WO2023092428A1 - Data value evaluation method and related product - Google Patents

Data value evaluation method and related product Download PDF

Info

Publication number
WO2023092428A1
WO2023092428A1 PCT/CN2021/133297 CN2021133297W WO2023092428A1 WO 2023092428 A1 WO2023092428 A1 WO 2023092428A1 CN 2021133297 W CN2021133297 W CN 2021133297W WO 2023092428 A1 WO2023092428 A1 WO 2023092428A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
model
processing device
data processing
encrypted
Prior art date
Application number
PCT/CN2021/133297
Other languages
French (fr)
Chinese (zh)
Inventor
吕清
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2021/133297 priority Critical patent/WO2023092428A1/en
Publication of WO2023092428A1 publication Critical patent/WO2023092428A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the embodiments of the present application relate to the field of data value evaluation, and in particular, to a data value evaluation method and related products.
  • the embodiment of the present application discloses a data value evaluation method and related products, which can accurately evaluate the value of vehicle data for training data business models.
  • the embodiment of the present application provides a data value evaluation method, the method includes: the data evaluation device sends the first model information to the first data processing device; the first model information indicates that the second data processing device uses its first model information A second encrypted business model obtained by training the first encrypted business model with local data; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model,
  • the first business model is an unencrypted business model corresponding to the first encrypted business model;
  • the data evaluation device obtains a first performance index according to the first index information from the first data processing device; the The first performance index represents the performance of the business model after using the first local data to train the first business model, and the first index information is that the first data processing device uses the first model information and the The test data corresponding to the second encrypted business model is obtained; the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index;
  • the second performance indicator characterizes the performance of
  • the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; it can accurately evaluate the value of the first local data for training the first business model .
  • the data evaluation device sends the first model information to the first data processing device. Since the first model information represents the second encrypted service model, the first data processing device can only obtain the second encrypted service model according to the first model information, but cannot obtain the first local data of the second data processing device. That is to say, the first local data of the second data processing device does not leave the local, and the use of the first local data is limited to training the first encrypted service model.
  • the first data processing device on the premise that the first local data of the second data processing device (seller) is completely invisible to the first data processing device (buyer), the first data processing device is helped to train the first business model, Then evaluate the value of the first local data for training the first business model.
  • the second data processing device uses its first local data to train the first encrypted business model, so that the first data processing device will not expose its business model and model training method.
  • the first index information is obtained by the first data processing device testing the second encrypted service model by using encrypted test data
  • the encrypted test data is obtained by encrypting the test data
  • the first index information is obtained by the first data processing device using the encrypted test data to test the second encrypted business model, so that the data evaluation device decrypts the first index information to obtain the first performance index.
  • the method before the data evaluation device sends the first model information to the first data processing device, the method further includes: the data evaluation device receives the second model from the second data processing device information; the data evaluation device obtains the first model information according to the second model information.
  • the data evaluation device obtains the first model information according to the second model information; leakage of the first model information can be avoided, and data security can be improved.
  • the method before the data evaluation device receives the second model information from the second data processing device, the method further includes: the data evaluation device sending the second data processing device Send third model information; the third model information is used to train the first encrypted service model.
  • the data evaluation device sends the third model information to the second data processing device, which can not only enable the second data processing device to train the first encrypted business model, but also avoid the model training method or program of the first data processing device .
  • the method before the data evaluation device sends the first model information to the first data processing device, the method further includes: the data evaluation device sends the first encrypted information to the second data processing device ;
  • the first encrypted information is used by the second data processing device to encrypt the first local data
  • the second encrypted business model is used by the second data processing device to use the first encrypted data and the third model
  • the information is obtained by training the first encrypted business model
  • the first encrypted data is obtained by encrypting the first local data with the first encrypted information.
  • the data evaluation device sends the first encryption information to the second data processing device, so that the second data processing device uses the first encryption information to encrypt its first local data to obtain the first encryption information for training the first encrypted business model. - encrypted data.
  • the method before the data evaluation device sends the third model information to the second data processing device, the method further includes: the data evaluation device receives information from the first data processing device The third model information of .
  • the method before the data evaluation device receives the third model information from the first data processing device, the method further includes: the data evaluation device sends the first data The processing device sends first encrypted information; the first encrypted information is used by the first data processing device to encrypt fourth model information to obtain the third model information, and the fourth model information is used to train the first business model.
  • the data evaluation device sends the first encrypted information to the first data processing device, so that the first data processing device uses the first encrypted information to encrypt the fourth model information to obtain the third model information; the exposure of the fourth model can be avoided information.
  • the obtaining the first performance index by the data evaluation device according to the first index information from the first data processing device includes: the data evaluation device decrypting the first index information processing to obtain the first performance index.
  • the data evaluation device performs decryption processing on the first index information, so as to accurately obtain the first performance index.
  • the method further includes: The data evaluation device sends a decryption private key to the first data processing device; the decryption private key is used by the first data processing device to decrypt the second encrypted business model.
  • the data evaluation device sends a decryption private key to the first data processing device, so that the first data processing device decrypts the second encrypted business model to obtain required model parameters.
  • the method further includes: The data evaluation device receives third model information from the first data processing device; the third model information is used to train the first encrypted business model; the data evaluation device sends the second data processing device Send the third model information.
  • the data evaluation device sends the third model information to the second data processing device, so that the second data processing device uses the third model information to assist the first data processing device in model training.
  • the present application provides another data value evaluation method, including: the first data processing device receives the first model information from the data evaluation device; the first model information indicates that the second data processing device utilizes its first The second encrypted business model obtained by training the first encrypted business model with local data; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, so
  • the first business model is an unencrypted business model corresponding to the first encrypted business model;
  • the first data processing device sends the test data corresponding to the first model information and the second encrypted business model to the
  • the data evaluation device sends first index information; the first index information is used by the data evaluation device to obtain a first performance index; the first performance index indicates that the first business model is trained using the first local data The performance of the subsequent business model.
  • the first data processing device sends the first index information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model; the data evaluation device can accurately evaluate the first local data for The value of training the first business model.
  • the first data processing device receives the first model information from the data evaluation device, and the first data processing device cannot obtain the first local data of the second data processing device according to the first model information, which can prevent the first local data from being exposed to A first data processing device.
  • the first data processing device sends the first indicator information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted service model, including: the The first data processing device uses the encrypted test data to test the second encrypted business model to obtain the first index information; the encrypted test data is obtained by encrypting the test data with the first encrypted information; the first data processing The means sends the first indicator information to the data evaluation means.
  • the first data processing device uses the encrypted test data to test the second encrypted service model, and can test to obtain the first index information for obtaining the first performance index.
  • the method before the first data processing device receives the first model information from the data evaluation device, the method further includes: the first data processing device sends a third model information to the data evaluation device Model information, the third model information is used to train the first encrypted service model.
  • the first data processing device sends the third model information to the data evaluation device, which not only enables the second data processing device to train the first encrypted business model, but also prevents its model training method or program from being exposed.
  • the method before the first data processing device sends the third model information to the data evaluation device, the method further includes: the first data processing device receives from the data evaluation device first encrypted information; the first data processing device uses the first encrypted information to encrypt fourth model information to obtain the third model information, and the fourth model information is used to train the first service Model.
  • the first data processing device uses the first encryption information to encrypt the fourth model information to obtain the third model information; it can prevent the fourth model information from being exposed to the second data processing device.
  • the method further includes: the first data processing device sends a second performance index to the data evaluation device, the second performance index represents the performance of the first business model, The second performance indicator is used by the data evaluation device to evaluate the value of the first local data for training the first business model.
  • the first data processing device sends the second performance index to the data evaluation device, which may enable the data evaluation device to evaluate the value of the first local data for training the first business model more quickly.
  • the method further includes: the first data processing device receives a decryption private key from the data evaluation device; The first data processing device uses the decryption private key to decrypt the second encrypted business model to obtain the second business model.
  • the first data processing device uses the decryption private key to decrypt the second encrypted business model to obtain the second business model; the required business model can be accurately obtained, and the second business model is prevented from being exposed to a second data processing device.
  • the method further includes: the The first data processing device sends third model information to the data evaluation device; the third model information is used to train the first encrypted business model; the first data processing device according to the information from the second data processing device The second model information to obtain the second encrypted business model.
  • the first data processing device obtains the second encrypted business model according to the second model information from the second data processing device, so as to decrypt the second encrypted business model to obtain the second business model.
  • the embodiment of the present application provides another data value evaluation method, including: the second data processing device receives the third model information from the data evaluation device; the third model information is used to train the first encrypted business model, The first encrypted business model is the same as the business model obtained by encrypting the first business model belonging to the first data processing device; the second data processing device sends second model information to the data evaluation device; the The second model information is used by the data evaluation device to obtain the first model information, and the first model information represents the second encrypted service obtained by the second data processing device using its first local data to train the one encrypted service model Model; the second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
  • the second data processing device sends the second model information to the data evaluation device, which can not only avoid exposing its own first local data, but also enable the data evaluation device to evaluate the first local data for training the first business model the value of.
  • the The method further includes: the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model;
  • the first local data is obtained through encryption processing;
  • the second data processing device obtains the second model information according to the second encrypted service model.
  • the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model; the use of the first local data can be limited to the training data business model , that is, the first local data of the second data processing device does not come out of the local.
  • the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model, and before obtaining the second encrypted model, the method further includes: The second data processing device receives the first encrypted information from the data evaluation device; the second data processing device encrypts the first local data by using the first encrypted information to obtain the First encrypt the data.
  • the second data processing device uses the first encrypted information to encrypt the first local data, so as to obtain encrypted data for training the first encrypted business model.
  • the method further includes: the second data processing device receives information from the data evaluation device Third model information; the third model information is used to train the first encrypted business model; the second data processing device uses the first local data to train the first encrypted business model to obtain the second An encrypted business model; the second data processing device sends second model information to the first data processing device; the second model information is used by the first data processing device to decrypt to obtain parameters of the second business model.
  • the second data processing device uses the first local data to train the first encrypted service model to obtain the second encrypted service model; it can help the first data processing device to implement model training.
  • the embodiment of the present application provides a data usage right delivery method, the method includes: the data delivery device receives fifth model information from the third data processing device; the fifth model information is used to train the third encryption The business model, the business model obtained by decrypting the third encrypted business model is the same as the unencrypted third business model that the third data processing device needs the assistance of the fourth data processing device to train; the data delivery device sends the The fourth data processing device sends the fifth model information.
  • the data delivery device sends fifth model information to the fourth data processing device, so that the fourth data processing device uses its local data and the fifth model information to train the third encrypted service model. Since the fifth model information is used to train the third encrypted business model, the fourth data processing device (which cannot successfully decrypt the third encrypted business model) cannot acquire an unencrypted business model according to the fifth model information. The fourth data processing device uses its local data to train the third encrypted business model. On the one hand, the third data processing device will not expose its business model and model training method, and on the other hand, the local data of the fourth data processing device will not leave the local . Therefore, in the embodiment of the present application, the third data processing device (buyer) can be helped to train the second business model on the premise that the local data of the fourth data processing device (seller) is completely invisible to the third data processing device (buyer).
  • the method further includes: the data delivery device sending a decryption private key to the third data processing device; the decryption private key is used by the third data processing device to The encrypted business model is decrypted, the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by encrypting the fourth data
  • the second local data of the processing device is obtained, and the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model after training the third business model by using the second local data.
  • the data delivery device sends the decryption private key to the third data processing device, so that the third data processing device uses the decryption private key to decrypt the fourth encrypted business model.
  • the method further includes: the data delivery device sends first encrypted information to the third data processing device, and the first encrypted information is used by the third data processing device to generate The fifth model information.
  • the data delivery device sends the first encrypted information to the third data processing device, so that the third data processing device generates fifth model information, which can prevent the third data processing device from exposing its model training method or program.
  • the method further includes: the data delivery device sends first encrypted information to the fourth data processing device, and the first encrypted information is used by the fourth data processing device to encrypt Its second local data.
  • the data delivery device sends the first encrypted information to the fourth data processing device, so that the fourth data processing device uses the first encrypted information to encrypt its second local data to obtain the first encryption information for training the third encrypted business model. Two encrypted data.
  • the sending, by the data delivery device, the fifth model information to the fourth data processing device includes: when detecting that there is no security problem in the fifth model information, the The data delivering means sends the fifth model information to the fourth data processing means.
  • the embodiment of the present application provides another data usage right delivery method, the method includes: a third data processing device receives a decryption private key from the data delivery device; the third data processing device uses the decryption private key Decrypt the fourth encrypted business model to obtain the fourth business model; the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by the The fourth data processing device encrypts its second local data, and the fourth business model is the same as the business model after using the second local data to train the third business model, and the third business model is the third The encrypted business model corresponds to an unencrypted business model, and is a business model that the third data processing device needs assistance from the fourth data processing device for training.
  • the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model; without obtaining the local data of the fourth data processing device, it can use
  • the local data of the fourth data processing device implements model training.
  • the method further includes: the third The data processing device sends fifth model information to the data delivery device; the fifth model information is used to train the third encrypted business model; the third data processing device according to the fourth data processing device Six model information to obtain the fourth encrypted service model.
  • the third data processing device sends the fifth model information to the data delivery device, which can prevent its model training method or program from being exposed.
  • the third data processing device obtains the fourth encrypted business model according to the sixth model information from the fourth data processing device; the business model that can be used by the fourth data processing device to help it train.
  • the method further includes: the third data processing device acquires the fifth model information from the data delivery device Encrypted information; the third data processing device encrypts the seventh model information according to the first encrypted information to obtain the fifth model information; the seventh model information is used to train the third business model .
  • the third data processing device encrypts the seventh model information according to the first encrypted information; it can not only enable the fourth data processing device to train the third encrypted business model, but also prevent the model training method or program from being exposed .
  • the third data processing device uses the decryption private key to decrypt the fourth encrypted business model, and after obtaining the fourth business model, the method further includes: the third data The processing means updates its local business model with parameters of said fourth business model.
  • obtaining a business model may refer to obtaining parameters of the business model.
  • the third data processing device uses the parameters of the fourth service model to update its local service model; the fourth data processing device can be used to help it implement model training.
  • the embodiment of the present application provides another data usage right delivery method, the method includes: the fourth data processing device receives the fifth model information from the data delivery device; the fifth model information is used to train the third encryption business model; the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain a fourth encrypted business model; the second encrypted data is encrypted by the fourth data processing device in its second local The data is obtained, and the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model after using the second local data to train the third business model, and the third business model is the third encrypted business model
  • the corresponding unencrypted business model which is the business model that the third data processing device needs the assistance of the fourth data processing device to train; the fourth data processing device sends the sixth model to the third data processing device Information; the sixth model information represents the fourth encrypted business model; the fourth encrypted business model is used by the third data processing device to decrypt to obtain the required model update parameters.
  • the fourth data processing device receives the fifth model information from the data delivery device; the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain the fourth encrypted business model; The business models and model training methods of the three data processing devices were leaked.
  • the fourth data processing device sends the sixth model information to the third data processing device, which can prevent the third data processing device from obtaining the local data of the fourth data processing device. That is to say, on the premise that the local data of the fourth data processing device is completely invisible to the third data processing device, it can help the third data processing device to realize the training of the service model.
  • the fourth data processing device uses the second encrypted data to train the third encrypted business model, and before obtaining the fourth encrypted business model, the method further includes: the fourth data processing The device encrypts the second local data by using the first encryption information from the data delivery device to obtain the second encrypted data.
  • the fourth data processing device uses the first encrypted information from the data delivery device to encrypt the second local data, so as to obtain the second encrypted data for training the third encrypted business model.
  • the embodiments of the present application provide a data processing device, and the data processing device has a function of implementing the behaviors in the method embodiments of the first aspect above.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the transceiver module is configured to send first model information to the first data processing device; the first model information indicates that the second data processing device utilizes The second encrypted business model obtained by training the first encrypted business model with the first local data; the second business model obtained by decrypting the second encrypted business model and the business model after using the first local data to train the first business model Similarly, the first business model is an unencrypted business model corresponding to the first encrypted business model; the processing module is configured to obtain the first performance according to the first index information from the first data processing device Index; the first performance index represents the performance of the business model after using the first local data to train the first business model, and the first index information is that the first data processing device uses the first model Information and test data corresponding to the second encrypted service model are obtained; the processing module is further configured to evaluate the effectiveness of the first local data for training the first service according to the first performance index and the second performance index The value of the model; the second performance indicator characterizes
  • the first index information is obtained by the first data processing device testing the second encrypted service model by using encrypted test data
  • the encrypted test data is obtained by encrypting the test data
  • the transceiver module is further configured to receive second model information from the second data processing device; the processing module is further configured to obtain the Describe the first model information.
  • the transceiving module is further configured to send third model information to the second data processing device; the third model information is used to train the first encrypted service model.
  • the transceiver module is further configured to send first encrypted information to the second data processing device; the first encrypted information is used by the second data processing device to encrypt the first A local data, the second encrypted business model is obtained by the second data processing device using the first encrypted data and the third model information to train the first encrypted business model, the first encrypted data is obtained by the The first encryption information is obtained by encrypting the first local data.
  • the transceiving module is further configured to receive the third model information from the first data processing device.
  • the transceiver module is further configured to send first encrypted information to the first data processing device; the first encrypted information is used by the first data processing device to encrypt the fourth model information to obtain the third model information, and the fourth model information is used to train the first business model.
  • the processing module is specifically configured to decrypt the first indicator information to obtain the first performance indicator.
  • the transceiver module is further configured to send a decryption private key to the first data processing device; the decryption private key is used by the first data processing device to encrypt the second The business model is decrypted.
  • the transceiver module is further configured to receive third model information from the first data processing device; the third model information is used to train the first encrypted service model; The data evaluation means sends the third model information to the second data processing means.
  • the embodiment of the present application provides another data processing device, the data processing device has the function of implementing the behavior in the method embodiment of the second aspect above.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the transceiver module includes a transceiver module and a processing module, wherein: the transceiver module is configured to receive the first model information from the data evaluation device; the first model information represents the model information used by the second data processing device The second encrypted business model obtained by training the first encrypted business model with the first local data; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the business model obtained by using the first local data to train the first business model , the first business model is an unencrypted business model corresponding to the first encrypted business model; the processing module is configured to, according to the first model information and the test data corresponding to the second encrypted business model, Controlling the transceiver module to send first index information to the data evaluation device; the first index information is used by the data evaluation device to obtain a first performance index; the first performance index is characterized by using the first local data The performance of the business model after training the first business model.
  • the processing module is specifically configured to use encrypted test data to test the second encrypted business model to obtain the first index information; the encrypted test data is encrypted by using the first encrypted information. The above test data were obtained.
  • the transceiving module is further configured to send third model information to the data evaluation device, where the third model information is used for training the first encrypted service model.
  • the transceiver module is further configured to receive the first encrypted information from the data evaluation device; the processing module is further configured to use the first encrypted information to update the fourth model information Perform encryption processing to obtain the third model information, and the fourth model information is used to train the first service model.
  • the transceiver module is further configured to send a second performance indicator to the data evaluation device, the second performance indicator represents the performance of the first business model, and the second performance The indicator is used by the data evaluating means to evaluate the value of the first local data for training the first business model.
  • the transceiver module is further configured to receive a decryption private key from the data evaluation device; the first data processing device uses the decryption private key to encrypt the second encrypted business model Perform decryption processing to obtain the second service model.
  • the transceiving module is further configured to send third model information to the data evaluation device; the third model information is used to train the first encrypted business model; the transceiving module is further configured to obtain the second encrypted service model according to the second model information from the second data processing device.
  • the embodiment of the present application provides another data processing device, the data processing device has the function of implementing the behavior in the method embodiment of the third aspect above.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the data processing device includes a transceiver module, wherein: the transceiver module is configured to receive third model information from the data evaluation device; the third model information is used to train the first encrypted business model , the first encrypted business model is the same as the business model obtained by encrypting the first business model belonging to the first data processing device; the transceiver module is further configured to send second model information to the data evaluation device; The second model information is used by the data evaluation device to obtain first model information, and the first model information represents the second data obtained by the second data processing device using its first local data to train the one encrypted service model.
  • An encrypted business model; the second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
  • the data processing device further includes a processing module; the processing module is configured to use the first encrypted data and the third model information to train the first encrypted business model to obtain the A second encrypted business model; the first encrypted data is obtained by encrypting the first local data; the processing module is further configured to obtain the second model information according to the second encrypted business model.
  • the transceiver module is further configured to receive the first encrypted information from the data evaluation device; the processing module is further configured to use the first encrypted information to process the The first local data is encrypted to obtain the first encrypted data.
  • the transceiver module is further configured to receive third model information from the data evaluation device; the third model information is used to train the first encrypted business model; the processing The module is further configured to use the first local data to train the first encrypted business model to obtain the second encrypted business model; the transceiver module is further configured to send the second model to the first data processing device information; the second model information is used by the first data processing device to decrypt to obtain parameters of the second service model.
  • the embodiment of the present application provides another data processing device, the data processing device has the functions in the method embodiment of the fourth aspect above.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the data processing device includes a transceiver module, wherein: the transceiver module is configured to receive fifth model information from the third data processing device; the fifth model information is used to train the third encrypted business model The business model obtained by decrypting the third encrypted business model is the same as the unencrypted third business model that the third data processing device needs the assistance of the fourth data processing device to train; The fourth data processing device sends the fifth model information.
  • the transceiver module is further configured to send a decryption private key to the third data processing device; the decryption private key is used by the third data processing device to performing decryption processing, the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by encrypting the fourth data processing device
  • the second local data is obtained, and the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model obtained by using the second local data to train the third business model.
  • the transceiver module is further configured to send first encrypted information to the third data processing device, where the first encrypted information is used by the third data processing device to generate the first Five model information.
  • the transceiver module is further configured to send first encrypted information to the fourth data processing device, and the first encrypted information is used by the fourth data processing device to encrypt its second local data.
  • the transceiving module is specifically configured to send the fifth model information to the fourth data processing device when it is detected that there is no security problem in the fifth model information .
  • the embodiment of the present application provides another data processing device, the data processing device has the function of implementing the behavior in the method embodiment of the fifth aspect above.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the data processing device includes a transceiver module and a processing module, wherein: the transceiver module is configured to receive a decryption private key from the data delivery device; the processing module is configured to use the decryption private key key to decrypt the fourth encrypted business model to obtain the fourth business model; the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by The fourth data processing device obtains by encrypting its second local data, the fourth business model is the same as the business model after using the second local data to train the third business model, and the third business model is the first The three encrypted business models correspond to unencrypted business models, and are business models that the third data processing device needs the assistance of the fourth data processing device to train.
  • the transceiver module is further configured to send fifth model information to the data delivery device; the fifth model information is used to train the third encrypted service model; the processing module is further configured to obtain the fourth encrypted service model according to the sixth model information from the fourth data processing device.
  • the processing module is further configured to obtain first encrypted information from the data delivery device through the transceiver module; perform encryption processing on the seventh model information according to the first encrypted information, The fifth model information is obtained; the seventh model information is used to train the third service model.
  • the processing module is further configured to use parameters of the fourth service model to update its local service model.
  • the embodiment of the present application provides another data processing device, which has the function of implementing the behavior in the method embodiment of the sixth aspect above.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • the data processing device includes a transceiver module, where: the transceiver module is configured to receive fifth model information from the data delivery device; the fifth model information is used to train the third encrypted business model
  • the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain a fourth encrypted business model; the second encrypted data is obtained by encrypting its second local data by the fourth data processing device
  • the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model after using the second local data to train the third business model, and the third business model corresponds to the third encrypted business model
  • An unencrypted business model which is a business model that the third data processing device needs the assistance of the fourth data processing device to train
  • the transceiver module is also configured to send sixth model information to the third data processing device
  • the sixth model information represents the fourth encrypted business model; the fourth encrypted business model is used by the third data processing device to decrypt to obtain the required model update parameters.
  • the data processing device further includes a processing module; the processing module is configured to encrypt the second local data by using the first encryption information from the data delivery device to obtain The second encrypted data.
  • the present application provides a server, the server includes a processor, and the processor can be used to execute computer-executed instructions stored in the memory, so that the above-mentioned first aspect or any possible implementation of the first aspect
  • the method shown in the above-mentioned second aspect or any possible implementation of the second aspect is executed, or the method shown in the above-mentioned third aspect or any possible implementation of the third aspect is executed.
  • the method is executed, or the method shown in the fourth aspect or any possible implementation of the fourth aspect is executed, or the method shown in the fifth aspect or any possible implementation of the fifth aspect is executed Execute, or enable the method shown in the sixth aspect or any possible implementation manner of the sixth aspect to be executed.
  • the process of sending information in the above method can be understood as the process of outputting information based on the instructions of the processor.
  • the processor In outputting information, the processor outputs the information to the transceiver for transmission by the transceiver. After the information is output by the processor, it may also need to undergo other processing before reaching the transceiver.
  • the processor receives incoming information
  • the transceiver receives that information and inputs it to the processor. Furthermore, after the transceiver receives the information, the information may require other processing before being input to the processor.
  • the above-mentioned processor may be a processor dedicated to performing these methods, or may be a processor that executes computer instructions in a memory to perform these methods, such as a general-purpose processor.
  • the processor may also be used to execute a program stored in the memory.
  • the data processing device is made to execute the method as shown in the first aspect or any possible implementation manner of the first aspect.
  • the memory is located outside the data processing device.
  • the memory is located in the above data processing device.
  • the processor and the memory may also be integrated into one device, that is, the processor and the memory may also be integrated together.
  • the data processing apparatus further includes a transceiver, where the transceiver is configured to receive a message or send a message, and the like.
  • the present application provides a data processing device, the data processing device includes a processing circuit and an interface circuit, and the interface circuit is used to obtain data or output data; the processing circuit is used to perform the above-mentioned first aspect or the first aspect
  • the corresponding method shown in any possible implementation manner of the second aspect, or the processing circuit is used to execute the corresponding method shown in the second aspect or any possible implementation manner of the second aspect, or the processing circuit is used to execute the corresponding method shown in the first aspect above
  • the corresponding method shown in the third aspect or any possible implementation of the third aspect, or the processing circuit is used to execute the corresponding method shown in the fourth aspect or any possible implementation of the fourth aspect, or the processing circuit
  • the processing circuit is used for performing the corresponding method as shown in the above fifth aspect or any possible implementation of the fifth aspect, or the processing circuit is used for performing the corresponding method as shown in the above sixth aspect or any possible implementation of the sixth aspect Methods.
  • the present application provides a computer-readable storage medium, which is used to store a computer program, and when it is run on a computer, the above-mentioned first aspect or any possible implementation of the first aspect can be realized
  • the method shown in the manner is executed, or the method shown in the second aspect or any possible implementation of the second aspect is executed, or the method shown in the third aspect or any possible implementation of the third aspect is executed.
  • the method is executed, or the method shown in the fourth aspect or any possible implementation manner of the fourth aspect is executed, or the method shown in the fifth aspect or any possible implementation manner of the fifth aspect is executed, Or the method shown in the sixth aspect or any possible implementation manner of the sixth aspect is executed.
  • the present application provides a computer program product, the computer program product includes a computer program or computer code, and when it is run on a computer, the above-mentioned first aspect or any possible implementation of the first aspect shows The method is executed, or the method shown in the second aspect or any possible implementation of the second aspect is executed, or the method shown in the third aspect or any possible implementation of the third aspect is executed , or make the above fourth aspect or the method shown in any possible implementation of the fourth aspect be executed, or cause the above fifth aspect or the method shown in any possible implementation of the fifth aspect to be executed, or make the above The method shown in the sixth aspect or any possible implementation manner of the sixth aspect is executed.
  • the present application provides a data value evaluation system, including the data evaluation device described in the seventh aspect or any possible implementation of the seventh aspect, and the eighth aspect or any possible implementation of the eighth aspect The data processing device described in the manner and the data processing device described in the ninth aspect or any possible implementation of the ninth aspect.
  • the present application provides a data usage right delivery system, including the data delivery device described in the above tenth aspect or any possible implementation of the tenth aspect, any of the above eleventh aspect or the eleventh aspect
  • FIG. 1 is a schematic diagram of a data value evaluation system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a data usage right delivery system provided by an embodiment of the present application.
  • Fig. 3 is an interactive flowchart of a data value evaluation method provided by the embodiment of the present application.
  • Fig. 4 is an interactive flowchart of another data value evaluation method provided by the embodiment of the present application.
  • Fig. 5 is a flow chart of a data value evaluation method provided by the embodiment of the present application.
  • FIG. 6 is a flow chart of another data value evaluation method provided in the embodiment of the present application.
  • FIG. 7 is a flow chart of another data value evaluation method provided in the embodiment of the present application.
  • FIG. 8 is a flow chart of another data value evaluation method provided in the embodiment of the present application.
  • FIG. 9 is a flow chart of another data value evaluation method provided in the embodiment of the present application.
  • FIG. 10 is a flow chart of another data value evaluation method provided in the embodiment of the present application.
  • Fig. 11 is an interactive flowchart of a data usage right delivery method provided by the embodiment of the present application.
  • Fig. 12 is a flow chart of a data usage right delivery method provided by the embodiment of the present application.
  • FIG. 13 is a flow chart of another data usage right delivery method provided by the embodiment of the present application.
  • Fig. 14 is a flow chart of another data usage right delivery method provided by the embodiment of the present application.
  • Fig. 15 is an interactive flowchart of a data evaluation and use right delivery method provided by the embodiment of the present application.
  • FIG. 16 shows a schematic structural diagram of a data processing device 1600
  • FIG. 17 is a schematic structural diagram of another data processing device 170 provided in the embodiment of the present application.
  • FIG. 18 is a schematic structural diagram of another data processing device 180 provided by an embodiment of the present application.
  • an embodiment means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application.
  • the occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described herein can be combined with other embodiments.
  • Homomorphic encryption processing the homomorphically encrypted data to obtain an output, and decrypting this output, the result is the same as the output obtained by processing the unencrypted original data in the same way.
  • Homomorphic encryption is a cryptographic technique based on computational complexity theory of mathematical puzzles. In essence, homomorphic encryption refers to such an encryption function, which performs ring addition and multiplication operations on the plaintext and re-encrypts, and performs corresponding operations on the ciphertext after encryption, and the result is equivalent. Due to this good nature, people can entrust a third party to process the data without disclosing the information.
  • An encryption function with homomorphic properties means that two plaintexts a and b satisfy Encryption function, where En is the encryption operation, Dec is the decryption operation, ⁇ , Corresponding to operations on plaintext and ciphertext domains, respectively.
  • En is the encryption operation
  • Dec is the decryption operation
  • Corresponding to operations on plaintext and ciphertext domains, respectively.
  • the encryption is called additive homomorphic encryption: when When stands for multiplication, the encryption is called multiplicative homomorphic encryption.
  • Fully homomorphic encryption refers to an encryption function that satisfies both the homomorphic and homomorphic properties of addition and multiplication, and can perform any number of addition and multiplication operations.
  • the data value evaluation method provided in the embodiment of the present application can accurately evaluate the value of vehicle data for the training data business model.
  • the data value evaluation method provided by the embodiment of this application can not only be used to evaluate the value of vehicle data for training data business models, but also can evaluate arbitrary data (such as new energy vehicle charging pile data, data with similar data structures between different organizations in the same industry, etc. ) for any object (such as a model to be trained), that is, the value of the right to use the data.
  • the embodiment of the present application Using the data value evaluation method provided by the embodiment of the present application to evaluate the value of data use rights has the following advantages: the buyer does not expose the data business model or the method of developing the data business model, such as data processing and model training methods, and On the premise that the seller does not disclose its data details, output the value of the seller's data to the buyer. Further, the embodiment of the present application also provides a data usage right delivery method, by which the data usage right can be traded, and the data security of both transaction parties can be guaranteed. Using the data usage right delivery method provided in this application to deliver the value of the data usage right has the following advantages: what is delivered is the data usage right, the seller's data does not leave the local area, and the use of the data is limited to the development of the buyer's data business model.
  • the delivery method of data usage rights provided by this application is the usage rights of transaction data rather than data ownership, and the use of data is limited to training data business models, and the buyer purchases the seller's data to help it train the service of the model.
  • a buyer-led federated learning architecture can be built based on the data trading system. In this architecture, the buyer can obtain the latest parameters of the seller's data after each round of model training without providing the seller with an updated model. The latest parameters of .
  • the following uses evaluating the value of vehicle data for the training data business model as an example to introduce the data value evaluation method provided by this application; taking the delivery of vehicle data usage rights as an example to introduce the data usage right delivery method provided by this embodiment of the application.
  • Fig. 1 is a schematic diagram of a data value evaluation system provided by an embodiment of the present application.
  • the data value evaluation system includes: a data evaluation device (which can be regarded as a server running a data transaction system), one or more buyers' data processing devices (only the first data processing device shown in Figure 1 device as an example of a buyer's data processing device) and one or more seller's data processing devices (the second data processing device shown in FIG. 1 as an example of a seller's data processing device).
  • the data processing device of the buyer may be referred to as the buyer for short
  • the data processing device of the seller may be referred to as the seller for short.
  • the buyer's data processing device refers to the device used by the buyer to train the data business model, and the buyer has the right to use or own the data processing device.
  • the seller's data processing device refers to the device used by the seller to store local data and realize data processing functions, and the seller has the right to use or ownership of its data processing device.
  • Both the first data processing device and the second data processing device may be devices or devices capable of data processing and storage, such as servers. Since the data evaluation device provided in the embodiment of the present application can provide a data value evaluation function, the data evaluation device can be regarded as a data value evaluation platform product. The buyer can use the data value evaluation platform products to evaluate the value of the seller's data for its data business model development, such as the value of training any data business model.
  • the data value evaluation platform is characterized by: input one: the buyer's data processing and training model method or program, and the buyer's initial data model performance indicators; input two: the seller uses the data processing and training provided by the buyer The method or program for training the model, and the parameters of the trained model.
  • Output The model parameters trained by the buyer using the seller's data, after updating the parameters of the initial data model, the percentage of model performance improvement and the value of the seller's data.
  • FIG. 2 is a schematic diagram of a data usage right delivery system provided by an embodiment of the present application.
  • the data usage right delivery system includes: a data delivery device (which can be regarded as a server running the data usage right delivery system), one or more buyer's data processing devices (only the first one shown in Figure 2 three data processing devices as an example of a buyer's data processing device) and one or more seller's data processing devices (a fourth data processing device shown in FIG. 2 as an example of a seller's data processing device).
  • Both the third data processing device and the fourth data processing device may be devices or devices capable of data processing and storage, such as servers.
  • the data delivery device can provide the delivery function of the data usage right (that is, the function of delivering the seller's data usage right to the buyer), the data delivery device can be regarded as a data usage right delivery platform product.
  • the buyer can purchase the right to use the seller's data through the delivery platform product of the right to use the data, that is, the right to use the seller's data.
  • the data usage rights delivery platform is characterized by providing a federated learning framework for joint modeling of buyers and sellers.
  • the buyer only buys the seller's data to participate in the buyer-led federated learning framework, uses the seller's data to train the model and passes the model parameters to the buyer to update the buyer's model.
  • the seller's data does not come out locally, and the detailed values of the seller's data are completely invisible to the buyer.
  • the use of the seller's data is limited to helping the buyer train the model in the buyer-led federated learning architecture.
  • the data usage right delivery system in Figure 2 and the data value evaluation system in Figure 1 can be two independent systems, or they can be the same system.
  • the data usage right delivery platform and the data value evaluation platform in this application can be two independent platforms, or they can be the same platform. It should be understood that if the data usage right delivery system in FIG. 2 and the data value evaluation system in FIG. 1 are the same system, then the data evaluation device in FIG. 1 and the data delivery device in FIG. 2 are the same device.
  • Fig. 3 is an interactive flowchart of a data value evaluation method provided by the embodiment of the present application. As shown in Figure 3, the method includes:
  • the data evaluation device sends first encrypted information to a first data processing device and a second data processing device respectively.
  • the data evaluation device may store or obtain a decryption private key corresponding to the first encrypted information.
  • the first encryption information is a homomorphic encryption program for implementing homomorphic encryption of data
  • the data evaluation device may store or obtain a decryption private key corresponding to the homomorphic encryption program.
  • the data evaluation device can use the decryption private key to decrypt encrypted data obtained by encrypting arbitrary data with the first encrypted information.
  • the first data processing device is a data processing device of the buyer
  • the second data processing device is a data processing device of the seller.
  • the data evaluation device, the first data processing device and the second data processing device are all servers, such as cloud servers.
  • the first data processing device may use the first encrypted information to encrypt the fourth model information used to train the first business model to obtain the third model information.
  • the third model information can be used to train the first encrypted business model. Encrypting the first business model can obtain the first encrypted business model. In other words, the first encrypted business model can be decrypted to obtain the first business model.
  • the fourth model information may be a data processing and model training program or code for training the first service model.
  • the second data processing device may use the first encrypted information to encrypt the first local data to obtain the first encrypted data. Wherein, the first local data is the data to be evaluated.
  • the above-mentioned first encryption information may be information for realizing homomorphic encryption of data.
  • the first encryption information is a homomorphic encryption program, an encryption function capable of realizing homomorphic encryption of data, etc., wherein the homomorphic encryption program refers to a program capable of realizing homomorphic encryption of data.
  • the first encrypted information is a homomorphic encryption program
  • the first data processing device uses the homomorphic encryption program to encrypt the fourth model information used to train the first business model to obtain the third Model information
  • the third model information can be used to train the first encrypted business model
  • the second data processing device uses the homomorphic encryption program to encrypt its first local data to obtain the first encrypted data, and uses the first encrypted The data and the third model information train the first encrypted business model to obtain the second encrypted business model.
  • the first encrypted business model can be regarded as obtained by the first data processing device by using a homomorphic encryption program to encrypt the first business model.
  • the above-mentioned first business model is an unencrypted business model corresponding to the first encrypted business model. It can be seen from the characteristics of homomorphic encryption that the service model obtained by decrypting the second encrypted service model is the same as the service model after training the first service model with the first local data. Since the second data processing device obtains and uses the first encrypted data and the third model information to train the first encrypted business model, it does not store and cannot obtain the decryption private key of the homomorphic encryption program, so the second data processing device cannot obtain the Fourth model information for training the first business model. That is to say, in this implementation, the buyer's fourth model information (such as data processing and model training methods) will not be exposed to the seller.
  • the buyer's fourth model information (such as data processing and model training methods) will not be exposed to the seller.
  • the first data processing device may obtain first model information representing the second encrypted service model. Since the first data processing device only provides the first model information to the first data processing device instead of the first local data, the first data processing device cannot obtain the first local data. That is, the seller's data details are not exposed to the buyer.
  • the first data processing device sends the initial performance index and third model information obtained by encrypting fourth model information by using the first encrypted information to the data evaluation device.
  • the fourth model information is used to train the first business model, and the first business model is a business model that needs to be trained for the first data processing.
  • the method flow in FIG. 3 can be regarded as a flow of evaluating the value of the first local data of the second data processing device for training the first business model.
  • the initial performance index (or called the second performance index) represents the performance of the first service model. Initial performance metrics can include precision, recall, etc. It should be understood that different service models have different performance indexes, which are not limited in this application.
  • the third model information is used to train the first encrypted business model.
  • the first encrypted business model may be obtained by the first data processing device performing encryption processing on the first business model by using the first encrypted information.
  • the first encryption information is a homomorphic encryption program
  • the fourth model information includes a data processing and model training program for training the first business model
  • the third model information includes the data processing and model training program Encrypt the processed program with a homomorphic encryption program
  • the first data processing device sends the program (corresponding to the fourth model information) encrypted with the data processing and model training program to the data evaluation device, and Initial performance indicators characterizing the performance of the first business model are sent to the data evaluation means.
  • the data evaluation device sends third model information to the second data processing device.
  • a possible implementation manner of step 303 is as follows: after the data evaluation device detects that the third model information has no security problem, it sends the third model information to the second data processing device.
  • the way for the data evaluation device to detect whether the third model information has a security problem may include: detecting whether the data processing and model training program included in the third model information is encrypted with a homomorphic encryption program. Check if the program is complete, scan the program for viruses, etc.
  • the first data processing device can implement integrity protection on the program through a signature algorithm. It should be understood that if it is detected that the encryption algorithm used by the program complies with general security specifications, and passes the integrity check and virus scanning (that is, no virus is detected by the program), then it is determined that the program has no security problems.
  • the second data processing device sends second model information to the data evaluating device.
  • the second model information is used by the data evaluation device to obtain the first model information.
  • the above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
  • the second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
  • the second data processing device may perform the following operations before performing step 304: the second data processing device encrypts its first local data by using the first encrypted information to obtain the first encrypted data; The data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model; generates the first model information according to the parameters of the second encrypted business model; performs encryption processing on the first model information to get the second model information.
  • the first model information contains parameters characterizing the second encrypted business model or contains parameters of the second encrypted business model.
  • the second model information includes parameters obtained by encrypting parameters representing the second encrypted service model or parameters obtained by encrypting parameters of the second encrypted service model.
  • the second data processing device may encrypt the first model information using an encryption method pre-agreed with the data evaluation device to obtain the second model information.
  • the data evaluation device decrypts the second model information to obtain the first model information. It should be noted that the purpose of encrypting the first model information by the second data processing device is to ensure the security of the data transmitted between the second data processing device and the data evaluation device, and avoid sending the first model information directly to cause the first model information to be encrypted. Give way.
  • the second data processing device may perform the following operations before performing step 304: the second data processing device encrypts its first local data by using the first encrypted information to obtain the first encrypted data; The data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain a second encrypted business model; generates the first model information according to the parameters of the second encrypted business model.
  • the first model information contains parameters characterizing the second encrypted business model or contains parameters of the second encrypted business model. In these embodiments, the first model information and the second model information are the same.
  • the second data processing device sends the second model information to the data evaluation device, that is to say the first model information to the data evaluation device.
  • the data evaluation device sends the first model information to the first data processing device according to the second model information.
  • step 305 is as follows: the data evaluation device decrypts the second model information to obtain the first model information; after detecting that the first model information has no security issues, it sends the first model information to the first data processing device .
  • the method for the data evaluation device to detect whether the first model information has a security problem may include: detecting whether the encryption algorithm used by the first model information complies with general security specifications, detecting whether the first model information is complete, and performing virus detection on the first model information. scan etc.
  • step 305 is as follows: after detecting that the second model information has no security problem, sending the second model information to the first data processing device; wherein, the second model information is the same as the first model information.
  • the first data processing device sends the first indicator information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted service model.
  • the above-mentioned first index information is used for the above-mentioned data evaluation device to obtain the first performance index.
  • the above-mentioned first performance index represents the performance of the service model after the first service model is trained by using the first local data.
  • step 306 is as follows: the first data processing device encrypts its local test data (that is, the test data corresponding to the second encrypted business model) by using the first encrypted information to obtain encrypted test data; Test the second encryption business model to obtain the first indicator information.
  • the encrypted test data and the second encrypted business model can be obtained by using the same homomorphic encryption program, so the encrypted test data can be used to test the second encrypted business model.
  • the first encryption information may be a homomorphic encryption program
  • the first index information may be a group of homomorphic encryption performance indicators corresponding to the second encryption business model.
  • the data evaluation device decrypts the first index information by using the decryption private key corresponding to the first encrypted information to obtain the first performance index.
  • the data evaluation device evaluates the value of the first local data for training the first service model according to the initial performance index and the first performance index.
  • step 308 is as follows: the data evaluation device evaluates the value of the first local data for training the first business model by comparing the initial performance index with the first performance index.
  • the data evaluation device compares the initial performance index with the first performance index, and evaluates the percentage of the first local data for the performance improvement of the buyer model (ie, the first business model) and the data reference value (ie, the first local data For training the value of the first business model); and sending the first local data to the first data processing device and the second data processing device respectively to the percentage and/or the first local data of the buyer's model (ie the first business model) performance improvement Value for training the first business model.
  • the data evaluation device uses homomorphic encryption technology to hide the buyer's data processing and model training methods from the seller, and hide the seller's data from the buyer; output a set of buyer model performance after updating the buyer's model based on the seller's data.
  • the percentage of lift metrics It should be understood that the value of any data of the seller for training any business model of the buyer can be evaluated by adopting the method flow in FIG. 3 , and it is ensured that the data of the seller and the model training program or code of the buyer are not exposed.
  • the value of any data of the seller to the buyer's training business model can be evaluated, so that the buyer can choose whether to purchase the right to use the seller's data and the right to use the seller's data according to the value of the seller's data to its training business model Fair remuneration.
  • One problem solved by the data value evaluation method provided in this application is to evaluate the value of the seller's data to the buyer without exposing the buyer's data processing and model training methods and the seller's data.
  • the technical means adopted are: adopt homomorphic encryption technology, hide the buyer's data processing and model training methods from the seller before the transaction is concluded, and hide the seller's data from the buyer; The percentage of model performance improvement metrics.
  • Another problem solved by the data value evaluation method provided in this application is: to meet the privacy and security protection requirements of the seller’s data: the seller’s data cannot leave the seller’s control area, the detailed value of the seller’s data is invisible to the buyer, and the use of the data can only be It is used to train the data business model, and meets the buyer's demand for using the seller's data to train the data business model under this restriction.
  • the technical means adopted improve the federated learning architecture, and the buyer purchases the seller's data to participate in the federated learning architecture led by it. Achieving technical effect: On the premise of meeting the seller's data privacy and security protection requirements, the data buyer's training data business model needs are met, and the potential value of the originally immobile data can be brought into play.
  • the second data processing device sends the second model information to the data evaluation device, and neither the data evaluation device nor the first data processing device (buyer) can obtain the second data through the second model information Process the local data of the device; it can meet the seller's data privacy and security protection requirements. That is to say, the seller's data (such as the first local data) will not leave the seller's control area, the detailed value of the seller's data is invisible to the buyer, and the use of the data can only be used to train the data business model. Buyer needs to train data business models using seller data.
  • the first data processing device sends the initial performance index and the third model information obtained by encrypting the fourth model information by using the first encrypted information to the data evaluation device; the first data processing device ( Buyer) data processing and model training methods to assess the value of seller data to buyers.
  • Fig. 4 is an interactive flowchart of another data value evaluation method provided by the embodiment of the present application.
  • the method flow in FIG. 4 is a possible implementation of the method described in FIG. 3 .
  • the method includes:
  • the data evaluation device sends a homomorphic encryption program to the first data processing device and the second data processing device respectively.
  • the data evaluation device holds the private decryption key for the homomorphic encryption program.
  • the first data processing device sends an initial performance index and a homomorphically encrypted data processing and model training program to the data evaluation device.
  • the data processing and model training program is used to train the first business model.
  • the first data processing device is to evaluate the value of the first local data of the second data processing device for training the first business model. After receiving the initial performance index, the data evaluation device may record the initial performance index.
  • the data processing and model training program of homomorphic encryption refers to the data processing and model training program encrypted by homomorphic encryption program.
  • the data evaluation device After detecting that the data processing and model training program of homomorphic encryption has no security problem, the data evaluation device sends the data processing and model training program of homomorphic encryption to the second data processing device.
  • Detecting whether there are security issues in the data processing and model training program of homomorphic encryption may include: checking whether the encryption algorithm used by the program complies with general security specifications, checking whether the program is complete, and scanning the program for viruses, etc.
  • the second data processing device uses a homomorphic encryption program to encrypt its first local data to obtain the first encrypted data, and then uses the homomorphic encryption data processing and model training program to train with the first encrypted data to obtain a second encrypted business model, And send the second encrypted business model to the data evaluation device.
  • the data evaluation device After detecting that the second encrypted service model has no security problem, the data evaluation device sends the second encrypted service model to the second data processing device.
  • Detecting whether the second encrypted business model has a security problem may include: detecting whether the encryption algorithm used by the second encrypted business model complies with general security specifications, detecting whether the second encrypted business model is complete, and performing virus scanning on the second encrypted business model wait.
  • the first data processing device uses a homomorphic encryption program to encrypt its local test data to obtain encrypted test data; uses the encrypted test data to test a second encrypted service model to obtain first index information.
  • the data evaluation device decrypts the first index information by using the decryption private key corresponding to the homomorphic encryption program to obtain the first performance index.
  • the data evaluation device evaluates the value of the first local data for training the first service model according to the initial performance index and the first performance index.
  • Step 408 can refer to step 308 .
  • the second data processing device sends the second encrypted business model to the data evaluation device, and neither the data evaluation device nor the first data processing device (buyer) can obtain the second encrypted business model through the second encrypted business model.
  • the local data of the data processing device can meet the seller's data privacy and security protection requirements. That is to say, the seller's data (such as the first local data) will not leave the seller's control area, the detailed value of the seller's data is invisible to the buyer, and the use of the data can only be used to train the data business model. Buyer needs to train data business models using seller data.
  • the first data processing device sends the initial performance index and the data processing and model training program encrypted by the homomorphic encryption program to the data evaluation device; Model training methods assess the value of seller data to buyers.
  • Fig. 3 and Fig. 4 introduce and describe the interaction process of the data value evaluation method in which the data evaluation device, the first data processing device and the second data processing device jointly participate.
  • the data value evaluation methods performed by the data evaluation device, the first data processing device and the second data processing device are respectively described below.
  • Fig. 5 is a flow chart of a data value evaluation method provided by the embodiment of the present application.
  • Fig. 5 is a flow chart of the data value evaluation method performed by the data evaluation device. As shown in Figure 5, the method includes:
  • the data evaluation device sends first model information to a first data processing device.
  • the above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
  • the first index information may be obtained by the first data processing device testing the second encrypted service model with encrypted test data, and the encrypted test data is obtained by encrypting the test data.
  • the second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
  • the first business model is an unencrypted business model corresponding to the first encrypted business model.
  • the data evaluation device may perform the following operations before performing step 501: receiving the second model information from the second data processing device; and obtaining the first model information according to the second model information.
  • Obtaining the first model information according to the second model information may be: the data evaluation device decrypts the second model information using a decryption method pre-agreed with the second data processing device to obtain the first model information.
  • the second model information may be obtained by the second data processing device encrypting the first model information using an encryption method pre-agreed with the data evaluation device.
  • the data evaluation device may perform the following operation before performing step 501: receive the first model information from the above-mentioned second data processing device.
  • the data evaluation device obtains a first performance index according to the first index information from the first data processing device.
  • the above-mentioned first performance index represents the performance of the business model after the above-mentioned first business model is trained by using the above-mentioned first local data, and the above-mentioned first index information is the The corresponding test data are obtained.
  • step 502 refer to step 407.
  • the data evaluation device evaluates the value of the first local data for training the first service model according to the first performance index and the second performance index.
  • the above-mentioned second performance index represents the performance of the above-mentioned first business model.
  • the data evaluation device sends the first model information to the first data processing device, and the data of the first data processing device can be limited to training the first business model, so as to achieve the purpose of not leaving the seller's data locally.
  • the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; it can accurately evaluate the value of the first local data for training the first business model.
  • Fig. 6 is a flow chart of another data value evaluation method provided by the embodiment of the present application.
  • the method flow in FIG. 6 is a possible implementation of the method described in FIG. 5 .
  • the method includes:
  • the data evaluation device sends first encrypted information to a first data processing device and a second data processing device respectively.
  • the first encryption information is used by the first data processing device to encrypt the fourth model information to obtain the third model information.
  • the fourth model information is used to train the first service model.
  • the first encryption information is used by the second data processing device to encrypt its first local data.
  • the data evaluation device receives third model information and a second performance index from the first data processing device.
  • the above third model information is used to train the first encrypted service model.
  • the second performance indicator characterizes the performance of the first business model.
  • the first business model is an unencrypted business model corresponding to the first encrypted business model.
  • the first encryption information may be a homomorphic encryption program; the third model information is that the first data processing device uses a homomorphic encryption program to encrypt the data processing and model training program used to train the first business model dealt with.
  • the data evaluation device sends third model information to the second data processing device.
  • the data evaluation device receives second model information from a second data processing device.
  • the above-mentioned second model information is used for the above-mentioned data evaluation device to obtain the first model information.
  • the first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
  • the data evaluation device obtains first model information according to the second model information.
  • Step 605 is optional but not necessary.
  • the data evaluation device receives the second model information from the second data processing device, and directly sends the first model information to the first data processing device, that is, executes step 606 . That is, in some embodiments, the first model information and the second model information are the same.
  • step 605 is implemented by: the data evaluation device decrypts the second model information to obtain the first model information.
  • the data evaluation device sends the first model information to the first data processing device.
  • the data evaluation device decrypts the first index information from the first data processing device to obtain the first performance index.
  • the above-mentioned first performance index represents the performance of the service model after the first service model is trained by using the first local data.
  • the first index information is obtained by the first data processing device by using the first model information and test data corresponding to the second encrypted service model.
  • the data evaluation device evaluates the value of the first local data for training the first service model according to the first performance index and the second performance index.
  • the above-mentioned second performance index represents the performance of the above-mentioned first business model.
  • the data evaluation device may further perform the following operation: the data evaluation device sends the decryption private key to the above-mentioned first data processing device.
  • the decryption private key is used by the first data processing device to decrypt the second encrypted business model.
  • the data evaluation device sends the first model information to the first data processing device, and the data of the first data processing device can be limited to training the first business model, so as to achieve the purpose of not leaving the seller's data locally.
  • the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; it can accurately evaluate the value of the first local data for training the first business model.
  • Fig. 7 is a flow chart of another data value evaluation method provided by the embodiment of the present application.
  • Fig. 7 is a flow chart of the data value evaluation method performed by the first data processing device (buyer). As shown in Figure 7, the method includes:
  • a first data processing device receives first model information from a data evaluation device.
  • the above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
  • the second business model obtained by decrypting the above-mentioned second encrypted business model is the same as the business model after training the first business model with the first local data.
  • the first business model is an unencrypted business model corresponding to the first encrypted business model.
  • the first data processing device sends the first indicator information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted service model.
  • the above-mentioned first index information is used for the above-mentioned data evaluation device to obtain the first performance index.
  • the above-mentioned first performance index represents the performance of the service model after the above-mentioned first service model is trained by using the above-mentioned first local data.
  • the first data processing device sends the first index information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model; the data evaluation device can accurately evaluate the first local data for The value of training the first business model.
  • the first data processing device receives the first model information from the data evaluation device, and the first data processing device cannot obtain the first local data of the second data processing device according to the first model information, which can prevent the first local data from being exposed to A first data processing device.
  • Fig. 8 is a flow chart of another data value evaluation method provided by the embodiment of the present application.
  • the method flow in FIG. 8 is a possible implementation of the method described in FIG. 7 .
  • the method includes:
  • a first data processing device receives first encrypted information from a data evaluation device.
  • the first data processing device encrypts fourth model information by using the first encrypted information to obtain third model information.
  • the above fourth model information is used to train the first service model.
  • the third model information is used to train the first encrypted business model.
  • the first encryption information is a homomorphic encryption program
  • the fourth model information is a data processing and model training program used to train the first business model
  • the third model information is the use of a homomorphic encryption program to encrypt the fourth model Homomorphically encrypted data processing and model training programs obtained by encrypting information.
  • the first encrypted business model can be regarded as obtained by encrypting the first business model by using a homomorphic encryption program.
  • the first data processing device sends the third model information and the second performance index to the data evaluation device.
  • the above-mentioned second performance index represents the performance of the first business model.
  • the above-mentioned second performance index is used by the data evaluation device to evaluate the value of the first local data of the second data processing device for training the first business model.
  • the first data processing device receives first model information from the data evaluation device.
  • step 804 refer to step 701.
  • the first data processing device encrypts the test data used for testing the first service model by using the first encryption information to obtain encrypted test data.
  • the first data processing device uses the encrypted test data to test the second encrypted service model to obtain the first indicator information.
  • the first index information is used by the data evaluation device to obtain a first performance index; the first performance index represents the performance of the service model after the first service model is trained using the first local data.
  • the first data processing device sends the first indicator information to the data evaluation device.
  • the first data processing device may also perform the following operations: the first data processing device decrypts the second encrypted business model by using the decryption private key to obtain the second business model.
  • the second business model is the same as the business model after training the first business model with the above-mentioned first local data.
  • the first data processing device sends the first index information, the third model information and the second performance index to the data evaluation device, so that the data evaluation device can accurately evaluate the value of the first local data for training the first business model .
  • the first data processing device sends the first index information, the third model information, and the first business model whose second performance index is not exposed and a program for training the first business model to the data evaluation device.
  • the first data processing device receives the first model information from the data evaluation device, and the first data processing device cannot obtain the first local data of the second data processing device according to the first model information, which can prevent the first local data from being exposed to A first data processing device.
  • FIG. 9 is a flow chart of another data value evaluation method provided by the embodiment of the present application.
  • FIG. 9 is a flow chart of the data value evaluation method performed by the second data processing device (seller). As shown in Figure 9, the method includes:
  • the second data processing device receives third model information from the data evaluation device.
  • the above third model information is used to train the first encrypted service model.
  • the above-mentioned first encrypted business model is the same as the business model obtained by encrypting the first business model belonging to the first data processing device.
  • the second data processing device sends second model information to the data evaluating device.
  • the above-mentioned second model information is used by the data evaluation device to obtain the first model information.
  • the above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
  • the second business model obtained by decrypting the above-mentioned second encrypted business model is the same as the business model after training the first business model with the first local data.
  • the second data processing device sends the second model information to the data evaluation device, which can not only avoid exposing its own first local data, but also enable the data evaluation device to evaluate the first local data for training the first business model the value of.
  • FIG. 10 is a flowchart of another data value evaluation method provided by the embodiment of the present application.
  • the method flow in FIG. 10 is a possible implementation of the method described in FIG. 9 .
  • the method includes:
  • a second data processing device receives first encrypted information from a data evaluation device.
  • step 100 refer to step 801.
  • the second data processing device encrypts the first local data by using the first encryption information to obtain the first encrypted data.
  • the second data processing device receives third model information from the data evaluation device.
  • step 1003 refer to step 901.
  • the sequence of step 1003 and step 1002 is not limited.
  • the second data processing device uses the first encrypted data and the third model information to train the first encrypted service model to obtain a second encrypted service model.
  • the second data processing device obtains the second model information according to the second encrypted service model.
  • the second model information is used by the data evaluation device to obtain the first model information.
  • the above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
  • the second data processing device sends second model information to the data evaluation device.
  • the second data processing device sends the second model information to the data evaluation device, which can not only avoid exposing its own local data, but also enable the data evaluation device to evaluate the value of the first local data for training the first business model .
  • FIG. 11 is an interactive flow chart of a data usage right delivery method provided by an embodiment of the present application. As shown in Figure 11, the method includes:
  • the third data processing device acquires a homomorphic encryption program and a decryption private key from the data delivery device.
  • Step 1101 can be understood as: the data delivery device sends the homomorphic encryption program and the decryption private key to the third data processing device.
  • the decryption private key is used to decrypt data encrypted using a homomorphic encryption program.
  • the third data processing device uses a homomorphic encryption program to encrypt the data processing and model training program to obtain a homomorphic encrypted data processing and model training program.
  • the data processing and model training program is used to train the business model that the third data processing device needs the assistance of the fourth data processing device to train.
  • the third data processing device sends a homomorphically encrypted data processing and model training program to the data delivery device.
  • the data delivery device After detecting that the data processing and model training program of homomorphic encryption has no security problem, the data delivery device sends the data processing and model training program of homomorphic encryption to the fourth data processing device.
  • the data delivery device may send the homomorphically encrypted data processing and model training program to one or more sellers after detecting that the homomorphically encrypted data processing and model training program has no security problems.
  • the fourth data processing device is only an example of a seller. That is to say, the buyer can purchase the right to use the data of multiple sellers through the method flow in FIG. 11 .
  • the fourth data processing device encrypts its second local data using a homomorphic encryption program to obtain second encrypted data, and then uses a homomorphic encryption data processing and model training program to train with the second encrypted data to obtain a fourth encrypted business model.
  • the data processing and model training program can be used to train the third business model, and the data processing and model training program of homomorphic encryption is used to train the third encrypted business model, that is, the third business model of homomorphic encryption.
  • the fourth encryption business model is a homomorphic encryption business model. Using the decryption private key corresponding to the homomorphic encryption program to encrypt the fourth business model can obtain the unencrypted fourth business model.
  • the fourth business model is equal to the business model trained by using the data processing and model training program and the second local data.
  • the data delivery device sends the homomorphic encryption program to the fourth data processing device while sending the homomorphic encrypted data processing and model training program to the fourth data processing device. In some embodiments, the data delivery device may send the homomorphic encrypted data processing and model training program and the homomorphic encryption program to the fourth data processing device through different messages.
  • the fourth data processing device sends the fourth encrypted service model to the third data processing device.
  • step 1106 the fourth data processing device sends the sixth model information to the third data processing device.
  • the sixth model information characterizes the above-mentioned fourth encrypted business model.
  • the sixth model information includes parameters of the fourth encrypted service model.
  • the third data processing device decrypts the fourth encrypted business model by using the decryption private key to obtain the fourth business model.
  • the fourth service model is the same as the service model after using the second local data to train the third service model.
  • the above-mentioned third business model is an unencrypted business model corresponding to the third encrypted business model, and is a business model for which the third data processing device requires the assistance of the fourth data processing device for training.
  • the third data processing device updates its local service model by using the parameters of the fourth service model.
  • the method flow in FIG. 11 and the method flow in FIG. 4 may be independent method flows, or may be two associated flows.
  • the data delivery device may be a data evaluation device
  • the third data processing device may be a first data processing device
  • the fourth data processing device may be a second data processing device;
  • the second data processing device can first evaluate the value of some local data of the seller for the buyer's training business model through the method flow in Figure 4, and then use the method flow in Figure 11 to purchase these local data or include the use of these local data right.
  • the second data processing device is to sell the right to use a certain piece of local data, and the data volume of the local data is 100.
  • the data evaluation device, the first data processing device and the second data processing device can first pass through the The method flow evaluates any part of the local data with a data volume of 1; after the buyer and the seller conclude a transaction, the right to use the local data is delivered by executing the method flow in Figure 11 .
  • the time spent on evaluation can be reduced.
  • the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model; without obtaining the local data of the fourth data processing device, it can use
  • the local data of the fourth data processing device implements model training.
  • what is delivered is the right to use the data, the seller's data does not leave the local, and the use of the data is limited to training the data business model.
  • the detailed value of the seller's data is completely invisible to the buyer, it helps the buyer to realize the training of the model. Under the premise of satisfying the privacy and security protection of the seller's data, the potential value of the seller's data can be brought into play.
  • FIG. 11 introduces and describes the interaction process of the data value evaluation method in which the data delivery device, the third data processing device and the fourth data processing device participate together.
  • the data usage right delivery methods performed by the data delivery device, the third data processing device, and the fourth data processing device are respectively described below.
  • FIG. 12 is a flow chart of a data usage right delivery method provided by an embodiment of the present application.
  • Fig. 12 is a data usage right delivery process executed by the data delivery device. As shown in Figure 12, the method includes:
  • the data delivery device receives fifth model information from a third data processing device.
  • the fifth model information is used to train the third encrypted service model.
  • the business model obtained by decrypting the third encrypted business model is the same as the unencrypted third business model trained by the third data processing device with assistance from the fourth data processing device.
  • the data delivery device may send first encrypted information to the third data processing device, where the first encrypted information is used by the third data processing device to generate fifth model information.
  • the first encrypted information is a homomorphic encryption program
  • the third data processing device uses the homomorphic encryption program to encrypt the data processing and model training program to obtain a homomorphic encrypted data processing and model training program ( i.e. fifth model information).
  • the data delivery device sends fifth model information to the fourth data processing device.
  • step 1202 is as follows: in the case of detecting that there is no security problem in the fifth model information, the data delivery device sends the fifth model information to the fourth data processing device.
  • Detecting whether the fifth model information has a security problem may include: detecting whether the encryption algorithm used by the fifth model information complies with general security regulations, detecting whether the fifth model information is complete, performing virus scanning on the fifth model information, and so on.
  • the data delivery device may also perform the following operations: the above-mentioned data delivery device sends a decryption private key to the above-mentioned third data processing device; the above-mentioned decryption private key is used by the above-mentioned third data processing device to encrypt the fourth
  • the business model is decrypted.
  • the fourth encrypted service model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted service model.
  • the above-mentioned second encrypted data is obtained by encrypting the second local data of the above-mentioned fourth data processing device.
  • the fourth service model obtained by decrypting the fourth encrypted service model is the same as the service model after training the third service model by using the second local data.
  • the data delivery device may further perform the following operation: send first encrypted information to the fourth data processing device, where the first encrypted information is used by the fourth data processing device to encrypt its second local data.
  • the fourth data processing device encrypts its second local data by using the first encryption information to obtain second encrypted data.
  • the data delivery device sends fifth model information to the fourth data processing device, so that the fourth data processing device uses its local data and the fifth model information to train the third encrypted service model. Since the fifth model information is used to train the third encrypted business model, the fourth data processing device (which cannot successfully decrypt the third encrypted business model) cannot acquire an unencrypted business model according to the fifth model information. The fourth data processing device uses its local data to train the third encrypted business model. On the one hand, the third data processing device will not expose its business model and model training method, and on the other hand, the local data of the fourth data processing device will not leave the local . Therefore, in the embodiment of the present application, the third data processing device (buyer) can be helped to train the second business model on the premise that the local data of the fourth data processing device (seller) is completely invisible to the third data processing device (buyer).
  • FIG. 13 is a flow chart of another data usage right delivery method provided by the embodiment of the present application.
  • Fig. 13 is a data usage right delivery process executed by the third data processing device (buyer). As shown in Figure 13, the method includes:
  • the third data processing device receives the decryption private key from the data delivery device.
  • the third data processing device decrypts the fourth encrypted business model by using the decryption private key to obtain the fourth business model.
  • the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model.
  • the above-mentioned second encrypted data is obtained by encrypting its second local data by the above-mentioned fourth data processing device.
  • the fourth service model is the same as the service model after the third service model is trained by using the second local data.
  • the third business model is an unencrypted business model corresponding to the third encrypted business model, and is a business model for which the third data processing device requires assistance from the fourth data processing device for training.
  • the third data processing device sends fifth model information to the data delivery device; the fifth model information is used to train the third An encrypted business model; a fourth encrypted business model is obtained according to the sixth model information from the fourth data processing device.
  • the third data processing device acquires the first encrypted information from the data delivery device; and encrypts the seventh model information according to the first encrypted information , to obtain the fifth model information; the seventh model information is used to train the third service model.
  • the third data processing device may perform the following operation: the third data processing device updates its local service model by using the parameters of the fourth service model.
  • the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model; without obtaining the local data of the fourth data processing device, it can use
  • the local data of the fourth data processing device implements model training.
  • FIG. 14 is a flow chart of another method for delivering data usage rights provided by the embodiment of the present application.
  • Fig. 14 is a data usage right transfer process executed by the fourth data processing device (seller). As shown in Figure 14, the method includes:
  • the fourth data processing device receives fifth model information from the data delivery device.
  • the above fifth model information is used to train the third encrypted service model.
  • the fourth data processing device uses the second encrypted data to train a third encrypted service model to obtain a fourth encrypted service model.
  • the above-mentioned second encrypted data is obtained by encrypting its second local data by the above-mentioned fourth data processing device.
  • the fourth service model obtained by decrypting the fourth encrypted service model is the same as the service model after training the third service model by using the second local data.
  • the third business model is an unencrypted business model corresponding to the third encrypted business model, and is a business model for which the third data processing device requires assistance from the fourth data processing device for training.
  • the fourth data processing device encrypts the second local data by using the first encryption information from the data delivery device to obtain the second encrypted data.
  • the first encryption information is a homomorphic encryption program
  • the fifth model information is a homomorphic encryption data processing and model training program.
  • the data processing and model training program of homomorphic encryption may be a program obtained by using the homomorphic encryption program (ie, the first encrypted information) to perform encryption processing on the data processing and model training program used to train the third business model.
  • the fourth data processing device sends sixth model information to the third data processing device.
  • the sixth model information represents the fourth encrypted business model; the fourth encrypted business model is used by the third data processing device to decrypt to obtain required model update parameters.
  • the fourth data processing device receives the fifth model information from the data delivery device; the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain the fourth encrypted business model; The business models and model training methods of the three data processing devices were leaked.
  • the fourth data processing device sends the sixth model information to the third data processing device, which can prevent the third data processing device from obtaining the local data of the fourth data processing device. That is to say, on the premise that the local data of the fourth data processing device is completely invisible to the third data processing device, it can help the third data processing device to realize the training of the business model.
  • the buyer and the seller evaluate the value of the right to use the seller's data to the buyer through the data evaluation device (corresponding to the data value evaluation platform), and the buyer and the seller deliver the seller's data through the data delivery device (corresponding to the data usage right delivery platform).
  • the data evaluation device and the data delivery device may be the same device or product, or different devices or products. That is to say, the data value evaluation platform and the data usage right delivery platform can be the same platform, or they can be two different platforms.
  • data value evaluation and data usage right delivery are described as two independent processes. The following takes the implementation of a data trading platform product that has both data value assessment and data usage rights delivery as an example to describe the solution of first evaluating data value and then delivering data usage rights.
  • Fig. 15 is an interaction flowchart of a data evaluation and use right delivery method provided by the embodiment of the present application. As shown in Figure 15, the method includes:
  • the second data processing apparatus releases introduction information of its local data whose use rights are to be sold.
  • step 1501 A possible implementation of step 1501 is as follows: the second data processing device (seller) publishes the source of the data it intends to sell the use right on the data transaction system (such as the vehicle data transaction system), the time when the data is generated, the data structure, and the field Data introduction information such as type and data label.
  • the data transaction system can run on the data evaluation device (data delivery device).
  • the second data processing device (seller) publishes presentation information of its local data for which the right to use is to be sold on the data transaction system operated by the data evaluation device.
  • the first data processing device initiates value evaluation for the first local data to the data evaluation device.
  • the first local data may be a piece of local data for sale issued by the second data processing device, or may be a part of a piece of local data for sale issued by the second data processing device.
  • the first local data may include two or more pieces of local data for sale issued by the second data processing device, for example, two pieces of local data with different data sources.
  • the buyer can initiate a value assessment for the data to the data transaction system.
  • the data evaluation device calculates and outputs the value of the first local data for the buyer model based on the percentage of performance improvement after the buyer model is trained using the first local data.
  • step 1503 may refer to FIG. 3 or FIG. 4 .
  • the first data processing device and the second data processing device conduct a communication transaction based on the percentage of the first local data calculated by the data evaluation device for the performance improvement of the buyer model and the reference value of the data.
  • Step 1504 can be understood as: the buyer and the seller conduct a communication transaction based on the percentage of the first local data calculated by the data evaluation device for the performance improvement of the buyer's model and the data reference value.
  • step 1505 If the transaction is concluded, execute step 1505; if the transaction is not concluded, the data transaction is terminated (or this process ends).
  • the first data processing device pays the second data processing device to acquire the right to use the first local data.
  • Step 1505 can be understood as: the buyer pays the seller to obtain the right to use the first local data.
  • the second data processing device participates in the federated learning architecture led by the first data processing device, and helps the first data processing device train the service model.
  • Step 1506 can be understood as: the first local data participates in the buyer-led federated learning framework to help the buyer train the business model. That is to say, after the transaction is concluded, the buyer obtains the right to use the seller's data, and the buyer can build a federated learning architecture based on the data transaction system, and use the seller's data to train its own data business model. In the embodiment of this application, the federated learning architecture is improved, and the buyer purchases the seller's data to participate in the federated learning architecture led by it. Achieving technical effect: On the premise of meeting the seller's data privacy and security protection requirements, the data buyer's training data business model needs are met, and the potential value of the originally immobile data can be brought into play.
  • the buyer can purchase multiple data usage rights from multiple sellers, build a federated learning framework based on the data transaction system, and use the seller's data to train its own data business model.
  • the data value assessment method and the data usage right delivery method in the embodiment of this application are not strongly coupled.
  • the data value assessment method and the data usage right delivery method can be developed as an independent product, or the functions of the two can be centralized A data trading platform is realized.
  • the data evaluation device calculates and outputs the value of the first local data for the buyer model based on the percentage of performance improvement after the buyer model is trained using the first local data; it is possible for the buyer not to expose its data processing and model training methods, On the premise that the seller does not disclose its data details, output the percentage and data reference value of the seller's data to the buyer's model performance improvement.
  • the data trading system provided by the embodiment of this application, what is delivered is the right to use the data, the seller's data does not leave the local, and the use of the data is limited to training data business models.
  • the detailed value of the seller's data is completely invisible to the buyer, it helps the buyer to realize the training of the model. Under the premise of satisfying the privacy and security protection of the seller's data, the potential value of the seller's data can be brought into play.
  • FIG. 16 shows a schematic structural diagram of a data processing device 1600 .
  • the data processing device 1600 can correspond to any one of the data evaluation device, the first data processing device, the second data processing device, the data delivery device, the third data processing device, and the fourth data processing device in the above-mentioned method embodiments.
  • the data processing device may include a processing module 1610 and a transceiver module 1620 .
  • a storage unit may also be included, and the storage unit may be used to store instructions (code or program) and/or data.
  • the processing module 1610 and the transceiver module 1620 may be coupled with the storage unit, for example, the processing module 1610 may read instructions (code or program) and/or data in the storage unit to implement a corresponding method.
  • the processing module 1610 may read instructions (code or program) and/or data in the storage unit to implement a corresponding method.
  • Each of the above units can be set independently, or can be partially or fully integrated.
  • the transceiving module 1620 may include a sending module and a receiving module.
  • the data processing device 1600 can correspondingly implement the behaviors and functions of the data evaluation device in the foregoing method embodiments.
  • the data processing device 1600 may be a data evaluation device, or a component (such as a chip or a circuit) applied in the data evaluation device.
  • the transceiver module 1620 can be used to perform all the receiving or sending operations performed by the data evaluation device in the embodiments shown in FIG. 3, FIG. 4, FIG. 5, FIG. 6, and FIG. 15, such as the steps in the embodiment shown in FIG.
  • the processing module 1610 is used to execute all the operations performed by the data evaluation device in the embodiments of FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , and FIG. 15 , except the transceiving operation.
  • the data processing device 1600 can correspondingly implement the behaviors and functions of the first data processing device in the foregoing method embodiments.
  • the data processing device 1600 may be a first data processing device, or may be a component (such as a chip or a circuit) applied in the first data processing device.
  • the transceiver module 1620 may be used to perform all the receiving or sending operations performed by the first data processing device in the embodiment shown in FIG. 3, FIG. 4, FIG. 7, FIG. 8 or FIG. Step 301 , step 302 , step 305 , step 306 and step 401 , step 402 , step 405 , step 406 in the embodiment shown in FIG. 4 , and/or other processes for supporting the technology described herein.
  • the processing module 1610 is configured to execute all the operations performed by the first data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 7 , FIG. 8 or FIG. 15 except the transceiving operation.
  • the data processing device 1600 can correspondingly implement the behaviors and functions of the second data processing device in the foregoing method embodiments.
  • the data processing device 1600 may be a second data processing device, or may be a component (such as a chip or a circuit) applied in the second data processing device.
  • the transceiver module 1620 may be used to perform all the receiving or sending operations performed by the second data processing device in the embodiment shown in FIG. 3, FIG. 4, FIG. 9, FIG. 10 or FIG. Step 301 , step 303 , step 304 and step 401 , step 403 , step 404 in the embodiment shown in FIG. 4 , and/or other processes for supporting the technology described herein.
  • the processing module 1610 is configured to perform all the operations performed by the second data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 9 , FIG. 10 or FIG. 15 , except the transceiving operation.
  • the data processing apparatus 1600 can correspondingly implement the behaviors and functions of the data delivery apparatus in the foregoing method embodiments.
  • the data processing device 1600 may be a data delivery device, or a component (such as a chip or a circuit) applied in the data delivery device.
  • the transceiver module 1620 can be used to perform all the receiving or sending operations performed by the data delivery device in the embodiment shown in FIG. 11 and FIG. Step 1201 and step 1202 in an embodiment, and/or other processes used to support the techniques described herein.
  • the processing module 1610 is configured to perform all operations performed by the data delivery device in the embodiments shown in FIG. 11 and FIG. 12 except for the transceiving operation.
  • the data processing apparatus 1600 can correspondingly implement the behaviors and functions of the third data processing apparatus in the foregoing method embodiments.
  • the data processing device 1600 may be a third data processing device, or may be a component (such as a chip or a circuit) applied in the third data processing device.
  • the transceiver module 1620 may be used to perform all the receiving or sending operations performed by the third data processing device in the embodiment shown in FIG. 11 and FIG. And step 1301 in the embodiment shown in FIG. 13 , and/or other processes for supporting the techniques described herein.
  • the processing module 1610 is configured to perform all the operations performed by the third data processing device in the embodiments shown in FIG. 11 and FIG. 13 except the transceiving operation.
  • the data processing apparatus 1600 can correspondingly implement the behavior and functions of the fourth data processing apparatus in the foregoing method embodiments.
  • the data processing device 1600 may be a fourth data processing device, or may be a component (such as a chip or a circuit) applied in the fourth data processing device.
  • the transceiver module 1620 may be used to perform all the receiving or sending operations performed by the fourth data processing device in the embodiment shown in FIG. 11 and FIG. Step 1401 and Step 1403 in the illustrated embodiment, and/or other processes used to support the techniques described herein.
  • the processing module 1610 is configured to execute all the operations performed by the fourth data processing device in the embodiments shown in FIG. 11 and FIG. 14 except the transceiving operation.
  • FIG. 17 is a schematic structural diagram of another data processing device 170 provided in an embodiment of the present application.
  • the data processing means in FIG. 17 may be the data evaluation means described above.
  • the data processing device in FIG. 17 may be the first data processing device described above.
  • the data processing device in FIG. 17 may be the second data processing device described above.
  • the data processing device in FIG. 17 may be the data delivery device described above.
  • the data processing device in FIG. 17 may be the third data processing device described above.
  • the data processing device in FIG. 17 may be the fourth data processing device described above.
  • the data processing device 170 includes at least one processor 1720 and a transceiver 1710 .
  • the processor 1720 and the transceiver 1710 may be used to perform the functions or operations performed by the above-mentioned data evaluation device.
  • the transceiver 1710 may perform all receiving or transmitting operations performed by the data evaluation device.
  • the processor 1720 can, for example, execute all the operations performed by the data evaluation device in the embodiments of FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , and FIG. 15 , except the transceiving operation.
  • the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the above-mentioned first data processing device.
  • the transceiver 1710 may perform all reception or transmission operations performed by the first data processing means.
  • the processor 1720 may, for example, perform all the operations performed by the first data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 7 , FIG. 8 or FIG. 15 except the transceiving operation.
  • the processor 1720 and the transceiver 1710 may be used to perform the functions or operations performed by the above-mentioned second data processing device.
  • the transceiver 1710 may perform all reception or transmission operations performed by the second data processing means.
  • the processor 1720 can, for example, execute all the operations performed by the second data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 9 , FIG. 10 or FIG. 15 except the transceiving operation.
  • the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the above data delivery device.
  • the transceiver 1710 may perform all receive or transmit operations performed by the data delivery device.
  • the processor 1720 may, for example, perform all the operations performed by the data delivery device in the embodiments of FIG. 11 and FIG. 12 except the transceiving operation.
  • the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the above-mentioned third data processing device.
  • the transceiver 1710 may perform all reception or transmission operations performed by the third data processing means.
  • the processor 1720 may, for example, perform all the operations performed by the third data processing device in the embodiments of FIG. 11 and FIG. 13 except the transceiving operation.
  • the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the fourth data processing device.
  • the transceiver 1710 may perform all reception or transmission operations performed by the fourth data processing means.
  • the processor 1720 may, for example, execute all the operations performed by the fourth data processing device in the embodiments of FIG. 11 and FIG. 14 except the transceiving operation.
  • Transceiver 1710 is used to communicate with other devices/devices over transmission media.
  • the processor 1720 uses the transceiver 1710 to send and receive data and/or signaling, and is used to implement the methods in the foregoing method embodiments.
  • the processor 1720 can realize the function of the processing module 1610 , and the transceiver 1710 can realize the function of the transceiver module 1620 .
  • the data processing device 170 may further include at least one memory 1730 for storing program instructions and/or data.
  • the memory 1730 is coupled to the processor 1720 .
  • the coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
  • Processor 1720 may cooperate with memory 1730 .
  • Processor 1720 may execute program instructions stored in memory 1730 . At least one of the at least one memory may be included in the processor.
  • a specific connection medium among the transceiver 1710, the processor 1720, and the memory 1730 is not limited.
  • the memory 1730, the processor 1720, and the transceiver 1710 are connected through a bus 1740.
  • the bus is represented by a thick line in FIG. 17, and the connection between other components is only for schematic illustration. , is not limited.
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 17 , but it does not mean that there is only one bus or one type of bus.
  • the processor may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or Execute the methods, steps and logic block diagrams disclosed in the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • FIG. 18 is a schematic structural diagram of another data processing device 180 provided by an embodiment of the present application.
  • the data processing device shown in FIG. 18 includes a logic circuit 1801 and an interface 1802 .
  • the processing module 1610 in FIG. 16 can be realized by a logic circuit 1801
  • the transceiver module 1620 in FIG. 16 can be realized by an interface 1802 .
  • the logic circuit 1801 may be a chip, a processing circuit, an integrated circuit or a system on chip (SoC) chip, etc.
  • the interface 1802 may be a communication interface, an input-output interface, or the like.
  • the logic circuit and the interface may also be coupled to each other. The embodiment of the present application does not limit the specific connection manner of the logic circuit and the interface.
  • the logic circuit and interface can be used to perform the functions or operations performed by the above-mentioned data evaluation device.
  • the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned first data processing device.
  • the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned second data processing device.
  • the logic circuit and interface may be used to perform the functions or operations performed by the above-mentioned data delivery device.
  • the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned third data processing device.
  • the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned fourth data processing device.
  • the present application also provides a computer-readable storage medium, where computer codes are stored in the computer-readable storage medium, and when the computer codes are run on the computer, the computer is made to execute the methods of the above-mentioned embodiments.
  • the present application also provides a computer program product, the computer program product includes computer code or computer program, and when the computer code or computer program is run on a computer, the methods in the above-mentioned embodiments are executed.
  • the present application also provides a data value evaluation system, including a data evaluation device, a first data processing device, and a second data processing device.
  • the present application also provides a data usage right delivery system, including a data delivery device, a third data processing device, and a fourth data processing device.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed in embodiments of the present application are a data value evaluation method and a related product. The method comprises: a data evaluation device sending first model information to a first data processing device, the first model information representing a second encryption service model obtained by training a first encryption service model by a second data processing device using first local data thereof, and a second service model obtained by decrypting the second encryption service model being the same as a service model after using the first local data to train the first service model; obtaining a first performance index according to first index information from the first data processing device; and evaluating, according to the first performance index and a second performance index, the value of the first local data for training the first service model, the second performance index representing the performance of the first service model. In the embodiments of the present application, in the premise that local data of a seller is completely invisible to a buyer, the buyer is helped to train the first service model, so as to evaluate the value of the first local data for training the first service model.

Description

数据价值评估方法和相关产品Data value assessment methods and related products 技术领域technical field
本申请实施例涉及数据价值评估领域,尤其涉及一种数据价值评估方法和相关产品。The embodiments of the present application relate to the field of data value evaluation, and in particular, to a data value evaluation method and related products.
背景技术Background technique
当前各大汽车主机厂和各级政府监管平台上存储着大量新能源汽车的历史和实时运行数据。利用这些数据开发相关数据业务模型,例如车辆故障诊断模型、动力电池热失控预警模型以及动力电池残值评估模型等,对于提升新能源汽车的安全性和性能效率具有极大的推进作用。At present, a large number of historical and real-time operation data of new energy vehicles are stored on major automobile OEMs and government supervision platforms at all levels. Using these data to develop relevant data business models, such as vehicle fault diagnosis model, power battery thermal runaway warning model, and power battery residual value evaluation model, will greatly promote the safety and performance efficiency of new energy vehicles.
当前,虽然汽车主机厂和各级政府监管平台上存储着大量新能源汽车运行数据,但是这些数据的质量普遍不高,存在大量的缺失、错误的问题。对于数据业务模型的开发而言,不同车辆数据对其具有不同的价值。例如,使用车辆1的运行数据来训练某个数据业务模型可明显提升该数据业务模型的性能,使用车辆2的数据来训练该数据业务模型几乎不能提升该数据业务模型的性能。对于数据业务模型的开发而言,需要准确地评估不同车辆数据对其具有的价值,以便使用对其具有较大价值的车辆数据来训练得到性能较好的数据业务模型。因此需要研究如何准确地评估车辆数据对于开发数据业务模型的价值。At present, although automobile OEMs and government regulatory platforms at all levels store a large amount of new energy vehicle operation data, the quality of these data is generally not high, and there are a lot of missing and wrong problems. For the development of data business models, different vehicle data have different values. For example, using the running data of vehicle 1 to train a certain data service model can obviously improve the performance of the data service model, but using the data of vehicle 2 to train the data service model can hardly improve the performance of the data service model. For the development of the data business model, it is necessary to accurately evaluate the value of different vehicle data, so that the vehicle data with greater value can be used to train the data business model with better performance. Therefore, it is necessary to study how to accurately evaluate the value of vehicle data for developing data business models.
发明内容Contents of the invention
本申请实施例公开了一种数据价值评估方法和相关产品,能够准确地评估车辆数据对于训练数据业务模型的价值。The embodiment of the present application discloses a data value evaluation method and related products, which can accurately evaluate the value of vehicle data for training data business models.
第一方面,本申请实施例提供一种数据价值评估方法,该方法包括:数据评估装置向第一数据处理装置发送第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;所述数据评估装置根据来自所述第一数据处理装置的第一指标信息,获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能,所述第一指标信息为所述第一数据处理装置利用所述第一模型信息和所述第二加密业务模型对应的测试数据得到;所述数据评估装置根据所述第一性能指标和第二性能指标,评估所述第一本地数据对于训练所述第一业务模型的价值;所述第二性能指标表征所述第一业务模型的性能。In the first aspect, the embodiment of the present application provides a data value evaluation method, the method includes: the data evaluation device sends the first model information to the first data processing device; the first model information indicates that the second data processing device uses its first model information A second encrypted business model obtained by training the first encrypted business model with local data; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, The first business model is an unencrypted business model corresponding to the first encrypted business model; the data evaluation device obtains a first performance index according to the first index information from the first data processing device; the The first performance index represents the performance of the business model after using the first local data to train the first business model, and the first index information is that the first data processing device uses the first model information and the The test data corresponding to the second encrypted business model is obtained; the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; The second performance indicator characterizes the performance of the first business model.
本申请实施例中,数据评估装置根据第一性能指标和第二性能指标,评估第一本地数据对于训练第一业务模型的价值;可准确地评估第一本地数据对于训练第一业务模型的价值。数据评估装置向第一数据处理装置发送第一模型信息。由于第一模型信息表征第二加密业务模型,因此第一数据处理装置根据该第一模型信息,仅可获取第二加密业务模型,而不能获取第二数据处理装置的第一本地数据。也就是说,第二数据处理装置的第一本地数据不离开本地,该第一本地数据的用途被限制为训练第一加密业务模型。因此,本申请实施例中,在第二数据处理装置(卖方)的第一本地数据对于第一数据处理装置(买方)完全不可见的前 提下,帮助第一数据处理装置训练第一业务模型,进而评估第一本地数据对于训练第一业务模型的价值。另外,第二数据处理装置利用其第一本地数据训练第一加密业务模型,这样第一数据处理装置就不会暴露其业务模型和模型训练方法。In the embodiment of the present application, the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; it can accurately evaluate the value of the first local data for training the first business model . The data evaluation device sends the first model information to the first data processing device. Since the first model information represents the second encrypted service model, the first data processing device can only obtain the second encrypted service model according to the first model information, but cannot obtain the first local data of the second data processing device. That is to say, the first local data of the second data processing device does not leave the local, and the use of the first local data is limited to training the first encrypted service model. Therefore, in the embodiment of the present application, on the premise that the first local data of the second data processing device (seller) is completely invisible to the first data processing device (buyer), the first data processing device is helped to train the first business model, Then evaluate the value of the first local data for training the first business model. In addition, the second data processing device uses its first local data to train the first encrypted business model, so that the first data processing device will not expose its business model and model training method.
在一种可能的实现方式中,所述第一指标信息为所述第一数据处理装置利用加密测试数据测试所述第二加密业务模型得到,所述加密测试数据加密所述测试数据得到。In a possible implementation manner, the first index information is obtained by the first data processing device testing the second encrypted service model by using encrypted test data, and the encrypted test data is obtained by encrypting the test data.
在该实现方式中,第一指标信息为第一数据处理装置利用加密测试数据测试第二加密业务模型得到,以便数据评估装置对第一指标信息做解密处理得到第一性能指标。In this implementation, the first index information is obtained by the first data processing device using the encrypted test data to test the second encrypted business model, so that the data evaluation device decrypts the first index information to obtain the first performance index.
在一种可能的实现方式中,在数据评估装置向第一数据处理装置发送第一模型信息之前,所述方法还包括:所述数据评估装置接收来自所述第二数据处理装置的第二模型信息;所述数据评估装置根据所述第二模型信息,获得所述第一模型信息。In a possible implementation manner, before the data evaluation device sends the first model information to the first data processing device, the method further includes: the data evaluation device receives the second model from the second data processing device information; the data evaluation device obtains the first model information according to the second model information.
在该实现方式中,数据评估装置根据第二模型信息,获得第一模型信息;可以避免第一模型信息被泄露,提高数据的安全性。In this implementation manner, the data evaluation device obtains the first model information according to the second model information; leakage of the first model information can be avoided, and data security can be improved.
在一种可能的实现方式中,在所述数据评估装置接收来自所述第二数据处理装置的第二模型信息之前,所述方法还包括:所述数据评估装置向所述第二数据处理装置发送第三模型信息;所述第三模型信息用于训练所述第一加密业务模型。In a possible implementation manner, before the data evaluation device receives the second model information from the second data processing device, the method further includes: the data evaluation device sending the second data processing device Send third model information; the third model information is used to train the first encrypted service model.
在该实现方式中,据评估装置向第二数据处理装置发送第三模型信息,既能使得第二数据处理装置训练第一加密业务模型,又能避免第一数据处理装置的模型训练方法或程序。In this implementation, the data evaluation device sends the third model information to the second data processing device, which can not only enable the second data processing device to train the first encrypted business model, but also avoid the model training method or program of the first data processing device .
在一种可能的实现方式中,在数据评估装置向第一数据处理装置发送第一模型信息之前,所述方法还包括:所述数据评估装置向所述第二数据处理装置发送第一加密信息;所述第一加密信息用于所述第二数据处理装置加密所述第一本地数据,所述第二加密业务模型由所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模型得到,所述第一加密数据由所述第一加密信息加密所述第一本地数据得到。In a possible implementation manner, before the data evaluation device sends the first model information to the first data processing device, the method further includes: the data evaluation device sends the first encrypted information to the second data processing device ; The first encrypted information is used by the second data processing device to encrypt the first local data, and the second encrypted business model is used by the second data processing device to use the first encrypted data and the third model The information is obtained by training the first encrypted business model, and the first encrypted data is obtained by encrypting the first local data with the first encrypted information.
在该实现方式中,数据评估装置向第二数据处理装置发送第一加密信息,以便第二数据处理装置利用该第一加密信息加密其第一本地数据得到用于训练第一加密业务模型的第一加密数据。In this implementation, the data evaluation device sends the first encryption information to the second data processing device, so that the second data processing device uses the first encryption information to encrypt its first local data to obtain the first encryption information for training the first encrypted business model. - encrypted data.
在一种可能的实现方式中,在所述数据评估装置向所述第二数据处理装置发送第三模型信息之前,所述方法还包括:所述数据评估装置接收来自所述第一数据处理装置的所述第三模型信息。In a possible implementation manner, before the data evaluation device sends the third model information to the second data processing device, the method further includes: the data evaluation device receives information from the first data processing device The third model information of .
在一种可能的实现方式中,在所述数据评估装置接收来自所述第一数据处理装置的所述第三模型信息之前,所述方法还包括:所述数据评估装置向所述第一数据处理装置发送第一加密信息;所述第一加密信息用于所述第一数据处理装置加密第四模型信息以得到所述第三模型信息,所述第四模型信息用于训练所述第一业务模型。In a possible implementation manner, before the data evaluation device receives the third model information from the first data processing device, the method further includes: the data evaluation device sends the first data The processing device sends first encrypted information; the first encrypted information is used by the first data processing device to encrypt fourth model information to obtain the third model information, and the fourth model information is used to train the first business model.
在该实现方式中,数据评估装置向第一数据处理装置发送第一加密信息,以便第一数据处理装置利用该第一加密信息加密第四模型信息得到第三模型信息;可以避免暴露第四模型信息。In this implementation, the data evaluation device sends the first encrypted information to the first data processing device, so that the first data processing device uses the first encrypted information to encrypt the fourth model information to obtain the third model information; the exposure of the fourth model can be avoided information.
在一种可能的实现方式中,所述数据评估装置根据来自所述第一数据处理装置的第一指标信息,获得第一性能指标包括:所述数据评估装置对所述第一指标信息做解密处理,获得所述第一性能指标。In a possible implementation manner, the obtaining the first performance index by the data evaluation device according to the first index information from the first data processing device includes: the data evaluation device decrypting the first index information processing to obtain the first performance index.
在该实现方式中,数据评估装置对第一指标信息做解密处理,可以准确地获得第一性能指标。In this implementation manner, the data evaluation device performs decryption processing on the first index information, so as to accurately obtain the first performance index.
在一种可能的实现方式中,所述数据评估装置根据所述第一性能指标和第二性能指标, 评估所述第一本地数据对于训练第一业务模型的价值之后,所述方法还包括:所述数据评估装置向所述第一数据处理装置发送解密私钥;所述解密私钥用于所述第一数据处理装置对所述第二加密业务模型做解密处理。In a possible implementation manner, after the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index, the method further includes: The data evaluation device sends a decryption private key to the first data processing device; the decryption private key is used by the first data processing device to decrypt the second encrypted business model.
在该实现方式中,数据评估装置向第一数据处理装置发送解密私钥,以便第一数据处理装置对第二加密业务模型做解密处理得到所需的模型参数。In this implementation, the data evaluation device sends a decryption private key to the first data processing device, so that the first data processing device decrypts the second encrypted business model to obtain required model parameters.
在一种可能的实现方式中,所述数据评估装置根据所述第一性能指标和第二性能指标,评估所述第一本地数据对于训练第一业务模型的价值之后,所述方法还包括:所述数据评估装置接收来自所述第一数据处理装置的第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;所述数据评估装置向所述第二数据处理装置发送所述第三模型信息。In a possible implementation manner, after the data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index, the method further includes: The data evaluation device receives third model information from the first data processing device; the third model information is used to train the first encrypted business model; the data evaluation device sends the second data processing device Send the third model information.
在该实现方式中,数据评估装置向第二数据处理装置发送第三模型信息,可以使得该第二数据处理装置利用该第三模型信息协助第一数据处理装置做模型训练。In this implementation, the data evaluation device sends the third model information to the second data processing device, so that the second data processing device uses the third model information to assist the first data processing device in model training.
第二方面,本申请提供了另一种数据价值评估方法,包括:第一数据处理装置接收来自数据评估装置的第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;所述第一数据处理装置根据所述第一模型信息和所述第二加密业务模型对应的测试数据,向所述数据评估装置发送第一指标信息;所述第一指标信息用于所述数据评估装置获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能。In a second aspect, the present application provides another data value evaluation method, including: the first data processing device receives the first model information from the data evaluation device; the first model information indicates that the second data processing device utilizes its first The second encrypted business model obtained by training the first encrypted business model with local data; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, so The first business model is an unencrypted business model corresponding to the first encrypted business model; the first data processing device sends the test data corresponding to the first model information and the second encrypted business model to the The data evaluation device sends first index information; the first index information is used by the data evaluation device to obtain a first performance index; the first performance index indicates that the first business model is trained using the first local data The performance of the subsequent business model.
本申请实施例中,第一数据处理装置根据第一模型信息和第二加密业务模型对应的测试数据,向数据评估装置发送第一指标信息;可以使得数据评估装置准确地评估第一本地数据对于训练第一业务模型的价值。第一数据处理装置接收来自数据评估装置的第一模型信息,第一数据处理装置根据该第一模型信息无法获取第二数据处理装置的第一本地数据,可以避免该第一本地数据被暴露给第一数据处理装置。In the embodiment of the present application, the first data processing device sends the first index information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model; the data evaluation device can accurately evaluate the first local data for The value of training the first business model. The first data processing device receives the first model information from the data evaluation device, and the first data processing device cannot obtain the first local data of the second data processing device according to the first model information, which can prevent the first local data from being exposed to A first data processing device.
在一种可能的实现方式中,所述第一数据处理装置根据所述第一模型信息和所述第二加密业务模型对应的测试数据,向所述数据评估装置发送第一指标信息包括:所述第一数据处理装置利用加密测试数据测试所述第二加密业务模型,得到所述第一指标信息;所述加密测试数据利用第一加密信息加密所述测试数据得到;所述第一数据处理装置向所述数据评估装置发送所述第一指标信息。In a possible implementation manner, the first data processing device sends the first indicator information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted service model, including: the The first data processing device uses the encrypted test data to test the second encrypted business model to obtain the first index information; the encrypted test data is obtained by encrypting the test data with the first encrypted information; the first data processing The means sends the first indicator information to the data evaluation means.
在该实现方式中,第一数据处理装置利用加密测试数据测试第二加密业务模型,可以测试得到用于获取第一性能指标的第一指标信息。In this implementation manner, the first data processing device uses the encrypted test data to test the second encrypted service model, and can test to obtain the first index information for obtaining the first performance index.
在一种可能的实现方式中,所述第一数据处理装置接收来自数据评估装置的第一模型信息之前,所述方法还包括:所述第一数据处理装置向所述数据评估装置发送第三模型信息,所述第三模型信息用于训练所述第一加密业务模型。In a possible implementation manner, before the first data processing device receives the first model information from the data evaluation device, the method further includes: the first data processing device sends a third model information to the data evaluation device Model information, the third model information is used to train the first encrypted service model.
在该实现方式中,第一数据处理装置向数据评估装置发送第三模型信息,既能使得第二数据处理装置训练第一加密业务模型,又能避免其模型训练方法或程序被暴露。In this implementation, the first data processing device sends the third model information to the data evaluation device, which not only enables the second data processing device to train the first encrypted business model, but also prevents its model training method or program from being exposed.
在一种可能的实现方式中,所述第一数据处理装置向所述数据评估装置发送第三模型信息之前,所述方法还包括:所述第一数据处理装置接收来自所述数据评估装置的第一加密信息;所述第一数据处理装置利用所述第一加密信息对第四模型信息做加密处理,得到所述第三模型信息,所述第四模型信息用于训练所述第一业务模型。In a possible implementation manner, before the first data processing device sends the third model information to the data evaluation device, the method further includes: the first data processing device receives from the data evaluation device first encrypted information; the first data processing device uses the first encrypted information to encrypt fourth model information to obtain the third model information, and the fourth model information is used to train the first service Model.
在该实现方式中,第一数据处理装置利用第一加密信息对第四模型信息做加密处理,得 到第三模型信息;可以避免第四模型信息被暴露给第二数据处理装置。In this implementation, the first data processing device uses the first encryption information to encrypt the fourth model information to obtain the third model information; it can prevent the fourth model information from being exposed to the second data processing device.
在一种可能的实现方式中,所述方法还包括:所述第一数据处理装置向所述数据评估装置发送第二性能指标,所述第二性能指标表征所述第一业务模型的性能,所述第二性能指标用于所述数据评估装置评估所述第一本地数据对于训练所述第一业务模型的价值。In a possible implementation manner, the method further includes: the first data processing device sends a second performance index to the data evaluation device, the second performance index represents the performance of the first business model, The second performance indicator is used by the data evaluation device to evaluate the value of the first local data for training the first business model.
在该实现方式中,第一数据处理装置向数据评估装置发送第二性能指标,可以使得该数据评估装置更快地评估第一本地数据对于训练所述第一业务模型的价值。In this implementation manner, the first data processing device sends the second performance index to the data evaluation device, which may enable the data evaluation device to evaluate the value of the first local data for training the first business model more quickly.
在一种可能的实现方式中,在向所述数据评估装置发送第一指标信息之后,所述方法还包括:所述第一数据处理装置接收来自所述数据评估装置的解密私钥;所述第一数据处理装置利用所述解密私钥对所述第二加密业务模型做解密处理,得到所述第二业务模型。In a possible implementation manner, after sending the first indicator information to the data evaluation device, the method further includes: the first data processing device receives a decryption private key from the data evaluation device; The first data processing device uses the decryption private key to decrypt the second encrypted business model to obtain the second business model.
在该实现方式中,第一数据处理装置利用解密私钥对第二加密业务模型做解密处理,得到第二业务模型;可以准确地获得所需的业务模型,并避免该第二业务模型暴露给第二数据处理装置。In this implementation, the first data processing device uses the decryption private key to decrypt the second encrypted business model to obtain the second business model; the required business model can be accurately obtained, and the second business model is prevented from being exposed to a second data processing device.
在一种可能的实现方式中,在所述第一数据处理装置利用所述解密私钥对所述第二加密业务模型做解密处理,得到第二业务模型之前,所述方法还包括:所述第一数据处理装置向所述数据评估装置发送第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;所述第一数据处理装置根据来自所述第二数据处理装置的第二模型信息,得到所述第二加密业务模型。In a possible implementation manner, before the first data processing device uses the decryption private key to decrypt the second encrypted business model to obtain the second business model, the method further includes: the The first data processing device sends third model information to the data evaluation device; the third model information is used to train the first encrypted business model; the first data processing device according to the information from the second data processing device The second model information to obtain the second encrypted business model.
在该实现方式中,第一数据处理装置根据来自第二数据处理装置的第二模型信息,得到第二加密业务模型,以便利用该第二加密业务模型解密得到第二业务模型。In this implementation manner, the first data processing device obtains the second encrypted business model according to the second model information from the second data processing device, so as to decrypt the second encrypted business model to obtain the second business model.
第三方面,本申请实施例提供另一种数据价值评估方法,包括:第二数据处理装置接收来自数据评估装置的第三模型信息;所述第三模型信息用于训练第一加密业务模型,所述第一加密业务模型与对属于第一数据处理装置的第一业务模型做加密处理得到的业务模型相同;所述第二数据处理装置向所述数据评估装置发送第二模型信息;所述第二模型信息用于所述数据评估装置获得第一模型信息,所述第一模型信息表征所述第二数据处理装置利用其第一本地数据训练所述一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练所述第一业务模型后的业务模型相同。In the third aspect, the embodiment of the present application provides another data value evaluation method, including: the second data processing device receives the third model information from the data evaluation device; the third model information is used to train the first encrypted business model, The first encrypted business model is the same as the business model obtained by encrypting the first business model belonging to the first data processing device; the second data processing device sends second model information to the data evaluation device; the The second model information is used by the data evaluation device to obtain the first model information, and the first model information represents the second encrypted service obtained by the second data processing device using its first local data to train the one encrypted service model Model; the second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
本申请实施例中,第二数据处理装置向数据评估装置发送第二模型信息,既能避免暴露自身的第一本地数据,又能使得数据评估装置能够评估第一本地数据对于训练第一业务模型的价值。In the embodiment of the present application, the second data processing device sends the second model information to the data evaluation device, which can not only avoid exposing its own first local data, but also enable the data evaluation device to evaluate the first local data for training the first business model the value of.
在一种可能的实现方式中,在第二数据处理装置接收来自所述数据评估装置的第三模型信息之后,所述第二数据处理装置向所述数据评估装置发送第二模型信息之前,所述方法还包括:所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模型,得到所述第二加密业务模型;所述第一加密数据由对所述第一本地数据做加密处理得到;所述第二数据处理装置根据所述第二加密业务模型,得到所述第二模型信息。In a possible implementation manner, after the second data processing device receives the third model information from the data evaluation device and before the second data processing device sends the second model information to the data evaluation device, the The method further includes: the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model; The first local data is obtained through encryption processing; the second data processing device obtains the second model information according to the second encrypted service model.
在该实现方式中,第二数据处理装置利用第一加密数据和第三模型信息训练第一加密业务模型,得到第二加密业务模型;可以使得第一本地数据的用途被限制为训练数据业务模型,即第二数据处理装置的第一本地数据不出本地。In this implementation, the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model; the use of the first local data can be limited to the training data business model , that is, the first local data of the second data processing device does not come out of the local.
在一种可能的实现方式中,所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模型,得到第二加密模型之前,所述方法还包括:所述第二数据处理装置接收来自所述数据评估装置的所述第一加密信息;所述第二数据处理装置利用所述第一加密信息对所述第一本地数据做加密处理,得到所述第一加密数据。In a possible implementation manner, the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model, and before obtaining the second encrypted model, the method further includes: The second data processing device receives the first encrypted information from the data evaluation device; the second data processing device encrypts the first local data by using the first encrypted information to obtain the First encrypt the data.
在该实现方式中,第二数据处理装置利用第一加密信息对第一本地数据做加密处理,以便得到用于训练第一加密业务模型的加密数据。In this implementation manner, the second data processing device uses the first encrypted information to encrypt the first local data, so as to obtain encrypted data for training the first encrypted business model.
在一种可能的实现方式中,所述第二数据处理装置向所述数据评估装置发送第二模型信息之后,所述方法还包括:所述第二数据处理装置接收来自所述数据评估装置的第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;所述第二数据处理装置利用所述第一本地数据训练所述第一加密业务模型,得到所述第二加密业务模型;所述第二数据处理装置向所述第一数据处理装置发送第二模型信息;所述第二模型信息用于所述第一数据处理装置解密得到第二业务模型的参数。In a possible implementation manner, after the second data processing device sends the second model information to the data evaluation device, the method further includes: the second data processing device receives information from the data evaluation device Third model information; the third model information is used to train the first encrypted business model; the second data processing device uses the first local data to train the first encrypted business model to obtain the second An encrypted business model; the second data processing device sends second model information to the first data processing device; the second model information is used by the first data processing device to decrypt to obtain parameters of the second business model.
在该实现方式中,第二数据处理装置利用第一本地数据训练第一加密业务模型,得到第二加密业务模型;可以帮助第一数据处理装置实现模型的训练。In this implementation manner, the second data processing device uses the first local data to train the first encrypted service model to obtain the second encrypted service model; it can help the first data processing device to implement model training.
第四方面,本申请实施例提供的一种数据使用权交付方法,该方法包括:数据交付装置接收来自第三数据处理装置的第五模型信息;所述第五模型信息用于训练第三加密业务模型,所述第三加密业务模型解密得到的业务模型与所述第三数据处理装置需要第四数据处理装置协助训练的未加密的第三业务模型相同;所述数据交付装置向所述第四数据处理装置发送所述第五模型信息。In a fourth aspect, the embodiment of the present application provides a data usage right delivery method, the method includes: the data delivery device receives fifth model information from the third data processing device; the fifth model information is used to train the third encryption The business model, the business model obtained by decrypting the third encrypted business model is the same as the unencrypted third business model that the third data processing device needs the assistance of the fourth data processing device to train; the data delivery device sends the The fourth data processing device sends the fifth model information.
本申请实施例中,数据交付装置向第四数据处理装置发送第五模型信息,以便该第四数据处理装置利用其本地数据和该第五模型信息训练第三加密业务模型。由于第五模型信息用于训练第三加密业务模型,因此第四数据处理装置(无法成功解密第三加密业务模型)根据该第五模型信息,不能获取未加密的业务模型。第四数据处理装置利用其本地数据训练第三加密业务模型,一方面使得第三数据处理装置不会暴露其业务模型和模型训练方法,另一方面使得第四数据处理装置的本地数据不离开本地。因此,本申请实施例中,可在第四数据处理装置(卖方)的本地数据对于第三数据处理装置(买方)完全不可见的前提下,帮助第三数据处理装置训练第二业务模型。In this embodiment of the present application, the data delivery device sends fifth model information to the fourth data processing device, so that the fourth data processing device uses its local data and the fifth model information to train the third encrypted service model. Since the fifth model information is used to train the third encrypted business model, the fourth data processing device (which cannot successfully decrypt the third encrypted business model) cannot acquire an unencrypted business model according to the fifth model information. The fourth data processing device uses its local data to train the third encrypted business model. On the one hand, the third data processing device will not expose its business model and model training method, and on the other hand, the local data of the fourth data processing device will not leave the local . Therefore, in the embodiment of the present application, the third data processing device (buyer) can be helped to train the second business model on the premise that the local data of the fourth data processing device (seller) is completely invisible to the third data processing device (buyer).
在一种可能的实现方式中,所述方法还包括:所述数据交付装置向所述第三数据处理装置发送解密私钥;所述解密私钥用于所述第三数据处理装置对第四加密业务模型做解密处理,所述第四加密业务模型由所述第四数据处理装置利用第二加密数据训练所述第三加密业务模型得到,所述第二加密数据由加密所述第四数据处理装置的第二本地数据得到,所述第四加密业务模型解密得到的第四业务模型与利用所述第二本地数据训练所述第三业务模型后的业务模型相同。In a possible implementation manner, the method further includes: the data delivery device sending a decryption private key to the third data processing device; the decryption private key is used by the third data processing device to The encrypted business model is decrypted, the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by encrypting the fourth data The second local data of the processing device is obtained, and the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model after training the third business model by using the second local data.
在该实现方式中,数据交付装置向第三数据处理装置发送解密私钥,以便该第三数据处理装置利用该解密私钥对第四加密业务模型做解密处理。In this implementation manner, the data delivery device sends the decryption private key to the third data processing device, so that the third data processing device uses the decryption private key to decrypt the fourth encrypted business model.
在一种可能的实现方式中,所述方法还包括:所述数据交付装置向所述第三数据处理装置发送第一加密信息,所述第一加密信息用于所述第三数据处理装置生成所述第五模型信息。In a possible implementation manner, the method further includes: the data delivery device sends first encrypted information to the third data processing device, and the first encrypted information is used by the third data processing device to generate The fifth model information.
在该实现方式中,数据交付装置向第三数据处理装置发送第一加密信息,以便第三数据处理装置生成第五模型信息,可以避免该第三数据处理装置暴露其模型训练方法或程序。In this implementation, the data delivery device sends the first encrypted information to the third data processing device, so that the third data processing device generates fifth model information, which can prevent the third data processing device from exposing its model training method or program.
在一种可能的实现方式中,所述方法还包括:所述数据交付装置向所述第四数据处理装置发送第一加密信息,所述第一加密信息用于所述第四数据处理装置加密其第二本地数据。In a possible implementation manner, the method further includes: the data delivery device sends first encrypted information to the fourth data processing device, and the first encrypted information is used by the fourth data processing device to encrypt Its second local data.
在该实现方式中,数据交付装置向第四数据处理装置发送第一加密信息,以便第四数据处理装置利用该第一加密信息加密其第二本地数据得到用于训练第三加密业务模型的第二加密数据。In this implementation, the data delivery device sends the first encrypted information to the fourth data processing device, so that the fourth data processing device uses the first encrypted information to encrypt its second local data to obtain the first encryption information for training the third encrypted business model. Two encrypted data.
在一种可能的实现方式中,所述数据交付装置向所述第四数据处理装置发送所述第五模 型信息包括:在检测所述第五模型信息的未存在安全性问题的情况下,所述数据交付装置向所述第四数据处理装置发送所述第五模型信息。In a possible implementation manner, the sending, by the data delivery device, the fifth model information to the fourth data processing device includes: when detecting that there is no security problem in the fifth model information, the The data delivering means sends the fifth model information to the fourth data processing means.
在该实现方式中,可以避免向第四数据处理装置发送存在安全性问题的模型信息。In this implementation manner, it is possible to avoid sending model information with security issues to the fourth data processing device.
第五方面,本申请实施例提供另一种数据使用权交付方法,该方法包括:第三数据处理装置接收来自数据交付装置的解密私钥;所述第三数据处理装置利用所述解密私钥对第四加密业务模型做解密处理,得到第四业务模型;所述第四加密业务模型由第四数据处理装置利用第二加密数据训练第三加密业务模型得到,所述第二加密数据由所述第四数据处理装置加密其第二本地数据得到,所述第四业务模型与利用所述第二本地数据训练第三业务模型后的业务模型相同,所述第三业务模型为所述第三加密业务模型对应的未加密的业务模型,且为所述第三数据处理装置需要所述第四数据处理装置协助训练的业务模型。In the fifth aspect, the embodiment of the present application provides another data usage right delivery method, the method includes: a third data processing device receives a decryption private key from the data delivery device; the third data processing device uses the decryption private key Decrypt the fourth encrypted business model to obtain the fourth business model; the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by the The fourth data processing device encrypts its second local data, and the fourth business model is the same as the business model after using the second local data to train the third business model, and the third business model is the third The encrypted business model corresponds to an unencrypted business model, and is a business model that the third data processing device needs assistance from the fourth data processing device for training.
本申请实施例中,第三数据处理装置利用解密私钥对第四加密业务模型做解密处理,得到第四业务模型;在不需要获取第四数据处理装置的本地数据的前提下,就能借助该第四数据处理装置的本地数据实现模型训练。In the embodiment of the present application, the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model; without obtaining the local data of the fourth data processing device, it can use The local data of the fourth data processing device implements model training.
在一种可能的实现方式中,在所述第三数据处理装置利用所述解密私钥对第四加密业务模型做解密处理,得到第四业务模型之前,所述方法还包括:所述第三数据处理装置向所述数据交付装置发送第五模型信息;所述第五模型信息用于训练所述第三加密业务模型;所述第三数据处理装置根据来自所述第四数据处理装置的第六模型信息,得到所述第四加密业务模型。In a possible implementation manner, before the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model, the method further includes: the third The data processing device sends fifth model information to the data delivery device; the fifth model information is used to train the third encrypted business model; the third data processing device according to the fourth data processing device Six model information to obtain the fourth encrypted service model.
在该实现方式中,第三数据处理装置向数据交付装置发送第五模型信息,可以避免其模型训练方法或程序被暴露。第三数据处理装置根据来自第四数据处理装置的第六模型信息,得到第四加密业务模型;可以利用得第四数据处理装置帮助其训练的业务模型。In this implementation manner, the third data processing device sends the fifth model information to the data delivery device, which can prevent its model training method or program from being exposed. The third data processing device obtains the fourth encrypted business model according to the sixth model information from the fourth data processing device; the business model that can be used by the fourth data processing device to help it train.
在一种可能的实现方式中,所述第三数据处理装置向所述数据交付装置发送第五模型信息之前,所述方法还包括:所述第三数据处理装置从所述数据交付装置获取第一加密信息;所述第三数据处理装置根据所述第一加密信息对第七模型信息做加密处理,得到所述第五模型信息;所述第七模型信息用于训练所述第三业务模型。In a possible implementation manner, before the third data processing device sends the fifth model information to the data delivery device, the method further includes: the third data processing device acquires the fifth model information from the data delivery device Encrypted information; the third data processing device encrypts the seventh model information according to the first encrypted information to obtain the fifth model information; the seventh model information is used to train the third business model .
在该实现方式中,第三数据处理装置根据第一加密信息对第七模型信息做加密处理;既能使得第四数据处理装置训练第三加密业务模型,又能避免模型训练方法或程序被暴露。In this implementation, the third data processing device encrypts the seventh model information according to the first encrypted information; it can not only enable the fourth data processing device to train the third encrypted business model, but also prevent the model training method or program from being exposed .
在一种可能的实现方式中,所述第三数据处理装置利用所述解密私钥对第四加密业务模型做解密处理,得到第四业务模型之后,所述方法还包括:所述第三数据处理装置利用所述第四业务模型的参数更新其本地业务模型。本申请中,得到一个业务模型可以是指得到该业务模型的参数。In a possible implementation manner, the third data processing device uses the decryption private key to decrypt the fourth encrypted business model, and after obtaining the fourth business model, the method further includes: the third data The processing means updates its local business model with parameters of said fourth business model. In this application, obtaining a business model may refer to obtaining parameters of the business model.
在该实现方式中,第三数据处理装置利用第四业务模型的参数更新其本地业务模型;可以利用第四数据处理装置帮助其实现模型的训练。In this implementation manner, the third data processing device uses the parameters of the fourth service model to update its local service model; the fourth data processing device can be used to help it implement model training.
第六方面,本申请实施例提供另一种数据使用权交付方法,该方法包括:第四数据处理装置接收来自数据交付装置的第五模型信息;所述第五模型信息用于训练第三加密业务模型;所述第四数据处理装置利用第二加密数据训练所述第三加密业务模型,得到第四加密业务模型;所述第二加密数据由所述第四数据处理装置加密其第二本地数据得到,所述第四加密业务模型解密得到的第四业务模型与利用所述第二本地数据训练第三业务模型后的业务模型相同,所述第三业务模型为所述第三加密业务模型对应的未加密的业务模型,且为所述第三数据处理装置需要所述第四数据处理装置协助训练的业务模型;所述第四数据处理装置向所述第三数据处理装置发送第六模型信息;所述第六模型信息表征所述第四加密业务模型;所述 第四加密业务模型用于所述第三数据处理装置解密得到所需的模型更新参数。In the sixth aspect, the embodiment of the present application provides another data usage right delivery method, the method includes: the fourth data processing device receives the fifth model information from the data delivery device; the fifth model information is used to train the third encryption business model; the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain a fourth encrypted business model; the second encrypted data is encrypted by the fourth data processing device in its second local The data is obtained, and the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model after using the second local data to train the third business model, and the third business model is the third encrypted business model The corresponding unencrypted business model, which is the business model that the third data processing device needs the assistance of the fourth data processing device to train; the fourth data processing device sends the sixth model to the third data processing device Information; the sixth model information represents the fourth encrypted business model; the fourth encrypted business model is used by the third data processing device to decrypt to obtain the required model update parameters.
本申请实施例中,第四数据处理装置接收来自数据交付装置的第五模型信息;第四数据处理装置利用第二加密数据训练第三加密业务模型,得到第四加密业务模型;这样可以避免第三数据处理装置的业务模型和模型训练方法被泄露。第四数据处理装置向第三数据处理装置发送第六模型信息,可以避免该第三数据处理装置获取到该第四数据处理装置的本地数据。也就是说,在第四数据处理装置的本地数据对于第三数据处理装置完全不可见的前提下,就能帮助第三数据处理装置实现业务模型的训练。In the embodiment of the present application, the fourth data processing device receives the fifth model information from the data delivery device; the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain the fourth encrypted business model; The business models and model training methods of the three data processing devices were leaked. The fourth data processing device sends the sixth model information to the third data processing device, which can prevent the third data processing device from obtaining the local data of the fourth data processing device. That is to say, on the premise that the local data of the fourth data processing device is completely invisible to the third data processing device, it can help the third data processing device to realize the training of the service model.
在一种可能的实现方式中,所述第四数据处理装置利用第二加密数据训练所述第三加密业务模型,得到第四加密业务模型之前,所述方法还包括:所述第四数据处理装置利用来自所述数据交付装置的第一加密信息对所述第二本地数据做加密处理,得到所述第二加密数据。In a possible implementation manner, the fourth data processing device uses the second encrypted data to train the third encrypted business model, and before obtaining the fourth encrypted business model, the method further includes: the fourth data processing The device encrypts the second local data by using the first encryption information from the data delivery device to obtain the second encrypted data.
在该实现方式中,第四数据处理装置利用来自数据交付装置的第一加密信息对第二本地数据做加密处理,以便得到用于训练第三加密业务模型的第二加密数据。In this implementation manner, the fourth data processing device uses the first encrypted information from the data delivery device to encrypt the second local data, so as to obtain the second encrypted data for training the third encrypted business model.
第七方面,本申请实施例提供一种数据处理装置,该数据处理装置具有实现上述第一方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块或单元。在一种可能的实现方式中,包括收发模块和处理模块,其中:所述收发模块,用于向第一数据处理装置发送第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;所述处理模块,用于根据来自所述第一数据处理装置的第一指标信息,获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能,所述第一指标信息为所述第一数据处理装置利用所述第一模型信息和所述第二加密业务模型对应的测试数据得到;所述处理模块,还用于根据所述第一性能指标和第二性能指标,评估所述第一本地数据对于训练所述第一业务模型的价值;所述第二性能指标表征所述第一业务模型的性能。In a seventh aspect, the embodiments of the present application provide a data processing device, and the data processing device has a function of implementing the behaviors in the method embodiments of the first aspect above. The functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules or units corresponding to the above functions. In a possible implementation manner, it includes a transceiver module and a processing module, wherein: the transceiver module is configured to send first model information to the first data processing device; the first model information indicates that the second data processing device utilizes The second encrypted business model obtained by training the first encrypted business model with the first local data; the second business model obtained by decrypting the second encrypted business model and the business model after using the first local data to train the first business model Similarly, the first business model is an unencrypted business model corresponding to the first encrypted business model; the processing module is configured to obtain the first performance according to the first index information from the first data processing device Index; the first performance index represents the performance of the business model after using the first local data to train the first business model, and the first index information is that the first data processing device uses the first model Information and test data corresponding to the second encrypted service model are obtained; the processing module is further configured to evaluate the effectiveness of the first local data for training the first service according to the first performance index and the second performance index The value of the model; the second performance indicator characterizes the performance of the first business model.
在一种可能的实现方式中,所述第一指标信息为所述第一数据处理装置利用加密测试数据测试所述第二加密业务模型得到,所述加密测试数据加密所述测试数据得到。In a possible implementation manner, the first index information is obtained by the first data processing device testing the second encrypted service model by using encrypted test data, and the encrypted test data is obtained by encrypting the test data.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述第二数据处理装置的第二模型信息;所述处理模块,还用于根据所述第二模型信息,获得所述第一模型信息。In a possible implementation manner, the transceiver module is further configured to receive second model information from the second data processing device; the processing module is further configured to obtain the Describe the first model information.
在一种可能的实现方式中,所述收发模块,还用于向所述第二数据处理装置发送第三模型信息;所述第三模型信息用于训练所述第一加密业务模型。In a possible implementation manner, the transceiving module is further configured to send third model information to the second data processing device; the third model information is used to train the first encrypted service model.
在一种可能的实现方式中,所述收发模块,还用于向所述第二数据处理装置发送第一加密信息;所述第一加密信息用于所述第二数据处理装置加密所述第一本地数据,所述第二加密业务模型由所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模型得到,所述第一加密数据由所述第一加密信息加密所述第一本地数据得到。In a possible implementation manner, the transceiver module is further configured to send first encrypted information to the second data processing device; the first encrypted information is used by the second data processing device to encrypt the first A local data, the second encrypted business model is obtained by the second data processing device using the first encrypted data and the third model information to train the first encrypted business model, the first encrypted data is obtained by the The first encryption information is obtained by encrypting the first local data.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述第一数据处理装置的所述第三模型信息。In a possible implementation manner, the transceiving module is further configured to receive the third model information from the first data processing device.
在一种可能的实现方式中,所述收发模块,还用于向所述第一数据处理装置发送第一加密信息;所述第一加密信息用于所述第一数据处理装置加密第四模型信息以得到所述第三模型信息,所述第四模型信息用于训练所述第一业务模型。In a possible implementation manner, the transceiver module is further configured to send first encrypted information to the first data processing device; the first encrypted information is used by the first data processing device to encrypt the fourth model information to obtain the third model information, and the fourth model information is used to train the first business model.
在一种可能的实现方式中,所述处理模块,具体用于对所述第一指标信息做解密处理, 获得所述第一性能指标。In a possible implementation manner, the processing module is specifically configured to decrypt the first indicator information to obtain the first performance indicator.
在一种可能的实现方式中,所述收发模块,还用于向所述第一数据处理装置发送解密私钥;所述解密私钥用于所述第一数据处理装置对所述第二加密业务模型做解密处理。In a possible implementation manner, the transceiver module is further configured to send a decryption private key to the first data processing device; the decryption private key is used by the first data processing device to encrypt the second The business model is decrypted.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述第一数据处理装置的第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;所述数据评估装置向所述第二数据处理装置发送所述第三模型信息。In a possible implementation manner, the transceiver module is further configured to receive third model information from the first data processing device; the third model information is used to train the first encrypted service model; The data evaluation means sends the third model information to the second data processing means.
关于第七方面或第七方面的各种可能的实施方式所带来的技术效果,可参考对于第一方面或第一方面的各种可能的实施方式的技术效果的介绍。Regarding the seventh aspect or the technical effects brought by various possible implementations of the seventh aspect, reference may be made to the introduction to the first aspect or the technical effects of various possible implementations of the first aspect.
第八方面,本申请实施例提供另一种数据处理装置,该数据处理装置具有实现上述第二方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块或单元。在一种可能的实现方式中,包括收发模块和处理模块,其中:所述收发模块,用于接收来自数据评估装置的第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;所述处理模块,用于根据所述第一模型信息和所述第二加密业务模型对应的测试数据,控制所述收发模块向所述数据评估装置发送第一指标信息;所述第一指标信息用于所述数据评估装置获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能。In an eighth aspect, the embodiment of the present application provides another data processing device, the data processing device has the function of implementing the behavior in the method embodiment of the second aspect above. The functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules or units corresponding to the above functions. In a possible implementation, it includes a transceiver module and a processing module, wherein: the transceiver module is configured to receive the first model information from the data evaluation device; the first model information represents the model information used by the second data processing device The second encrypted business model obtained by training the first encrypted business model with the first local data; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the business model obtained by using the first local data to train the first business model , the first business model is an unencrypted business model corresponding to the first encrypted business model; the processing module is configured to, according to the first model information and the test data corresponding to the second encrypted business model, Controlling the transceiver module to send first index information to the data evaluation device; the first index information is used by the data evaluation device to obtain a first performance index; the first performance index is characterized by using the first local data The performance of the business model after training the first business model.
在一种可能的实现方式中,所述处理模块,具体用于利用加密测试数据测试所述第二加密业务模型,得到所述第一指标信息;所述加密测试数据利用第一加密信息加密所述测试数据得到。In a possible implementation manner, the processing module is specifically configured to use encrypted test data to test the second encrypted business model to obtain the first index information; the encrypted test data is encrypted by using the first encrypted information. The above test data were obtained.
在一种可能的实现方式中,所述收发模块,还用于向所述数据评估装置发送第三模型信息,所述第三模型信息用于训练所述第一加密业务模型。In a possible implementation manner, the transceiving module is further configured to send third model information to the data evaluation device, where the third model information is used for training the first encrypted service model.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述数据评估装置的第一加密信息;所述处理模块,还用于利用所述第一加密信息对第四模型信息做加密处理,得到所述第三模型信息,所述第四模型信息用于训练所述第一业务模型。In a possible implementation manner, the transceiver module is further configured to receive the first encrypted information from the data evaluation device; the processing module is further configured to use the first encrypted information to update the fourth model information Perform encryption processing to obtain the third model information, and the fourth model information is used to train the first service model.
在一种可能的实现方式中,所述收发模块,还用于向所述数据评估装置发送第二性能指标,所述第二性能指标表征所述第一业务模型的性能,所述第二性能指标用于所述数据评估装置评估所述第一本地数据对于训练所述第一业务模型的价值。In a possible implementation manner, the transceiver module is further configured to send a second performance indicator to the data evaluation device, the second performance indicator represents the performance of the first business model, and the second performance The indicator is used by the data evaluating means to evaluate the value of the first local data for training the first business model.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述数据评估装置的解密私钥;所述第一数据处理装置利用所述解密私钥对所述第二加密业务模型做解密处理,得到所述第二业务模型。In a possible implementation manner, the transceiver module is further configured to receive a decryption private key from the data evaluation device; the first data processing device uses the decryption private key to encrypt the second encrypted business model Perform decryption processing to obtain the second service model.
在一种可能的实现方式中,所述收发模块,还用于向所述数据评估装置发送第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;所述收发模块,还用于根据来自所述第二数据处理装置的第二模型信息,得到所述第二加密业务模型。In a possible implementation manner, the transceiving module is further configured to send third model information to the data evaluation device; the third model information is used to train the first encrypted business model; the transceiving module is further configured to obtain the second encrypted service model according to the second model information from the second data processing device.
关于第八方面或第八方面的各种可能的实施方式所带来的技术效果,可参考对于第二方面或第二方面的各种可能的实施方式的技术效果的介绍。Regarding the eighth aspect or the technical effects brought by various possible implementation manners of the eighth aspect, reference may be made to the introduction of the second aspect or the technical effects of various possible implementation manners of the second aspect.
第九方面,本申请实施例提供另一种数据处理装置,该数据处理装置具有实现上述第三方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块或单元。在一种可能的 实现方式中,数据处理装置包括收发模块,其中:所述收发模块,用于接收来自数据评估装置的第三模型信息;所述第三模型信息用于训练第一加密业务模型,所述第一加密业务模型与对属于第一数据处理装置的第一业务模型做加密处理得到的业务模型相同;所述收发模块,还用于向所述数据评估装置发送第二模型信息;所述第二模型信息用于所述数据评估装置获得第一模型信息,所述第一模型信息表征所述第二数据处理装置利用其第一本地数据训练所述一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练所述第一业务模型后的业务模型相同。In a ninth aspect, the embodiment of the present application provides another data processing device, the data processing device has the function of implementing the behavior in the method embodiment of the third aspect above. The functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules or units corresponding to the above functions. In a possible implementation manner, the data processing device includes a transceiver module, wherein: the transceiver module is configured to receive third model information from the data evaluation device; the third model information is used to train the first encrypted business model , the first encrypted business model is the same as the business model obtained by encrypting the first business model belonging to the first data processing device; the transceiver module is further configured to send second model information to the data evaluation device; The second model information is used by the data evaluation device to obtain first model information, and the first model information represents the second data obtained by the second data processing device using its first local data to train the one encrypted service model. An encrypted business model; the second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
在一种可能的实现方式中,所述数据处理装置还包括处理模块;所述处理模块,用于利用第一加密数据和所述第三模型信息训练所述第一加密业务模型,得到所述第二加密业务模型;所述第一加密数据由对所述第一本地数据做加密处理得到;所述处理模块,还用于根据所述第二加密业务模型,得到所述第二模型信息。In a possible implementation manner, the data processing device further includes a processing module; the processing module is configured to use the first encrypted data and the third model information to train the first encrypted business model to obtain the A second encrypted business model; the first encrypted data is obtained by encrypting the first local data; the processing module is further configured to obtain the second model information according to the second encrypted business model.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述数据评估装置的所述第一加密信息;所述处理模块,还用于利用所述第一加密信息对所述第一本地数据做加密处理,得到所述第一加密数据。In a possible implementation manner, the transceiver module is further configured to receive the first encrypted information from the data evaluation device; the processing module is further configured to use the first encrypted information to process the The first local data is encrypted to obtain the first encrypted data.
在一种可能的实现方式中,所述收发模块,还用于接收来自所述数据评估装置的第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;所述处理模块,还用于利用所述第一本地数据训练所述第一加密业务模型,得到所述第二加密业务模型;所述收发模块,还用于向所述第一数据处理装置发送第二模型信息;所述第二模型信息用于所述第一数据处理装置解密得到第二业务模型的参数。In a possible implementation manner, the transceiver module is further configured to receive third model information from the data evaluation device; the third model information is used to train the first encrypted business model; the processing The module is further configured to use the first local data to train the first encrypted business model to obtain the second encrypted business model; the transceiver module is further configured to send the second model to the first data processing device information; the second model information is used by the first data processing device to decrypt to obtain parameters of the second service model.
关于第九方面或第九方面的各种可能的实施方式所带来的技术效果,可参考对于第三方面或第三方面的各种可能的实施方式的技术效果的介绍。Regarding the ninth aspect or the technical effects brought by various possible implementation manners of the ninth aspect, reference may be made to the introduction of the third aspect or the technical effects of various possible implementation manners of the third aspect.
第十方面,本申请实施例提供另一种数据处理装置,该数据处理装置具有实现上述第四方面方法实施例中的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块或单元。在一种可能的实现方式中,数据处理装置包括收发模块,其中:收发模块,用于接收来自第三数据处理装置的第五模型信息;所述第五模型信息用于训练第三加密业务模型,所述第三加密业务模型解密得到的业务模型与所述第三数据处理装置需要第四数据处理装置协助训练的未加密的第三业务模型相同;所述收发模块,还用于向所述第四数据处理装置发送所述第五模型信息。In a tenth aspect, the embodiment of the present application provides another data processing device, the data processing device has the functions in the method embodiment of the fourth aspect above. The functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules or units corresponding to the above functions. In a possible implementation manner, the data processing device includes a transceiver module, wherein: the transceiver module is configured to receive fifth model information from the third data processing device; the fifth model information is used to train the third encrypted business model The business model obtained by decrypting the third encrypted business model is the same as the unencrypted third business model that the third data processing device needs the assistance of the fourth data processing device to train; The fourth data processing device sends the fifth model information.
在一种可能的实现方式中,所述收发模块,还用于向所述第三数据处理装置发送解密私钥;所述解密私钥用于所述第三数据处理装置对第四加密业务模型做解密处理,所述第四加密业务模型由所述第四数据处理装置利用第二加密数据训练所述第三加密业务模型得到,所述第二加密数据由加密所述第四数据处理装置的第二本地数据得到,所述第四加密业务模型解密得到的第四业务模型与利用所述第二本地数据训练所述第三业务模型后的业务模型相同。In a possible implementation manner, the transceiver module is further configured to send a decryption private key to the third data processing device; the decryption private key is used by the third data processing device to performing decryption processing, the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by encrypting the fourth data processing device The second local data is obtained, and the fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model obtained by using the second local data to train the third business model.
在一种可能的实现方式中,所述收发模块,还用于向所述第三数据处理装置发送第一加密信息,所述第一加密信息用于所述第三数据处理装置生成所述第五模型信息。In a possible implementation manner, the transceiver module is further configured to send first encrypted information to the third data processing device, where the first encrypted information is used by the third data processing device to generate the first Five model information.
在一种可能的实现方式中,所述收发模块,还用于向所述第四数据处理装置发送第一加密信息,所述第一加密信息用于所述第四数据处理装置加密其第二本地数据。In a possible implementation manner, the transceiver module is further configured to send first encrypted information to the fourth data processing device, and the first encrypted information is used by the fourth data processing device to encrypt its second local data.
在一种可能的实现方式中,所述收发模块,具体用于在检测所述第五模型信息的未存在安全性问题的情况下,向所述第四数据处理装置发送所述第五模型信息。In a possible implementation manner, the transceiving module is specifically configured to send the fifth model information to the fourth data processing device when it is detected that there is no security problem in the fifth model information .
关于第十方面或第十方面的各种可能的实施方式所带来的技术效果,可参考对于第四方面或第四方面的各种可能的实施方式的技术效果的介绍。Regarding the technical effects brought by the tenth aspect or various possible implementation manners of the tenth aspect, reference may be made to the introduction of the fourth aspect or the technical effects of various possible implementation manners of the fourth aspect.
第十一方面,本申请实施例提供另一种数据处理装置,该数据处理装置具有实现上述第五方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块或单元。在一种可能的实现方式中,数据处理装置包括收发模块和处理模块,其中:所述收发模块,用于接收来自数据交付装置的解密私钥;所述处理模块,用于利用所述解密私钥对第四加密业务模型做解密处理,得到第四业务模型;所述第四加密业务模型由第四数据处理装置利用第二加密数据训练第三加密业务模型得到,所述第二加密数据由所述第四数据处理装置加密其第二本地数据得到,所述第四业务模型与利用所述第二本地数据训练第三业务模型后的业务模型相同,所述第三业务模型为所述第三加密业务模型对应的未加密的业务模型,且为所述第三数据处理装置需要所述第四数据处理装置协助训练的业务模型。In an eleventh aspect, the embodiment of the present application provides another data processing device, the data processing device has the function of implementing the behavior in the method embodiment of the fifth aspect above. The functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules or units corresponding to the above functions. In a possible implementation manner, the data processing device includes a transceiver module and a processing module, wherein: the transceiver module is configured to receive a decryption private key from the data delivery device; the processing module is configured to use the decryption private key key to decrypt the fourth encrypted business model to obtain the fourth business model; the fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model, and the second encrypted data is obtained by The fourth data processing device obtains by encrypting its second local data, the fourth business model is the same as the business model after using the second local data to train the third business model, and the third business model is the first The three encrypted business models correspond to unencrypted business models, and are business models that the third data processing device needs the assistance of the fourth data processing device to train.
在一种可能的实现方式中,所述收发模块,还用于向所述数据交付装置发送第五模型信息;所述第五模型信息用于训练所述第三加密业务模型;所述处理模块,还用于根据来自所述第四数据处理装置的第六模型信息,得到所述第四加密业务模型。In a possible implementation manner, the transceiver module is further configured to send fifth model information to the data delivery device; the fifth model information is used to train the third encrypted service model; the processing module is further configured to obtain the fourth encrypted service model according to the sixth model information from the fourth data processing device.
在一种可能的实现方式中,所述处理模块,还用于通过所述收发模块从所述数据交付装置获取第一加密信息;根据所述第一加密信息对第七模型信息做加密处理,得到所述第五模型信息;所述第七模型信息用于训练所述第三业务模型。In a possible implementation manner, the processing module is further configured to obtain first encrypted information from the data delivery device through the transceiver module; perform encryption processing on the seventh model information according to the first encrypted information, The fifth model information is obtained; the seventh model information is used to train the third service model.
在一种可能的实现方式中,所述处理模块,还用于利用所述第四业务模型的参数更新其本地业务模型。In a possible implementation manner, the processing module is further configured to use parameters of the fourth service model to update its local service model.
关于第十一方面或第十一方面的各种可能的实施方式所带来的技术效果,可参考对于第五方面或第五方面的各种可能的实施方式的技术效果的介绍。For the technical effects of the eleventh aspect or various possible implementations of the eleventh aspect, reference may be made to the introduction of the fifth aspect or the technical effects of various possible implementations of the fifth aspect.
第十二方面,本申请实施例提供另一种数据处理装置,该数据处理装置具有实现上述第六方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块或单元。在一种可能的实现方式中,数据处理装置包括收发模块,其中:所述收发模块,用于接收来自数据交付装置的第五模型信息;所述第五模型信息用于训练第三加密业务模型;所述第四数据处理装置利用第二加密数据训练所述第三加密业务模型,得到第四加密业务模型;所述第二加密数据由所述第四数据处理装置加密其第二本地数据得到,所述第四加密业务模型解密得到的第四业务模型与利用所述第二本地数据训练第三业务模型后的业务模型相同,所述第三业务模型为所述第三加密业务模型对应的未加密的业务模型,且为所述第三数据处理装置需要所述第四数据处理装置协助训练的业务模型;所述收发模块,还用于向所述第三数据处理装置发送第六模型信息;所述第六模型信息表征所述第四加密业务模型;所述第四加密业务模型用于所述第三数据处理装置解密得到所需的模型更新参数。In a twelfth aspect, the embodiment of the present application provides another data processing device, which has the function of implementing the behavior in the method embodiment of the sixth aspect above. The functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules or units corresponding to the above functions. In a possible implementation manner, the data processing device includes a transceiver module, where: the transceiver module is configured to receive fifth model information from the data delivery device; the fifth model information is used to train the third encrypted business model The fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain a fourth encrypted business model; the second encrypted data is obtained by encrypting its second local data by the fourth data processing device The fourth business model obtained by decrypting the fourth encrypted business model is the same as the business model after using the second local data to train the third business model, and the third business model corresponds to the third encrypted business model An unencrypted business model, which is a business model that the third data processing device needs the assistance of the fourth data processing device to train; the transceiver module is also configured to send sixth model information to the third data processing device The sixth model information represents the fourth encrypted business model; the fourth encrypted business model is used by the third data processing device to decrypt to obtain the required model update parameters.
在一种可能的实现方式中,所述数据处理装置还包括处理模块;所述处理模块,用于利用来自所述数据交付装置的第一加密信息对所述第二本地数据做加密处理,得到所述第二加密数据。In a possible implementation manner, the data processing device further includes a processing module; the processing module is configured to encrypt the second local data by using the first encryption information from the data delivery device to obtain The second encrypted data.
关于第十二方面或第十二方面的各种可能的实施方式所带来的技术效果,可参考对于第六方面或第六方面的各种可能的实施方式的技术效果的介绍。Regarding the technical effects brought about by the twelfth aspect or various possible implementation manners of the twelfth aspect, reference may be made to the introduction of the sixth aspect or the technical effects of various possible implementation manners of the sixth aspect.
第十三方面,本申请提供一种服务器,该服务器包括处理器,该处理器可以用于执行存储器所存储的计算机执行指令,以使上述第一方面或第一方面的任意可能的实现方式所示的方法被执行,或者以使上述第二方面或第二方面的任意可能的实现方式所示的方法被执行,或者以使上述第三方面或第三方面的任意可能的实现方式所示的方法被执行,或者以使上述 第四方面或第四方面的任意可能的实现方式所示的方法被执行,或者以使上述第五方面或第五方面的任意可能的实现方式所示的方法被执行,或者以使上述第六方面或第六方面的任意可能的实现方式所示的方法被执行。In a thirteenth aspect, the present application provides a server, the server includes a processor, and the processor can be used to execute computer-executed instructions stored in the memory, so that the above-mentioned first aspect or any possible implementation of the first aspect The method shown in the above-mentioned second aspect or any possible implementation of the second aspect is executed, or the method shown in the above-mentioned third aspect or any possible implementation of the third aspect is executed. The method is executed, or the method shown in the fourth aspect or any possible implementation of the fourth aspect is executed, or the method shown in the fifth aspect or any possible implementation of the fifth aspect is executed Execute, or enable the method shown in the sixth aspect or any possible implementation manner of the sixth aspect to be executed.
本申请实施例中,在执行上述方法的过程中,上述方法中有关发送信息的过程,可以理解为基于处理器的指令进行输出信息的过程。在输出信息时,处理器将信息输出给收发器,以便由收发器进行发射。该信息在由处理器输出之后,还可能需要进行其他的处理,然后到达收发器。类似的,处理器接收输入的信息时,收发器接收该信息,并将其输入处理器。更进一步的,在收发器收到该信息之后,该信息可能需要进行其他的处理,然后才输入处理器。In the embodiment of the present application, in the process of executing the above method, the process of sending information in the above method can be understood as the process of outputting information based on the instructions of the processor. In outputting information, the processor outputs the information to the transceiver for transmission by the transceiver. After the information is output by the processor, it may also need to undergo other processing before reaching the transceiver. Similarly, when the processor receives incoming information, the transceiver receives that information and inputs it to the processor. Furthermore, after the transceiver receives the information, the information may require other processing before being input to the processor.
对于处理器所涉及的发送和/或接收等操作,如果没有特殊说明,或者,如果未与其在相关描述中的实际作用或者内在逻辑相抵触,则可以一般性的理解为基于处理器的指令输出。For the sending and/or receiving operations involved in the processor, if there is no special description, or if it does not conflict with its actual function or internal logic in the relevant description, it can be generally understood as the instruction output based on the processor .
在实现过程中,上述处理器可以是专门用于执行这些方法的处理器,也可以是执行存储器中的计算机指令来执行这些方法的处理器,例如通用处理器等。例如,处理器还可以用于执行存储器中存储的程序,当该程序被执行时,使得该数据处理装置执行如上述第一方面或第一方面的任意可能的实现方式所示的方法。在一种可能的实现方式中,存储器位于上述数据处理装置之外。在一种可能的实现方式中,存储器位于上述数据处理装置之内。During implementation, the above-mentioned processor may be a processor dedicated to performing these methods, or may be a processor that executes computer instructions in a memory to perform these methods, such as a general-purpose processor. For example, the processor may also be used to execute a program stored in the memory. When the program is executed, the data processing device is made to execute the method as shown in the first aspect or any possible implementation manner of the first aspect. In a possible implementation manner, the memory is located outside the data processing device. In a possible implementation manner, the memory is located in the above data processing device.
本申请实施例中,处理器和存储器还可能集成于一个器件中,即处理器和存储器还可能被集成于一起。In the embodiment of the present application, the processor and the memory may also be integrated into one device, that is, the processor and the memory may also be integrated together.
在一种可能的实现方式中,数据处理装置还包括收发器,该收发器,用于接收报文或发送报文等。In a possible implementation manner, the data processing apparatus further includes a transceiver, where the transceiver is configured to receive a message or send a message, and the like.
第十四方面,本申请提供一种数据处理装置,该数据处理装置包括处理电路和接口电路,该接口电路用于获取数据或输出数据;处理电路用于执行如上述第一方面或第一方面的任意可能的实现方式所示的相应的方法,或者处理电路用于执行如上述第二方面或第二方面的任意可能的实现方式所示的相应的方法,或者处理电路用于执行如上述第三方面或第三方面的任意可能的实现方式所示的相应的方法,或者处理电路用于执行如上述第四方面或第四方面的任意可能的实现方式所示的相应的方法,或者处理电路用于执行如上述第五方面或第五方面的任意可能的实现方式所示的相应的方法,或者处理电路用于执行如上述第六方面或第六方面的任意可能的实现方式所示的相应的方法。In a fourteenth aspect, the present application provides a data processing device, the data processing device includes a processing circuit and an interface circuit, and the interface circuit is used to obtain data or output data; the processing circuit is used to perform the above-mentioned first aspect or the first aspect The corresponding method shown in any possible implementation manner of the second aspect, or the processing circuit is used to execute the corresponding method shown in the second aspect or any possible implementation manner of the second aspect, or the processing circuit is used to execute the corresponding method shown in the first aspect above The corresponding method shown in the third aspect or any possible implementation of the third aspect, or the processing circuit is used to execute the corresponding method shown in the fourth aspect or any possible implementation of the fourth aspect, or the processing circuit For performing the corresponding method as shown in the above fifth aspect or any possible implementation of the fifth aspect, or the processing circuit is used for performing the corresponding method as shown in the above sixth aspect or any possible implementation of the sixth aspect Methods.
第十五方面,本申请提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序,当其在计算机上运行时,使得上述第一方面或第一方面的任意可能的实现方式所示的方法被执行,或者使得上述第二方面或第二方面的任意可能的实现方式所示的方法被执行,或者使得上述第三方面或第三方面的任意可能的实现方式所示的方法被执行,或者使得上述第四方面或第四方面的任意可能的实现方式所示的方法被执行,或者使得上述第五方面或第五方面的任意可能的实现方式所示的方法被执行,或者使得上述第六方面或第六方面的任意可能的实现方式所示的方法被执行。In a fifteenth aspect, the present application provides a computer-readable storage medium, which is used to store a computer program, and when it is run on a computer, the above-mentioned first aspect or any possible implementation of the first aspect can be realized The method shown in the manner is executed, or the method shown in the second aspect or any possible implementation of the second aspect is executed, or the method shown in the third aspect or any possible implementation of the third aspect is executed. The method is executed, or the method shown in the fourth aspect or any possible implementation manner of the fourth aspect is executed, or the method shown in the fifth aspect or any possible implementation manner of the fifth aspect is executed, Or the method shown in the sixth aspect or any possible implementation manner of the sixth aspect is executed.
第十六方面,本申请提供一种计算机程序产品,该计算机程序产品包括计算机程序或计算机代码,当其在计算机上运行时,使得上述第一方面或第一方面的任意可能的实现方式所示的方法被执行,或者使得上述第二方面或第二方面的任意可能的实现方式所示的方法被执行,或者使得上述第三方面或第三方面的任意可能的实现方式所示的方法被执行,或者使得上述第四方面或第四方面的任意可能的实现方式所示的方法被执行,或者使得上述第五方面或第五方面的任意可能的实现方式所示的方法被执行,或者使得上述第六方面或第六方面的任意可能的实现方式所示的方法被执行。In a sixteenth aspect, the present application provides a computer program product, the computer program product includes a computer program or computer code, and when it is run on a computer, the above-mentioned first aspect or any possible implementation of the first aspect shows The method is executed, or the method shown in the second aspect or any possible implementation of the second aspect is executed, or the method shown in the third aspect or any possible implementation of the third aspect is executed , or make the above fourth aspect or the method shown in any possible implementation of the fourth aspect be executed, or cause the above fifth aspect or the method shown in any possible implementation of the fifth aspect to be executed, or make the above The method shown in the sixth aspect or any possible implementation manner of the sixth aspect is executed.
第十七方面,本申请提供一种数据价值评估系统,包括上述第七方面或第七方面的任意可能的实现方式所述的数据评估装置、上述第八方面或第八方面的任意可能的实现方式所述的数据处理装置以及上述第九方面或第九方面的任意可能的实现方式所述的数据处理装置。In the seventeenth aspect, the present application provides a data value evaluation system, including the data evaluation device described in the seventh aspect or any possible implementation of the seventh aspect, and the eighth aspect or any possible implementation of the eighth aspect The data processing device described in the manner and the data processing device described in the ninth aspect or any possible implementation of the ninth aspect.
第十八方面,本申请提供一种数据使用权交付系统,包括上述第十方面或第十方面的任意可能的实现方式所述的数据交付装置、上述第十一方面或第十一方面的任意可能的实现方式所述的数据处理装置以及上述第十二方面或第十二方面的任意可能的实现方式所述的数据处理装置。In an eighteenth aspect, the present application provides a data usage right delivery system, including the data delivery device described in the above tenth aspect or any possible implementation of the tenth aspect, any of the above eleventh aspect or the eleventh aspect The data processing device described in a possible implementation manner and the data processing device described in the above twelfth aspect or any possible implementation manner of the twelfth aspect.
附图说明Description of drawings
为了更清楚地说明本申请实施例或背景技术中的技术方案,下面将对本申请实施例或背景技术中所需要使用的附图进行说明。In order to more clearly illustrate the technical solutions in the embodiment of the present application or the background art, the following will describe the drawings that need to be used in the embodiment of the present application or the background art.
图1为本申请实施例提供的一种数据价值评估系统的示意图;FIG. 1 is a schematic diagram of a data value evaluation system provided by an embodiment of the present application;
图2为本申请实施例提供的一种数据使用权交付系统的示意图;FIG. 2 is a schematic diagram of a data usage right delivery system provided by an embodiment of the present application;
图3为本申请实施例提供的一种数据价值评估方法交互流程图;Fig. 3 is an interactive flowchart of a data value evaluation method provided by the embodiment of the present application;
图4为本申请实施例提供的另一种数据价值评估方法交互流程图;Fig. 4 is an interactive flowchart of another data value evaluation method provided by the embodiment of the present application;
图5为本申请实施例提供的一种数据价值评估方法流程图;Fig. 5 is a flow chart of a data value evaluation method provided by the embodiment of the present application;
图6为本申请实施例提供的另一种数据价值评估方法流程图;FIG. 6 is a flow chart of another data value evaluation method provided in the embodiment of the present application;
图7为本申请实施例提供的另一种数据价值评估方法流程图;FIG. 7 is a flow chart of another data value evaluation method provided in the embodiment of the present application;
图8为本申请实施例提供的另一种数据价值评估方法流程图;FIG. 8 is a flow chart of another data value evaluation method provided in the embodiment of the present application;
图9为本申请实施例提供的另一种数据价值评估方法流程图;FIG. 9 is a flow chart of another data value evaluation method provided in the embodiment of the present application;
图10为本申请实施例提供的另一种数据价值评估方法流程图;FIG. 10 is a flow chart of another data value evaluation method provided in the embodiment of the present application;
图11为本申请实施例提供的一种数据使用权交付方法交互流程图;Fig. 11 is an interactive flowchart of a data usage right delivery method provided by the embodiment of the present application;
图12为本申请实施例提供的一种数据使用权交付方法流程图;Fig. 12 is a flow chart of a data usage right delivery method provided by the embodiment of the present application;
图13为本申请实施例提供的另一种数据使用权交付方法流程图;FIG. 13 is a flow chart of another data usage right delivery method provided by the embodiment of the present application;
图14为本申请实施例提供的另一种数据使用权交付方法流程图;Fig. 14 is a flow chart of another data usage right delivery method provided by the embodiment of the present application;
图15为本申请实施例提供的一种数据评估与使用权交付方法交互流程图;Fig. 15 is an interactive flowchart of a data evaluation and use right delivery method provided by the embodiment of the present application;
图16示出了一种数据处理装置1600的结构示意图;FIG. 16 shows a schematic structural diagram of a data processing device 1600;
图17为本申请实施例提供的另一种数据处理装置170的结构示意图;FIG. 17 is a schematic structural diagram of another data processing device 170 provided in the embodiment of the present application;
图18为本申请实施例提供的另一种数据处理装置180的结构示意图。FIG. 18 is a schematic structural diagram of another data processing device 180 provided by an embodiment of the present application.
具体实施方式Detailed ways
本申请实施例的说明书、权利要求书及附图中的术语“第一”和“第二”等仅用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备等,没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元等,或可选地还包括对于这些过程、方法、产品或设备等固有的其它步骤或单元。The terms "first" and "second" in the description, claims, and drawings of the embodiments of the present application are only used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units that are not listed, or optionally It also includes other steps or units inherent to these processes, methods, products, or devices.
在本文中提及的“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员可以显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described herein can be combined with other embodiments.
本申请以下实施例中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本申请的限制。如在本申请的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“所述”、“上述”、“该”和“这一”旨在也包括复数表达形式,除非其上下文中明确地有相反指示。还应当理解,本申请中使用的术语“和/或”是指并包含一个或多个所列出项目的任何或所有可能组合。例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。本申请中使用的术语“多个”是指两个或两个以上。The terms used in the following embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. As used in the specification and appended claims of this application, the singular expressions "a", "an", "said", "above", "the" and "this" are intended to also Plural expressions are included unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in this application refers to and includes any and all possible combinations of one or more of the listed items. For example, "A and/or B" can mean: there are only A, only B, and both A and B, where A and B can be singular or plural. The term "plurality" as used in this application means two or more.
下面首先介绍本申请实施例中所使用的术语。The terms used in the embodiments of the present application are firstly introduced below.
同态加密(homomorphicrncryption):对经过同态加密的数据进行处理得到一个输出,将这一输出进行解密,其结果与用同一方法处理未加密的原始数据得到的输出结果是一样的。同态加密是基于数学难题的计算复杂性理论的密码学技术。本质上,同态加密是指这样一种加密函数,对明文进行环上的加法和乘法运算再加密,与加密后对密文进行相应的运算,结果是等价的。由于这个良好的性质,人们可以委托第三方对数据进行处理而不泄露信息。具有同态性质的加密函数是指两个明文a、b满足
Figure PCTCN2021133297-appb-000001
的加密函数,其中En是加密运算,Dec是解密运算,⊙、
Figure PCTCN2021133297-appb-000002
分别对应明文和密文域上的运算。当
Figure PCTCN2021133297-appb-000003
代表加法时,称该加密为加同态加密:当
Figure PCTCN2021133297-appb-000004
代表乘法时,称该加密为乘同态加密。全同态加密是指同时满足加同态和乘同态性质,可以进行任意多次加和乘运算的加密函数。用数学公式来表达,即Dec(f(En(m1),En(m2),…,En(mk)))=f(m1,m2,…,mk),或写成:f(En(m1),En(m2),…,En(mk))=En(f(m1,m2,…,mk)),如果f是任意函数,称为全同态加密。全同态加密体制,可以在不解密的条件下对加密数据进行任何可以在明文上进行的运算,使得对加密信息仍能进行深入和无限的分析,而不会影响其保密性。
Homomorphic encryption (homomorphic encryption): processing the homomorphically encrypted data to obtain an output, and decrypting this output, the result is the same as the output obtained by processing the unencrypted original data in the same way. Homomorphic encryption is a cryptographic technique based on computational complexity theory of mathematical puzzles. In essence, homomorphic encryption refers to such an encryption function, which performs ring addition and multiplication operations on the plaintext and re-encrypts, and performs corresponding operations on the ciphertext after encryption, and the result is equivalent. Due to this good nature, people can entrust a third party to process the data without disclosing the information. An encryption function with homomorphic properties means that two plaintexts a and b satisfy
Figure PCTCN2021133297-appb-000001
Encryption function, where En is the encryption operation, Dec is the decryption operation, ⊙,
Figure PCTCN2021133297-appb-000002
Corresponding to operations on plaintext and ciphertext domains, respectively. when
Figure PCTCN2021133297-appb-000003
When represents addition, the encryption is called additive homomorphic encryption: when
Figure PCTCN2021133297-appb-000004
When stands for multiplication, the encryption is called multiplicative homomorphic encryption. Fully homomorphic encryption refers to an encryption function that satisfies both the homomorphic and homomorphic properties of addition and multiplication, and can perform any number of addition and multiplication operations. Expressed in mathematical formulas, namely Dec(f(En(m1), En(m2),...,En(mk)))=f(m1, m2,...,mk), or written as: f(En(m1) , En(m2),..., En(mk))=En(f(m1, m2,...,mk)), if f is an arbitrary function, it is called fully homomorphic encryption. The fully homomorphic encryption system can perform any operation on the encrypted data that can be performed on the plaintext without decryption, so that the encrypted information can still be deeply and infinitely analyzed without affecting its confidentiality.
开发高质量的新能源汽车数据业务模型的关键在于高质量的车辆运行数据。当前,虽然汽车主机厂和各级政府监管平台上存储着大量新能源汽车的运行数据,但是这些数据的质量普遍不高,存在大量的缺失、错误的问题,而且这些数据通常缺少车辆状态标签。对于数据业务模型的开发而言,真正有价值的是那些发生异常车辆的数据。但是,这些异常车辆的数据产生的量较少,而且确定车辆异常类型需要投入人力标注。因此,这些带有人工标注的车辆异常数据都属于各大汽车主机厂的机密数据,严格管控,几乎没有流动性,使得数量稀少但高价值的车辆异常数据分散于各大汽车主机厂之间,形成一个个数据孤岛。这些宝贵的车辆数据价值没有得到充分的挖掘,造成了巨大资源浪费现象。The key to developing a high-quality new energy vehicle data business model lies in high-quality vehicle operation data. At present, although automobile OEMs and government regulatory platforms at all levels store a large amount of operating data of new energy vehicles, the quality of these data is generally not high, there are a lot of missing and wrong problems, and these data usually lack vehicle status labels. For the development of data business models, the real value is the data of those abnormal vehicles. However, the amount of data generated for these abnormal vehicles is small, and determining the abnormal type of the vehicle requires human labeling. Therefore, these abnormal vehicle data with manual annotations belong to the confidential data of major automobile OEMs. They are strictly controlled and have almost no liquidity, which makes the rare but high-value abnormal vehicle data scattered among major automobile OEMs. Form a data island. The value of these valuable vehicle data has not been fully tapped, resulting in a huge waste of resources.
目前,开发新能源汽车业务模型(数据业务模型的示例)利用数据的方式不能打通各汽车主机厂之间的数据通道,即数据的流动性问题没有得到根本解决,导致开发新能源汽车业务模型的汽车主机厂或者第三方的汽车零部件供应商对高质量车辆数据的需求难以满足。对汽车主机厂或者第三方的汽车零部件供应商来说,由于不能准确地评估不同车辆数据对于其开发数据业务模型的价值,因此不知道需要使用哪些车辆数据来开发其数据业务模型,也不知道使用这些车辆数据支付多少报酬比较合理。可见,数据的流动性问题没有得到根本解决的一个障碍在于,不能准确地评估车辆数据对于开发数据业务模型的价值。数据的流动性问题没有得到根本解决的另一个障碍在于,如何在不暴露买方开发的数据业务模型(或开发数据业务模型的方法)和卖方不暴露数据的前提下,完成买方和卖方之间的数据交付。At present, the way of developing new energy vehicle business models (an example of data business models) using data cannot open up the data channel between various automobile OEMs, that is, the problem of data mobility has not been fundamentally resolved, resulting in the development of new energy vehicle business models. It is difficult for automobile OEMs or third-party auto parts suppliers to meet the demand for high-quality vehicle data. For automobile OEMs or third-party auto parts suppliers, because they cannot accurately evaluate the value of different vehicle data for their data business model development, they do not know which vehicle data to use to develop their data business models, nor It makes sense to know how much you will be paid for using this vehicle data. It can be seen that one of the obstacles to the fundamental solution to the mobility of data lies in the inability to accurately evaluate the value of vehicle data for the development of data business models. Another obstacle that has not fundamentally solved the problem of data liquidity is how to complete the transaction between the buyer and the seller without exposing the data business model developed by the buyer (or the method of developing the data business model) and the seller without exposing the data. data delivery.
为解决数据的流动性问题,需要研究如何准确地评估车辆数据对于开发数据业务模型的价值以及如何完成买方和卖方之间的数据交付。本申请实施例提供的数据价值评估方法,能够准确地评估车辆数据对于训练数据业务模型的价值的方案。本申请实施例提供的数据价值 评估方法不仅可用于评估车辆数据对于训练数据业务模型的价值,还可以评估任意数据(例如新能源汽车充电桩数据、同一行业不同组织之间数据结构类似的数据等)对于任意对象(例如待训练模型)来说的使用价值,即数据的使用权的价值。采用本申请实施例提供的数据价值评估方法评估数据的使用权的价值具有以下优势:可以让买方不暴露其开发的数据业务模型或开发数据业务模型的方法,例如数据处理和模型训练方法,并且在卖方不暴露其数据细节的前提下,输出卖方数据对于买方的价值。进一步地,本申请实施例还提供了数据使用权交付方法,利用该方法可交易数据的使用权,并保证交易双方数据的安全。采用本申请提供的数据使用权交付方法交付数据的使用权的价值具有以下优势:交付的是数据的使用权,卖方的数据不离开本地,数据的用途被限制为开发买方的数据业务模型。在卖方数据的详细数值对于买方完全不可见的前提下,帮助买方实现数据业务模型的开发。满足卖方数据隐私安全保护的前提下,发挥卖方数据的潜在价值。本申请提供的数据使用权交付方法是交易数据的使用权而不是数据所有权,而且数据的用途限定为训练数据业务模型,买方购买的是卖方数据帮助其训练模型的服务。买方购买数据的使用权之后,可以基于数据交易系统搭建一个买方主导的联邦学习架构,在该架构中买方可以获取卖方数据每一轮模型训练后的最新参数,而不需要向卖方提供所更新模型的最新参数。下面以评估车辆数据对于训练数据业务模型的价值为例,介绍本申请提供的数据价值评估方法;以交付车辆数据的使用权为例,介绍本申请实施例提供的数据使用权交付方法。In order to solve the problem of data mobility, it is necessary to study how to accurately evaluate the value of vehicle data for the development of data business models and how to complete the data delivery between buyers and sellers. The data value evaluation method provided in the embodiment of the present application can accurately evaluate the value of vehicle data for the training data business model. The data value evaluation method provided by the embodiment of this application can not only be used to evaluate the value of vehicle data for training data business models, but also can evaluate arbitrary data (such as new energy vehicle charging pile data, data with similar data structures between different organizations in the same industry, etc. ) for any object (such as a model to be trained), that is, the value of the right to use the data. Using the data value evaluation method provided by the embodiment of the present application to evaluate the value of data use rights has the following advantages: the buyer does not expose the data business model or the method of developing the data business model, such as data processing and model training methods, and On the premise that the seller does not disclose its data details, output the value of the seller's data to the buyer. Further, the embodiment of the present application also provides a data usage right delivery method, by which the data usage right can be traded, and the data security of both transaction parties can be guaranteed. Using the data usage right delivery method provided in this application to deliver the value of the data usage right has the following advantages: what is delivered is the data usage right, the seller's data does not leave the local area, and the use of the data is limited to the development of the buyer's data business model. On the premise that the detailed value of the seller's data is completely invisible to the buyer, it helps the buyer realize the development of the data business model. Under the premise of satisfying the privacy and security protection of the seller's data, the potential value of the seller's data can be brought into play. The delivery method of data usage rights provided by this application is the usage rights of transaction data rather than data ownership, and the use of data is limited to training data business models, and the buyer purchases the seller's data to help it train the service of the model. After the buyer purchases the right to use the data, a buyer-led federated learning architecture can be built based on the data trading system. In this architecture, the buyer can obtain the latest parameters of the seller's data after each round of model training without providing the seller with an updated model. The latest parameters of . The following uses evaluating the value of vehicle data for the training data business model as an example to introduce the data value evaluation method provided by this application; taking the delivery of vehicle data usage rights as an example to introduce the data usage right delivery method provided by this embodiment of the application.
图1为本申请实施例提供的一种数据价值评估系统的示意图。如图1所示,该数据价值评估系统包括:数据评估装置(可视为运行有数据交易系统的服务器)、一个或多个买方的数据处理装置(图1中仅示出的第一数据处理装置作为买方的数据处理装置的示例)以及一个或多个卖方的数据处理装置(图1中示出的第二数据处理装置作为卖方的数据处理装置的示例)。本申请中,出于简便的目的,买方的数据处理装置可简称为买方,卖方的数据处理装置可简称为卖方。买方的数据处理装置是指买方用于训练数据业务模型的装置,买方对其数据处理装置具有使用权或所有权。卖方的数据处理装置是指卖方用于存储器本地数据且可实现数据处理功能的装置,卖方对其数据处理装置具有使用权或所有权。第一数据处理装置和第二数据处理装置可均为具备数据处理和存储能力的装置或设备,例如服务器。由于本申请实施例提供的数据评估装置可提供数据价值评估功能,因此该数据评估装置可视为一种数据价值评估平台产品。买方可通过数据价值评估平台产品来评估卖方的数据对于其开发数据业务模型的价值,例如训练任意数据业务模型的价值。Fig. 1 is a schematic diagram of a data value evaluation system provided by an embodiment of the present application. As shown in Figure 1, the data value evaluation system includes: a data evaluation device (which can be regarded as a server running a data transaction system), one or more buyers' data processing devices (only the first data processing device shown in Figure 1 device as an example of a buyer's data processing device) and one or more seller's data processing devices (the second data processing device shown in FIG. 1 as an example of a seller's data processing device). In this application, for the sake of simplicity, the data processing device of the buyer may be referred to as the buyer for short, and the data processing device of the seller may be referred to as the seller for short. The buyer's data processing device refers to the device used by the buyer to train the data business model, and the buyer has the right to use or own the data processing device. The seller's data processing device refers to the device used by the seller to store local data and realize data processing functions, and the seller has the right to use or ownership of its data processing device. Both the first data processing device and the second data processing device may be devices or devices capable of data processing and storage, such as servers. Since the data evaluation device provided in the embodiment of the present application can provide a data value evaluation function, the data evaluation device can be regarded as a data value evaluation platform product. The buyer can use the data value evaluation platform products to evaluate the value of the seller's data for its data business model development, such as the value of training any data business model.
在一些实施例中,数据价值评估平台的特征在于:输入一:买方的数据处理和训练模型的方法或程序,以及买方的初始数据模型的性能指标;输入二:卖方使用买方提供的数据处理和训练模型的方法或程序,训练得到的模型的参数。输出:买方使用卖方数据训练的模型参数,更新初始数据模型的参数后,模型性能提升的百分比和卖方数据的价值。In some embodiments, the data value evaluation platform is characterized by: input one: the buyer's data processing and training model method or program, and the buyer's initial data model performance indicators; input two: the seller uses the data processing and training provided by the buyer The method or program for training the model, and the parameters of the trained model. Output: The model parameters trained by the buyer using the seller's data, after updating the parameters of the initial data model, the percentage of model performance improvement and the value of the seller's data.
图2为本申请实施例提供的一种数据使用权交付系统的示意图。如图2所示,该数据使用权交付系统包括:数据交付装置(可视为运行有数据使用权交付系统的服务器)、一个或多个买方的数据处理装置(图2中仅示出的第三数据处理装置作为买方的数据处理装置的示例)以及一个或多个卖方的数据处理装置(图2中示出的第四数据处理装置作为卖方的数据处理装置的示例)。第三数据处理装置和第四数据处理装置可均为具备数据处理和存储能力的装置或设备,例如服务器。由于本申请提供的数据交付装置可提供数据使用权的交付功能(即将卖方数据的使用权交付给买方的功能),因此该数据交付装置可视为一种数据使用权交付平台产品。买方可通过数据使用权交付平台产品来购买卖方数据的使用权,即使用卖方数据的权 利。FIG. 2 is a schematic diagram of a data usage right delivery system provided by an embodiment of the present application. As shown in Figure 2, the data usage right delivery system includes: a data delivery device (which can be regarded as a server running the data usage right delivery system), one or more buyer's data processing devices (only the first one shown in Figure 2 three data processing devices as an example of a buyer's data processing device) and one or more seller's data processing devices (a fourth data processing device shown in FIG. 2 as an example of a seller's data processing device). Both the third data processing device and the fourth data processing device may be devices or devices capable of data processing and storage, such as servers. Since the data delivery device provided in this application can provide the delivery function of the data usage right (that is, the function of delivering the seller's data usage right to the buyer), the data delivery device can be regarded as a data usage right delivery platform product. The buyer can purchase the right to use the seller's data through the delivery platform product of the right to use the data, that is, the right to use the seller's data.
在一些实施例中,数据使用权交付平台的特征在于:提供一个买卖双方联合建模的联邦学习框架。在此框架上买方只是购买卖方数据参与买方主导的联邦学习框架中,利用卖方的数据训练模型并将该模型参数传给买方以更新买方的模型。此过程卖方数据不出本地,且卖方数据的详细数值对于买方完全不可见,卖方数据的用途被限制为在买方主导的联邦学习架构中帮助买方训练模型。In some embodiments, the data usage rights delivery platform is characterized by providing a federated learning framework for joint modeling of buyers and sellers. In this framework, the buyer only buys the seller's data to participate in the buyer-led federated learning framework, uses the seller's data to train the model and passes the model parameters to the buyer to update the buyer's model. In this process, the seller's data does not come out locally, and the detailed values of the seller's data are completely invisible to the buyer. The use of the seller's data is limited to helping the buyer train the model in the buyer-led federated learning architecture.
图2中的数据使用权交付系统和图1中的数据价值评估系统可以是两个独立的系统,也可以是同一个系统。或者说,本申请中的数据使用权交付平台与数据价值评估平台可以是两个独立的平台,也可以是同一个平台。应理解,若图2中的数据使用权交付系统和图1中的数据价值评估系统是同一个系统,则图1中的数据评估装置和图2中的数据交付装置是同一个装置。The data usage right delivery system in Figure 2 and the data value evaluation system in Figure 1 can be two independent systems, or they can be the same system. In other words, the data usage right delivery platform and the data value evaluation platform in this application can be two independent platforms, or they can be the same platform. It should be understood that if the data usage right delivery system in FIG. 2 and the data value evaluation system in FIG. 1 are the same system, then the data evaluation device in FIG. 1 and the data delivery device in FIG. 2 are the same device.
下面结合附图来描述本申请实施例提供的一种数据价值评估方法交互流程。The interaction process of a data value evaluation method provided by the embodiment of the present application is described below with reference to the accompanying drawings.
图3为本申请实施例提供的一种数据价值评估方法交互流程图。如图3所示,该方法包括:Fig. 3 is an interactive flowchart of a data value evaluation method provided by the embodiment of the present application. As shown in Figure 3, the method includes:
301、数据评估装置分别向第一数据处理装置和第二数据处理装置发送第一加密信息。301. The data evaluation device sends first encrypted information to a first data processing device and a second data processing device respectively.
数据评估装置可存储有或可获取第一加密信息对应的解密私钥。例如,第一加密信息为用于实现数据同态加密的同态加密程序,数据评估装置可存储有或可获取该同态加密程序对应的解密私钥。数据评估装置可利用解密私钥对由第一加密信息对任意数据做加密处理得到的加密数据做解密处理。The data evaluation device may store or obtain a decryption private key corresponding to the first encrypted information. For example, the first encryption information is a homomorphic encryption program for implementing homomorphic encryption of data, and the data evaluation device may store or obtain a decryption private key corresponding to the homomorphic encryption program. The data evaluation device can use the decryption private key to decrypt encrypted data obtained by encrypting arbitrary data with the first encrypted information.
第一数据处理装置为买方的数据处理装置,第二数据处理装置为卖方的数据处理装置。在一些实施例中,数据评估装置、第一数据处理装置以及第二数据处理装置均为服务器,例如云服务器。第一数据处理装置可利用上述第一加密信息对其用于训练第一业务模型的第四模型信息做加密处理以得到第三模型信息。第三模型信息可用于训练第一加密业务模型。对第一业务模型做加密处理可得到第一加密业务模型。或者说,第一加密业务模型可解密得到第一业务模型。第四模型信息可以是一个用于训练第一业务模型的数据处理与模型训练程序或者代码。第二数据处理装置可利用第一加密信息对其第一本地数据做加密处理以得到第一加密数据。其中,第一本地数据为待做价值评估的数据。The first data processing device is a data processing device of the buyer, and the second data processing device is a data processing device of the seller. In some embodiments, the data evaluation device, the first data processing device and the second data processing device are all servers, such as cloud servers. The first data processing device may use the first encrypted information to encrypt the fourth model information used to train the first business model to obtain the third model information. The third model information can be used to train the first encrypted business model. Encrypting the first business model can obtain the first encrypted business model. In other words, the first encrypted business model can be decrypted to obtain the first business model. The fourth model information may be a data processing and model training program or code for training the first service model. The second data processing device may use the first encrypted information to encrypt the first local data to obtain the first encrypted data. Wherein, the first local data is the data to be evaluated.
上述第一加密信息可以是用于实现数据同态加密的信息。举例来说,第一加密信息为同态加密程序、可实现数据同态加密的加密函数等,其中,同态加密程序是指可实现数据同态加密的程序。在一种可能的实现方式中,第一加密信息为同态加密程序;第一数据处理装置利用同态加密程序对其用于训练第一业务模型的第四模型信息做加密处理以得到第三模型信息,该第三模型信息可用于训练第一加密业务模型;第二数据处理装置利用该同态加密程序对其第一本地数据做加密处理以得到第一加密数据,并利用该第一加密数据和第三模型信息训练第一加密业务模型以得到第二加密业务模型。第一数据处理装置和第二数据处理装置均未存储且不能获取同态加密程序的解密私钥。第一加密业务模型可视为第一数据处理装置利用同态加密程序对第一业务模型做加密处理得到。或者说,上述第一业务模型为第一加密业务模型对应的未加密的业务模型。由同态加密的特性可知,对第二加密业务模型做解密得到的业务模型与利用第一本地数据训练第一业务模型后的业务模型相同。由于第二数据处理装置是获得并利用第一加密数据和第三模型信息训练第一加密业务模型,未存储也不能获取同态加密程序的解密私钥,因此第二数据处理装置不能得到用于训练第一业务模型的第四模型信息。也就是说,在该实现方式中,买方的第四模型信息(例如数据处理和模型训练方法) 不会暴露给卖方。第一数据处理装置可获取表征第二加密业务模型的第一模型信息。由于第一数据处理装置只是向第一数据处理装置提供第一模型信息,而不是第一本地数据,因此第一数据处理装置无法获知该第一本地数据。也就是说,卖方的数据细节不被暴露给买方。The above-mentioned first encryption information may be information for realizing homomorphic encryption of data. For example, the first encryption information is a homomorphic encryption program, an encryption function capable of realizing homomorphic encryption of data, etc., wherein the homomorphic encryption program refers to a program capable of realizing homomorphic encryption of data. In a possible implementation, the first encrypted information is a homomorphic encryption program; the first data processing device uses the homomorphic encryption program to encrypt the fourth model information used to train the first business model to obtain the third Model information, the third model information can be used to train the first encrypted business model; the second data processing device uses the homomorphic encryption program to encrypt its first local data to obtain the first encrypted data, and uses the first encrypted The data and the third model information train the first encrypted business model to obtain the second encrypted business model. Neither the first data processing device nor the second data processing device stores and cannot obtain the decryption private key of the homomorphic encryption program. The first encrypted business model can be regarded as obtained by the first data processing device by using a homomorphic encryption program to encrypt the first business model. In other words, the above-mentioned first business model is an unencrypted business model corresponding to the first encrypted business model. It can be seen from the characteristics of homomorphic encryption that the service model obtained by decrypting the second encrypted service model is the same as the service model after training the first service model with the first local data. Since the second data processing device obtains and uses the first encrypted data and the third model information to train the first encrypted business model, it does not store and cannot obtain the decryption private key of the homomorphic encryption program, so the second data processing device cannot obtain the Fourth model information for training the first business model. That is to say, in this implementation, the buyer's fourth model information (such as data processing and model training methods) will not be exposed to the seller. The first data processing device may obtain first model information representing the second encrypted service model. Since the first data processing device only provides the first model information to the first data processing device instead of the first local data, the first data processing device cannot obtain the first local data. That is, the seller's data details are not exposed to the buyer.
302、第一数据处理装置向数据评估装置发送初始性能指标和利用第一加密信息对第四模型信息做加密处理得到的第三模型信息。302. The first data processing device sends the initial performance index and third model information obtained by encrypting fourth model information by using the first encrypted information to the data evaluation device.
第四模型信息用于训练第一业务模型,该第一业务模型为第一数据处理需要训练的业务模型。图3的方法流程可视为评估第二数据处理装置的第一本地数据对于训练第一业务模型的价值的流程。初始性能指标(或者称为第二性能指标)表征第一业务模型的性能。初始性能指标可包含准确率、召回率等。应理解,不同业务模型的性能指标不同,本申请不作限定。第三模型信息用于训练第一加密业务模型。第一加密业务模型可以是第一数据处理装置利用第一加密信息对第一业务模型做加密处理得到。The fourth model information is used to train the first business model, and the first business model is a business model that needs to be trained for the first data processing. The method flow in FIG. 3 can be regarded as a flow of evaluating the value of the first local data of the second data processing device for training the first business model. The initial performance index (or called the second performance index) represents the performance of the first service model. Initial performance metrics can include precision, recall, etc. It should be understood that different service models have different performance indexes, which are not limited in this application. The third model information is used to train the first encrypted business model. The first encrypted business model may be obtained by the first data processing device performing encryption processing on the first business model by using the first encrypted information.
在一些可能的实施例中,第一加密信息为同态加密程序,第四模型信息包含用于训练第一业务模型的数据处理与模型训练程序,第三模型信息包含该数据处理与模型训练程序用同态加密程序加密处理后的程序;第一数据处理装置将该数据处理与模型训练程序用同态加密程序加密处理后的程序(对应于第四模型信息)发送给数据评估装置,并将表征第一业务模型的性能的初始性能指标发送给数据评估装置。In some possible embodiments, the first encryption information is a homomorphic encryption program, the fourth model information includes a data processing and model training program for training the first business model, and the third model information includes the data processing and model training program Encrypt the processed program with a homomorphic encryption program; the first data processing device sends the program (corresponding to the fourth model information) encrypted with the data processing and model training program to the data evaluation device, and Initial performance indicators characterizing the performance of the first business model are sent to the data evaluation means.
303、数据评估装置向第二数据处理装置发送第三模型信息。303. The data evaluation device sends third model information to the second data processing device.
步骤303一种可能的实现方式如下:数据评估装置在检测到第三模型信息没有安全问题之后,向第二数据处理装置发送第三模型信息。数据评估装置检测第三模型信息是否有安全问题的方式可以包括:检测第三模型信息包含的数据处理与模型训练程序用同态加密程序加密处理后的程序使用的加密算法是否符合通用安全规范、检测该程序是否完整、对该程序进行病毒扫描等。第一数据处理装置可通过签名算法对该程序进行完整性保护。应理解,若检测到该程序使用的加密算法符合通用安全规范,并且通过完整性检测和病毒扫描(即该程序未扫描出病毒),则确定该程序无安全问题。A possible implementation manner of step 303 is as follows: after the data evaluation device detects that the third model information has no security problem, it sends the third model information to the second data processing device. The way for the data evaluation device to detect whether the third model information has a security problem may include: detecting whether the data processing and model training program included in the third model information is encrypted with a homomorphic encryption program. Check if the program is complete, scan the program for viruses, etc. The first data processing device can implement integrity protection on the program through a signature algorithm. It should be understood that if it is detected that the encryption algorithm used by the program complies with general security specifications, and passes the integrity check and virus scanning (that is, no virus is detected by the program), then it is determined that the program has no security problems.
304、第二数据处理装置向数据评估装置发送第二模型信息。304. The second data processing device sends second model information to the data evaluating device.
第二模型信息用于上述数据评估装置获得第一模型信息。上述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型。上述第二加密业务模型解密得到的第二业务模型与利用上述第一本地数据训练上述第一业务模型后的业务模型相同。The second model information is used by the data evaluation device to obtain the first model information. The above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model. The second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data.
在一些实施例中,第二数据处理装置在执行步骤304之前,可执行如下操作:第二数据处理装置利用第一加密信息对其第一本地数据做加密处理,得到第一加密数据;第二数据处理装置利用第一加密数据和第三模型信息训练第一加密业务模型,得到第二加密业务模型;根据第二加密业务模型的参数,生成第一模型信息;对第一模型信息做加密处理以得到第二模型信息。第一模型信息包含表征第二加密业务模型的参数或者包含第二加密业务模型的参数。第二模型信息包含对表征第二加密业务模型的参数做加密处理得到的参数或者包含对第二加密业务模型的参数做加密处理得到的参数。在这些实施例中,第二数据处理装置可利用与数据评估装置预先约定的加密方式对第一模型信息做加密处理以得到第二模型信息。数据评估装置对第二模型信息做解密处理可得到第一模型信息。需要说明,第二数据处理装置对第一模型信息做加密处理是为了保证第二数据处理装置与数据评估装置之间传输的数据的安全,避免直接发送第一模型信息造成该第一模型信息被泄露。In some embodiments, the second data processing device may perform the following operations before performing step 304: the second data processing device encrypts its first local data by using the first encrypted information to obtain the first encrypted data; The data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model; generates the first model information according to the parameters of the second encrypted business model; performs encryption processing on the first model information to get the second model information. The first model information contains parameters characterizing the second encrypted business model or contains parameters of the second encrypted business model. The second model information includes parameters obtained by encrypting parameters representing the second encrypted service model or parameters obtained by encrypting parameters of the second encrypted service model. In these embodiments, the second data processing device may encrypt the first model information using an encryption method pre-agreed with the data evaluation device to obtain the second model information. The data evaluation device decrypts the second model information to obtain the first model information. It should be noted that the purpose of encrypting the first model information by the second data processing device is to ensure the security of the data transmitted between the second data processing device and the data evaluation device, and avoid sending the first model information directly to cause the first model information to be encrypted. Give way.
在一些实施例中,第二数据处理装置在执行步骤304之前,可执行如下操作:第二数据 处理装置利用第一加密信息对其第一本地数据做加密处理,得到第一加密数据;第二数据处理装置利用第一加密数据和第三模型信息训练第一加密业务模型,得到第二加密业务模型;根据第二加密业务模型的参数,生成第一模型信息。第一模型信息包含表征第二加密业务模型的参数或者包含第二加密业务模型的参数。在这些实施例中,第一模型信息和第二模型信息相同。第二数据处理装置向数据评估装置发送第二模型信息也就是向数据评估装置发送第一模型信息。In some embodiments, the second data processing device may perform the following operations before performing step 304: the second data processing device encrypts its first local data by using the first encrypted information to obtain the first encrypted data; The data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain a second encrypted business model; generates the first model information according to the parameters of the second encrypted business model. The first model information contains parameters characterizing the second encrypted business model or contains parameters of the second encrypted business model. In these embodiments, the first model information and the second model information are the same. The second data processing device sends the second model information to the data evaluation device, that is to say the first model information to the data evaluation device.
305、数据评估装置根据第二模型信息,向第一数据处理装置发送第一模型信息。305. The data evaluation device sends the first model information to the first data processing device according to the second model information.
步骤305一种可能的实现方式如下:数据评估装置对第二模型信息做解密处理得到第一模型信息;在检测到第一模型信息没有安全问题之后,向第一数据处理装置发送第一模型信息。A possible implementation of step 305 is as follows: the data evaluation device decrypts the second model information to obtain the first model information; after detecting that the first model information has no security issues, it sends the first model information to the first data processing device .
数据评估装置检测第一模型信息是否有安全问题的方式可以包括:检测该第一模型信息使用的加密算法是否符合通用安全规范、检测该第一模型信息是否完整、对该第一模型信息进行病毒扫描等。The method for the data evaluation device to detect whether the first model information has a security problem may include: detecting whether the encryption algorithm used by the first model information complies with general security specifications, detecting whether the first model information is complete, and performing virus detection on the first model information. scan etc.
步骤305一种可能的实现方式如下:在检测到第二模型信息没有安全问题之后,向第一数据处理装置发送第二模型信息;其中,第二模型信息与第一模型信息相同。A possible implementation manner of step 305 is as follows: after detecting that the second model information has no security problem, sending the second model information to the first data processing device; wherein, the second model information is the same as the first model information.
306、第一数据处理装置根据第一模型信息和第二加密业务模型对应的测试数据,向数据评估装置发送第一指标信息。306. The first data processing device sends the first indicator information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted service model.
上述第一指标信息用于上述数据评估装置获得第一性能指标。上述第一性能指标表征利用第一本地数据训练第一业务模型后的业务模型的性能。The above-mentioned first index information is used for the above-mentioned data evaluation device to obtain the first performance index. The above-mentioned first performance index represents the performance of the service model after the first service model is trained by using the first local data.
步骤306一种可能的实现方式如下:第一数据处理装置利用第一加密信息对其本地测试数据(即第二加密业务模型对应的测试数据)做加密处理以得到加密测试数据;利用加密测试数据测试第二加密业务模型,得到第一指标信息。加密测试数据和第二加密业务模型可以是使用相同的同态加密程序得到,因此可利用加密测试数据测试第二加密业务模型。第一加密信息可以是同态加密程序,第一指标信息可以是第二加密业务模型对应的一组同态加密的性能指标。A possible implementation of step 306 is as follows: the first data processing device encrypts its local test data (that is, the test data corresponding to the second encrypted business model) by using the first encrypted information to obtain encrypted test data; Test the second encryption business model to obtain the first indicator information. The encrypted test data and the second encrypted business model can be obtained by using the same homomorphic encryption program, so the encrypted test data can be used to test the second encrypted business model. The first encryption information may be a homomorphic encryption program, and the first index information may be a group of homomorphic encryption performance indicators corresponding to the second encryption business model.
307、数据评估装置使用第一加密信息对应的解密私钥对第一指标信息做解密处理以得到第一性能指标。307. The data evaluation device decrypts the first index information by using the decryption private key corresponding to the first encrypted information to obtain the first performance index.
308、数据评估装置根据初始性能指标和第一性能指标,评估第一本地数据对于训练第一业务模型的价值。308. The data evaluation device evaluates the value of the first local data for training the first service model according to the initial performance index and the first performance index.
步骤308一种可能的实现方式如下:数据评估装置通过对比初始性能指标和第一性能指标来评估第一本地数据对于训练第一业务模型的价值。A possible implementation manner of step 308 is as follows: the data evaluation device evaluates the value of the first local data for training the first business model by comparing the initial performance index with the first performance index.
在一些实施例中,数据评估装置将初始性能指标和第一性能指标进行对比,评估第一本地数据对于买方模型(即第一业务模型)性能提升的百分比和数据参考价值(即第一本地数据对于训练第一业务模型的价值);并向第一数据处理装置和第二数据处理装置分别发送第一本地数据对于买方模型(即第一业务模型)性能提升的百分比和/或第一本地数据对于训练第一业务模型的价值。In some embodiments, the data evaluation device compares the initial performance index with the first performance index, and evaluates the percentage of the first local data for the performance improvement of the buyer model (ie, the first business model) and the data reference value (ie, the first local data For training the value of the first business model); and sending the first local data to the first data processing device and the second data processing device respectively to the percentage and/or the first local data of the buyer's model (ie the first business model) performance improvement Value for training the first business model.
本申请实施例的主要原理是:数据评估装置利用同态加密技术,对卖方隐藏买方的数据处理和模型训练方法,对买方隐藏卖方的数据;输出一组基于卖方数据更新买方模型后买方模型性能提升指标的百分比。应理解,采用图3中的方法流程可评估卖方的任意数据对于训练买方的任意业务模型的价值,并保证卖方的数据以及买方的模型训练程序或代码不被暴露。对于买方来说,可评估卖方的任意数据对买方训练业务模型的价值,这样买方可根据卖方的 数据对其训练业务模型的价值来选择是否购买卖方数据的使用权以及购买卖方数据的使用权的合理报酬。本申请提供的数据价值评估方法解决的一个问题是:不暴露买方数据处理和模型训练方法和卖方数据的前提下,评估卖方数据对于买方的价值。采用的技术手段是:采用同态加密技术,在交易未达成前对卖方隐藏买方的数据处理和模型训练方法,对买方隐藏卖方的数据;数据评估装置输出一组基于卖方数据更新买方模型后买方模型性能提升指标的百分比。本申请提供的数据价值评估方法解决的另一个问题是:满足卖方数据对隐私安全保护的要求:卖方数据不能离开卖方的控制区,卖方数据的详细数值对于买方不可见,数据的用途只能是用来训练数据业务模型,在此限制条件下满足买方使用卖方数据训练数据业务模型的需求。采用的技术手段:改进联邦学习架构,买方购买卖方的数据参与其主导的联邦学习架构。达到技术效果:满足卖方数据隐私安全保护的要求的前提下满足了数据买方训练数据业务模型的需求,让原本不能流动的数据发挥出潜在的价值。The main principle of the embodiment of the present application is: the data evaluation device uses homomorphic encryption technology to hide the buyer's data processing and model training methods from the seller, and hide the seller's data from the buyer; output a set of buyer model performance after updating the buyer's model based on the seller's data. The percentage of lift metrics. It should be understood that the value of any data of the seller for training any business model of the buyer can be evaluated by adopting the method flow in FIG. 3 , and it is ensured that the data of the seller and the model training program or code of the buyer are not exposed. For the buyer, the value of any data of the seller to the buyer's training business model can be evaluated, so that the buyer can choose whether to purchase the right to use the seller's data and the right to use the seller's data according to the value of the seller's data to its training business model Fair remuneration. One problem solved by the data value evaluation method provided in this application is to evaluate the value of the seller's data to the buyer without exposing the buyer's data processing and model training methods and the seller's data. The technical means adopted are: adopt homomorphic encryption technology, hide the buyer's data processing and model training methods from the seller before the transaction is concluded, and hide the seller's data from the buyer; The percentage of model performance improvement metrics. Another problem solved by the data value evaluation method provided in this application is: to meet the privacy and security protection requirements of the seller’s data: the seller’s data cannot leave the seller’s control area, the detailed value of the seller’s data is invisible to the buyer, and the use of the data can only be It is used to train the data business model, and meets the buyer's demand for using the seller's data to train the data business model under this restriction. The technical means adopted: improve the federated learning architecture, and the buyer purchases the seller's data to participate in the federated learning architecture led by it. Achieving technical effect: On the premise of meeting the seller's data privacy and security protection requirements, the data buyer's training data business model needs are met, and the potential value of the originally immobile data can be brought into play.
本申请实施例中,第二数据处理装置(卖方)向数据评估装置发送第二模型信息,该数据评估装置和第一数据处理装置(买方)均不能通过第二模型信息获取到该第二数据处理装置的本地数据;能够满足卖方数据隐私安全保护的要求。也就是说,卖方数据(例如第一本地数据)不会离开卖方的控制区,卖方数据的详细数值对于买方不可见,数据的用途只能是用来训练数据业务模型,在此限制条件下满足买方使用卖方数据训练数据业务模型的需求。本申请实施例中,第一数据处理装置向数据评估装置发送初始性能指标和利用第一加密信息对第四模型信息做加密处理得到的第三模型信息;能够在不暴露第一数据处理装置(买方)的数据处理和模型训练方法评估卖方数据对于买方的价值。In the embodiment of the present application, the second data processing device (seller) sends the second model information to the data evaluation device, and neither the data evaluation device nor the first data processing device (buyer) can obtain the second data through the second model information Process the local data of the device; it can meet the seller's data privacy and security protection requirements. That is to say, the seller's data (such as the first local data) will not leave the seller's control area, the detailed value of the seller's data is invisible to the buyer, and the use of the data can only be used to train the data business model. Buyer needs to train data business models using seller data. In the embodiment of the present application, the first data processing device sends the initial performance index and the third model information obtained by encrypting the fourth model information by using the first encrypted information to the data evaluation device; the first data processing device ( Buyer) data processing and model training methods to assess the value of seller data to buyers.
图4为本申请实施例提供的另一种数据价值评估方法交互流程图。图4中的方法流程为图3中描述的方法的一种可能的实现方式。如图4所示,该方法包括:Fig. 4 is an interactive flowchart of another data value evaluation method provided by the embodiment of the present application. The method flow in FIG. 4 is a possible implementation of the method described in FIG. 3 . As shown in Figure 4, the method includes:
401、数据评估装置分别向第一数据处理装置和第二数据处理装置发送同态加密程序。401. The data evaluation device sends a homomorphic encryption program to the first data processing device and the second data processing device respectively.
数据评估装置掌控同态加密程序的解密私钥。The data evaluation device holds the private decryption key for the homomorphic encryption program.
402、第一数据处理装置向数据评估装置发送初始性能指标和同态加密的数据处理与模型训练程序。402. The first data processing device sends an initial performance index and a homomorphically encrypted data processing and model training program to the data evaluation device.
数据处理与模型训练程序用于训练第一业务模型。第一数据处理装置待评估第二数据处理装置的第一本地数据对于训练第一业务模型的价值。数据评估装置接收到初始性能指标之后,可记录该初始性能指标。同态加密的数据处理与模型训练程序是指利用同态加密程序加密的数据处理与模型训练程序。The data processing and model training program is used to train the first business model. The first data processing device is to evaluate the value of the first local data of the second data processing device for training the first business model. After receiving the initial performance index, the data evaluation device may record the initial performance index. The data processing and model training program of homomorphic encryption refers to the data processing and model training program encrypted by homomorphic encryption program.
403、数据评估装置在检测同态加密的数据处理与模型训练程序没有安全问题之后,向第二数据处理装置发送同态加密的数据处理与模型训练程序。403. After detecting that the data processing and model training program of homomorphic encryption has no security problem, the data evaluation device sends the data processing and model training program of homomorphic encryption to the second data processing device.
检测同态加密的数据处理与模型训练程是否有安全问题可以包括:检测该程序使用的加密算法是否符合通用安全规范、检测该程序是否完整、对该程序进行病毒扫描等。Detecting whether there are security issues in the data processing and model training program of homomorphic encryption may include: checking whether the encryption algorithm used by the program complies with general security specifications, checking whether the program is complete, and scanning the program for viruses, etc.
404、第二数据处理装置使用同态加密程序加密其第一本地数据以得到第一加密数据,再使用同态加密的数据处理与模型训练程序与第一加密数据训练得到第二加密业务模型,并将第二加密业务模型发送给数据评估装置。404. The second data processing device uses a homomorphic encryption program to encrypt its first local data to obtain the first encrypted data, and then uses the homomorphic encryption data processing and model training program to train with the first encrypted data to obtain a second encrypted business model, And send the second encrypted business model to the data evaluation device.
405、数据评估装置在检测到第二加密业务模型没有安全问题之后,向第二数据处理装置发送第二加密业务模型。405. After detecting that the second encrypted service model has no security problem, the data evaluation device sends the second encrypted service model to the second data processing device.
检测第二加密业务模型是否有安全问题可以包括:检测该第二加密业务模型使用的加密算法是否符合通用安全规范、检测该第二加密业务模型是否完整、对该第二加密业务模型进行病毒扫描等。Detecting whether the second encrypted business model has a security problem may include: detecting whether the encryption algorithm used by the second encrypted business model complies with general security specifications, detecting whether the second encrypted business model is complete, and performing virus scanning on the second encrypted business model wait.
406、第一数据处理装置利用同态加密程序对其本地测试数据做加密处理以得到加密测试数据;利用加密测试数据测试第二加密业务模型,得到第一指标信息。406. The first data processing device uses a homomorphic encryption program to encrypt its local test data to obtain encrypted test data; uses the encrypted test data to test a second encrypted service model to obtain first index information.
407、数据评估装置使用同态加密程序对应的解密私钥对第一指标信息做解密处理以得到第一性能指标。407. The data evaluation device decrypts the first index information by using the decryption private key corresponding to the homomorphic encryption program to obtain the first performance index.
408、数据评估装置根据初始性能指标和第一性能指标,评估第一本地数据对于训练第一业务模型的价值。408. The data evaluation device evaluates the value of the first local data for training the first service model according to the initial performance index and the first performance index.
步骤408可参阅步骤308。Step 408 can refer to step 308 .
本申请实施例中,第二数据处理装置(卖方)向数据评估装置发送第二加密业务模型,该数据评估装置和第一数据处理装置(买方)均不能通过第二加密业务模型获取到该第二数据处理装置的本地数据;能够满足卖方数据隐私安全保护的要求。也就是说,卖方数据(例如第一本地数据)不会离开卖方的控制区,卖方数据的详细数值对于买方不可见,数据的用途只能是用来训练数据业务模型,在此限制条件下满足买方使用卖方数据训练数据业务模型的需求。本申请实施例中,第一数据处理装置向数据评估装置发送初始性能指标和利用同态加密程序加密的数据处理与模型训练程序;能够在不暴露第一数据处理装置(买方)的数据处理和模型训练方法评估卖方数据对于买方的价值。In this embodiment of the application, the second data processing device (seller) sends the second encrypted business model to the data evaluation device, and neither the data evaluation device nor the first data processing device (buyer) can obtain the second encrypted business model through the second encrypted business model. 2. The local data of the data processing device; it can meet the seller's data privacy and security protection requirements. That is to say, the seller's data (such as the first local data) will not leave the seller's control area, the detailed value of the seller's data is invisible to the buyer, and the use of the data can only be used to train the data business model. Buyer needs to train data business models using seller data. In the embodiment of the present application, the first data processing device sends the initial performance index and the data processing and model training program encrypted by the homomorphic encryption program to the data evaluation device; Model training methods assess the value of seller data to buyers.
图3和图4介绍了描述了数据评估装置、第一数据处理装置以及第二数据处理装置共同参与的数据价值评估方法交互流程。下面分别描述数据评估装置、第一数据处理装置以及第二数据处理装置各自执行的数据价值评估方法。Fig. 3 and Fig. 4 introduce and describe the interaction process of the data value evaluation method in which the data evaluation device, the first data processing device and the second data processing device jointly participate. The data value evaluation methods performed by the data evaluation device, the first data processing device and the second data processing device are respectively described below.
图5为本申请实施例提供的一种数据价值评估方法流程图。图5为数据评估装置执行的数据价值评估方法流程。如图5所示,该方法包括:Fig. 5 is a flow chart of a data value evaluation method provided by the embodiment of the present application. Fig. 5 is a flow chart of the data value evaluation method performed by the data evaluation device. As shown in Figure 5, the method includes:
501、数据评估装置向第一数据处理装置发送第一模型信息。501. The data evaluation device sends first model information to a first data processing device.
上述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型。上述第一指标信息可以是上述第一数据处理装置利用加密测试数据测试上述第二加密业务模型得到,上述加密测试数据加密上述测试数据得到。上述第二加密业务模型解密得到的第二业务模型与利用上述第一本地数据训练第一业务模型后的业务模型相同。上述第一业务模型为上述第一加密业务模型对应的未加密的业务模型。The above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model. The first index information may be obtained by the first data processing device testing the second encrypted service model with encrypted test data, and the encrypted test data is obtained by encrypting the test data. The second business model obtained by decrypting the second encrypted business model is the same as the business model after training the first business model with the first local data. The first business model is an unencrypted business model corresponding to the first encrypted business model.
在一些实施例中,数据评估装置在执行步骤501之前可执行如下操作:接收来自第二数据处理装置的第二模型信息;根据第二模型信息,获得第一模型信息。根据上述第二模型信息,获得上述第一模型信息可以是:数据评估装置利用与第二数据处理装置预先约定的解密方式对第二模型信息做解密处理,得到第一模型信息。第二模型信息可以是第二数据处理装置利用与数据评估装置预先约定的加密方式对第一模型信息做加密处理得到。In some embodiments, the data evaluation device may perform the following operations before performing step 501: receiving the second model information from the second data processing device; and obtaining the first model information according to the second model information. Obtaining the first model information according to the second model information may be: the data evaluation device decrypts the second model information using a decryption method pre-agreed with the second data processing device to obtain the first model information. The second model information may be obtained by the second data processing device encrypting the first model information using an encryption method pre-agreed with the data evaluation device.
在一些实施例中,数据评估装置在执行步骤501之前可执行如下操作:接收来自上述第二数据处理装置的第一模型信息。In some embodiments, the data evaluation device may perform the following operation before performing step 501: receive the first model information from the above-mentioned second data processing device.
502、数据评估装置根据来自第一数据处理装置的第一指标信息,获得第一性能指标。502. The data evaluation device obtains a first performance index according to the first index information from the first data processing device.
上述第一性能指标表征利用上述第一本地数据训练上述第一业务模型后的业务模型的性能,上述第一指标信息为上述第一数据处理装置利用上述第一模型信息和上述第二加密业务模型对应的测试数据得到。步骤502可参阅步骤407。The above-mentioned first performance index represents the performance of the business model after the above-mentioned first business model is trained by using the above-mentioned first local data, and the above-mentioned first index information is the The corresponding test data are obtained. For step 502, refer to step 407.
503、数据评估装置根据上述第一性能指标和第二性能指标,评估上述第一本地数据对于训练上述第一业务模型的价值。503. The data evaluation device evaluates the value of the first local data for training the first service model according to the first performance index and the second performance index.
上述第二性能指标表征上述第一业务模型的性能。The above-mentioned second performance index represents the performance of the above-mentioned first business model.
本申请实施例中,数据评估装置向第一数据处理装置发送第一模型信息,可以将第一数 据处理装置的数据限制为训练第一业务模型,以便达到卖方数据不出本地的目的。数据评估装置根据第一性能指标和第二性能指标,评估第一本地数据对于训练第一业务模型的价值;能够准确地评估第一本地数据对于训练第一业务模型的价值。In the embodiment of the present application, the data evaluation device sends the first model information to the first data processing device, and the data of the first data processing device can be limited to training the first business model, so as to achieve the purpose of not leaving the seller's data locally. The data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; it can accurately evaluate the value of the first local data for training the first business model.
图6为本申请实施例提供的另一种数据价值评估方法流程图。图6中的方法流程为图5中描述的方法的一种可能的实现方式。如图6所示,该方法包括:Fig. 6 is a flow chart of another data value evaluation method provided by the embodiment of the present application. The method flow in FIG. 6 is a possible implementation of the method described in FIG. 5 . As shown in Figure 6, the method includes:
601、数据评估装置分别向第一数据处理装置和第二数据处理装置发送第一加密信息。601. The data evaluation device sends first encrypted information to a first data processing device and a second data processing device respectively.
第一加密信息用于第一数据处理装置加密第四模型信息以得到第三模型信息。第四模型信息用于训练第一业务模型。第一加密信息用于第二数据处理装置加密其第一本地数据。The first encryption information is used by the first data processing device to encrypt the fourth model information to obtain the third model information. The fourth model information is used to train the first service model. The first encryption information is used by the second data processing device to encrypt its first local data.
602、数据评估装置接收来自第一数据处理装置的第三模型信息以及第二性能指标。602. The data evaluation device receives third model information and a second performance index from the first data processing device.
上述第三模型信息用于训练第一加密业务模型。第二性能指标表征第一业务模型的性能。第一业务模型为第一加密业务模型对应的未加密的业务模型。在一些实施例中,第一加密信息可以是同态加密程序;第三模型信息为第一数据处理装置使用同态加密程序对其用于训练第一业务模型的数据处理与模型训练程序做加密处理得到的。The above third model information is used to train the first encrypted service model. The second performance indicator characterizes the performance of the first business model. The first business model is an unencrypted business model corresponding to the first encrypted business model. In some embodiments, the first encryption information may be a homomorphic encryption program; the third model information is that the first data processing device uses a homomorphic encryption program to encrypt the data processing and model training program used to train the first business model dealt with.
603、数据评估装置向第二数据处理装置发送第三模型信息。603. The data evaluation device sends third model information to the second data processing device.
604、数据评估装置接收来自第二数据处理装置的第二模型信息。604. The data evaluation device receives second model information from a second data processing device.
上述第二模型信息用于上述数据评估装置获得第一模型信息。第一模型信息表征上述第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型。The above-mentioned second model information is used for the above-mentioned data evaluation device to obtain the first model information. The first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
605、数据评估装置根据第二模型信息,获得第一模型信息。605. The data evaluation device obtains first model information according to the second model information.
步骤605是可选的,而非必要的。在一些实施例中,数据评估装置接收来自第二数据处理装置的第二模型信息,直接向第一数据处理装置发送第一模型信息,即执行步骤606。也就是说,在一些实施例中,第一模型信息和第二模型信息相同。在一些实施例中,步骤605的实现方式是:数据评估装置对第二模型信息做解密处理得到第一模型信息。Step 605 is optional but not necessary. In some embodiments, the data evaluation device receives the second model information from the second data processing device, and directly sends the first model information to the first data processing device, that is, executes step 606 . That is, in some embodiments, the first model information and the second model information are the same. In some embodiments, step 605 is implemented by: the data evaluation device decrypts the second model information to obtain the first model information.
606、数据评估装置向第一数据处理装置发送第一模型信息。606. The data evaluation device sends the first model information to the first data processing device.
607、数据评估装置对来自第一数据处理装置的第一指标信息做解密处理,得到第一性能指标。607. The data evaluation device decrypts the first index information from the first data processing device to obtain the first performance index.
上述第一性能指标表征利用第一本地数据训练第一业务模型后的业务模型的性能。上述第一指标信息为上述第一数据处理装置利用上述第一模型信息和上述第二加密业务模型对应的测试数据得到。The above-mentioned first performance index represents the performance of the service model after the first service model is trained by using the first local data. The first index information is obtained by the first data processing device by using the first model information and test data corresponding to the second encrypted service model.
608、数据评估装置根据上述第一性能指标和第二性能指标,评估第一本地数据对于训练第一业务模型的价值。608. The data evaluation device evaluates the value of the first local data for training the first service model according to the first performance index and the second performance index.
上述第二性能指标表征上述第一业务模型的性能。The above-mentioned second performance index represents the performance of the above-mentioned first business model.
在一些实施例中,数据评估装置在执行步骤608之后,还可以执行如下操作:数据评估装置向上述第一数据处理装置发送解密私钥。上述解密私钥用于第一数据处理装置对第二加密业务模型做解密处理。In some embodiments, after performing step 608, the data evaluation device may further perform the following operation: the data evaluation device sends the decryption private key to the above-mentioned first data processing device. The decryption private key is used by the first data processing device to decrypt the second encrypted business model.
本申请实施例中,数据评估装置向第一数据处理装置发送第一模型信息,可以将第一数据处理装置的数据限制为训练第一业务模型,以便达到卖方数据不出本地的目的。数据评估装置根据第一性能指标和第二性能指标,评估第一本地数据对于训练第一业务模型的价值;能够准确地评估第一本地数据对于训练第一业务模型的价值。In the embodiment of the present application, the data evaluation device sends the first model information to the first data processing device, and the data of the first data processing device can be limited to training the first business model, so as to achieve the purpose of not leaving the seller's data locally. The data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; it can accurately evaluate the value of the first local data for training the first business model.
图7为本申请实施例提供的另一种数据价值评估方法流程图。图7为第一数据处理装置(买方)执行的数据价值评估方法流程。如图7所示,该方法包括:Fig. 7 is a flow chart of another data value evaluation method provided by the embodiment of the present application. Fig. 7 is a flow chart of the data value evaluation method performed by the first data processing device (buyer). As shown in Figure 7, the method includes:
701、第一数据处理装置接收来自数据评估装置的第一模型信息。701. A first data processing device receives first model information from a data evaluation device.
上述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型。上述第二加密业务模型解密得到的第二业务模型与利用第一本地数据训练第一业务模型后的业务模型相同。上述第一业务模型为上述第一加密业务模型对应的未加密的业务模型。The above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model. The second business model obtained by decrypting the above-mentioned second encrypted business model is the same as the business model after training the first business model with the first local data. The first business model is an unencrypted business model corresponding to the first encrypted business model.
702、第一数据处理装置根据第一模型信息和第二加密业务模型对应的测试数据,向数据评估装置发送第一指标信息。702. The first data processing device sends the first indicator information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted service model.
上述第一指标信息用于上述数据评估装置获得第一性能指标。上述第一性能指标表征利用上述第一本地数据训练上述第一业务模型后的业务模型的性能。The above-mentioned first index information is used for the above-mentioned data evaluation device to obtain the first performance index. The above-mentioned first performance index represents the performance of the service model after the above-mentioned first service model is trained by using the above-mentioned first local data.
本申请实施例中,第一数据处理装置根据第一模型信息和第二加密业务模型对应的测试数据,向数据评估装置发送第一指标信息;可以使得数据评估装置准确地评估第一本地数据对于训练第一业务模型的价值。第一数据处理装置接收来自数据评估装置的第一模型信息,第一数据处理装置根据该第一模型信息无法获取第二数据处理装置的第一本地数据,可以避免该第一本地数据被暴露给第一数据处理装置。In the embodiment of the present application, the first data processing device sends the first index information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model; the data evaluation device can accurately evaluate the first local data for The value of training the first business model. The first data processing device receives the first model information from the data evaluation device, and the first data processing device cannot obtain the first local data of the second data processing device according to the first model information, which can prevent the first local data from being exposed to A first data processing device.
图8为本申请实施例提供的另一种数据价值评估方法流程图。图8中的方法流程为图7中描述的方法的一种可能的实现方式。如图8所示,该方法包括:Fig. 8 is a flow chart of another data value evaluation method provided by the embodiment of the present application. The method flow in FIG. 8 is a possible implementation of the method described in FIG. 7 . As shown in Figure 8, the method includes:
801、第一数据处理装置接收来自数据评估装置的第一加密信息。801. A first data processing device receives first encrypted information from a data evaluation device.
802、第一数据处理装置利用第一加密信息对第四模型信息做加密处理,得到第三模型信息。802. The first data processing device encrypts fourth model information by using the first encrypted information to obtain third model information.
上述第四模型信息用于训练第一业务模型。第三模型信息用于训练第一加密业务模型。在一些实施例中,第一加密信息为同态加密程序,第四模型信息为用于训练第一业务模型的数据处理与模型训练程序,第三模型信息为利用同态加密程序对第四模型信息做加密处理得到的同态加密的数据处理与模型训练程序。第一加密业务模型可以视为利用同态加密程序对第一业务模型做加密处理得到的。The above fourth model information is used to train the first service model. The third model information is used to train the first encrypted business model. In some embodiments, the first encryption information is a homomorphic encryption program, the fourth model information is a data processing and model training program used to train the first business model, and the third model information is the use of a homomorphic encryption program to encrypt the fourth model Homomorphically encrypted data processing and model training programs obtained by encrypting information. The first encrypted business model can be regarded as obtained by encrypting the first business model by using a homomorphic encryption program.
803、第一数据处理装置向数据评估装置发送第三模型信息以及第二性能指标。803. The first data processing device sends the third model information and the second performance index to the data evaluation device.
上述第二性能指标表征第一业务模型的性能。上述第二性能指标用于数据评估装置评估第二数据处理装置的第一本地数据对于训练第一业务模型的价值。The above-mentioned second performance index represents the performance of the first business model. The above-mentioned second performance index is used by the data evaluation device to evaluate the value of the first local data of the second data processing device for training the first business model.
804、第一数据处理装置接收来自数据评估装置的第一模型信息。804. The first data processing device receives first model information from the data evaluation device.
步骤804可参阅步骤701。For step 804, refer to step 701.
805、第一数据处理装置利用第一加密信息加密其用于测试第一业务模型的测试数据以得到加密测试数据。805. The first data processing device encrypts the test data used for testing the first service model by using the first encryption information to obtain encrypted test data.
806、第一数据处理装置利用加密测试数据测试第二加密业务模型,得到第一指标信息。806. The first data processing device uses the encrypted test data to test the second encrypted service model to obtain the first indicator information.
上述第一指标信息用于上述数据评估装置获得第一性能指标;上述第一性能指标表征利用上述第一本地数据训练上述第一业务模型后的业务模型的性能。The first index information is used by the data evaluation device to obtain a first performance index; the first performance index represents the performance of the service model after the first service model is trained using the first local data.
807、第一数据处理装置向数据评估装置发送第一指标信息。807. The first data processing device sends the first indicator information to the data evaluation device.
在一些实施例中,第一数据处理装置还可执行如下操作:第一数据处理装置利用上述解密私钥对上述第二加密业务模型做解密处理,得到第二业务模型。第二业务模型与利用上述第一本地数据训练第一业务模型后的业务模型相同。In some embodiments, the first data processing device may also perform the following operations: the first data processing device decrypts the second encrypted business model by using the decryption private key to obtain the second business model. The second business model is the same as the business model after training the first business model with the above-mentioned first local data.
本申请实施例中,第一数据处理装置向数据评估装置发送第一指标信息、第三模型信息以及第二性能指标,以便数据评估装置准确地评估第一本地数据对于训练第一业务模型的价值。第一数据处理装置向数据评估装置发送第一指标信息、第三模型信息以及第二性能指标不被暴露其第一业务模型以及用于训练第一业务模型的程序。第一数据处理装置接收来自数 据评估装置的第一模型信息,第一数据处理装置根据该第一模型信息无法获取第二数据处理装置的第一本地数据,可以避免该第一本地数据被暴露给第一数据处理装置。In the embodiment of the present application, the first data processing device sends the first index information, the third model information and the second performance index to the data evaluation device, so that the data evaluation device can accurately evaluate the value of the first local data for training the first business model . The first data processing device sends the first index information, the third model information, and the first business model whose second performance index is not exposed and a program for training the first business model to the data evaluation device. The first data processing device receives the first model information from the data evaluation device, and the first data processing device cannot obtain the first local data of the second data processing device according to the first model information, which can prevent the first local data from being exposed to A first data processing device.
图9为本申请实施例提供的另一种数据价值评估方法流程图。图9为第二数据处理装置(卖方)执行的数据价值评估方法流程。如图9所示,该方法包括:FIG. 9 is a flow chart of another data value evaluation method provided by the embodiment of the present application. FIG. 9 is a flow chart of the data value evaluation method performed by the second data processing device (seller). As shown in Figure 9, the method includes:
901、第二数据处理装置接收来自数据评估装置的第三模型信息。901. The second data processing device receives third model information from the data evaluation device.
上述第三模型信息用于训练第一加密业务模型。上述第一加密业务模型与对属于第一数据处理装置的第一业务模型做加密处理得到的业务模型相同。The above third model information is used to train the first encrypted service model. The above-mentioned first encrypted business model is the same as the business model obtained by encrypting the first business model belonging to the first data processing device.
902、第二数据处理装置向数据评估装置发送第二模型信息。902. The second data processing device sends second model information to the data evaluating device.
上述第二模型信息用于数据评估装置获得第一模型信息。上述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型。上述第二加密业务模型解密得到的第二业务模型与利用第一本地数据训练第一业务模型后的业务模型相同。The above-mentioned second model information is used by the data evaluation device to obtain the first model information. The above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model. The second business model obtained by decrypting the above-mentioned second encrypted business model is the same as the business model after training the first business model with the first local data.
本申请实施例中,第二数据处理装置向数据评估装置发送第二模型信息,既能避免暴露自身的第一本地数据,又能使得数据评估装置能够评估第一本地数据对于训练第一业务模型的价值。In the embodiment of the present application, the second data processing device sends the second model information to the data evaluation device, which can not only avoid exposing its own first local data, but also enable the data evaluation device to evaluate the first local data for training the first business model the value of.
图10为本申请实施例提供的另一种数据价值评估方法流程图。图10中的方法流程为图9中描述的方法的一种可能的实现方式。如图10所示,该方法包括:Fig. 10 is a flowchart of another data value evaluation method provided by the embodiment of the present application. The method flow in FIG. 10 is a possible implementation of the method described in FIG. 9 . As shown in Figure 10, the method includes:
1001、第二数据处理装置接收来自数据评估装置的第一加密信息。1001. A second data processing device receives first encrypted information from a data evaluation device.
步骤1001可参阅步骤801。For step 1001, refer to step 801.
1002、第二数据处理装置利用第一加密信息对第一本地数据做加密处理,得到第一加密数据。1002. The second data processing device encrypts the first local data by using the first encryption information to obtain the first encrypted data.
1003、第二数据处理装置接收来自数据评估装置的第三模型信息。1003. The second data processing device receives third model information from the data evaluation device.
步骤1003可参阅步骤901。步骤1003与步骤1002的先后顺序不作限定。For step 1003, refer to step 901. The sequence of step 1003 and step 1002 is not limited.
1004、第二数据处理装置利用第一加密数据和第三模型信息训练第一加密业务模型,得到第二加密业务模型。1004. The second data processing device uses the first encrypted data and the third model information to train the first encrypted service model to obtain a second encrypted service model.
1005、第二数据处理装置根据第二加密业务模型,得到第二模型信息。1005. The second data processing device obtains the second model information according to the second encrypted service model.
第二模型信息用于上述数据评估装置获得第一模型信息。上述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型。The second model information is used by the data evaluation device to obtain the first model information. The above-mentioned first model information represents the second encrypted service model obtained by the second data processing device using its first local data to train the first encrypted service model.
1006、第二数据处理装置向数据评估装置发送第二模型信息。1006. The second data processing device sends second model information to the data evaluation device.
本申请实施例中,第二数据处理装置向数据评估装置发送第二模型信息,既能避免暴露自身的本地数据,又能使得数据评估装置能够评估第一本地数据对于训练第一业务模型的价值。In the embodiment of the present application, the second data processing device sends the second model information to the data evaluation device, which can not only avoid exposing its own local data, but also enable the data evaluation device to evaluate the value of the first local data for training the first business model .
下面结合附图来描述本申请实施例提供的一种数据使用权交付方法交互流程。The interaction process of a data usage right delivery method provided by the embodiment of the present application is described below with reference to the accompanying drawings.
图11为本申请实施例提供的一种数据使用权交付方法交互流程图。如图11所示,该方法包括:FIG. 11 is an interactive flow chart of a data usage right delivery method provided by an embodiment of the present application. As shown in Figure 11, the method includes:
1101、第三数据处理装置从数据交付装置获取同态加密程序和解密私钥。1101. The third data processing device acquires a homomorphic encryption program and a decryption private key from the data delivery device.
步骤1101可理解为:数据交付装置向第三数据处理装置发送同态加密程序和解密私钥。解密私钥用于解密使用同态加密程序加密的数据。 Step 1101 can be understood as: the data delivery device sends the homomorphic encryption program and the decryption private key to the third data processing device. The decryption private key is used to decrypt data encrypted using a homomorphic encryption program.
1102、第三数据处理装置利用同态加密程序对数据处理与模型训练程序做加密处理,得到同态加密的数据处理与模型训练程序。1102. The third data processing device uses a homomorphic encryption program to encrypt the data processing and model training program to obtain a homomorphic encrypted data processing and model training program.
数据处理与模型训练程序用于训练第三数据处理装置需要第四数据处理装置协助其训练 的业务模型。The data processing and model training program is used to train the business model that the third data processing device needs the assistance of the fourth data processing device to train.
1103、第三数据处理装置向数据交付装置发送同态加密的数据处理与模型训练程序。1103. The third data processing device sends a homomorphically encrypted data processing and model training program to the data delivery device.
1104、数据交付装置在检测同态加密的数据处理与模型训练程序没有安全问题之后,向第四数据处理装置发送同态加密的数据处理与模型训练程序。1104. After detecting that the data processing and model training program of homomorphic encryption has no security problem, the data delivery device sends the data processing and model training program of homomorphic encryption to the fourth data processing device.
在实际应用中,数据交付装置在检测同态加密的数据处理与模型训练程序没有安全问题之后,可向一个或多个卖方发送同态加密的数据处理与模型训练程序。应理解,第四数据处理装置仅为一个卖方的举例。也就是说,买方可通过图11中的方法流程购买多个卖方的数据的使用权。In practical applications, the data delivery device may send the homomorphically encrypted data processing and model training program to one or more sellers after detecting that the homomorphically encrypted data processing and model training program has no security problems. It should be understood that the fourth data processing device is only an example of a seller. That is to say, the buyer can purchase the right to use the data of multiple sellers through the method flow in FIG. 11 .
1105、第四数据处理装置使用同态加密程序加密其第二本地数据以得到第二加密数据,再使用同态加密的数据处理与模型训练程序与第二加密数据训练得到第四加密业务模型。1105. The fourth data processing device encrypts its second local data using a homomorphic encryption program to obtain second encrypted data, and then uses a homomorphic encryption data processing and model training program to train with the second encrypted data to obtain a fourth encrypted business model.
数据处理与模型训练程序可用于训练第三业务模型,同态加密的数据处理与模型训练程序用于训练第三加密业务模型,即同态加密的第三业务模型。第四加密业务模型是同态加密的业务模型。使用同态加密程序对应的解密私钥对第四加密业务模型可得到未加密的第四业务模型。第四业务模型等同于使用数据处理与模型训练程序与第二本地数据训练得到的业务模型。The data processing and model training program can be used to train the third business model, and the data processing and model training program of homomorphic encryption is used to train the third encrypted business model, that is, the third business model of homomorphic encryption. The fourth encryption business model is a homomorphic encryption business model. Using the decryption private key corresponding to the homomorphic encryption program to encrypt the fourth business model can obtain the unencrypted fourth business model. The fourth business model is equal to the business model trained by using the data processing and model training program and the second local data.
在一些实施例中,数据交付装置向第四数据处理装置发送同态加密的数据处理与模型训练程序的同时,向第四数据处理装置发送同态加密程序。在一些实施例中,数据交付装置可通过不同的消息向第四数据处理装置发送同态加密的数据处理与模型训练程序和同态加密程序。In some embodiments, the data delivery device sends the homomorphic encryption program to the fourth data processing device while sending the homomorphic encrypted data processing and model training program to the fourth data processing device. In some embodiments, the data delivery device may send the homomorphic encrypted data processing and model training program and the homomorphic encryption program to the fourth data processing device through different messages.
1106、第四数据处理装置向第三数据处理装置发送第四加密业务模型。1106. The fourth data processing device sends the fourth encrypted service model to the third data processing device.
步骤1106一种可能的实现方式是:第四数据处理装置向第三数据处理装置发送第六模型信息。第六模型信息表征上述第四加密业务模型。或者,第六模型信息包含第四加密业务模型的参数。A possible implementation manner of step 1106 is: the fourth data processing device sends the sixth model information to the third data processing device. The sixth model information characterizes the above-mentioned fourth encrypted business model. Alternatively, the sixth model information includes parameters of the fourth encrypted service model.
1107、第三数据处理装置利用解密私钥对第四加密业务模型做解密处理,得到第四业务模型。1107. The third data processing device decrypts the fourth encrypted business model by using the decryption private key to obtain the fourth business model.
第四业务模型与利用第二本地数据训练第三业务模型后的业务模型相同。上述第三业务模型为第三加密业务模型对应的未加密的业务模型,且为第三数据处理装置需要上述第四数据处理装置协助训练的业务模型。The fourth service model is the same as the service model after using the second local data to train the third service model. The above-mentioned third business model is an unencrypted business model corresponding to the third encrypted business model, and is a business model for which the third data processing device requires the assistance of the fourth data processing device for training.
1108、第三数据处理装置利用第四业务模型的参数更新其本地业务模型。1108. The third data processing device updates its local service model by using the parameters of the fourth service model.
图11中的方法流程与图4中的方法流程可以是相互独立的方法流程,也可以是相关联的两个流程。在一些实施例中,数据交付装置可以是数据评估装置,第三数据处理装置可以是第一数据处理装置,第四数据处理装置可以是第二数据处理装置;数据评估装置、第一数据处理装置以及第二数据处理装置可先通过图4中的方法流程评估卖方的某些本地数据对于买方训练业务模型的价值,再通过图11中的方法流程来购买这些本地数据或者包含这些本地数据的使用权。举例来说,第二数据处理装置待出售某份本地数据的使用权,该份本地数据的数据量为100,数据评估装置、第一数据处理装置以及第二数据处理装置可先通过图4中的方法流程评估该份本地数据中数据量为1的任意一部分数据;在买方与卖方达成交易之后,通过执行图11中的方法流程交付该份本地数据的使用权。通过评估整个本地数据集中的一部分,可以减少评估所耗费的时间。The method flow in FIG. 11 and the method flow in FIG. 4 may be independent method flows, or may be two associated flows. In some embodiments, the data delivery device may be a data evaluation device, the third data processing device may be a first data processing device, and the fourth data processing device may be a second data processing device; the data evaluation device, the first data processing device And the second data processing device can first evaluate the value of some local data of the seller for the buyer's training business model through the method flow in Figure 4, and then use the method flow in Figure 11 to purchase these local data or include the use of these local data right. For example, the second data processing device is to sell the right to use a certain piece of local data, and the data volume of the local data is 100. The data evaluation device, the first data processing device and the second data processing device can first pass through the The method flow evaluates any part of the local data with a data volume of 1; after the buyer and the seller conclude a transaction, the right to use the local data is delivered by executing the method flow in Figure 11 . By evaluating a portion of the entire local dataset, the time spent on evaluation can be reduced.
本申请实施例中,第三数据处理装置利用解密私钥对第四加密业务模型做解密处理,得到第四业务模型;在不需要获取第四数据处理装置的本地数据的前提下,就能借助该第四数 据处理装置的本地数据实现模型训练。本申请实施例中,交付的是数据的使用权,卖方的数据不离开本地,数据的用途被限制为训练数据业务模型。在卖方数据的详细数值对于买方完全不可见的前提下,帮助买方实现模型的训练。满足卖方数据隐私安全保护的前提下,发挥卖方数据的潜在价值。In the embodiment of the present application, the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model; without obtaining the local data of the fourth data processing device, it can use The local data of the fourth data processing device implements model training. In the embodiment of this application, what is delivered is the right to use the data, the seller's data does not leave the local, and the use of the data is limited to training the data business model. On the premise that the detailed value of the seller's data is completely invisible to the buyer, it helps the buyer to realize the training of the model. Under the premise of satisfying the privacy and security protection of the seller's data, the potential value of the seller's data can be brought into play.
图11介绍了描述了数据交付装置、第三数据处理装置以及第四数据处理装置共同参与的数据价值评估方法交互流程。下面分别描述数据交付装置、第三数据处理装置以及第四数据处理装置各自执行的数据使用权交付方法。FIG. 11 introduces and describes the interaction process of the data value evaluation method in which the data delivery device, the third data processing device and the fourth data processing device participate together. The data usage right delivery methods performed by the data delivery device, the third data processing device, and the fourth data processing device are respectively described below.
图12为本申请实施例提供的一种数据使用权交付方法流程图。图12为数据交付装置执行的数据使用权交付流程。如图12所示,该方法包括:FIG. 12 is a flow chart of a data usage right delivery method provided by an embodiment of the present application. Fig. 12 is a data usage right delivery process executed by the data delivery device. As shown in Figure 12, the method includes:
1201、数据交付装置接收来自第三数据处理装置的第五模型信息。1201. The data delivery device receives fifth model information from a third data processing device.
第五模型信息用于训练第三加密业务模型。第三加密业务模型解密得到的业务模型与第三数据处理装置需要第四数据处理装置协助训练的未加密的第三业务模型相同。The fifth model information is used to train the third encrypted service model. The business model obtained by decrypting the third encrypted business model is the same as the unencrypted third business model trained by the third data processing device with assistance from the fourth data processing device.
在一种可能的实现方式中,数据交付装置在执行步骤1201之前,可向第三数据处理装置发送第一加密信息,该第一加密信息用于第三数据处理装置生成第五模型信息。在一些实施例中,第一加密信息为同态加密程序,第三数据处理装置利用同态加密程序对数据处理与模型训练程序做加密处理,以得到同态加密的数据处理与模型训练程序(即第五模型信息)。In a possible implementation manner, before performing step 1201, the data delivery device may send first encrypted information to the third data processing device, where the first encrypted information is used by the third data processing device to generate fifth model information. In some embodiments, the first encrypted information is a homomorphic encryption program, and the third data processing device uses the homomorphic encryption program to encrypt the data processing and model training program to obtain a homomorphic encrypted data processing and model training program ( i.e. fifth model information).
1202、数据交付装置向第四数据处理装置发送第五模型信息。1202. The data delivery device sends fifth model information to the fourth data processing device.
步骤1202一种可能的实现方式如下:在检测上述第五模型信息的未存在安全性问题的情况下,上述数据交付装置向上述第四数据处理装置发送上述第五模型信息。A possible implementation of step 1202 is as follows: in the case of detecting that there is no security problem in the fifth model information, the data delivery device sends the fifth model information to the fourth data processing device.
检测第五模型信息是否有安全问题可以包括:检测该第五模型信息使用的加密算法是否符合通用安全规范、检测该第五模型信息是否完整、对该第五模型信息进行病毒扫描等。Detecting whether the fifth model information has a security problem may include: detecting whether the encryption algorithm used by the fifth model information complies with general security regulations, detecting whether the fifth model information is complete, performing virus scanning on the fifth model information, and so on.
在一种可能的实现方式中,数据交付装置还可执行如下操作:上述数据交付装置向上述第三数据处理装置发送解密私钥;上述解密私钥用于上述第三数据处理装置对第四加密业务模型做解密处理。上述第四加密业务模型由上述第四数据处理装置利用第二加密数据训练上述第三加密业务模型得到。上述第二加密数据由加密上述第四数据处理装置的第二本地数据得到。上述第四加密业务模型解密得到的第四业务模型与利用上述第二本地数据训练上述第三业务模型后的业务模型相同。In a possible implementation manner, the data delivery device may also perform the following operations: the above-mentioned data delivery device sends a decryption private key to the above-mentioned third data processing device; the above-mentioned decryption private key is used by the above-mentioned third data processing device to encrypt the fourth The business model is decrypted. The fourth encrypted service model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted service model. The above-mentioned second encrypted data is obtained by encrypting the second local data of the above-mentioned fourth data processing device. The fourth service model obtained by decrypting the fourth encrypted service model is the same as the service model after training the third service model by using the second local data.
在一种可能的实现方式中,数据交付装置还可执行如下操作:向第四数据处理装置发送第一加密信息,上述第一加密信息用于上述第四数据处理装置加密其第二本地数据。第四数据处理装置利用第一加密信息加密其第二本地数据可得到第二加密数据。In a possible implementation manner, the data delivery device may further perform the following operation: send first encrypted information to the fourth data processing device, where the first encrypted information is used by the fourth data processing device to encrypt its second local data. The fourth data processing device encrypts its second local data by using the first encryption information to obtain second encrypted data.
本申请实施例中,数据交付装置向第四数据处理装置发送第五模型信息,以便该第四数据处理装置利用其本地数据和该第五模型信息训练第三加密业务模型。由于第五模型信息用于训练第三加密业务模型,因此第四数据处理装置(无法成功解密第三加密业务模型)根据该第五模型信息,不能获取未加密的业务模型。第四数据处理装置利用其本地数据训练第三加密业务模型,一方面使得第三数据处理装置不会暴露其业务模型和模型训练方法,另一方面使得第四数据处理装置的本地数据不离开本地。因此,本申请实施例中,可在第四数据处理装置(卖方)的本地数据对于第三数据处理装置(买方)完全不可见的前提下,帮助第三数据处理装置训练第二业务模型。In this embodiment of the present application, the data delivery device sends fifth model information to the fourth data processing device, so that the fourth data processing device uses its local data and the fifth model information to train the third encrypted service model. Since the fifth model information is used to train the third encrypted business model, the fourth data processing device (which cannot successfully decrypt the third encrypted business model) cannot acquire an unencrypted business model according to the fifth model information. The fourth data processing device uses its local data to train the third encrypted business model. On the one hand, the third data processing device will not expose its business model and model training method, and on the other hand, the local data of the fourth data processing device will not leave the local . Therefore, in the embodiment of the present application, the third data processing device (buyer) can be helped to train the second business model on the premise that the local data of the fourth data processing device (seller) is completely invisible to the third data processing device (buyer).
图13为本申请实施例提供的另一种数据使用权交付方法流程图。图13为第三数据处理装置(买方)执行的数据使用权交付流程。如图13所示,该方法包括:FIG. 13 is a flow chart of another data usage right delivery method provided by the embodiment of the present application. Fig. 13 is a data usage right delivery process executed by the third data processing device (buyer). As shown in Figure 13, the method includes:
1301、第三数据处理装置接收来自数据交付装置的解密私钥。1301. The third data processing device receives the decryption private key from the data delivery device.
1302、第三数据处理装置利用解密私钥对第四加密业务模型做解密处理,得到第四业务模型。1302. The third data processing device decrypts the fourth encrypted business model by using the decryption private key to obtain the fourth business model.
第四加密业务模型由第四数据处理装置利用第二加密数据训练第三加密业务模型得到。上述第二加密数据由上述第四数据处理装置加密其第二本地数据得到。上述第四业务模型与利用上述第二本地数据训练第三业务模型后的业务模型相同。上述第三业务模型为上述第三加密业务模型对应的未加密的业务模型,且为上述第三数据处理装置需要上述第四数据处理装置协助训练的业务模型。The fourth encrypted business model is obtained by the fourth data processing device using the second encrypted data to train the third encrypted business model. The above-mentioned second encrypted data is obtained by encrypting its second local data by the above-mentioned fourth data processing device. The fourth service model is the same as the service model after the third service model is trained by using the second local data. The third business model is an unencrypted business model corresponding to the third encrypted business model, and is a business model for which the third data processing device requires assistance from the fourth data processing device for training.
在一种可能的实现方式中,第三数据处理装置在执行步骤1302之前,可执行如下操作:第三数据处理装置向数据交付装置发送第五模型信息;上述第五模型信息用于训练第三加密业务模型;根据来自第四数据处理装置的第六模型信息,得到第四加密业务模型。第三数据处理装置在向数据交付装置发送第五模型信息之前,可执行如下操作:第三数据处理装置从数据交付装置获取第一加密信息;根据第一加密信息对第七模型信息做加密处理,得到第五模型信息;上述第七模型信息用于训练上述第三业务模型。In a possible implementation manner, before the third data processing device performs step 1302, the following operations may be performed: the third data processing device sends fifth model information to the data delivery device; the fifth model information is used to train the third An encrypted business model; a fourth encrypted business model is obtained according to the sixth model information from the fourth data processing device. Before the third data processing device sends the fifth model information to the data delivery device, the following operations may be performed: the third data processing device acquires the first encrypted information from the data delivery device; and encrypts the seventh model information according to the first encrypted information , to obtain the fifth model information; the seventh model information is used to train the third service model.
在一种可能的实现方式中,第三数据处理装置在执行步骤1302之后,可执行如下操作:第三数据处理装置利用上述第四业务模型的参数更新其本地业务模型。In a possible implementation manner, after performing step 1302, the third data processing device may perform the following operation: the third data processing device updates its local service model by using the parameters of the fourth service model.
本申请实施例中,第三数据处理装置利用解密私钥对第四加密业务模型做解密处理,得到第四业务模型;在不需要获取第四数据处理装置的本地数据的前提下,就能借助该第四数据处理装置的本地数据实现模型训练。In the embodiment of the present application, the third data processing device uses the decryption private key to decrypt the fourth encrypted business model to obtain the fourth business model; without obtaining the local data of the fourth data processing device, it can use The local data of the fourth data processing device implements model training.
图14为本申请实施例提供的另一种数据使用权交付方法流程图。图14为第四数据处理装置(卖方)执行的数据使用权交付流程。如图14所示,该方法包括:FIG. 14 is a flow chart of another method for delivering data usage rights provided by the embodiment of the present application. Fig. 14 is a data usage right transfer process executed by the fourth data processing device (seller). As shown in Figure 14, the method includes:
1401、第四数据处理装置接收来自数据交付装置的第五模型信息。1401. The fourth data processing device receives fifth model information from the data delivery device.
上述第五模型信息用于训练第三加密业务模型。The above fifth model information is used to train the third encrypted service model.
1402、第四数据处理装置利用第二加密数据训练第三加密业务模型,得到第四加密业务模型。1402. The fourth data processing device uses the second encrypted data to train a third encrypted service model to obtain a fourth encrypted service model.
上述第二加密数据由上述第四数据处理装置加密其第二本地数据得到。上述第四加密业务模型解密得到的第四业务模型与利用上述第二本地数据训练第三业务模型后的业务模型相同。上述第三业务模型为上述第三加密业务模型对应的未加密的业务模型,且为上述第三数据处理装置需要上述第四数据处理装置协助训练的业务模型。The above-mentioned second encrypted data is obtained by encrypting its second local data by the above-mentioned fourth data processing device. The fourth service model obtained by decrypting the fourth encrypted service model is the same as the service model after training the third service model by using the second local data. The third business model is an unencrypted business model corresponding to the third encrypted business model, and is a business model for which the third data processing device requires assistance from the fourth data processing device for training.
第四数据处理装置在执行步骤1402之前,可执行如下操作:第四数据处理装置利用来自数据交付装置的第一加密信息对第二本地数据做加密处理,得到第二加密数据。在一些实施例中,第一加密信息为同态加密程序,第五模型信息为同态加密的数据处理与模型训练程序。同态加密的数据处理与模型训练程序可以是利用同态加密程序(即第一加密信息)做用于训练第三业务模型的数据处理与模型训练程序做加密处理,得到的程序。Before the fourth data processing device executes step 1402, the following operations may be performed: the fourth data processing device encrypts the second local data by using the first encryption information from the data delivery device to obtain the second encrypted data. In some embodiments, the first encryption information is a homomorphic encryption program, and the fifth model information is a homomorphic encryption data processing and model training program. The data processing and model training program of homomorphic encryption may be a program obtained by using the homomorphic encryption program (ie, the first encrypted information) to perform encryption processing on the data processing and model training program used to train the third business model.
1403、第四数据处理装置向第三数据处理装置发送第六模型信息。1403. The fourth data processing device sends sixth model information to the third data processing device.
上述第六模型信息表征上述第四加密业务模型;上述第四加密业务模型用于上述第三数据处理装置解密得到所需的模型更新参数。The sixth model information represents the fourth encrypted business model; the fourth encrypted business model is used by the third data processing device to decrypt to obtain required model update parameters.
本申请实施例中,第四数据处理装置接收来自数据交付装置的第五模型信息;第四数据处理装置利用第二加密数据训练第三加密业务模型,得到第四加密业务模型;这样可以避免第三数据处理装置的业务模型和模型训练方法被泄露。第四数据处理装置向第三数据处理装置发送第六模型信息,可以避免该第三数据处理装置获取到该第四数据处理装置的本地数据。也就是说,在第四数据处理装置的本地数据对于第三数据处理装置完全不可见的前提下,就 能帮助第三数据处理装置实现业务模型的训练。In the embodiment of the present application, the fourth data processing device receives the fifth model information from the data delivery device; the fourth data processing device uses the second encrypted data to train the third encrypted business model to obtain the fourth encrypted business model; The business models and model training methods of the three data processing devices were leaked. The fourth data processing device sends the sixth model information to the third data processing device, which can prevent the third data processing device from obtaining the local data of the fourth data processing device. That is to say, on the premise that the local data of the fourth data processing device is completely invisible to the third data processing device, it can help the third data processing device to realize the training of the business model.
前面描述了买卖双方通过数据评估装置(对应于数据价值评估平台)评估卖方数据的使用权对于买方的价值的方案,以及买卖双方通过数据交付装置(对应于数据使用权交付平台)交付卖方数据的使用权给买方的方案。在实际应用中,数据评估装置和数据交付装置可以是同一个装置或产品,也可以是不同的装置或产品。也就是说,数据价值评估平台和数据使用权交付平台可以是同一个平台,也可以是两个不同的平台。前述实施例中将数据价值评估和数据使用权交付作为两个独立的流程来描述。下面以一个同时具备数据价值评估和数据使用权交付的数据交易平台产品的实现为例,来描述先做数据价值评估,再做数据使用权交付的方案。The above describes the scheme in which the buyer and the seller evaluate the value of the right to use the seller's data to the buyer through the data evaluation device (corresponding to the data value evaluation platform), and the buyer and the seller deliver the seller's data through the data delivery device (corresponding to the data usage right delivery platform). Right of use to Buyer's program. In practical applications, the data evaluation device and the data delivery device may be the same device or product, or different devices or products. That is to say, the data value evaluation platform and the data usage right delivery platform can be the same platform, or they can be two different platforms. In the foregoing embodiments, data value evaluation and data usage right delivery are described as two independent processes. The following takes the implementation of a data trading platform product that has both data value assessment and data usage rights delivery as an example to describe the solution of first evaluating data value and then delivering data usage rights.
图15为本申请实施例提供的一种数据评估与使用权交付方法交互流程图。如图15所示,该方法包括:Fig. 15 is an interaction flowchart of a data evaluation and use right delivery method provided by the embodiment of the present application. As shown in Figure 15, the method includes:
1501、第二数据处理装置发布其待出售使用权的本地数据的介绍信息。1501. The second data processing apparatus releases introduction information of its local data whose use rights are to be sold.
步骤1501一种可能的实现方式如下:第二数据处理装置(卖方)在数据交易系统(例如车辆数据交易系统)上发布其准备出售使用权的数据的来源、数据产生的时间、数据结构、字段类型、数据标签等数据介绍信息。数据交易系统可以运行于数据评估装置(数据交付装置)。第二数据处理装置(卖方)在数据评估装置运行的数据交易系统上发布其待出售使用权的本地数据的介绍信息。A possible implementation of step 1501 is as follows: the second data processing device (seller) publishes the source of the data it intends to sell the use right on the data transaction system (such as the vehicle data transaction system), the time when the data is generated, the data structure, and the field Data introduction information such as type and data label. The data transaction system can run on the data evaluation device (data delivery device). The second data processing device (seller) publishes presentation information of its local data for which the right to use is to be sold on the data transaction system operated by the data evaluation device.
1502、第一数据处理装置向数据评估装置发起针对第一本地数据的价值评估。1502. The first data processing device initiates value evaluation for the first local data to the data evaluation device.
第一本地数据可以是第二数据处理装置发布的一份待出售使用权的本地数据,也可以是第二数据处理装置发布的一份待出售使用权的本地数据中的一部分。第一本地数据可以包括第二数据处理装置发布的两份或两份以上待出售使用权的本地数据,例如两份数据来源不同的本地数据。The first local data may be a piece of local data for sale issued by the second data processing device, or may be a part of a piece of local data for sale issued by the second data processing device. The first local data may include two or more pieces of local data for sale issued by the second data processing device, for example, two pieces of local data with different data sources.
在一些实施例中,买方从数据交易系统上找到感兴趣的数据后,可以向数据交易系统发起针对这些数据的价值评估。In some embodiments, after the buyer finds the data he is interested in from the data transaction system, he can initiate a value assessment for the data to the data transaction system.
1503、数据评估装置基于买方模型使用第一本地数据训练后性能提升的百分比,计算并输出第一本地数据对于买方模型的价值。1503. The data evaluation device calculates and outputs the value of the first local data for the buyer model based on the percentage of performance improvement after the buyer model is trained using the first local data.
步骤1503的实现方式可参阅图3或者图4。The implementation manner of step 1503 may refer to FIG. 3 or FIG. 4 .
1504、第一数据处理装置和第二数据处理装置基于数据评估装置计算的第一本地数据对于买方模型性能提升的百分比和数据参考价值,进行沟通交易。1504. The first data processing device and the second data processing device conduct a communication transaction based on the percentage of the first local data calculated by the data evaluation device for the performance improvement of the buyer model and the reference value of the data.
步骤1504可理解为:买卖双方基于数据评估装置计算的第一本地数据对于买方模型性能提升的百分比和数据参考价值,进行沟通交易。 Step 1504 can be understood as: the buyer and the seller conduct a communication transaction based on the percentage of the first local data calculated by the data evaluation device for the performance improvement of the buyer's model and the data reference value.
如果交易达成,则执行步骤1505;如果交易未达成,则数据交易终止(或者说结束本流程)。If the transaction is concluded, execute step 1505; if the transaction is not concluded, the data transaction is terminated (or this process ends).
1505、第一数据处理装置向第二数据处理装置付款以获取第一本地数据的使用权。1505. The first data processing device pays the second data processing device to acquire the right to use the first local data.
步骤1505可理解为:买方向卖方付款以获取第一本地数据的使用权。 Step 1505 can be understood as: the buyer pays the seller to obtain the right to use the first local data.
1506、第二数据处理装置参与第一数据处理装置主导的联邦学习架构中,帮助第一数据处理装置训练业务模型。1506. The second data processing device participates in the federated learning architecture led by the first data processing device, and helps the first data processing device train the service model.
步骤1506可参阅图11中的方法流程。步骤1506可理解为:第一本地数据参与买方主导的联邦学习架构中,帮助买方训练业务模型。也就是说,交易达成后,买方获取卖方数据的使用权,买方可以基于数据交易系统构架一个其主导的联邦学习架构,使用卖方数据训练自己的数据业务模型。本申请实施例中,改进了联邦学习架构,买方购买卖方的数据参与其主 导的联邦学习架构。达到技术效果:满足卖方数据隐私安全保护的要求的前提下满足了数据买方训练数据业务模型的需求,让原本不能流动的数据发挥出潜在的价值。For step 1506, refer to the method flow in FIG. 11 . Step 1506 can be understood as: the first local data participates in the buyer-led federated learning framework to help the buyer train the business model. That is to say, after the transaction is concluded, the buyer obtains the right to use the seller's data, and the buyer can build a federated learning architecture based on the data transaction system, and use the seller's data to train its own data business model. In the embodiment of this application, the federated learning architecture is improved, and the buyer purchases the seller's data to participate in the federated learning architecture led by it. Achieving technical effect: On the premise of meeting the seller's data privacy and security protection requirements, the data buyer's training data business model needs are met, and the potential value of the originally immobile data can be brought into play.
在一些实施例中,买方可从多个卖方购买多份数据的使用权,并基于数据交易系统构架一个其主导的联邦学习架构,使用卖方数据训练自己的数据业务模型。In some embodiments, the buyer can purchase multiple data usage rights from multiple sellers, build a federated learning framework based on the data transaction system, and use the seller's data to train its own data business model.
本申请实施例中的数据价值评估方法和数据使用权交付方法并非强耦合的,数据价值评估方法和数据使用权交付方法可以分别作为一个独立的产品进行开发,也可以将二者的功能集中在一个数据交易平台实现。The data value assessment method and the data usage right delivery method in the embodiment of this application are not strongly coupled. The data value assessment method and the data usage right delivery method can be developed as an independent product, or the functions of the two can be centralized A data trading platform is realized.
本申请实施例中,数据评估装置基于买方模型使用第一本地数据训练后性能提升的百分比,计算并输出第一本地数据对于买方模型的价值;能够在买方不暴露其数据处理和模型训练方法,卖方不暴露其数据细节的前提下,输出卖方数据对于买方模型性能提升的百分比和数据参考价值。另外,使用本申请实施例提供的数据交易系统,交付的是数据的使用权,卖方的数据不离开本地,数据的用途被限制为训练数据业务模型。在卖方数据的详细数值对于买方完全不可见的前提下,帮助买方实现模型的训练。满足卖方数据隐私安全保护的前提下,发挥卖方数据的潜在价值。In the embodiment of the present application, the data evaluation device calculates and outputs the value of the first local data for the buyer model based on the percentage of performance improvement after the buyer model is trained using the first local data; it is possible for the buyer not to expose its data processing and model training methods, On the premise that the seller does not disclose its data details, output the percentage and data reference value of the seller's data to the buyer's model performance improvement. In addition, using the data trading system provided by the embodiment of this application, what is delivered is the right to use the data, the seller's data does not leave the local, and the use of the data is limited to training data business models. On the premise that the detailed value of the seller's data is completely invisible to the buyer, it helps the buyer to realize the training of the model. Under the premise of satisfying the privacy and security protection of the seller's data, the potential value of the seller's data can be brought into play.
图16示出了一种数据处理装置1600的结构示意图。该数据处理装置1600可以对应实现上述各个方法实施例中由数据评估装置、第一数据处理装置、第二数据处理装置、数据交付装置、第三数据处理装置、第四数据处理装置中的任一个实现的功能或者步骤。该数据处理装置可以包括处理模块1610和收发模块1620。可选的,还可以包括存储单元,该存储单元可以用于存储指令(代码或者程序)和/或数据。处理模块1610和收发模块1620可以与该存储单元耦合,例如,处理模块1610可以读取存储单元中的指令(代码或者程序)和/或数据,以实现相应的方法。上述各个单元可以独立设置,也可以部分或者全部集成。例如收发模块1620可包括发送模块和接收模块。FIG. 16 shows a schematic structural diagram of a data processing device 1600 . The data processing device 1600 can correspond to any one of the data evaluation device, the first data processing device, the second data processing device, the data delivery device, the third data processing device, and the fourth data processing device in the above-mentioned method embodiments. The functions or steps to be realized. The data processing device may include a processing module 1610 and a transceiver module 1620 . Optionally, a storage unit may also be included, and the storage unit may be used to store instructions (code or program) and/or data. The processing module 1610 and the transceiver module 1620 may be coupled with the storage unit, for example, the processing module 1610 may read instructions (code or program) and/or data in the storage unit to implement a corresponding method. Each of the above units can be set independently, or can be partially or fully integrated. For example, the transceiving module 1620 may include a sending module and a receiving module.
在一些可能的实施方式中,数据处理装置1600能够对应实现上述方法实施例中数据评估装置的行为和功能。例如数据处理装置1600可以为数据评估装置,也可以为应用于数据评估装置中的部件(例如芯片或者电路)。收发模块1620例如可以用于执行图3、图4、图5、图6、图15的实施例中由数据评估装置所执行的全部接收或发送操作,例如图3所示的实施例中的步骤301至步骤306涉及的接收或发送操作以及图4所示实施例中的步骤401至步骤406涉及的接收或发送操作,和/或用于支持本文所描述的技术的其它过程。处理模块1610用于执行图3、图4、图5、图6、图15的实施例中由数据评估装置所执行的除了收发操作之外的全部操作。In some possible implementation manners, the data processing device 1600 can correspondingly implement the behaviors and functions of the data evaluation device in the foregoing method embodiments. For example, the data processing device 1600 may be a data evaluation device, or a component (such as a chip or a circuit) applied in the data evaluation device. The transceiver module 1620, for example, can be used to perform all the receiving or sending operations performed by the data evaluation device in the embodiments shown in FIG. 3, FIG. 4, FIG. 5, FIG. 6, and FIG. 15, such as the steps in the embodiment shown in FIG. The receiving or sending operations involved in steps 301 to 306 and the receiving or sending operations involved in steps 401 to 406 in the embodiment shown in FIG. 4 , and/or other processes for supporting the technology described herein. The processing module 1610 is used to execute all the operations performed by the data evaluation device in the embodiments of FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , and FIG. 15 , except the transceiving operation.
在一些可能的实施方式中,数据处理装置1600能够对应实现上述方法实施例中第一数据处理装置的行为和功能。例如数据处理装置1600可以为第一数据处理装置,也可以为应用于第一数据处理装置中的部件(例如芯片或者电路)。收发模块1620例如可以用于执行图3、图4、图7、图8或图15的实施例中由第一数据处理装置所执行的全部接收或发送操作,例如图3所示的实施例中的步骤301、步骤302、步骤305、步骤306以及图4所示实施例中的步骤401、步骤402、步骤405、步骤406,和/或用于支持本文所描述的技术的其它过程。处理模块1610用于执行图3、图4、图7、图8或图15的实施例中由第一数据处理装置所执行的除了收发操作之外的全部操作。In some possible implementation manners, the data processing device 1600 can correspondingly implement the behaviors and functions of the first data processing device in the foregoing method embodiments. For example, the data processing device 1600 may be a first data processing device, or may be a component (such as a chip or a circuit) applied in the first data processing device. The transceiver module 1620, for example, may be used to perform all the receiving or sending operations performed by the first data processing device in the embodiment shown in FIG. 3, FIG. 4, FIG. 7, FIG. 8 or FIG. Step 301 , step 302 , step 305 , step 306 and step 401 , step 402 , step 405 , step 406 in the embodiment shown in FIG. 4 , and/or other processes for supporting the technology described herein. The processing module 1610 is configured to execute all the operations performed by the first data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 7 , FIG. 8 or FIG. 15 except the transceiving operation.
在一些可能的实施方式中,数据处理装置1600能够对应实现上述方法实施例中第二数据处理装置的行为和功能。例如数据处理装置1600可以为第二数据处理装置,也可以为应用于第二数据处理装置中的部件(例如芯片或者电路)。收发模块1620例如可以用于执行图3、 图4、图9、图10或图15的实施例中由第二数据处理装置所执行的全部接收或发送操作,例如图3所示的实施例中的步骤301、步骤303、步骤304以及图4所示实施例中的步骤401、步骤403、步骤404,和/或用于支持本文所描述的技术的其它过程。处理模块1610用于执行图3、图4、图9、图10或图15的实施例中由第二数据处理装置所执行的除了收发操作之外的全部操作。In some possible implementation manners, the data processing device 1600 can correspondingly implement the behaviors and functions of the second data processing device in the foregoing method embodiments. For example, the data processing device 1600 may be a second data processing device, or may be a component (such as a chip or a circuit) applied in the second data processing device. The transceiver module 1620, for example, may be used to perform all the receiving or sending operations performed by the second data processing device in the embodiment shown in FIG. 3, FIG. 4, FIG. 9, FIG. 10 or FIG. Step 301 , step 303 , step 304 and step 401 , step 403 , step 404 in the embodiment shown in FIG. 4 , and/or other processes for supporting the technology described herein. The processing module 1610 is configured to perform all the operations performed by the second data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 9 , FIG. 10 or FIG. 15 , except the transceiving operation.
在一些可能的实施方式中,数据处理装置1600能够对应实现上述方法实施例中数据交付装置的行为和功能。例如数据处理装置1600可以为数据交付装置,也可以为应用于数据交付装置中的部件(例如芯片或者电路)。收发模块1620例如可以用于执行图11、图12的实施例中由数据交付装置所执行的全部接收或发送操作,例如图11所示的实施例中的步骤1101、步骤1103以及图12所示实施例中的步骤1201和步骤1202,和/或用于支持本文所描述的技术的其它过程。处理模块1610用于执行图11、图12的实施例中由数据交付装置所执行的除了收发操作之外的全部操作。In some possible implementation manners, the data processing apparatus 1600 can correspondingly implement the behaviors and functions of the data delivery apparatus in the foregoing method embodiments. For example, the data processing device 1600 may be a data delivery device, or a component (such as a chip or a circuit) applied in the data delivery device. The transceiver module 1620, for example, can be used to perform all the receiving or sending operations performed by the data delivery device in the embodiment shown in FIG. 11 and FIG. Step 1201 and step 1202 in an embodiment, and/or other processes used to support the techniques described herein. The processing module 1610 is configured to perform all operations performed by the data delivery device in the embodiments shown in FIG. 11 and FIG. 12 except for the transceiving operation.
在一些可能的实施方式中,数据处理装置1600能够对应实现上述方法实施例中第三数据处理装置的行为和功能。例如数据处理装置1600可以为第三数据处理装置,也可以为应用于第三数据处理装置中的部件(例如芯片或者电路)。收发模块1620例如可以用于执行图11、图13的实施例中由第三数据处理装置所执行的全部接收或发送操作,例如图11所示的实施例中的步骤1101、步骤1103、步骤1106以及图13所示实施例中的步骤1301,和/或用于支持本文所描述的技术的其它过程。处理模块1610用于执行图11、图13的实施例中由第三数据处理装置所执行的除了收发操作之外的全部操作。In some possible implementation manners, the data processing apparatus 1600 can correspondingly implement the behaviors and functions of the third data processing apparatus in the foregoing method embodiments. For example, the data processing device 1600 may be a third data processing device, or may be a component (such as a chip or a circuit) applied in the third data processing device. The transceiver module 1620, for example, may be used to perform all the receiving or sending operations performed by the third data processing device in the embodiment shown in FIG. 11 and FIG. And step 1301 in the embodiment shown in FIG. 13 , and/or other processes for supporting the techniques described herein. The processing module 1610 is configured to perform all the operations performed by the third data processing device in the embodiments shown in FIG. 11 and FIG. 13 except the transceiving operation.
在一些可能的实施方式中,数据处理装置1600能够对应实现上述方法实施例中第四数据处理装置的行为和功能。例如数据处理装置1600可以为第四数据处理装置,也可以为应用于第四数据处理装置中的部件(例如芯片或者电路)。收发模块1620例如可以用于执行图11、图14的实施例中由第四数据处理装置所执行的全部接收或发送操作,例如图11所示的实施例中的步骤1104、步骤1106以及图14所示实施例中的步骤1401和步骤1403,和/或用于支持本文所描述的技术的其它过程。处理模块1610用于执行图11、图14的实施例中由第四数据处理装置所执行的除了收发操作之外的全部操作。In some possible implementation manners, the data processing apparatus 1600 can correspondingly implement the behavior and functions of the fourth data processing apparatus in the foregoing method embodiments. For example, the data processing device 1600 may be a fourth data processing device, or may be a component (such as a chip or a circuit) applied in the fourth data processing device. The transceiver module 1620, for example, may be used to perform all the receiving or sending operations performed by the fourth data processing device in the embodiment shown in FIG. 11 and FIG. Step 1401 and Step 1403 in the illustrated embodiment, and/or other processes used to support the techniques described herein. The processing module 1610 is configured to execute all the operations performed by the fourth data processing device in the embodiments shown in FIG. 11 and FIG. 14 except the transceiving operation.
图17为本申请实施例提供的另一种数据处理装置170的结构示意图。图17中的数据处理装置可以是上述数据评估装置。图17中的数据处理装置可以是上述第一数据处理装置。图17中的数据处理装置可以是上述第二数据处理装置。图17中的数据处理装置可以是上述数据交付装置。图17中的数据处理装置可以是上述第三数据处理装置。图17中的数据处理装置可以是上述第四数据处理装置。FIG. 17 is a schematic structural diagram of another data processing device 170 provided in an embodiment of the present application. The data processing means in FIG. 17 may be the data evaluation means described above. The data processing device in FIG. 17 may be the first data processing device described above. The data processing device in FIG. 17 may be the second data processing device described above. The data processing device in FIG. 17 may be the data delivery device described above. The data processing device in FIG. 17 may be the third data processing device described above. The data processing device in FIG. 17 may be the fourth data processing device described above.
如图17所示,该数据处理装置170包括至少一个处理器1720和收发器1710。As shown in FIG. 17 , the data processing device 170 includes at least one processor 1720 and a transceiver 1710 .
在本申请的另一些实施例中,处理器1720和收发器1710可以用于执行上述数据评估装置执行的功能或操作等。收发器1710可执行由数据评估装置所执行的全部接收或发送操作。处理器1720例如可执行图3、图4、图5、图6、图15的实施例中由数据评估装置所执行的除了收发操作之外的全部操作。In some other embodiments of the present application, the processor 1720 and the transceiver 1710 may be used to perform the functions or operations performed by the above-mentioned data evaluation device. The transceiver 1710 may perform all receiving or transmitting operations performed by the data evaluation device. The processor 1720 can, for example, execute all the operations performed by the data evaluation device in the embodiments of FIG. 3 , FIG. 4 , FIG. 5 , FIG. 6 , and FIG. 15 , except the transceiving operation.
在本申请的另一些实施例中,处理器1720和收发器1710可以用于执行上述第一数据处理装置执行的功能或操作等。收发器1710可执行由第一数据处理装置所执行的全部接收或发送操作。处理器1720例如可执行图3、图4、图7、图8或图15的实施例中由第一数据处理装置所执行的除了收发操作之外的全部操作。In some other embodiments of the present application, the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the above-mentioned first data processing device. The transceiver 1710 may perform all reception or transmission operations performed by the first data processing means. The processor 1720 may, for example, perform all the operations performed by the first data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 7 , FIG. 8 or FIG. 15 except the transceiving operation.
在本申请的另一些实施例中,处理器1720和收发器1710可以用于执行上述第二数据处 理装置执行的功能或操作等。收发器1710可执行由第二数据处理装置所执行的全部接收或发送操作。处理器1720例如可执行图3、图4、图9、图10或图15的实施例中由第二数据处理装置所执行的除了收发操作之外的全部操作。In some other embodiments of the present application, the processor 1720 and the transceiver 1710 may be used to perform the functions or operations performed by the above-mentioned second data processing device. The transceiver 1710 may perform all reception or transmission operations performed by the second data processing means. The processor 1720 can, for example, execute all the operations performed by the second data processing device in the embodiment shown in FIG. 3 , FIG. 4 , FIG. 9 , FIG. 10 or FIG. 15 except the transceiving operation.
在本申请的另一些实施例中,处理器1720和收发器1710可以用于执行上述数据交付装置执行的功能或操作等。收发器1710可执行由数据交付装置所执行的全部接收或发送操作。处理器1720例如可执行图11、图12的实施例中由数据交付装置所执行的除了收发操作之外的全部操作。In some other embodiments of the present application, the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the above data delivery device. The transceiver 1710 may perform all receive or transmit operations performed by the data delivery device. The processor 1720 may, for example, perform all the operations performed by the data delivery device in the embodiments of FIG. 11 and FIG. 12 except the transceiving operation.
在本申请的另一些实施例中,处理器1720和收发器1710可以用于执行上述第三数据处理装置执行的功能或操作等。收发器1710可执行由第三数据处理装置所执行的全部接收或发送操作。处理器1720例如可执行图11、图13的实施例中由第三数据处理装置所执行的除了收发操作之外的全部操作。In some other embodiments of the present application, the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the above-mentioned third data processing device. The transceiver 1710 may perform all reception or transmission operations performed by the third data processing means. The processor 1720 may, for example, perform all the operations performed by the third data processing device in the embodiments of FIG. 11 and FIG. 13 except the transceiving operation.
在本申请的另一些实施例中,处理器1720和收发器1710可以用于执行上述第四数据处理装置执行的功能或操作等。收发器1710可执行由第四数据处理装置所执行的全部接收或发送操作。处理器1720例如可执行图11、图14的实施例中由第四数据处理装置所执行的除了收发操作之外的全部操作。In some other embodiments of the present application, the processor 1720 and the transceiver 1710 may be configured to perform the functions or operations performed by the fourth data processing device. The transceiver 1710 may perform all reception or transmission operations performed by the fourth data processing means. The processor 1720 may, for example, execute all the operations performed by the fourth data processing device in the embodiments of FIG. 11 and FIG. 14 except the transceiving operation.
收发器1710用于通过传输介质和其他设备/装置进行通信。处理器1720利用收发器1710收发数据和/或信令,并用于实现上述方法实施例中的方法。处理器1720可实现处理模块1610的功能,收发器1710可实现收发模块1620的功能。 Transceiver 1710 is used to communicate with other devices/devices over transmission media. The processor 1720 uses the transceiver 1710 to send and receive data and/or signaling, and is used to implement the methods in the foregoing method embodiments. The processor 1720 can realize the function of the processing module 1610 , and the transceiver 1710 can realize the function of the transceiver module 1620 .
可选的,数据处理装置170还可以包括至少一个存储器1730,用于存储程序指令和/或数据。存储器1730和处理器1720耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器1720可能和存储器1730协同操作。处理器1720可能执行存储器1730中存储的程序指令。该至少一个存储器中的至少一个可以包括于处理器中。Optionally, the data processing device 170 may further include at least one memory 1730 for storing program instructions and/or data. The memory 1730 is coupled to the processor 1720 . The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. Processor 1720 may cooperate with memory 1730 . Processor 1720 may execute program instructions stored in memory 1730 . At least one of the at least one memory may be included in the processor.
本申请实施例中不限定上述收发器1710、处理器1720以及存储器1730之间的具体连接介质。本申请实施例在图17中以存储器1730、处理器1720以及收发器1710之间通过总线1740连接,总线在图17中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图17中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。In this embodiment of the present application, a specific connection medium among the transceiver 1710, the processor 1720, and the memory 1730 is not limited. In the embodiment of the present application, in FIG. 17, the memory 1730, the processor 1720, and the transceiver 1710 are connected through a bus 1740. The bus is represented by a thick line in FIG. 17, and the connection between other components is only for schematic illustration. , is not limited. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 17 , but it does not mean that there is only one bus or one type of bus.
在本申请实施例中,处理器可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In this embodiment of the application, the processor may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or Execute the methods, steps and logic block diagrams disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
图18为本申请实施例提供的另一种数据处理装置180的结构示意图。如图18所示,图18所示的数据处理装置包括逻辑电路1801和接口1802。图16中的处理模块1610可以用逻辑电路1801实现,图16中的收发模块1620可以用接口1802实现。其中,该逻辑电路1801可以为芯片、处理电路、集成电路或片上系统(system on chip,SoC)芯片等,接口1802可以为通信接口、输入输出接口等。本申请实施例中,逻辑电路和接口还可以相互耦合。对于逻辑电路和接口的具体连接方式,本申请实施例不作限定。FIG. 18 is a schematic structural diagram of another data processing device 180 provided by an embodiment of the present application. As shown in FIG. 18 , the data processing device shown in FIG. 18 includes a logic circuit 1801 and an interface 1802 . The processing module 1610 in FIG. 16 can be realized by a logic circuit 1801 , and the transceiver module 1620 in FIG. 16 can be realized by an interface 1802 . Wherein, the logic circuit 1801 may be a chip, a processing circuit, an integrated circuit or a system on chip (SoC) chip, etc., and the interface 1802 may be a communication interface, an input-output interface, or the like. In the embodiment of the present application, the logic circuit and the interface may also be coupled to each other. The embodiment of the present application does not limit the specific connection manner of the logic circuit and the interface.
在本申请的一些实施例中,该逻辑电路和接口可用于执行上述数据评估装置执行的功能或操作等。In some embodiments of the present application, the logic circuit and interface can be used to perform the functions or operations performed by the above-mentioned data evaluation device.
在本申请的另一些实施例中,该逻辑电路和接口可用于执行上述第一数据处理装置执行的功能或操作等。In some other embodiments of the present application, the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned first data processing device.
在本申请的另一些实施例中,该逻辑电路和接口可用于执行上述第二数据处理装置执行的功能或操作等。In some other embodiments of the present application, the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned second data processing device.
在本申请的一些实施例中,该逻辑电路和接口可用于执行上述数据交付装置执行的功能或操作等。In some embodiments of the present application, the logic circuit and interface may be used to perform the functions or operations performed by the above-mentioned data delivery device.
在本申请的另一些实施例中,该逻辑电路和接口可用于执行上述第三数据处理装置执行的功能或操作等。In some other embodiments of the present application, the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned third data processing device.
在本申请的另一些实施例中,该逻辑电路和接口可用于执行上述第四数据处理装置执行的功能或操作等。In some other embodiments of the present application, the logic circuit and the interface may be used to perform the functions or operations performed by the above-mentioned fourth data processing device.
本申请还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机代码,当计算机代码在计算机上运行时,使得计算机执行上述实施例的方法。The present application also provides a computer-readable storage medium, where computer codes are stored in the computer-readable storage medium, and when the computer codes are run on the computer, the computer is made to execute the methods of the above-mentioned embodiments.
本申请还提供一种计算机程序产品,该计算机程序产品包括计算机代码或计算机程序,当该计算机代码或计算机程序在计算机上运行时,使得上述实施例中的方法被执行。The present application also provides a computer program product, the computer program product includes computer code or computer program, and when the computer code or computer program is run on a computer, the methods in the above-mentioned embodiments are executed.
本申请还提供一种数据价值评估系统,包括数据评估装置、第一数据处理装置以及第二数据处理装置。The present application also provides a data value evaluation system, including a data evaluation device, a first data processing device, and a second data processing device.
本申请还提供一种数据使用权交付系统,包括数据交付装置、第三数据处理装置以及第四数据处理装置。The present application also provides a data usage right delivery system, including a data delivery device, a third data processing device, and a fourth data processing device.
以上所述,仅为本申请实施例的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以上述权利要求的保护范围为准。The above is only the specific implementation of the embodiment of the present application, but the protection scope of the present application is not limited thereto. Any person familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present application. , should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be based on the protection scope of the above claims.

Claims (19)

  1. 一种数据价值评估方法,其特征在于,包括:A data value evaluation method, characterized in that it includes:
    数据评估装置向第一数据处理装置发送第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;The data evaluation device sends the first model information to the first data processing device; the first model information represents the second encrypted business model obtained by the second data processing device using its first local data to train the first encrypted business model; the first The second business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, and the first business model is the unencrypted business corresponding to the first encrypted business model Model;
    所述数据评估装置根据来自所述第一数据处理装置的第一指标信息,获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能,所述第一指标信息为所述第一数据处理装置利用所述第一模型信息和所述第二加密业务模型对应的测试数据得到;The data evaluation device obtains a first performance index according to the first index information from the first data processing device; the first performance index represents the business after training the first business model with the first local data The performance of the model, the first index information is obtained by the first data processing device using the first model information and the test data corresponding to the second encrypted business model;
    所述数据评估装置根据所述第一性能指标和第二性能指标,评估所述第一本地数据对于训练所述第一业务模型的价值;所述第二性能指标表征所述第一业务模型的性能。The data evaluation device evaluates the value of the first local data for training the first business model according to the first performance index and the second performance index; the second performance index represents the performance of the first business model performance.
  2. 根据权利要求1所述的方法,其特征在于,所述第一指标信息为所述第一数据处理装置利用加密测试数据测试所述第二加密业务模型得到,所述加密测试数据加密所述测试数据得到。The method according to claim 1, wherein the first index information is obtained by the first data processing device using encrypted test data to test the second encrypted business model, and the encrypted test data encrypts the test data obtained.
  3. 根据权利要求1或2所述的方法,其特征在于,在数据评估装置向第一数据处理装置发送第一模型信息之前,所述方法还包括:The method according to claim 1 or 2, wherein, before the data evaluation device sends the first model information to the first data processing device, the method further comprises:
    所述数据评估装置向所述第二数据处理装置发送第一加密信息;所述第一加密信息用于所述第二数据处理装置加密所述第一本地数据,所述第二加密业务模型由所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模型得到,所述第一加密数据由所述第一加密信息加密所述第一本地数据得到。The data evaluation device sends first encrypted information to the second data processing device; the first encrypted information is used by the second data processing device to encrypt the first local data, and the second encrypted business model is determined by The second data processing device uses the first encrypted data and the third model information to train the first encrypted business model, and the first encrypted data is obtained by encrypting the first local data with the first encrypted information .
  4. 根据权利要求1至3任一项所述的方法,其特征在于,在所述数据评估装置接收来自所述第一数据处理装置的所述第三模型信息之前,所述方法还包括:The method according to any one of claims 1 to 3, wherein, before the data evaluation device receives the third model information from the first data processing device, the method further comprises:
    所述数据评估装置向所述第一数据处理装置发送第一加密信息;所述第一加密信息用于所述第一数据处理装置加密第四模型信息以得到所述第三模型信息,所述第四模型信息用于训练所述第一业务模型。The data evaluation device sends first encrypted information to the first data processing device; the first encrypted information is used by the first data processing device to encrypt fourth model information to obtain the third model information, the The fourth model information is used to train the first service model.
  5. 根据权利要求1至4任一项所述的方法,其特征在于,所述数据评估装置根据来自所述第一数据处理装置的第一指标信息,获得第一性能指标包括:The method according to any one of claims 1 to 4, wherein the obtaining of the first performance index by the data evaluation device according to the first index information from the first data processing device includes:
    所述数据评估装置对所述第一指标信息做解密处理,获得所述第一性能指标。The data evaluation device decrypts the first index information to obtain the first performance index.
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述数据评估装置根据所述第一性能指标和第二性能指标,评估所述第一本地数据对于训练第一业务模型的价值之后,所述方法还包括:The method according to any one of claims 1 to 5, wherein the data evaluation device evaluates the effectiveness of the first local data for training the first business model according to the first performance index and the second performance index After value, the method also includes:
    所述数据评估装置向所述第一数据处理装置发送解密私钥;所述解密私钥用于所述第一数据处理装置对所述第二加密业务模型做解密处理。The data evaluation device sends a decryption private key to the first data processing device; the decryption private key is used by the first data processing device to decrypt the second encrypted business model.
  7. 一种数据价值评估方法,其特征在于,包括:A data value evaluation method, characterized in that it includes:
    第一数据处理装置接收来自数据评估装置的第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;The first data processing device receives the first model information from the data evaluation device; the first model information represents the second encrypted business model obtained by the second data processing device using its first local data to train the first encrypted business model; the The second business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, and the first business model is the unencrypted corresponding to the first encrypted business model business model;
    所述第一数据处理装置根据所述第一模型信息和所述第二加密业务模型对应的测试数据,向所述数据评估装置发送第一指标信息;所述第一指标信息用于所述数据评估装置获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能。The first data processing device sends first index information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model; the first index information is used for the data The evaluation device obtains a first performance index; the first performance index represents the performance of the business model after the first business model is trained by using the first local data.
  8. 根据权利要求7所述的方法,其特征在于,所述第一数据处理装置根据所述第一模型信息和所述第二加密业务模型对应的测试数据,向所述数据评估装置发送第一指标信息包括:The method according to claim 7, wherein the first data processing device sends the first index to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model Information includes:
    所述第一数据处理装置利用加密测试数据测试所述第二加密业务模型,得到所述第一指标信息;所述加密测试数据利用第一加密信息加密所述测试数据得到;The first data processing device uses the encrypted test data to test the second encrypted business model to obtain the first index information; the encrypted test data is obtained by encrypting the test data with the first encrypted information;
    所述第一数据处理装置向所述数据评估装置发送所述第一指标信息。The first data processing means sends the first index information to the data evaluation means.
  9. 根据权利要求8所述的方法,其特征在于,所述第一数据处理装置向所述数据评估装置发送第三模型信息之前,所述方法还包括:The method according to claim 8, wherein before the first data processing device sends the third model information to the data evaluation device, the method further comprises:
    所述第一数据处理装置接收来自所述数据评估装置的第一加密信息;said first data processing means receives first encrypted information from said data evaluation means;
    所述第一数据处理装置利用所述第一加密信息对第四模型信息做加密处理,得到所述第三模型信息,所述第四模型信息用于训练所述第一业务模型。The first data processing device encrypts fourth model information by using the first encrypted information to obtain the third model information, and the fourth model information is used for training the first service model.
  10. 根据权利要求7至9任一项所述的方法,其特征在于,在向所述数据评估装置发送第一指标信息之后,所述方法还包括:The method according to any one of claims 7 to 9, characterized in that, after sending the first indicator information to the data evaluation device, the method further comprises:
    所述第一数据处理装置接收来自所述数据评估装置的解密私钥;said first data processing means receives a decryption private key from said data evaluation means;
    所述第一数据处理装置利用所述解密私钥对所述第二加密业务模型做解密处理,得到所述第二业务模型。The first data processing device uses the decryption private key to decrypt the second encrypted business model to obtain the second business model.
  11. 一种数据价值评估方法,其特征在于,包括:A data value evaluation method, characterized in that it includes:
    第二数据处理装置接收来自数据评估装置的第三模型信息;所述第三模型信息用于训练第一加密业务模型,所述第一加密业务模型与对属于第一数据处理装置的第一业务模型做加密处理得到的业务模型相同;The second data processing device receives the third model information from the data evaluation device; the third model information is used to train the first encrypted business model, and the first encrypted business model is related to the first business belonging to the first data processing device The business model obtained by encrypting the model is the same;
    所述第二数据处理装置向所述数据评估装置发送第二模型信息;所述第二模型信息用于所述数据评估装置获得第一模型信息,所述第一模型信息表征所述第二数据处理装置利用其第一本地数据训练所述一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练所述第一业务模型后的业务模型相同。The second data processing device sends second model information to the data evaluation device; the second model information is used by the data evaluation device to obtain first model information, and the first model information represents the second data The processing device uses its first local data to train the second encrypted business model obtained from the first encrypted business model; the second encrypted business model obtained by decrypting the second encrypted business model is the same as Business model after business model is the same.
  12. 根据权利要求11所述的方法,其特征在于,在第二数据处理装置接收来自所述数据评估装置的第三模型信息之后,所述第二数据处理装置向所述数据评估装置发送第二模型信息之前,所述方法还包括:The method according to claim 11, characterized in that after the second data processing device receives the third model information from the data evaluation device, the second data processing device sends the second model to the data evaluation device Before the information, the method also includes:
    所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模 型,得到所述第二加密业务模型;所述第一加密数据由对所述第一本地数据做加密处理得到;The second data processing device uses the first encrypted data and the third model information to train the first encrypted business model to obtain the second encrypted business model; the first encrypted data is provided by the first local The data is obtained through encryption;
    所述第二数据处理装置根据所述第二加密业务模型,得到所述第二模型信息。The second data processing device obtains the second model information according to the second encrypted service model.
  13. 根据权利要求12所述的方法,其特征在于,所述第二数据处理装置利用第一加密数据和所述第三模型信息训练所述第一加密业务模型,得到第二加密模型之前,所述方法还包括:The method according to claim 12, wherein the second data processing device uses the first encrypted data and the third model information to train the first encrypted business model, and before obtaining the second encrypted model, the Methods also include:
    所述第二数据处理装置接收来自所述数据评估装置的所述第一加密信息;said second data processing means receives said first encrypted information from said data evaluation means;
    所述第二数据处理装置利用所述第一加密信息对所述第一本地数据做加密处理,得到所述第一加密数据。The second data processing device encrypts the first local data by using the first encryption information to obtain the first encrypted data.
  14. 根据权利要求11至13任一项所述的方法,其特征在于,所述第二数据处理装置向所述数据评估装置发送第二模型信息之后,所述方法还包括:The method according to any one of claims 11 to 13, wherein after the second data processing device sends the second model information to the data evaluation device, the method further comprises:
    所述第二数据处理装置接收来自所述数据评估装置的第三模型信息;所述第三模型信息用于训练所述第一加密业务模型;The second data processing device receives third model information from the data evaluation device; the third model information is used to train the first encrypted business model;
    所述第二数据处理装置利用所述第一本地数据训练所述第一加密业务模型,得到所述第二加密业务模型;The second data processing device uses the first local data to train the first encrypted business model to obtain the second encrypted business model;
    所述第二数据处理装置向所述第一数据处理装置发送第二模型信息;所述第二模型信息用于所述第一数据处理装置解密得到第二业务模型的参数。The second data processing device sends second model information to the first data processing device; the second model information is used by the first data processing device to decrypt to obtain parameters of the second service model.
  15. 一种数据价值评估装置,其特征在于,包括:A data value evaluation device, characterized in that it includes:
    收发模块,用于向第一数据处理装置发送第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;The transceiver module is configured to send the first model information to the first data processing device; the first model information represents the second encrypted business model obtained by the second data processing device using its first local data to train the first encrypted business model; The second business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, and the first business model is the unencrypted version corresponding to the first encrypted business model. business model;
    处理模块,用于根据来自所述第一数据处理装置的第一指标信息,获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能,所述第一指标信息为所述第一数据处理装置利用所述第一模型信息和所述第二加密业务模型对应的测试数据得到;A processing module, configured to obtain a first performance index according to the first index information from the first data processing device; the first performance index represents the business after training the first business model with the first local data The performance of the model, the first index information is obtained by the first data processing device using the first model information and the test data corresponding to the second encrypted business model;
    所述处理模块,还用于根据所述第一性能指标和第二性能指标,评估所述第一本地数据对于训练所述第一业务模型的价值;所述第二性能指标表征所述第一业务模型的性能。The processing module is further configured to evaluate the value of the first local data for training the first business model according to the first performance index and the second performance index; the second performance index characterizes the first Performance of the business model.
  16. 一种数据处理装置,其特征在于,包括:A data processing device, characterized in that it comprises:
    收发模块,用于接收来自数据评估装置的第一模型信息;所述第一模型信息表征第二数据处理装置利用其第一本地数据训练第一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练第一业务模型后的业务模型相同,所述第一业务模型为所述第一加密业务模型对应的未加密的业务模型;The transceiver module is configured to receive the first model information from the data evaluation device; the first model information represents the second encrypted business model obtained by the second data processing device using its first local data to train the first encrypted business model; the The second business model obtained by decrypting the second encrypted business model is the same as the business model after using the first local data to train the first business model, and the first business model is the unencrypted corresponding to the first encrypted business model business model;
    处理模块,用于根据所述第一模型信息和所述第二加密业务模型对应的测试数据,控制所述收发模块向所述数据评估装置发送第一指标信息;所述第一指标信息用于所述数据评估装置获得第一性能指标;所述第一性能指标表征利用所述第一本地数据训练所述第一业务模型后的业务模型的性能。A processing module, configured to control the transceiver module to send first index information to the data evaluation device according to the first model information and the test data corresponding to the second encrypted business model; the first index information is used for The data evaluation device obtains a first performance index; the first performance index represents the performance of the business model after the first business model is trained by using the first local data.
  17. 一种数据处理装置,其特征在于,包括:A data processing device, characterized in that it comprises:
    收发模块,用于接收来自数据评估装置的第三模型信息;所述第三模型信息用于训练第一加密业务模型,所述第一加密业务模型与对属于第一数据处理装置的第一业务模型做加密处理得到的业务模型相同;The transceiver module is used to receive the third model information from the data evaluation device; the third model information is used to train the first encrypted business model, and the first encrypted business model is related to the first business belonging to the first data processing device The business model obtained by encrypting the model is the same;
    所述收发模块,还用于向所述数据评估装置发送第二模型信息;所述第二模型信息用于所述数据评估装置获得第一模型信息,所述第一模型信息表征所述第二数据处理装置利用其第一本地数据训练所述一加密业务模型得到的第二加密业务模型;所述第二加密业务模型解密得到的第二业务模型与利用所述第一本地数据训练所述第一业务模型后的业务模型相同。The transceiver module is further configured to send second model information to the data evaluation device; the second model information is used by the data evaluation device to obtain first model information, and the first model information represents the second model information. The data processing device uses its first local data to train the second encrypted business model obtained from the first encrypted business model; the second encrypted business model obtained by decrypting the second encrypted business model is the same as the second encrypted business model obtained by using the first local data to train the first The business model following a business model is the same.
  18. 一种数据价值评估系统,其特征在于,包括:权利要求15所述的数据价值评估装置、权利要求16所述的数据处理装置以及权利要求17所述的数据处理装置。A data value evaluation system, characterized by comprising: the data value evaluation device according to claim 15, the data processing device according to claim 16, and the data processing device according to claim 17.
  19. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时,使所述处理器执行权利要求1至14任意一项所述的方法。A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program includes program instructions, and when the program instructions are executed by a processor, the processor executes The method according to any one of claims 1 to 14.
PCT/CN2021/133297 2021-11-25 2021-11-25 Data value evaluation method and related product WO2023092428A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/133297 WO2023092428A1 (en) 2021-11-25 2021-11-25 Data value evaluation method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/133297 WO2023092428A1 (en) 2021-11-25 2021-11-25 Data value evaluation method and related product

Publications (1)

Publication Number Publication Date
WO2023092428A1 true WO2023092428A1 (en) 2023-06-01

Family

ID=86538584

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/133297 WO2023092428A1 (en) 2021-11-25 2021-11-25 Data value evaluation method and related product

Country Status (1)

Country Link
WO (1) WO2023092428A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070088465A1 (en) * 2004-11-01 2007-04-19 Heffington Mark F Programmable automotive computer method and apparatus with accelerometer input
CN108681926A (en) * 2018-05-21 2018-10-19 陕西省信息化工程研究院 A kind of data value appraisal procedure
CN112927022A (en) * 2021-03-23 2021-06-08 湖南汽车工程职业学院 Electric automobile evaluation system based on big data
CN113128686A (en) * 2020-01-16 2021-07-16 华为技术有限公司 Model training method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070088465A1 (en) * 2004-11-01 2007-04-19 Heffington Mark F Programmable automotive computer method and apparatus with accelerometer input
CN108681926A (en) * 2018-05-21 2018-10-19 陕西省信息化工程研究院 A kind of data value appraisal procedure
CN113128686A (en) * 2020-01-16 2021-07-16 华为技术有限公司 Model training method and device
CN112927022A (en) * 2021-03-23 2021-06-08 湖南汽车工程职业学院 Electric automobile evaluation system based on big data

Similar Documents

Publication Publication Date Title
CN113032840B (en) Data processing method, device, equipment and computer readable storage medium
US20170359321A1 (en) Secure Data Exchange
TW201947476A (en) Blockchain-based logistics information transmission method, system and device
KR102224390B1 (en) Data statistics method and apparatus
CN108650077B (en) Block chain based information transmission method, terminal, equipment and readable storage medium
CN113505894A (en) Longitudinal federated learning linear regression and logistic regression model training method and device
CN111367903A (en) Credit report generation method based on block chain and related system
CN113748440A (en) Secure multi-party computing attribution
CN111027981B (en) Method and device for multi-party joint training of risk assessment model for IoT (Internet of things) machine
US20200259819A1 (en) Systems and methods for managing secure sharing of online data
CN110493268A (en) A kind of data processing method and device based on block chain network
CN112163954A (en) Transaction method and device based on block chain
Brandao et al. Nist first call for multi-party threshold schemes
CN113810168A (en) Training method of machine learning model, server and computer equipment
CN116244725A (en) File processing method and device based on block chain, equipment and file contribution system
WO2023092428A1 (en) Data value evaluation method and related product
CN113067822A (en) Block chain-based information processing method, apparatus, device, medium, and product
CN110232570B (en) Information supervision method and device
CN113821811B (en) Block chain-based data acquisition method and system, electronic equipment and storage medium
Chenli et al. Fairtrade: Efficient atomic exchange-based fair exchange protocol for digital data trading
JP2024510658A (en) Data processing methods, devices, electronic devices, and storage media for multi-source data
CN114037492A (en) Bidding method, system, equipment and storage medium based on block chain
CN111131227B (en) Data processing method and device
CN118119960A (en) Data value evaluation method and related product
CN112116414A (en) Auction type safe nearest neighbor target base source searching system and method supporting range verification

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21965163

Country of ref document: EP

Kind code of ref document: A1