of the described terminal generated the last time, as the physical location of current described terminal, generates the virtual location of current described terminal.
Wherein, the time interval between the first moment and the second moment is when being less than Preset Time, terminal may be relatively in the position in the second moment and the distance between the position in the first moment, in order to ensure the reasonability of the virtual location of the present terminal generated, so the virtual location of the terminal generated the last time is as the physical location of present terminal, generate the virtual location of present terminal.
Such as: the first moment was the 9:30 of 2014-9-1, second moment was the 9:59 of 2014-9-1, Preset Time is 1 hour, and the time interval between the first moment and the second moment is less than 1 hour, as shown in Figure 5 b, the virtual location of the terminal that P point generated for the second moment, then with P point for the center of circle, the first radius is inner circle radius, and the second radius is in the circle ring area of exradius, namely, in the circle ring area that the broken circle in figure forms, random selecting 1 S is as the virtual location of present terminal.
205, described terminal reports the described virtual location of described terminal to described application.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.According to current time and the last time interval in moment and the relation of Preset Time, the physical location how decision chooses present terminal carries out virtual and generating virtual position.When current time and last moment interval greater than or when equaling Preset Time, the physical location according to present terminal is carried out virtual, generating virtual position, thus the reasonability that ensure that the virtual location of generation; When current time is less than Preset Time with the time interval in last moment, choosing the last virtual location generated carries out virtual as the physical location of present terminal, generating virtual position, thus ensure that the reasonability of the virtual location of generation, eliminate the resource obtained shared by terminal physical location simultaneously.
The embodiment of the present invention additionally provides a kind of device 300 protecting terminal location, and as shown in Figure 6, device 300 comprises:
Target determination module 301, for when applying application and obtaining the position of terminal, obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application.
Wherein, terminal reports virtual location to target application.
First generation module 302, for when described in be applied as described target application time, obtain the physical location of described terminal, and according to described physical location, generate the virtual location of described terminal.
Wherein, virtual location is different from physical location.
Reporting module 303, for reporting the described virtual location of described terminal to described application.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.
As shown in Figure 7, the target determination module 301 in device 300 comprises:
Mark acquiring unit 3011, for when described application application obtains the position of described terminal, described terminal obtains the application identities of described application.
Bag name acquiring unit 3012, for according to described application identities, and is stored in the application identities of terminal and the mapping relations of bag name, obtains the bag name corresponding with described application identities.
Detecting unit 3013, whether consistent for the bag name detected in the Bao Mingyu virtualization applications list of described application.
Wherein, the virtual bag name with comprising target application with list.
Target determination unit 3014, time consistent for the bag name in virtualization applications list described in the Bao Mingyu when described application, using described application as described target application.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By judging that the bag name of the application that terminal obtains is whether in virtualization applications list, determines whether to carry out virtual to terminal physical location, thus can selectively to the virtual location of application reporting terminal.
As shown in Figure 8, the first generation module 302 in device 300 comprises:
Setup unit 3021, for setting the first radius and the second radius.
Wherein, the second radius is greater than the first radius, and the first radius is more than or equal to the first preset value, and the second radius is less than or equal to the second preset value.
Generation unit 3022, for described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By with terminal physical location for the center of circle, with the first radius for inner circle radius, second radius is that exradius forms some virtual location as terminal of random selecting in a circle ring area, thus one can be obtained close to terminal physical location, and don't the virtual location that can overlap with physical location, and then report more rational virtual location to application.
As shown in Figure 9, comprising in device 300:
Adjusting module 306, for when the virtual location of the described terminal generated overlaps with described unreasonable position, again chooses a bit, as the virtual location reported to described application in described circle ring area.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.When the virtual location of the terminal generated is unreasonable position, by again choosing the virtual location of a rational position as terminal in circle ring area, and the rational virtual location this again chosen reports application, thus ensure that the reasonability of the virtual location chosen.
As shown in Figure 10, device 300 also comprises:
Detection module 304, whether Preset Time is more than or equal to for the time interval detected between the first moment and the second moment, described first moment is moment of the position of the described terminal of the current application of described target application, and described second moment is moment of the position of the described terminal of described target application last time application.
Second generation module 305, between the first moment and the second moment interval greater than when equaling Preset Time, obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.According to current time and the last time interval in moment and the relation of Preset Time, the physical location how decision chooses present terminal carries out virtual and generating virtual position.When current time and last moment interval greater than or when equaling Preset Time, the physical location according to present terminal is carried out virtual, generating virtual position, thus the reasonability that ensure that the virtual location of generation; When current time is less than Preset Time with the time interval in last moment, choosing the last virtual location generated carries out virtual as the physical location of present terminal, generating virtual position, thus ensure that the reasonability of the virtual location of generation, eliminate the resource obtained shared by terminal physical location simultaneously.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for apparatus embodiments, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.
Claims (10)
1. protect a method for terminal location, it is characterized in that, comprising:
When applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
When described be applied as described target application time, described terminal obtains the physical location of described terminal, and according to described physical location, generates the virtual location of described terminal, and described virtual location is different from described physical location;
Described terminal reports the described virtual location of described terminal to described application.
2. method according to claim 1, is characterized in that, described when applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application, comprising:
When described application application obtains the position of described terminal, described terminal obtains the application identities of described application;
According to described application identities, and be stored in the application identities of terminal and the mapping relations of bag name, obtain the bag name corresponding with described application identities;
Whether the bag name detected in the Bao Mingyu virtualization applications list of described application is consistent;
If the bag name in virtualization applications list described in the Bao Mingyu of described application is consistent, then using described application as described target application.
3. method according to claim 1, is characterized in that, described according to described physical location, generates the virtual location of described terminal, comprising:
Set the first radius and the second radius, described second radius is greater than described first radius, and described first radius is more than or equal to the first preset value, and described second radius is less than or equal to the second preset value;
With described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
4. method according to claim 1, is characterized in that, also comprises:
Whether the time interval detected between the first moment and the second moment is more than or equal to Preset Time, described first moment is moment of the position of the described terminal of the current application of described target application, and described second moment is moment of the position of the described terminal of described target application last time application;
If between the first moment and the second moment interval greater than equaling Preset Time, then obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal;
If the time interval between the first moment and the second moment is less than Preset Time, then the virtual location of the described terminal generated the last time, as the physical location of current described terminal, generates the virtual location of current described terminal.
5. the method according to claim 1 or 3, is characterized in that, described terminal storage has unreasonable position; To report the described virtual location of described terminal to described application in described terminal before, also comprise:
When the virtual location of the described terminal generated overlaps with described unreasonable position, again choose a bit in described circle ring area, as the virtual location reported to described application, the described virtual location reported to described application does not overlap with described unreasonable position.
6. protect a device for terminal location, it is characterized in that, comprising:
Target determination module, for when applying application and obtaining the position of terminal, obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
First generation module, for when described in be applied as described target application time, obtain the physical location of described terminal, and according to described physical location, generate the virtual location of described terminal, described virtual location is different from described physical location;
Reporting module, for reporting the described virtual location of described terminal to described application.
7. device according to claim 6, is characterized in that, described target determination module, comprising:
Mark acquiring unit, for when described application application obtains the position of described terminal, described terminal obtains the application identities of described application;
Bag name acquiring unit, for according to described application identities, and is stored in the application identities of terminal and the mapping relations of bag name, obtains the bag name corresponding with described application identities;
Detecting unit, whether consistent for the bag name detected in the Bao Mingyu virtualization applications list of described application;
Target determination unit, time consistent for the bag name in virtualization applications list described in the Bao Mingyu when described application, using described application as described target application.
8. device according to claim 6, is characterized in that, described first generation module, comprising:
Setup unit, for setting the first radius and the second radius, described second radius is greater than described first radius, and described first radius is more than or equal to the first preset value, and described second radius is less than or equal to the second preset value;
Generation unit, for described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
9. device according to claim 6, is characterized in that, also comprises:
Detection module, whether Preset Time is more than or equal to for the time interval detected between the first moment and the second moment, described first moment is moment of the position of the described terminal of the current application of described target application, and described second moment is moment of the position of the described terminal of described target application last time application;
Second generation module, between the first moment and the second moment interval greater than when equaling Preset Time, obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal;
3rd generation module, when being less than Preset Time for the time interval between the first moment and the second moment, the virtual location of the described terminal generated the last time, as the physical location of current described terminal, generates the virtual location of current described terminal.
10. the device according to claim 6 or 8, is characterized in that, described device stores unreasonable position; Described device also comprises:
Adjusting module, for when the virtual location of the described terminal generated overlaps with described unreasonable position, again choose a bit in described circle ring area, as the virtual location reported to described application, the described virtual location reported to described application does not overlap with described unreasonable position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410476281.8A CN105430033A (en) | 2014-09-17 | 2014-09-17 | Method and device for protecting position of terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410476281.8A CN105430033A (en) | 2014-09-17 | 2014-09-17 | Method and device for protecting position of terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105430033A true CN105430033A (en) | 2016-03-23 |
Family
ID=55507973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410476281.8A Pending CN105430033A (en) | 2014-09-17 | 2014-09-17 | Method and device for protecting position of terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105430033A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022101A (en) * | 2016-05-17 | 2016-10-12 | 广东欧珀移动通信有限公司 | Application management method and terminal |
CN106228086A (en) * | 2016-07-29 | 2016-12-14 | 北京小米移动软件有限公司 | Obtain the method and device of positional information |
CN106897610A (en) * | 2017-01-19 | 2017-06-27 | 北京奇虎科技有限公司 | A kind of method and apparatus for positioning protection |
CN107231481A (en) * | 2017-06-19 | 2017-10-03 | 郭启蒙 | A kind of method in the simulation geographical position for smart mobile phone |
CN109905386A (en) * | 2019-02-20 | 2019-06-18 | 徐建红 | A kind of station address protection system and its working method based on user information safety |
CN109923506A (en) * | 2016-11-23 | 2019-06-21 | 华为技术有限公司 | Information processing method and positioning chip, mobile terminal |
CN110866271A (en) * | 2019-10-22 | 2020-03-06 | 中山大学 | Position privacy protection method and system based on Android platform |
CN110881169A (en) * | 2019-12-04 | 2020-03-13 | 南京森林警察学院 | Android mobile phone track positioning data protection method |
CN111065088A (en) * | 2019-10-18 | 2020-04-24 | 宇龙计算机通信科技(深圳)有限公司 | Position acquisition method and device, storage medium and electronic equipment |
CN112527937A (en) * | 2020-12-16 | 2021-03-19 | 上海连尚网络科技有限公司 | Method and device for storing user position information |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5948043A (en) * | 1996-11-08 | 1999-09-07 | Etak, Inc. | Navigation system using GPS data |
WO2010083654A1 (en) * | 2009-01-23 | 2010-07-29 | 阿尔卡特朗讯公司 | Method and related device for realizing protection of the privacy of user location information |
CN102968338A (en) * | 2012-12-13 | 2013-03-13 | 北京奇虎科技有限公司 | Method and device for classifying application program of electronic equipment and electronic equipment |
CN103316472A (en) * | 2013-05-17 | 2013-09-25 | 南京睿悦信息技术有限公司 | Android device gas platform system based on Bluetooth handle and implementation method of Android device gas platform system |
CN103425234A (en) * | 2013-07-30 | 2013-12-04 | 海信集团有限公司 | Method for dynamically adjusting picture processing performance and display terminal |
CN103731799A (en) * | 2012-10-11 | 2014-04-16 | 中兴通讯股份有限公司 | Non-real-time position information acquisition method, mobile terminal and communication system |
CN104010272A (en) * | 2014-05-12 | 2014-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting privacy |
-
2014
- 2014-09-17 CN CN201410476281.8A patent/CN105430033A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5948043A (en) * | 1996-11-08 | 1999-09-07 | Etak, Inc. | Navigation system using GPS data |
WO2010083654A1 (en) * | 2009-01-23 | 2010-07-29 | 阿尔卡特朗讯公司 | Method and related device for realizing protection of the privacy of user location information |
CN103731799A (en) * | 2012-10-11 | 2014-04-16 | 中兴通讯股份有限公司 | Non-real-time position information acquisition method, mobile terminal and communication system |
CN102968338A (en) * | 2012-12-13 | 2013-03-13 | 北京奇虎科技有限公司 | Method and device for classifying application program of electronic equipment and electronic equipment |
CN103316472A (en) * | 2013-05-17 | 2013-09-25 | 南京睿悦信息技术有限公司 | Android device gas platform system based on Bluetooth handle and implementation method of Android device gas platform system |
CN103425234A (en) * | 2013-07-30 | 2013-12-04 | 海信集团有限公司 | Method for dynamically adjusting picture processing performance and display terminal |
CN104010272A (en) * | 2014-05-12 | 2014-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting privacy |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022101A (en) * | 2016-05-17 | 2016-10-12 | 广东欧珀移动通信有限公司 | Application management method and terminal |
CN106022101B (en) * | 2016-05-17 | 2019-12-06 | Oppo广东移动通信有限公司 | application management method and terminal |
CN106228086A (en) * | 2016-07-29 | 2016-12-14 | 北京小米移动软件有限公司 | Obtain the method and device of positional information |
CN109923506A (en) * | 2016-11-23 | 2019-06-21 | 华为技术有限公司 | Information processing method and positioning chip, mobile terminal |
CN106897610A (en) * | 2017-01-19 | 2017-06-27 | 北京奇虎科技有限公司 | A kind of method and apparatus for positioning protection |
WO2018133654A1 (en) * | 2017-01-19 | 2018-07-26 | 北京奇虎科技有限公司 | Protected positioning method and device |
CN107231481A (en) * | 2017-06-19 | 2017-10-03 | 郭启蒙 | A kind of method in the simulation geographical position for smart mobile phone |
CN109905386A (en) * | 2019-02-20 | 2019-06-18 | 徐建红 | A kind of station address protection system and its working method based on user information safety |
CN111065088A (en) * | 2019-10-18 | 2020-04-24 | 宇龙计算机通信科技(深圳)有限公司 | Position acquisition method and device, storage medium and electronic equipment |
CN110866271A (en) * | 2019-10-22 | 2020-03-06 | 中山大学 | Position privacy protection method and system based on Android platform |
CN110881169A (en) * | 2019-12-04 | 2020-03-13 | 南京森林警察学院 | Android mobile phone track positioning data protection method |
CN112527937A (en) * | 2020-12-16 | 2021-03-19 | 上海连尚网络科技有限公司 | Method and device for storing user position information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105430033A (en) | Method and device for protecting position of terminal | |
US10873900B2 (en) | Method for wireless fidelity connection and related products | |
JP6463837B2 (en) | Method and system for geolocation authentication of resources | |
EP3277027B1 (en) | Wi-fi connection method, mobile terminal and storage medium | |
KR20180044345A (en) | Generate and publish verified location information | |
JP5993094B2 (en) | Pre-presentation method and system for signal coverage hole | |
JP6611951B2 (en) | Geographical location positioning method and apparatus | |
KR102072095B1 (en) | Identity authentication methods, devices, and systems | |
CN104010272A (en) | Method and device for protecting privacy | |
TWI696086B (en) | Entity information verification method and device | |
CN106455058A (en) | Method and device for determining population distribution condition | |
CN105323713A (en) | Technical investigation method and system based on passive positioning | |
MX2013013214A (en) | Managing network interaction for devices. | |
US20140198670A1 (en) | Wireless network site survey systems and methods | |
CN104604260A (en) | Positioning method and communication equipment | |
CN105068103A (en) | Auxiliary positioning method and electronic equipment | |
US11989246B2 (en) | Providing electronic search and guidance using non-address destination designations | |
CN103327444A (en) | Unlocking method and mobile electronic equipment based on location information | |
US20180241724A1 (en) | Wi-fi connection method, mobile terminal and storage medium | |
CN105246157A (en) | A positioning method and positioning system for a mobile terminal | |
CN103916435A (en) | Method and device for judging authenticity of information | |
CN104185276A (en) | Positioning method and device based on wireless network | |
CN103763731B (en) | Positioning detection method and device | |
CN107196935B (en) | Positioning information transmission method and system | |
US20150278539A1 (en) | Location-based data security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160323 |
|
RJ01 | Rejection of invention patent application after publication |