Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for protecting equipment privacy, electronic equipment and storage medium

A technology for protecting equipment and equipment, applied in the field of data information security, can solve problems such as interruption, exposure of user's personal preference and privacy, and user's loss of independent thinking and search and selection capabilities, so as to achieve the effect of equipment privacy

Active Publication Date: 2020-05-08
LENOVO (BEIJING) CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But these will expose the user's personal preferences and privacy too much, and at the same time will receive all kinds of message pushes to cause disturbance, and with many unnecessary precise recommendations, it will make Users gradually lose the ability to think independently and search and choose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting equipment privacy, electronic equipment and storage medium
  • Method and device for protecting equipment privacy, electronic equipment and storage medium
  • Method and device for protecting equipment privacy, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] With the advent of the era of big data and artificial intelligence, the value of data is gradually increasing. Mobile terminal equipment identification codes, such as International Mobile Equipment Identity (International Mobile Equipment Identity, IMEI), Wireless Broadband (Wireless-Fidelity, Wi-Fi) The collection and use of terminal device identification information such as Media Access Control Address (MAC) address, International Mobile Subscriber Identification Number (IMSI) and Bluetooth address has become a common phenomenon. Through data collection and reporting, user behavior data can be collected for a long time to obtain relatively complete user portrait information. At the same time, the current popular advertising alliance platforms will share device information with each other to make accurate recommendations and other behaviors.

[0029] But these will over-expose the user's personal preferences and privacy, and at the same time will receive all kinds of m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for protecting equipment privacy. The method comprises the steps of: uninstalling a first application program installed in equipment; automatically reinstalling a second application program for the equipment, wherein the first application program and the second application program are the same application program, and in the process of installingthe second application program, a virtual device identification code corresponding to the second application program is generated for the device, so that a server corresponding to the second application program determines that the device is a new terminal device; wherein the virtual device identification code is different from a real device identification code of the device. The embodiment of theinvention further provides a device for protecting equipment privacy, electronic equipment and a storage medium.

Description

technical field [0001] The embodiments of the present application relate to data information security, and relate to but are not limited to a method and device for protecting device privacy, electronic devices, and storage media. Background technique [0002] With the advent of the era of big data and artificial intelligence, the value of data has gradually increased, and the collection and use of terminal equipment identification information such as mobile terminal equipment identification codes has become a common phenomenon. Through data collection and reporting, user behavior data can be collected for a long time to obtain relatively complete user portrait information. At the same time, the current popular advertising alliance platforms will share device information with each other to make accurate recommendations and other behaviors. [0003] But these will over-expose the user's personal preferences and privacy, and at the same time will receive all kinds of message p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/44G06F8/61
CPCG06F21/6245G06F21/445G06F8/61G06F8/62G06F2221/2133
Inventor 王迪王华
Owner LENOVO (BEIJING) CO LTD