Multi-party joint feature evaluation method and device for protecting privacy security

A privacy-preserving, multi-party technology, used in computer security devices, digital data protection, instruments, etc.

Active Publication Date: 2020-04-10
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF10 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, non-label holders are unwilling to disclose their user and feature data to label holders

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party joint feature evaluation method and device for protecting privacy security
  • Multi-party joint feature evaluation method and device for protecting privacy security
  • Multi-party joint feature evaluation method and device for protecting privacy security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0071] Figure 1A It shows the data owned by the data party A disclosed in the embodiment of this specification. Figure 1B It shows the data owned by the data party B disclosed in the embodiment of this specification. Figure 1A with Figure 1B Each ID (Identity Document, identity identification number) in can be a digital code that uniquely identifies a user, such as a mobile phone number. Such as Figure 1A with Figure 1B As shown, ID1, ID2, and ID3 are IDs shared by data party A and data party B. Figure 1A Each ID in has a label and a feature value of feature Fa. Exemplary, such as Figure 1A As shown, labels can be divided into positive labels and negative labels. Figure 1B Each ID in has the feature value of feature Fb.

[0072] In an exemplary scenario, the data party A may be an electronic payment platform (such as Alipay), and the tag may...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a multi-party joint feature evaluation method and device for protecting privacy security. The device at least comprises a first device storing a first sample set and a second device storing a second sample set, and the method is applied to the first device. The method comprises the following steps: encrypting an initial ID of each sample in a first sample set, and sending an obtained first encryption ID and a label of the first sample set to the second device; receiving a first encryption ID of the second sample set, an identifier of a sub-box where thesecond sample set is located, and a second encryption ID and a label of the first sample set from the second device; encrypting the first encrypted ID of the second sample set to obtain a second encrypted ID of the second sample set; determining a common sample according to the second encryption ID of the second sample set and the second encryption ID of the first sample set; and calculating theinformation value of features according to a label of the common sample and the identifier of the sub-box so as to select the features for a machine learning model.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer information processing, and in particular to a method and device for multi-party joint feature evaluation that protects privacy and security. Background technique [0002] The data needed for machine learning often involves multiple fields. For example, in the merchant classification analysis scenario based on machine learning, the electronic payment platform has the transaction flow data of the merchants, the e-commerce platform stores the sales data of the merchants, and the banking institution has the loan data of the merchants. Data often exists in silos. Due to issues such as industry competition, data security, and user privacy, data integration faces great resistance. It is difficult to integrate data scattered across various platforms to train machine learning models. Under the premise of ensuring that data is not leaked, using multi-party data to jointly train mach...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06N20/00
CPCG06F21/602G06F21/6245G06N20/00
Inventor 陆梦倩汲小溪王维强
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products