Unlock instant, AI-driven research and patent intelligence for your innovation.

3D printing multi-database sharing optimization algorithm for single-key encryption and decryption

A key encryption, 3D printing technology, applied in the field of multi-database sharing, can solve the problems of inexhaustible 3D printing parameters, high cost of 3D printing experiments, etc., to achieve the effect of ensuring confidentiality

Inactive Publication Date: 2020-12-25
CHENGDU AIRCRAFT INDUSTRY GROUP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the implementation process of 3D printing, due to too many 3D printing related parameters, it is impossible to exhaust all 3D printing parameters during the experiment and judge whether these parameters can form suitable parts. Therefore, a 3D printing parameter learning and prediction method is needed. way to realize the prediction of 3D printing parameters
[0005] Moreover, due to the high cost of 3D printing experiments, it is impossible for one enterprise or unit to complete all of them. Therefore, a technical solution for joint training of multiple databases to obtain more accurate model parameters is proposed, and this type of solution involves multiple databases. confidentiality issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3D printing multi-database sharing optimization algorithm for single-key encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] This embodiment describes in detail the situation that two data sample owners share the database, and at this time, the two data sample owners are denoted by A and B respectively.

[0059] Two typical structures:

[0060] The first typical structure is that A and B have some characteristics of m data samples respectively, for example: A has the characteristics of laser power and printing speed in m groups, while B has the characteristics of m groups of powder feeding volume and air feeding volume, The features owned by parties A and B are not repeated; this is a scenario where the data features of parties A and B are different. In this case, it is necessary to use the data same distribution technology to process the data samples uniformly for subsequent operations.

[0061] The second typical structure is that A has m1 data samples, B has m2 data samples, and the number of data features contained in each data sample is the same, that is, the number of data features con...

Embodiment 2

[0100] Compared with the technical solution of "homomorphically encrypting the shared data such as data samples in the sample matrix, and then performing Taylor expansion" in Example 1, encryption methods such as secret sharing and multi-party secure summation can also be used for encryption, and then no Taylor unfolded.

[0101] Other parts of this embodiment are the same as those of Embodiment 1, so details are not repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of database sharing, and discloses a 3D printing multi-database sharing optimization algorithm for single-key encryption and decryption , which is based onthe single-key encryption and decryption technology. The algorithm comprises the following steps: firstly, performing encryption sharing on model parameters and a sample matrix through a homomorphicencryption algorithm, then performing expansion through a Taylor formula, and obtaining a target gradient through gradient descent; and then each training party updates the local model parameters according to the target gradient, so that multiple training parties of the shared database share the model parameters. According to the multi-database sharing optimization algorithm, a plurality of userscan share the databases for joint training, and the confidentiality of own data can be guaranteed.

Description

technical field [0001] The invention relates to the technical field of multi-database sharing, in particular to a 3D printing multi-database sharing optimization algorithm for single-key encryption and decryption. Background technique [0002] In the 1980s, 3D printing technology was born. 3D printing is a bottom-up manufacturing method, also known as additive manufacturing technology, which is different from traditional "removal" processing methods. 3D printing technology has been widely concerned by people since its birth, so it has developed rapidly. In recent decades, 3D printing technology has become the focus of attention and has been applied in industrial design, architecture, automobile, aerospace, dentistry, education and other fields. [0003] In 3D printing projects, the information security of manufacturing material database, detection feedback database, process parameter database, product self-diagnosis system and self-inspection system is very important. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6227
Inventor 隋少春荣鹏王大为高川云
Owner CHENGDU AIRCRAFT INDUSTRY GROUP