Anonymizing location information of a mobile device
First Claim
1. A method for anonymizing location information of a mobile device, the method comprising:
- receiving, by an anonymization provider, from the mobile device, location information identifying the location of the mobile device;
receiving, by the anonymization provider, from the mobile device, an anonymity requirement, wherein the received anonymity requirement includes a k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device;
selecting, by the anonymization provider, an obfuscation value indicating an extent of location obfuscation that satisfies the received anonymity requirement, wherein the extent of location obfuscation determines location boundaries within which a generated obfuscated location will reside;
verifying, by the anonymization provider, that the k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device is satisfied within the location boundaries determined by the selected obfuscation value;
generating, by the anonymization provider, an obfuscated location for the mobile device; and
sending, by the anonymization provider, to the mobile device, the obfuscated location.
1 Assignment
0 Petitions
Accused Products
Abstract
Anonymizing location information of a mobile device by an anonymization provider. The anonymizing provider receives, from the mobile device, location information identifying the location of the mobile device and an anonymity requirement. The anonymization provider selects an obfuscation value indicating an extent of location obfuscation that satisfies the received anonymity requirement. The extent of location obfuscation determines location boundaries within which a generated obfuscated location will reside. The anonymization provider generates an obfuscated location for the mobile device and sends the obfuscated location to the mobile device.
25 Citations
12 Claims
-
1. A method for anonymizing location information of a mobile device, the method comprising:
-
receiving, by an anonymization provider, from the mobile device, location information identifying the location of the mobile device; receiving, by the anonymization provider, from the mobile device, an anonymity requirement, wherein the received anonymity requirement includes a k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device; selecting, by the anonymization provider, an obfuscation value indicating an extent of location obfuscation that satisfies the received anonymity requirement, wherein the extent of location obfuscation determines location boundaries within which a generated obfuscated location will reside; verifying, by the anonymization provider, that the k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device is satisfied within the location boundaries determined by the selected obfuscation value; generating, by the anonymization provider, an obfuscated location for the mobile device; and sending, by the anonymization provider, to the mobile device, the obfuscated location. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product for anonymizing location information of a mobile device, the computer program product comprising one or more computer readable storage medium and program instructions stored on at least one of the one or more computer readable storage medium, the program instructions comprising:
-
program instructions to receive, by an anonymization provider, from the mobile device, location information identifying the location of the mobile device; program instructions to receive, by the anonymization provider, from the mobile device, an anonymity requirement, wherein the received anonymity requirement includes a k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device; program instructions to select, by the anonymization provider, an obfuscation value indicating an extent of location obfuscation that satisfies the received anonymity requirement, wherein the extent of location obfuscation determines location boundaries within which a generated obfuscated location will reside; program instruction to verify, by the anonymization provider, that the k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device is satisfied within the location boundaries determined by the selected obfuscation value; program instructions to generate, by the anonymization provider, an obfuscated location for the mobile device; and program instructions to send, by the anonymization provider, to the mobile device, the obfuscated location. - View Dependent Claims (6, 7, 8)
-
-
9. A computer system for anonymizing location information of a mobile device, the computer system comprising one or more processors, one or more computer readable memories, one or more computer readable tangible storage medium, and program instructions stored on at least one of the one or more storage medium for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising:
-
program instructions to receive, by an anonymization provider, from the mobile device, location information identifying the location of the mobile device; program instructions to receive, by the anonymization provider, from the mobile device, an anonymity requirement, wherein the received anonymity requirement includes a k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device; program instructions to select, by the anonymization provider, an obfuscation value indicating an extent of location obfuscation that satisfies the received anonymity requirement, wherein the extent of location obfuscation determines location boundaries within which a generated obfuscated location will reside; program instruction to verify, by the anonymization provider, that the k-anonymity value specifying how many other mobile devices cannot be distinguished from the mobile device is satisfied within the location boundaries determined by the selected obfuscation value; program instructions to generate, by the anonymization provider, an obfuscated location for the mobile device; and program instructions to send, by the anonymization provider, to the mobile device, the obfuscated location. - View Dependent Claims (10, 11, 12)
-
Specification