Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection data processing method and device and storage medium

A data processing and privacy protection technology, applied in the field of data security, can solve problems such as difficulties in division of labor and cooperation, inability to integrate and interoperate data processing technologies, and difficulty in breaking professional barriers.

Active Publication Date: 2022-07-01
蓝象智联(杭州)科技有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present invention is to provide a privacy-protected data processing method, device, and storage medium to solve the problem that in the prior art, due to the coupling of the plaintext module and the security module, it is difficult to break the respective professional barriers in the process of technology fusion , difficult division of labor and cooperation, high technical threshold, serious coupling between product functions and underlying capabilities, and inability to integrate and interoperate between data processing technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection data processing method and device and storage medium
  • Privacy protection data processing method and device and storage medium
  • Privacy protection data processing method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0045] Example 1: Matrix Vector Multiplication

[0046]

[0047] in, is a calculation expression, representing matrix-vector multiplication; Available but invisible data representing the parties, in vector form, represents the transpose of a vector; Represents available but invisible data for a party, in matrix form. In matrix-vector multiplication, there is no general method of back-calculating the available but invisible data from the result, as a basic premise of privacy protection.

example 2

[0048] Example 2: Matrix Multiply

[0049]

[0050] in, is a calculation expression, representing matrix multiplication; Represents the available but invisible data of the participant, in matrix form; Y represents the available but invisible data of the participant, in matrix form; in matrix multiplication, in order to satisfy the irreversibility of matrix operations, here is the constraint, the shape of the two matrices It cannot be the same, which avoids the operation by constructing an invertible matrix.

[0051] In some embodiments, the service-oriented interface of the security module is defined to support the use of data defined in formal parameters.

[0052] Specifically, the security module will inevitably come into contact with large-scale data in the calculation process. Therefore, in the definition of the service interface, it is necessary to support the use of data defined by formal parameters to avoid direct transmission between the plaintext module and th...

specific Embodiment approach

[0068] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Referring to the foregoing embodiments, details are not repeated here.

[0069] By separating the security module and the plaintext module, the application scenarios of multi-party secure computing and federated learning are constructed. On the other hand, the integration process of technologies can be accelerated.

[0070] Technology integration includes vertical technology integration and horizontal technology integration. Vertical integration of technology means that in traditional data applications, such as multi-party joint statistical analysis, multi-party joint modeling to establish AI models, it provides the convenience of technical integration for the integration of traditional statistical analysis technology, AI technology, and cryptography technology. The horizontal integration of technology is able to open up between different technology manufacturers and realize the interconnection and interoperability of da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data processing method and device for privacy protection and a storage medium, and the method comprises the steps: obtaining an initiator plaintext module based on a data processing task, wherein the initiator plaintext module is used for constructing an instruction of data processing logic; obtaining a servitized security module required by the initiator plaintext module, a servitized interface of the security module being defined as the same design, and the security module being a processing operation constructed based on a multi-party security computing protocol; and obtaining initiator data and participant data required by the initiator plaintext module and the corresponding security module, the participant data being available but invisible to the initiator, and based on the initiator data and the participant data, performing data processing by using the initiator plaintext module and the corresponding security module, and obtaining an initiator processing result.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data processing method, device and storage medium for privacy protection. Background technique [0002] In the computing theory and method for the protection of privacy information in the whole life cycle, privacy computing is a technology that integrates multiple technical routes. Currently, privacy computing in the industry includes three technical routes, namely: Trusted Execution Environment (TEE), Multi-party Secure Computing (MPC) , and Federated Learning FL. The three technical routes have their own characteristics. MPC includes technologies such as hidden query, privacy seeking, and inadvertent transmission, which are widely used in various scenarios. Due to the complexity of various encrypted plaintext modules, the application threshold is relatively high; FL is used in In joint modeling scenarios, when modeling, multi-party secure computing technology is used t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 王超
Owner 蓝象智联(杭州)科技有限公司