Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method and system of network model

A network model and encryption method technology, applied in transmission systems, encryption devices with shift registers/memory, digital transmission systems, etc. Simplify the encryption and decryption process, protect it from being easily copied, and simplify the effect of the encryption process

Active Publication Date: 2019-07-26
AISPEECH CO LTD
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the encryption and decryption process is cumbersome and the security is average.
The main disadvantage of the method of encrypting the model parameters after solidification is that only one file needs to be encrypted but the security is low. Once the encrypted model is deciphered, the model is easier to copy and spread
It can be seen that the common problems of the model encryption methods in the prior art are that the security is not high enough, and when the model is updated, it is necessary to re-encrypt and replace and update all the model files, and the process is cumbersome
[0013] The defect of the above-mentioned network model encryption method, the reason for the defect of the direct encryption method is that the number of model files is large, and the encryption method is single
For the method of encryption after the model is solidified, the reason for its defect is that the weight parameters in the network are solidified into the network structure, which reduces the number of files, but increases the size of a single model file, and a model file contains the calculation graph and All information such as parameters, the model is easier to be copied and disseminated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and system of network model
  • Encryption and decryption method and system of network model
  • Encryption and decryption method and system of network model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is some embodiments of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0058] In one embodiment of the present invention, as figure 1 As shown, the encryption method of the network model is provided, including the following steps:

[0059] Step S101, acquiring a network structure definition file.

[0060] In this step, the network structure definition file model.pb in the network model fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method and system of a network model. The encryption method comprises the following steps: extracting a network structure definition file in a network model file; and encrypting the network structure definition file through the first secret key and an encryption algorithm; and extracting a network variable name file in the network model file; and encrypting the network variable name file through the second secret key and the encryption algorithm; and generating an encrypted network model file according to the encrypted network structure definition file and the encrypted network variable name file. According to the method, part of files in the network model file are encrypted without a secret key, so that the security is improved, and theencryption process is simplified. And later use of the model, such as updating, is more convenient.

Description

technical field [0001] The invention belongs to the technical field of network application and deep learning, and in particular relates to an encryption and decryption method and system of a TensorFlow model. Background technique [0002] In related technologies, most deep network models are stored in standard serialized probuf format, which means that anyone can copy your model. A common way to protect a model from being easily copied is to encrypt the model, load the model in the application, and then decrypt the encrypted model in memory. [0003] The commonly used model encryption algorithm is the symmetric encryption algorithm in reversible encryption. The most commonly used model encryption scheme is to use a fixed password to encrypt the saved model file, and then decrypt the encrypted model during the inference process. There is also a method of solidifying the network model file first, solidifying the weight variables into the network structure, simplifying the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L12/24
CPCH04L9/0643H04L41/145H04L63/0428
Inventor 王运侠
Owner AISPEECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products