Joint training method and device for business model

A business model and training method technology, applied in the computer field, can solve problems such as data islands and incomplete data sharing

Active Publication Date: 2020-10-02
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the era of big data, a lot of data may be scattered and stored in different enterprises. Based on privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Joint training method and device for business model
  • Joint training method and device for business model
  • Joint training method and device for business model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The solutions provided in this specification will be described below in conjunction with the accompanying drawings. The technical terms involved in the embodiments of this specification are introduced below.

[0041] Multi-Party Computation (Secure Muti-Party Computation, MPC) is an algorithm that protects data privacy and security. Multi-party secure computing allows multiple data parties participating in the calculation to perform collaborative calculations without leaking their own data.

[0042] Secret Sharing (SS) is an algorithm for protecting data privacy. Under the premise of not leaking their own data, multiple data parties can use the secret sharing method to perform collaborative calculations and obtain secret information. Each data party can obtain a share of this secret information. A single data party cannot recover this secret information. This secret information can only be recovered by fusing the shares owned by multiple data parties. For example, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a joint training method and device for a business model. In the process of multi-party joint training of a service model, in order to train a service model ata higher convergence speed by using a Newton method, when an inverse matrix of a Hessian matrix is determined, an auxiliary matrix generated by a trusted third party is introduced, products of the Hessian matrix and the auxiliary matrix are determined by all service parties of a joint training service model in a secret sharing mode, and corresponding shares are obtained respectively. And then, thecombination result of the product of the Hessian matrix and the auxiliary matrix is disclosed, so that each business party obtains the inverse matrix of the combination result, and the correspondingshare of the inverse matrix of the Hessian matrix is determined. According to the specific business party interaction mode setting, it is feasible to adjust model parameters by using a Newton method in multi-party security calculation on the premise of ensuring data privacy, so that the joint training efficiency of a business model is improved.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular to a method and device for joint training of business models by using computers in multi-party secure computing. Background technique [0002] In the era of big data, a lot of data may be scattered and stored in different enterprises. Based on privacy protection and other considerations, enterprises cannot fully share each other's data, so data islands may exist. [0003] In some cases, it is usually necessary to carry out cooperative security modeling between enterprises, so as to fully protect the privacy of enterprise data, use the data of all parties to carry out collaborative training on data processing models, so as to process business more accurately and effectively data. At this time, the data used for training the data processing model may be scattered among the parties involved in the cooperative modeling. Therefore, how to provide a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06N20/00
CPCG06N20/00G06F18/253G06F18/214
Inventor 周亚顺李漓春张祺智
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products