Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Natural language semantic key generation method based on deep neural network coding

A deep neural network and natural language technology, which is applied in the field of semantic feature extraction based on deep neural network and key generation based on semantic features, and semantic key generation based on natural language semantic similarity, which can solve the difficulty of guaranteeing user privacy and security, etc. problems, to achieve the effect of improving security strength, increasing security, and reducing difficulty

Active Publication Date: 2021-06-04
HANGZHOU DIANZI UNIV
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the disadvantages are also obvious, that is, the biometric authentication method needs to retain the user's biometric template for comparison and authentication, and it is difficult to guarantee user privacy and security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Natural language semantic key generation method based on deep neural network coding
  • Natural language semantic key generation method based on deep neural network coding
  • Natural language semantic key generation method based on deep neural network coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solution of the present invention will be described in detail below with reference to the accompanying drawings.

[0023] Refer figure 1 , figure 2 with image 3 , A text-semantic key generation technology, including the following steps:

[0024] Step (1), construct a natural language short-key training language library with a category tag, as the training data set L1.

[0025] Traditional semantic classification tasks are simply similar, or the statements of the same topics are used as the same class. In order to be able to more accurately separate semantically unsatisfactory statements, it is necessary to construct a textual key training data set. Each category is different but the semantics is the same, and the number of each category statement reaches N1, N1 ≥ 50; Semantic key training data sets each statement is labeled with the category tag. During the training, enter the statement in the data set, and output the category belonging to this statement.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a semantic key generation method based on natural language semantic similarity. According to the method, a text with a certain elastic range is used as a password, a text semantic vector is extracted by using a deep neural network model, and the semantic vector is recoded through a deep neural network to generate a key. In the authentication process, the input natural language text does not need to be matched with the original text one by one, and the same key can be generated to complete the authentication process as long as the semantics of the input natural language text is similar to that of the original text. In the process, a user does not need to memorize an original text in a one-word-free manner, and only needs to basically memorize short text semantics and formats, the memories can be described through a natural language, a secret key is generated, and authentication is completed. According to the method, the risk of privacy leakage of biological feature template authentication does not exist, and meanwhile, a user can generate a high-security key (>512 bit length) and the security and the flexibility of the authentication process are improved.

Description

Technical field [0001] The present invention belongs to the field of natural language processing and cryptography, involving Chinese semantics extracting tasks and key generation tasks, involving a semantic key generation method based on natural language semantic simplicity, specifically, based on deep neural network Semantic feature extraction and method of generating a key based on semantic feature. Background technique [0002] With the rapid development of the Internet, users often need to authenticate the user's identity before communicating with the outside world, and can only link user operations with previous operations in the network, so that users can view history. Or for new operations, such as online shopping, funds, etc. [0003] In the current identity authentication technology, common methods can be divided into two categories: one is the user's authentication by the user to complete the personal identity by saving, the commonly used password is a combination of no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F40/30G06N3/04G06N3/08
CPCG06F21/46G06F40/30G06N3/08G06N3/045
Inventor 吴震东康洁
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products