CN105430033A - Method and device for protecting position of terminal - Google Patents

Method and device for protecting position of terminal Download PDF

Info

Publication number
CN105430033A
CN105430033A CN201410476281.8A CN201410476281A CN105430033A CN 105430033 A CN105430033 A CN 105430033A CN 201410476281 A CN201410476281 A CN 201410476281A CN 105430033 A CN105430033 A CN 105430033A
Authority
CN
China
Prior art keywords
terminal
application
location
virtual
moment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410476281.8A
Other languages
Chinese (zh)
Inventor
涂超
郭和平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410476281.8A priority Critical patent/CN105430033A/en
Publication of CN105430033A publication Critical patent/CN105430033A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method and device for protecting the position of a terminal, and relates to the technical field of electronic information. The method and device can guarantee privacy and security of a user. The method comprises the following steps: when an application makes an application to obtain the position of a terminal, the terminal obtains the package name of the application and determines whether the application is a target application according to the package name of the application; if the application is a target application, the terminal obtains the actual position of the terminal and generates the virtual position of the terminal on the basis of the actual position, the virtual position being different from the actual position; and the terminal reports the virtual position of the terminal to the application. The method and device for protecting the position of a terminal are suitable for scenes in which the position of a terminal is reported to an application.

Description

A kind of method and apparatus protecting terminal location
Technical field
The present invention relates to electronic information technical field, particularly relate to a kind of method and apparatus protecting terminal location.
Background technology
Along with the development of electronic information technology, all kinds of terminal applies emerges in an endless stream, and wherein, some application needs to obtain terminal location.
In the prior art, when application needs to obtain terminal location, to location-based service application location authority, thus the authority obtaining terminal location will be had.When after this application success application location authority, navigation system positions terminal, and reports this application by locating the terminal physical location obtained, and makes application learn terminal physical location.
In the prior art, as long as position authority has been applied in application, the physical location of self can have been reported this application by terminal.But this application may utilize terminal physical location to carry out some malicious operation, send swindle information etc. as utilized terminal physical location to terminal; If terminal physical location is revealed by this application, other application or hacker etc. may utilize the terminal physical location of leakage to carry out malicious operation to terminal in addition, thus bring hidden danger for the personal secrets of terminal use, are difficult to the personal secrets of guarantee terminal use.
Summary of the invention
Embodiments of the invention provide a kind of method and apparatus protecting terminal location, can prevent the physical location revealing terminal use, ensure the personal secrets of terminal use.
For achieving the above object, embodiments of the invention adopt following technical scheme:
On the one hand, the embodiment of the present invention provides a kind of method protecting terminal location, comprising:
When applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
When described be applied as described target application time, described terminal obtains the physical location of described terminal, and according to described physical location, generates the virtual location of described terminal, and described virtual location is different from described physical location;
Described terminal reports the described virtual location of described terminal to described application.
On the other hand, the embodiment of the present invention provides a kind of device protecting terminal location, comprising:
Target determination module, for when applying application and obtaining the position of terminal, obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
First generation module, for when described in be applied as described target application time, obtain the physical location of described terminal, and according to described physical location, generate the virtual location of described terminal, described virtual location is different from described physical location;
Reporting module, for reporting the described virtual location of described terminal to described application.
A kind of method and apparatus protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
A kind of flow chart protecting the method for terminal location that Fig. 1 provides for the embodiment of the present invention;
A kind of flow chart protecting a kind of implementation of the method for terminal location that Fig. 2 provides for the embodiment of the present invention;
A kind of flow chart protecting the another kind of implementation of the method for terminal location that Fig. 3 provides for the embodiment of the present invention;
Fig. 3 a for the embodiment of the present invention provide a kind of choose virtual location region illustrate schematic diagram;
What Fig. 3 b chose virtual location region for another kind that the embodiment of the present invention provides illustrates schematic diagram;
A kind of flow chart protecting another implementation of the method for terminal location that Fig. 4 provides for the embodiment of the present invention;
The flow chart of the method for the another kind protection terminal location that Fig. 5 provides for the embodiment of the present invention;
A kind of generating virtual position that Fig. 5 a provides for the embodiment of the present invention illustrate schematic diagram;
The another kind of generating virtual position that Fig. 5 b provides for the embodiment of the present invention illustrate schematic diagram;
A kind of structural representation protecting the device of terminal location that Fig. 6 provides for the embodiment of the present invention;
A kind of structural representation protecting a kind of implementation of the device of terminal location that Fig. 7 provides for the embodiment of the present invention;
A kind of structural representation protecting the another kind of implementation of the device of terminal location that Fig. 8 provides for the embodiment of the present invention;
A kind of structural representation protecting another implementation of the device of terminal location that Fig. 9 provides for the embodiment of the present invention;
The structural representation of the device of the another kind protection terminal location that Figure 10 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
The technical scheme that the embodiment of the present invention provides is applied to the scene of terminal to the position of application reporting terminal, the present invention is by being undertaken virtual by the physical location of terminal, and the virtual location of generation is reported application, prevent the leakage of the physical location of terminal use, ensure the personal secrets of terminal use.Wherein, terminal can be mobile phone, panel computer etc.The physical location of terminal is the true place at the current place of terminal, and corresponding virtual location is the random place in the preset range centered by physical location, and virtual location is a dummy location of terminal, and namely physical location and virtual location are different positions.When applying the position needing to obtain mobile phone, mobile phone will obtain its physical location, and this physical location is carried out virtual, draw virtual location, such as: the physical location of acquisition is Shuangqing Road, Haidian District, Beijing City, undertaken virtual by physical location, the virtual location obtained is Zhichun Road, Haidian District, Beijing City.
Embodiments provide a kind of method protecting terminal location, as shown in Figure 1, comprising:
101, when applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application.
Wherein, when application needs to obtain terminal location, will to location-based service application location authority, position authority is for obtaining the position of terminal, and this position authority is specifically as follows ACCESSFINELOCATION (acquisition exact position) authority.After application success application location authority, access GPS (GlobalPositioningSystem, global positioning system), when accessing GPS, terminal system needs to verify the position authority of application, and the bag name namely by obtaining application judges whether this application is target application.Wherein, terminal reports virtual location to target application, and namely target application is the application of the actual position needing reporting terminal.
102, when described be applied as described target application time, described terminal obtains the physical location of described terminal, and according to described physical location, generates the virtual location of described terminal.
Wherein, virtual location is different from physical location.After obtaining the physical location of terminal, centered by physical location, choose a virtual location region, random selecting virtual location do not overlapped with physical location in this virtual location region, as the virtual location of terminal.When application is not target application, terminal does not carry out the operation of generating virtual position, after obtaining the physical location of terminal, physical location is reported application.
103, described terminal reports the described virtual location of described terminal to described application.
Wherein, after generating the virtual location of terminal, the virtual location of generation is reported application, the position of the terminal that this application obtains is virtual location, instead of the physical location of terminal.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.
Further; to report the alternative of virtual location to application in order to increase terminal; on the basis of the scheme shown in Fig. 1; the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location; the further refinement of the implementation of this programme to 101 in the scheme shown in Fig. 1, wherein, 101 can be implemented as 1011-1014; as shown in Figure 2, comprising:
1011, when described application application obtains the position of described terminal, described terminal obtains the application identities of described application.
Wherein, application identities is for identifying application.The application identities of application can be the UID (UserIdentification, user identity proves) of application, application and UID one_to_one corresponding.As shown in table 1, the application identities of application 1 is UID1, and the application identities of application 2 is UID2 etc.
Table 1
Application Application identities
Application 1 UID1
Application 2 UID2
1012, according to described application identities, and be stored in the application identities of terminal and the mapping relations of bag name, obtain the bag name corresponding with described application identities.
Wherein, application identities and bag name have relation one to one.As shown in table 2, application identities is that the bag that UID1 is corresponding is called bag name 1, and application identities is that the bag that UID2 is corresponding is called bag name 2 etc.
Table 2
Application identities Bag name
UID1 Bag name 1
UID2 Bag name 2
In addition, the mapping relations of application identities and bag name have been come by mapping function, and mapping function, application identities and bag name are all stored in application package manager.Known applications mark and mapping relations, utilize mapping function, then can obtain the bag name corresponding with application identities.
1013, whether the bag name detected in the Bao Mingyu virtualization applications list of described application is consistent.
Wherein, the storage area in terminal can be divided into system partitioning and user data subregion.Virtualization applications list can be stored in any one file in system partitioning, and when the application request in virtual list obtains terminal location, terminal all needs the virtual location to application reporting terminal.The bag name of target application can be comprised in virtualization applications list, the out of Memory about target application can also be comprised, as the type etc. of target application.
It should be noted that, after terminal completes application installation, terminal can obtain the authority information of application from the broadcast of application, when applying the authority of having applied for obtaining terminal location, whether terminal can be pointed out and undertaken virtual by the position of terminal to be reported, if terminal use selects the position of terminal to carry out virtual, then terminal can record the bag name of application, and this bag name is stored in virtualization applications list.
It should be noted that, when needing the virtual location of terminal to report application, terminal can receive the instruction of user, and according to the instruction of user, adds in virtualization applications list by information such as the bag names of this application; When not needing the virtual location of terminal to report application, terminal can receive the instruction of user, and according to the instruction of user, the information such as the bag name of this application is deleted from virtualization applications list.
1014, if the bag name in virtualization applications list described in the Bao Mingyu of described application is consistent, then using described application as described target application.
Wherein, target application is the application of the virtual location that reporting terminal generates.When the bag name in the virtual list of Bao Mingyu of applying is consistent, the virtual location needed to this application reporting terminal is described.When the bag name in the Bao Mingyu virtualization applications list of applying is inconsistent, then this application is not target application, does not need the virtual location to this application reporting terminal.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By judging that the bag name of the application that terminal obtains is whether in virtualization applications list, determines whether to carry out virtual to terminal physical location, thus can selectively to the virtual location of application reporting terminal.
Further; on the basis of the scheme shown in Fig. 2; the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location; the further refinement of the implementation of this programme to 102 in the scheme shown in Fig. 2; the virtual location specifically how generating terminal is described, wherein, 102 can be implemented as 1021-1022; as shown in Figure 3, comprising:
1021, described terminal obtains the physical location of described terminal, and sets the first radius and the second radius.
Wherein, terminal can utilize location (position) to obtain function and obtain the current longitude and latitude of terminal, and converts the longitude and latitude of acquisition to metric geodetic coordinates, and this geodetic coordinates is the physical location of terminal.
It should be noted that, second radius is greater than the first radius, first radius is more than or equal to the first preset value, namely the minimum value that the first radius is desirable is the first preset value, second radius is less than or equal to the second preset value, namely the maximum that the second radius is desirable is the second preset value, and the first preset value and the second preset value collectively define the scope at the place, region choosing virtual location.Such as: the first preset value is 1 kilometer, and the first radius can be set to 1.5 kilometers, the second preset value is 10 kilometers, and the second radius can be set to 9.5 kilometers.
1022, with described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
Wherein, taking physical location as the center of circle, first radius is inner circle radius, second radius is in the circle ring area of exradius, during the virtual location of random selecting a bit as terminal, because selected region does not comprise physical location, in this region during chosen position, the position chosen can not overlap with physical location, is namely all virtual location.
In specific implementation process, terminal can utilize location (position) to obtain function and obtain the current longitude and latitude of terminal, and convert the longitude and latitude of acquisition to metric geodetic coordinates, with this geodetic coordinates for the center of circle, with the first radius for inner circle radius, second radius is that exradius forms a circle ring area, and carries out random position in this circle ring area.Such as: as shown in Figure 3 a, the first radius is 1 kilometer, and the second radius is 2 kilometers, and O point is the physical location of terminal, and OA is the first radius, and OB is the second radius.Circle ring area between inner circle and cylindrical is the region of virtual location, and random selecting 1 C is as virtual location in this region.
In addition, the region of virtual location can be circle ring area, can be also the region of similar annular that rectangle is formed, and the shape, size etc. in the region of virtual location are at this and be not construed as limiting.Such as: as shown in Figure 3 b, the region between interior rectangle and outer rectangle is the region of virtual location.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By with terminal physical location for the center of circle, with the first radius for inner circle radius, second radius is that exradius forms some virtual location as terminal of random selecting in a circle ring area, thus one can be obtained close to terminal physical location, and don't the virtual location that can overlap with physical location, and then report more rational virtual location to application.
Optionally, in order to ensure the reasonability of the virtual location chosen, on the basis of the scheme shown in Fig. 3, the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location, and this programme can increase 104 after 1022, as shown in Figure 4, comprising:
104, when the virtual location of the described terminal generated overlaps with described unreasonable position, again choose a bit in described circle ring area, as the virtual location reported to described application.
Wherein, the virtual location reported to application does not overlap with unreasonable position.Some irrational positions are stored in terminal, when the virtual location generated overlaps with the unreasonable position stored in terminal, cast out irrational virtual location of generation, and regenerate virtual location, until regenerate virtual for position all do not overlap with unreasonable some time, the virtual location regenerated is reported application.Such as: when the virtual location generated is the summit in Mountain Everest, the summit due to Mountain Everest is the irrational position stored in terminal, so the summit in Mountain Everest is cast out, and chosen position in annulus again.Again such as: when terminal use is in coastal area, the virtual location of generation is marine, because sea is the irrational position stored in terminal, so sea is cast out, and chosen position in annulus again.
It should be noted that, irrational position of tag memory storage can carry out adding, delete or changing according to the instruction of terminal use, and the renewal prompting that also can provide according to network side is selected to upgrade.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.When the virtual location of the terminal generated is unreasonable position, by again choosing the virtual location of a rational position as terminal in circle ring area, and the rational virtual location this again chosen reports application, thus ensure that the reasonability of the virtual location chosen.
Optionally, in order to ensure the reasonability of the virtual location generated, the embodiment of the present invention additionally provides a kind of concrete scheme protecting the method for terminal location, as shown in Figure 5, comprising:
201, when applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application.
202, when described be applied as described target application time, whether the time interval detected between the first moment and the second moment is more than or equal to Preset Time.
Wherein, the first moment was moment of the position of the current application terminal of target application, and the second moment was moment of the position of target application last time application terminal.Such as, the first moment was the 9:30 of 2014-9-1, and the second moment was the 10:35 of 2014-9-1.
203, if between the first moment and the second moment interval greater than equaling Preset Time, then obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal.
Wherein, between the first moment and the second moment interval greater than when equaling Preset Time, terminal may be far away in the position in the second moment and the distance between the position in the first moment, in order to ensure the reasonability of the virtual location of the present terminal generated, obtain the physical location of present terminal, and according to the physical location of present terminal, generate the virtual location of present terminal.
Such as: the first moment was the 9:30 of 2014-9-1, second moment was the 13:35 of 2014-9-1, Preset Time is 1 hour, so between the first moment and the second moment interval greater than 1 hour, as shown in Figure 5 a, P point is the virtual location of the terminal that the second moment generated, Q point is the physical location of the first moment terminal, with Q point for the center of circle, first radius is inner circle radius, second radius is in the circle ring area of exradius, and in the circle ring area that the broken circle namely in figure forms, random selecting 1 R is as the virtual location of present terminal.
204, if the time interval between the first moment and the second moment is less than Preset Time, then the virtual location of the described terminal generated the last time, as the physical location of current described terminal, generates the virtual location of current described terminal.
Wherein, the time interval between the first moment and the second moment is when being less than Preset Time, terminal may be relatively in the position in the second moment and the distance between the position in the first moment, in order to ensure the reasonability of the virtual location of the present terminal generated, so the virtual location of the terminal generated the last time is as the physical location of present terminal, generate the virtual location of present terminal.
Such as: the first moment was the 9:30 of 2014-9-1, second moment was the 9:59 of 2014-9-1, Preset Time is 1 hour, and the time interval between the first moment and the second moment is less than 1 hour, as shown in Figure 5 b, the virtual location of the terminal that P point generated for the second moment, then with P point for the center of circle, the first radius is inner circle radius, and the second radius is in the circle ring area of exradius, namely, in the circle ring area that the broken circle in figure forms, random selecting 1 S is as the virtual location of present terminal.
205, described terminal reports the described virtual location of described terminal to described application.
A kind of method protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.According to current time and the last time interval in moment and the relation of Preset Time, the physical location how decision chooses present terminal carries out virtual and generating virtual position.When current time and last moment interval greater than or when equaling Preset Time, the physical location according to present terminal is carried out virtual, generating virtual position, thus the reasonability that ensure that the virtual location of generation; When current time is less than Preset Time with the time interval in last moment, choosing the last virtual location generated carries out virtual as the physical location of present terminal, generating virtual position, thus ensure that the reasonability of the virtual location of generation, eliminate the resource obtained shared by terminal physical location simultaneously.
The embodiment of the present invention additionally provides a kind of device 300 protecting terminal location, and as shown in Figure 6, device 300 comprises:
Target determination module 301, for when applying application and obtaining the position of terminal, obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application.
Wherein, terminal reports virtual location to target application.
First generation module 302, for when described in be applied as described target application time, obtain the physical location of described terminal, and according to described physical location, generate the virtual location of described terminal.
Wherein, virtual location is different from physical location.
Reporting module 303, for reporting the described virtual location of described terminal to described application.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.
As shown in Figure 7, the target determination module 301 in device 300 comprises:
Mark acquiring unit 3011, for when described application application obtains the position of described terminal, described terminal obtains the application identities of described application.
Bag name acquiring unit 3012, for according to described application identities, and is stored in the application identities of terminal and the mapping relations of bag name, obtains the bag name corresponding with described application identities.
Detecting unit 3013, whether consistent for the bag name detected in the Bao Mingyu virtualization applications list of described application.
Wherein, the virtual bag name with comprising target application with list.
Target determination unit 3014, time consistent for the bag name in virtualization applications list described in the Bao Mingyu when described application, using described application as described target application.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By judging that the bag name of the application that terminal obtains is whether in virtualization applications list, determines whether to carry out virtual to terminal physical location, thus can selectively to the virtual location of application reporting terminal.
As shown in Figure 8, the first generation module 302 in device 300 comprises:
Setup unit 3021, for setting the first radius and the second radius.
Wherein, the second radius is greater than the first radius, and the first radius is more than or equal to the first preset value, and the second radius is less than or equal to the second preset value.
Generation unit 3022, for described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.By with terminal physical location for the center of circle, with the first radius for inner circle radius, second radius is that exradius forms some virtual location as terminal of random selecting in a circle ring area, thus one can be obtained close to terminal physical location, and don't the virtual location that can overlap with physical location, and then report more rational virtual location to application.
As shown in Figure 9, comprising in device 300:
Adjusting module 306, for when the virtual location of the described terminal generated overlaps with described unreasonable position, again chooses a bit, as the virtual location reported to described application in described circle ring area.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.When the virtual location of the terminal generated is unreasonable position, by again choosing the virtual location of a rational position as terminal in circle ring area, and the rational virtual location this again chosen reports application, thus ensure that the reasonability of the virtual location chosen.
As shown in Figure 10, device 300 also comprises:
Detection module 304, whether Preset Time is more than or equal to for the time interval detected between the first moment and the second moment, described first moment is moment of the position of the described terminal of the current application of described target application, and described second moment is moment of the position of the described terminal of described target application last time application.
Second generation module 305, between the first moment and the second moment interval greater than when equaling Preset Time, obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal.
A kind of device protecting terminal location that the embodiment of the present invention provides, for the scene of the position to application reporting terminal.When applying application and obtaining the position of terminal, terminal, by judging whether this application is target application, determines whether virtual for the physical location of terminal, if this is applied as target application, then determine virtual for the physical location of terminal, and the virtual location of the terminal of generation is reported this application.Application is reported with by the physical location of terminal, the prior art being difficult to the personal secrets ensureing terminal use is compared, in the present invention, when applying the position needing to obtain terminal, the virtual location of terminal is generated according to the physical location of terminal, and the virtual location of generation is reported this application, what application got is the virtual location of terminal, do not obtain the physical location of terminal, thus prevent the physical location revealing terminal, avoiding application or hacker etc. utilizes the physical location of the terminal use revealed to carry out malicious operation to terminal, and then ensured the personal secrets of terminal use.According to current time and the last time interval in moment and the relation of Preset Time, the physical location how decision chooses present terminal carries out virtual and generating virtual position.When current time and last moment interval greater than or when equaling Preset Time, the physical location according to present terminal is carried out virtual, generating virtual position, thus the reasonability that ensure that the virtual location of generation; When current time is less than Preset Time with the time interval in last moment, choosing the last virtual location generated carries out virtual as the physical location of present terminal, generating virtual position, thus ensure that the reasonability of the virtual location of generation, eliminate the resource obtained shared by terminal physical location simultaneously.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for apparatus embodiments, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (10)

1. protect a method for terminal location, it is characterized in that, comprising:
When applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
When described be applied as described target application time, described terminal obtains the physical location of described terminal, and according to described physical location, generates the virtual location of described terminal, and described virtual location is different from described physical location;
Described terminal reports the described virtual location of described terminal to described application.
2. method according to claim 1, is characterized in that, described when applying application and obtaining the position of terminal, described terminal obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application, comprising:
When described application application obtains the position of described terminal, described terminal obtains the application identities of described application;
According to described application identities, and be stored in the application identities of terminal and the mapping relations of bag name, obtain the bag name corresponding with described application identities;
Whether the bag name detected in the Bao Mingyu virtualization applications list of described application is consistent;
If the bag name in virtualization applications list described in the Bao Mingyu of described application is consistent, then using described application as described target application.
3. method according to claim 1, is characterized in that, described according to described physical location, generates the virtual location of described terminal, comprising:
Set the first radius and the second radius, described second radius is greater than described first radius, and described first radius is more than or equal to the first preset value, and described second radius is less than or equal to the second preset value;
With described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
4. method according to claim 1, is characterized in that, also comprises:
Whether the time interval detected between the first moment and the second moment is more than or equal to Preset Time, described first moment is moment of the position of the described terminal of the current application of described target application, and described second moment is moment of the position of the described terminal of described target application last time application;
If between the first moment and the second moment interval greater than equaling Preset Time, then obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal;
If the time interval between the first moment and the second moment is less than Preset Time, then the virtual location of the described terminal generated the last time, as the physical location of current described terminal, generates the virtual location of current described terminal.
5. the method according to claim 1 or 3, is characterized in that, described terminal storage has unreasonable position; To report the described virtual location of described terminal to described application in described terminal before, also comprise:
When the virtual location of the described terminal generated overlaps with described unreasonable position, again choose a bit in described circle ring area, as the virtual location reported to described application, the described virtual location reported to described application does not overlap with described unreasonable position.
6. protect a device for terminal location, it is characterized in that, comprising:
Target determination module, for when applying application and obtaining the position of terminal, obtains the bag name of described application, and according to the bag name of described application, determines whether described application is target application;
First generation module, for when described in be applied as described target application time, obtain the physical location of described terminal, and according to described physical location, generate the virtual location of described terminal, described virtual location is different from described physical location;
Reporting module, for reporting the described virtual location of described terminal to described application.
7. device according to claim 6, is characterized in that, described target determination module, comprising:
Mark acquiring unit, for when described application application obtains the position of described terminal, described terminal obtains the application identities of described application;
Bag name acquiring unit, for according to described application identities, and is stored in the application identities of terminal and the mapping relations of bag name, obtains the bag name corresponding with described application identities;
Detecting unit, whether consistent for the bag name detected in the Bao Mingyu virtualization applications list of described application;
Target determination unit, time consistent for the bag name in virtualization applications list described in the Bao Mingyu when described application, using described application as described target application.
8. device according to claim 6, is characterized in that, described first generation module, comprising:
Setup unit, for setting the first radius and the second radius, described second radius is greater than described first radius, and described first radius is more than or equal to the first preset value, and described second radius is less than or equal to the second preset value;
Generation unit, for described physical location for the center of circle, described first radius is inner circle radius, and described second radius is in the circle ring area of exradius, and random selecting is a bit as described virtual location of described terminal.
9. device according to claim 6, is characterized in that, also comprises:
Detection module, whether Preset Time is more than or equal to for the time interval detected between the first moment and the second moment, described first moment is moment of the position of the described terminal of the current application of described target application, and described second moment is moment of the position of the described terminal of described target application last time application;
Second generation module, between the first moment and the second moment interval greater than when equaling Preset Time, obtain the physical location of current described terminal, and according to the physical location of current described terminal, generate the virtual location of current described terminal;
3rd generation module, when being less than Preset Time for the time interval between the first moment and the second moment, the virtual location of the described terminal generated the last time, as the physical location of current described terminal, generates the virtual location of current described terminal.
10. the device according to claim 6 or 8, is characterized in that, described device stores unreasonable position; Described device also comprises:
Adjusting module, for when the virtual location of the described terminal generated overlaps with described unreasonable position, again choose a bit in described circle ring area, as the virtual location reported to described application, the described virtual location reported to described application does not overlap with described unreasonable position.
CN201410476281.8A 2014-09-17 2014-09-17 Method and device for protecting position of terminal Pending CN105430033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410476281.8A CN105430033A (en) 2014-09-17 2014-09-17 Method and device for protecting position of terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410476281.8A CN105430033A (en) 2014-09-17 2014-09-17 Method and device for protecting position of terminal

Publications (1)

Publication Number Publication Date
CN105430033A true CN105430033A (en) 2016-03-23

Family

ID=55507973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410476281.8A Pending CN105430033A (en) 2014-09-17 2014-09-17 Method and device for protecting position of terminal

Country Status (1)

Country Link
CN (1) CN105430033A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022101A (en) * 2016-05-17 2016-10-12 广东欧珀移动通信有限公司 Application management method and terminal
CN106228086A (en) * 2016-07-29 2016-12-14 北京小米移动软件有限公司 Obtain the method and device of positional information
CN106897610A (en) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 A kind of method and apparatus for positioning protection
CN107231481A (en) * 2017-06-19 2017-10-03 郭启蒙 A kind of method in the simulation geographical position for smart mobile phone
CN109905386A (en) * 2019-02-20 2019-06-18 徐建红 A kind of station address protection system and its working method based on user information safety
CN109923506A (en) * 2016-11-23 2019-06-21 华为技术有限公司 Information processing method and positioning chip, mobile terminal
CN110866271A (en) * 2019-10-22 2020-03-06 中山大学 Position privacy protection method and system based on Android platform
CN110881169A (en) * 2019-12-04 2020-03-13 南京森林警察学院 Android mobile phone track positioning data protection method
CN111065088A (en) * 2019-10-18 2020-04-24 宇龙计算机通信科技(深圳)有限公司 Position acquisition method and device, storage medium and electronic equipment
CN112527937A (en) * 2020-12-16 2021-03-19 上海连尚网络科技有限公司 Method and device for storing user position information

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5948043A (en) * 1996-11-08 1999-09-07 Etak, Inc. Navigation system using GPS data
WO2010083654A1 (en) * 2009-01-23 2010-07-29 阿尔卡特朗讯公司 Method and related device for realizing protection of the privacy of user location information
CN102968338A (en) * 2012-12-13 2013-03-13 北京奇虎科技有限公司 Method and device for classifying application program of electronic equipment and electronic equipment
CN103316472A (en) * 2013-05-17 2013-09-25 南京睿悦信息技术有限公司 Android device gas platform system based on Bluetooth handle and implementation method of Android device gas platform system
CN103425234A (en) * 2013-07-30 2013-12-04 海信集团有限公司 Method for dynamically adjusting picture processing performance and display terminal
CN103731799A (en) * 2012-10-11 2014-04-16 中兴通讯股份有限公司 Non-real-time position information acquisition method, mobile terminal and communication system
CN104010272A (en) * 2014-05-12 2014-08-27 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting privacy

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5948043A (en) * 1996-11-08 1999-09-07 Etak, Inc. Navigation system using GPS data
WO2010083654A1 (en) * 2009-01-23 2010-07-29 阿尔卡特朗讯公司 Method and related device for realizing protection of the privacy of user location information
CN103731799A (en) * 2012-10-11 2014-04-16 中兴通讯股份有限公司 Non-real-time position information acquisition method, mobile terminal and communication system
CN102968338A (en) * 2012-12-13 2013-03-13 北京奇虎科技有限公司 Method and device for classifying application program of electronic equipment and electronic equipment
CN103316472A (en) * 2013-05-17 2013-09-25 南京睿悦信息技术有限公司 Android device gas platform system based on Bluetooth handle and implementation method of Android device gas platform system
CN103425234A (en) * 2013-07-30 2013-12-04 海信集团有限公司 Method for dynamically adjusting picture processing performance and display terminal
CN104010272A (en) * 2014-05-12 2014-08-27 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting privacy

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022101A (en) * 2016-05-17 2016-10-12 广东欧珀移动通信有限公司 Application management method and terminal
CN106022101B (en) * 2016-05-17 2019-12-06 Oppo广东移动通信有限公司 application management method and terminal
CN106228086A (en) * 2016-07-29 2016-12-14 北京小米移动软件有限公司 Obtain the method and device of positional information
CN109923506A (en) * 2016-11-23 2019-06-21 华为技术有限公司 Information processing method and positioning chip, mobile terminal
CN106897610A (en) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 A kind of method and apparatus for positioning protection
WO2018133654A1 (en) * 2017-01-19 2018-07-26 北京奇虎科技有限公司 Protected positioning method and device
CN107231481A (en) * 2017-06-19 2017-10-03 郭启蒙 A kind of method in the simulation geographical position for smart mobile phone
CN109905386A (en) * 2019-02-20 2019-06-18 徐建红 A kind of station address protection system and its working method based on user information safety
CN111065088A (en) * 2019-10-18 2020-04-24 宇龙计算机通信科技(深圳)有限公司 Position acquisition method and device, storage medium and electronic equipment
CN110866271A (en) * 2019-10-22 2020-03-06 中山大学 Position privacy protection method and system based on Android platform
CN110881169A (en) * 2019-12-04 2020-03-13 南京森林警察学院 Android mobile phone track positioning data protection method
CN112527937A (en) * 2020-12-16 2021-03-19 上海连尚网络科技有限公司 Method and device for storing user position information

Similar Documents

Publication Publication Date Title
CN105430033A (en) Method and device for protecting position of terminal
EP3277027B1 (en) Wi-fi connection method, mobile terminal and storage medium
KR20180044345A (en) Generate and publish verified location information
KR102072095B1 (en) Identity authentication methods, devices, and systems
US10873900B2 (en) Method for wireless fidelity connection and related products
JP5993094B2 (en) Pre-presentation method and system for signal coverage hole
US20180146393A1 (en) Wireless network site survey systems and methods
US11432349B2 (en) Group creation method, apparatus, and system
CN104102358A (en) Privacy information protecting method and privacy information protecting device
CN104010272A (en) Method and device for protecting privacy
JP2017533521A (en) Method and system for geolocation authentication of resources
CN110099142B (en) IP address allocation method, device, equipment and storage medium
CN102869089B (en) mobile terminal locating method and system
CN103458501A (en) Positioning method and device
TWI696086B (en) Entity information verification method and device
CN101179851A (en) Positioning system and method of navigation mobile phone
ES2541321T3 (en) Dynamic label control and event location by fingerprint printing
CN108521876B (en) Measuring method and device of Bluetooth equipment
US11989246B2 (en) Providing electronic search and guidance using non-address destination designations
US9681298B1 (en) Controlling an amount of information disclosed by a position-determining system
CN103916435A (en) Method and device for judging authenticity of information
CN104185276A (en) Positioning method and device based on wireless network
CN105246157A (en) Mobile terminal positioning method and positioning system
CN107196935B (en) Positioning information transmission method and system
CN109104719A (en) Obtain the methods, devices and systems of mobile device identification information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160323

RJ01 Rejection of invention patent application after publication