Privacy data protection method and device
A privacy data, data technology, applied in the field of network security, can solve the problem of inability to reliably guarantee the security of user privacy data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0100]In recent years, with the development of the Internet, it has become easier and easier to obtain user data. For example, on various social platforms, face images, location data, nicknames, etc. posted by users can be obtained. Although the user's identity data (name, ID card, etc.) cannot be obtained directly from data such as face images and positioning data, but if a certain amount of such data is obtained, the attacker can infer the user's identity with a high probability data. For example, once an assailant has mastered some identity data-non-identity data (such as mastering a person's ID card, he knows the person's address, and at this time the ID card-address forms a data pair) associated database. Combined with the non-identity data crawled from the Internet, the user's identity data can be reversely located and queried. For example, the attacker knows that Zhang San lives in community A, works as a staff member in company B and often goes to restaurant C for co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


