Method and device for protecting equipment privacy, electronic equipment and storage medium
A technology for protecting equipment and equipment, applied in the field of data information security, can solve problems such as interruption, exposure of user's personal preference and privacy, and user's loss of independent thinking and search and selection capabilities, so as to achieve the effect of equipment privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] With the advent of the era of big data and artificial intelligence, the value of data is gradually increasing. Mobile terminal equipment identification codes, such as International Mobile Equipment Identity (International Mobile Equipment Identity, IMEI), Wireless Broadband (Wireless-Fidelity, Wi-Fi) The collection and use of terminal device identification information such as Media Access Control Address (MAC) address, International Mobile Subscriber Identification Number (IMSI) and Bluetooth address has become a common phenomenon. Through data collection and reporting, user behavior data can be collected for a long time to obtain relatively complete user portrait information. At the same time, the current popular advertising alliance platforms will share device information with each other to make accurate recommendations and other behaviors.
[0029] But these will over-expose the user's personal preferences and privacy, and at the same time will receive all kinds of m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


