Data encryption method, federal modeling method and device and computer equipment

A data encryption and data technology, applied in digital data protection, integrated learning and other directions, can solve the problem of leaking the intersection ID of both parties

Pending Publication Date: 2022-04-29
北京融数联智科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to overcome the problem of leaking the intersection ID of both parties when performin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, federal modeling method and device and computer equipment
  • Data encryption method, federal modeling method and device and computer equipment
  • Data encryption method, federal modeling method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as there is no conflict with each other.

[0029] In the embodiment of the present invention, during the data interaction process between the first client and the second client, the interaction data is encrypted and decrypted, and the interaction data is generated through a blind-unblinding operation after the interaction data is blindly signed. The r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method, a federal modeling method, a federal modeling device and computer equipment, and the method comprises the steps: generating an RSA public and private key pair, and transmitting an RSA public key to a second client; obtaining second encrypted data obtained by performing blind operation on a second user ID by the second client based on the RSA public key; using an RSA private key to sign a first user ID to obtain first encrypted data, performing blind signature on the second encrypted data to obtain third encrypted data, and sending the first encrypted data and the third encrypted data to the second client; obtaining a random number set generated by the second client based on the first encrypted data and the third encrypted data; and performing mapping association on the random number set and first encrypted data. In the privacy intersection process of the two interaction parties, encryption operation is carried out for multiple times, and the risk that the intersection ID and internal data of the two interaction parties are leaked is effectively reduced through random number processing.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a data encryption method, a federated modeling method, a device and computer equipment. Background technique [0002] With the rapid development of machine learning, machine learning has been applied in various fields. Especially for some special scenarios, it is necessary to apply machine learning to protect the intersection ID of both parties, and model based on this premise. For example, an insurance company has insurance product purchase data of most users in the industry, and another insurance company hopes to establish a precise marketing model based on internal customer data to predict whether the company's internal customers will purchase specified insurance products. The data cannot be modeled. At this time, it is necessary to conduct federated learning modeling with companies that have most of the user insurance product purchase data in the industry. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/64G06F21/62G06N20/20
CPCG06F21/602G06F21/64G06F21/62G06N20/20
Inventor 花京华袁晔傅跃兵冯建
Owner 北京融数联智科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products