Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for determining and processing security of rule set

A technology for determining methods and security, applied in the Internet field, can solve problems such as leaked data resources, insecure rule models, etc., and achieve the effect of reducing the risk of leaks

Active Publication Date: 2021-01-05
ANT ZHIXIN HANGZHOU INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]However, if the above rule model itself is not safe, the data provider may leak the data resources owned by the data provider during the process of running the rule model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining and processing security of rule set
  • Method and device for determining and processing security of rule set
  • Method and device for determining and processing security of rule set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in this specification will be clearly and completely described below in conjunction with the accompanying drawings in this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of the embodiments. Based on the implementations in this specification, all other implementations obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0020] Some embodiments of this specification provide a method for determining the security of a rule model, and the method can be specifically applied to a system including a first server, a second server, and a third server.

[0021] For details, please refer to figure 1 shown. The above-mentioned first server may specifically include a server deployed on the sid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for determining and processing security of a rule set. The method comprises: obtaining a rule set which comprises a plurality of expressions formed by partor all of a plurality of variables; dividing the rule set into a plurality of sub-rule sets respectively corresponding to variables, wherein the different sub-rule sets include different variables; calculating a hit guessing probability that an actual value corresponding to a variable contained in the sub-rule set can be guessed under the condition that the sub-rule set is hit; under the condition that the sub-rule set is not hit, calculating the missed guessing probability that the actual value corresponding to the variable contained in the sub-rule set can be guessed; and respectively comparing the hit guessing probability and the missed guessing probability with a preset threshold, and determining the security of the rule set. The risk of data leakage of the data provider due to unsafeoperation of the rule model is reduced.

Description

technical field [0001] This specification belongs to the technical field of the Internet, and in particular relates to a method, device and server for determining the security of a rule set. Background technique [0002] In some data processing scenarios, the model generator and data provider are often separated. [0003] Usually, the data provider can respond to the request of the model generator, use its own data resources, run the rule model provided by the model generator, and obtain the corresponding processing results; then feed back the above processing results to the model generator. In this way, the model generator can obtain corresponding processing results without touching the data resources owned by the data provider; and can perform specific data processing according to the above processing results. [0004] However, if the above-mentioned rule model itself is not safe, then the data provider may leak the data resources owned by the data provider during the pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 张文彬李翰林李漓春殷山
Owner ANT ZHIXIN HANGZHOU INFORMATION TECH CO LTD