Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method, device and equipment

A data processing and algorithm technology, applied in the field of data processing, can solve the problems of users' private data being easily stolen maliciously and poor security

Pending Publication Date: 2022-03-25
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the encrypted privacy data may be stolen by a malicious third party during the data transmission process, and the security of encrypting the user's private data with the key is poor, making the user's private data easy to be stolen maliciously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device and equipment
  • Data processing method, device and equipment
  • Data processing method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as Figure 1A and Figure 1B As shown, the embodiment of this specification provides a data processing method. The execution body of the method may be a terminal device, and the terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, or a terminal device such as a personal computer, or a terminal device such as a Smart wearable devices such as smart watches. The method specifically may include the following steps:

[0033] In S102, a trigger execution instruction of the target user for the target service is received, and in response to the trigger execution instruction, a first image corresponding to the target user is acquired.

[0034] Among them, the target business can be any business that needs to authenticate the target user based on the target user's biometric data. Feature data, for example, the first image may include the face image, fingerprint information or iris information of the target user.

[0035] In implemen...

Embodiment 2

[0052] Such as figure 2 As shown, the embodiment of this specification provides a data processing method. The execution body of the method may be a terminal device, and the terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, or a terminal device such as a personal computer, or a terminal device such as a Smart wearable devices such as smart watches. The method specifically may include the following steps:

[0053] In S202, a trigger execution instruction of the target user for the target service is received, and in response to the trigger execution instruction, a first image corresponding to the target user is acquired.

[0054] Wherein, the first image may contain biometric data of the target user.

[0055] For the specific processing procedure of the above S202, reference may be made to the relevant content of S102 in the above Embodiment 1, which will not be repeated here.

[0056] In S204, the historical first image is acquired....

Embodiment 3

[0100] Such as Figure 5A and Figure 5B As shown, the embodiment of this specification provides a data processing method. The execution body of the method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method specifically may include the following steps:

[0101] In S502, obtain a training data set for the target business.

[0102] Wherein, the training data set may include a plurality of first images, and the first images may include biometric data of the user.

[0103] In implementation, the server can acquire the first image sent by the client (ie, the terminal device) based on the preset model training period, wherein the server can store the first image in the corresponding training data set.

[0104] In S504, based on the first image, the first loss function and the second loss function, the image desensitization model constructed by the preset deep learning algorithm is trained to obtain the traine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data processing method, device and equipment, and the method comprises the steps: receiving a triggering execution instruction of a target user for a target service, and obtaining a first image corresponding to the target user in response to the triggering execution instruction; based on a pre-trained image desensitization model, determining a target desensitization image corresponding to the first image, the image desensitization model being obtained by training a model constructed by a preset deep learning algorithm based on a first loss function, a second loss function and a historical first image, the first loss function is used for enabling a desensitized image output by the image desensitization model to meet a preset image desensitization requirement, and the second loss function is used for enabling the desensitized image output by the image desensitization model to meet a preset image use requirement of the target service; and sending the target desensitized image to a server, so that the server executes the target service based on the target desensitized image.

Description

technical field [0001] This document relates to the technical field of data processing, in particular to a data processing method, device and equipment. Background technique [0002] With the rapid development of computer technology, the user's real identity can be verified through private data such as face images, fingerprints, and irises, and corresponding services can be provided to users after the verification is passed. [0003] In order to protect the security of the user's private data, after the terminal device obtains the user's private data, it can encrypt the user's private data with a key, and send the encrypted private data to the server. Perform decryption processing, and authenticate users based on the decrypted private data. [0004] However, the encrypted private data may be stolen by a malicious third party during the data transmission process, and the security of encrypting the user's private data with a key is poor, which makes the user's private data ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/62G06N3/08G06N20/00
CPCG06F21/32G06F21/6245G06N3/08G06N20/00
Inventor 张长浩傅欣艺王维强
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD