Neural network model encryption protection system and method related to data random encryption
A neural network model and random encryption technology, applied in the field of artificial neural network protection mechanism to achieve the effect of rights protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] A system structure diagram of a neural network model encryption protection system 100 involving random encryption of data is shown in the appendix of the specification. figure 1 , for the encryption principle of the encryption module 2 of the encryption protection system 100, please refer to the appendix of the description. figure 2 , the encryption protection system 100 includes a data input module 1 , an encryption module 2 , an encrypted data input module 3 , an artificial neural network model module 4 and a data output module 5 . The data input module 1 is connected with the signal of the encryption module 2, the encryption module 2 is connected with the signal of the encrypted data input module 3, the encrypted data input module 3 is connected with the signal of the artificial neural network model module 4, and the artificial neural network model module 4 is connected with the signal of the data output module 5. connected.
[0048] Further, the data input module ...
Embodiment 2
[0060] A neural network model encryption protection method involving random encryption of data proposed by the present invention includes the following steps:
[0061] A. Provide original input data D;
[0062] S. Encrypt the original input data D to generate encrypted input data D ’ ;
[0063] B. Encrypt the input data D ’ Input to the artificial neural network model, the artificial neural network model encrypts the input data D ’ perform calculations and get results;
[0064] C. Output the calculated results.
[0065] Wherein, step S specifically includes:
[0066] S1. provide a group of keys S with N digits as a control amount, the key S specifically defines the encryption process for the original input data D; wherein, the length of the key S is determined by the encryption method in the encryption process and the encryption requirements. Defined; each of the N-digit numbers of the key S is selected from one of the Arabic numerals 0-9;
[0067] S2. Convert the origi...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com