Unlock instant, AI-driven research and patent intelligence for your innovation.

Joint training method and device for business models

A business model and training method technology, applied in the computer field, can solve problems such as data islands and incomplete data sharing

Active Publication Date: 2020-11-13
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the era of big data, a lot of data may be scattered and stored in different enterprises. Based on privacy protection and other considerations, enterprises cannot fully share each other's data, so there may be data islands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Joint training method and device for business models
  • Joint training method and device for business models
  • Joint training method and device for business models

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The solutions provided in this specification will be described below in conjunction with the accompanying drawings. The technical terms involved in the embodiments of this specification are introduced below.

[0054] Multi-Party Computation (Secure Muti-Party Computation, MPC) is an algorithm that protects data privacy and security. Multi-party secure computing allows multiple data parties participating in the calculation to perform collaborative calculations without leaking their own data.

[0055] Secret Sharing (SS) is an algorithm for protecting data privacy. Under the premise of not leaking their own data, multiple data parties can use the secret sharing method to perform collaborative calculations and obtain secret information. Each data party can obtain a share of this secret information. A single data party cannot recover this secret information. This secret information can only be recovered by fusing the shares owned by multiple data parties. For example, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide a method and device for joint training of business models. In multi-party security calculations, nonlinear complex operations are assigned to third parties for processing, which greatly reduces the complexity of joint training of nonlinear models by multiple business parties. At the same time, each business party holding the characteristic data or label data of the training samples generates a predetermined number of random numbers through the agreed random number generation method, so as to obtain the sample data of the training samples corresponding to each other in order to maintain data consistency , and because the third party does not participate in the random number generation process, each other business party effectively guarantees data privacy against the third party. And each other business parties interact through the secret sharing method to ensure data privacy between each other. In short, the above method greatly reduces the computational complexity of joint training of nonlinear models by multiple business parties on the basis of privacy protection.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to a method and device for training a business model by using a computer. Background technique [0002] In the era of big data, a lot of data may be scattered and stored in different enterprises. Based on privacy protection and other considerations, enterprises cannot fully share each other's data, so data islands may exist. [0003] In some cases, it is usually necessary to carry out cooperative security modeling between enterprises, so as to fully protect the privacy of enterprise data, use the data of all parties to carry out collaborative training on data processing models, so as to process business more accurately and effectively data. At this time, the data used for training the data processing model may be scattered among the parties involved in the cooperative modeling. Therefore, how to provide a more effective model training method b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F7/58G06N3/04G06N3/08
CPCG06F21/6218G06F7/588G06N3/08G06N3/048
Inventor 周亚顺李漓春张祺智
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD