Joint training method and device for service model

A business model and training method technology, applied in the computer field, can solve problems such as incomplete data sharing and data islands

Active Publication Date: 2020-10-02
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the era of big data, a lot of data may be scattered and stored in different enterprises. Based on privacy protection and other considerations, enterprises cannot fully share each other's data, so there may be data islands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Joint training method and device for service model
  • Joint training method and device for service model
  • Joint training method and device for service model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The solutions provided in this specification will be described below in conjunction with the accompanying drawings. The technical terms involved in the embodiments of this specification are introduced below.

[0054] Multi-Party Computation (Secure Muti-Party Computation, MPC) is an algorithm that protects data privacy and security. Multi-party secure computing allows multiple data parties participating in the calculation to perform collaborative calculations without leaking their own data.

[0055] Secret Sharing (SS) is an algorithm for protecting data privacy. Under the premise of not leaking their own data, multiple data parties can use the secret sharing method to perform collaborative calculations and obtain secret information. Each data party can obtain a share of this secret information. A single data party cannot recover this secret information. This secret information can only be recovered by fusing the shares owned by multiple data parties. For example, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a joint training method and device for a service model, and the method and device enable the nonlinear complex operation to be distributed to a third party forprocessing in multi-party safety calculation, and greatly reduce the complexity of the joint training of a plurality of service parties for a nonlinear model. Meanwhile, each service party holding the feature data or the label data of the training sample generates a preset number of random numbers in an agreed random number generation mode, the sample data of the training samples in one-to-one correspondence in sequence is obtained, the consistency of the data is kept, and since the third party does not participate in the random number generation process, other service parties effectively guarantee data privacy for the third party. And other service parties interact with each other through a secret sharing method, so that data privacy is ensured among the service parties. In conclusion, according to the method, on the basis of privacy protection, the operation complexity of a nonlinear model jointly trained by a plurality of service parties is greatly reduced.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to a method and device for training a business model by using a computer. Background technique [0002] In the era of big data, a lot of data may be scattered and stored in different enterprises. Based on privacy protection and other considerations, enterprises cannot fully share each other's data, so data islands may exist. [0003] In some cases, it is usually necessary to carry out cooperative security modeling between enterprises, so as to fully protect the privacy of enterprise data, use the data of all parties to carry out collaborative training on data processing models, so as to process business more accurately and effectively data. At this time, the data used for training the data processing model may be scattered among the parties involved in the cooperative modeling. Therefore, how to provide a more effective model training method b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F7/58G06N3/04G06N3/08
CPCG06F21/6218G06F7/588G06N3/08G06N3/048
Inventor 周亚顺李漓春张祺智
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products