CN115442152A - Method and device for service evaluation - Google Patents
Method and device for service evaluation Download PDFInfo
- Publication number
- CN115442152A CN115442152A CN202211128186.XA CN202211128186A CN115442152A CN 115442152 A CN115442152 A CN 115442152A CN 202211128186 A CN202211128186 A CN 202211128186A CN 115442152 A CN115442152 A CN 115442152A
- Authority
- CN
- China
- Prior art keywords
- evaluation
- model
- data
- business
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 145
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000013210 evaluation model Methods 0.000 claims abstract description 169
- 238000004364 calculation method Methods 0.000 claims abstract description 17
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 43
- 230000005611 electricity Effects 0.000 claims description 33
- 238000012886 linear function Methods 0.000 claims description 26
- 238000004422 calculation algorithm Methods 0.000 claims description 18
- 230000002159 abnormal effect Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 9
- 238000004458 analytical method Methods 0.000 claims description 2
- 238000012502 risk assessment Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 239000000654 additive Substances 0.000 description 5
- 230000000996 additive effect Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012954 risk control Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012417 linear regression Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
技术领域technical field
本发明涉及联合学习技术领域,尤其涉及一种业务评估的方法和装置。The invention relates to the technical field of joint learning, in particular to a method and device for business evaluation.
背景技术Background technique
在风控领域,模型提供方和数据提供方由于各自的保密要求,需要对各自持有的评估模型和业务数据分别进行保密。为了实现在模型提供方不获取真实业务数据的基础上仍能够利用业务数据进行风险评估,在现有的实现过程中,通常需要模型提供方和数据提供方共同选择可信任的服务端,由模型提供方对模型进行加密将加密后的模型存储至服务端,在数据提供方需要使用模型的时候,将业务数据上传至服务端以在服务端使用模型。此种方式需要将评估模型和业务数据同时上传到服务端使用,因此在服务端可信性存在问题时,解密后的模型以及上传的数据都存在泄露的风险,安全性差。In the field of risk control, due to their respective confidentiality requirements, the model provider and the data provider need to keep their respective evaluation models and business data confidential. In order to realize risk assessment using business data without the model provider obtaining real business data, in the existing implementation process, it is usually necessary for the model provider and the data provider to jointly select a trusted server. The provider encrypts the model and stores the encrypted model to the server, and when the data provider needs to use the model, uploads the business data to the server to use the model on the server. This method needs to upload the evaluation model and business data to the server for use at the same time. Therefore, when there is a problem with the credibility of the server, the decrypted model and uploaded data are at risk of leakage, and the security is poor.
发明内容Contents of the invention
有鉴于此,本发明实施例提供一种业务评估的方法和装置,无需利用可信的第三方服务端使用模型,模型提供方和数据提供方分别对各自持有的评估模型和业务数据进行加密,并仅由模型提供方存储可以用于解析评估模型的第一私钥,提高了数据的安全性。同时利用同态加密技术实现了加密后的业务数据与加密后评估模型之间的计算,进而保证在模型提供方不知晓真实的业务数据的情况下,也可以利用第一私钥对数据提供方反馈的密文进行解析,得到评估模型对应的评估值,方便快捷。In view of this, the embodiments of the present invention provide a method and device for business evaluation, without using a trusted third-party server to use the model, the model provider and the data provider respectively encrypt the evaluation model and business data held by them , and only the model provider stores the first private key that can be used to analyze and evaluate the model, which improves data security. At the same time, homomorphic encryption technology is used to realize the calculation between the encrypted business data and the encrypted evaluation model, thereby ensuring that the first private key can also be used to pair the data provider with the model provider without knowing the real business data. The feedback ciphertext is analyzed to obtain the evaluation value corresponding to the evaluation model, which is convenient and quick.
为实现上述目的,根据本发明实施例的一个方面,提供了一种应用于模型提供方的业务评估的方法。To achieve the above purpose, according to an aspect of the embodiments of the present invention, a method for service evaluation applied to a model provider is provided.
本发明实施例的一种业务评估的方法包括:获取用于业务评估的评估模型;对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;接收所述数据提供方反馈的密文,利用第一私钥对所述密文进行解析,以得到所述评估模型对应的评估值;其中,所述密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;根据所述评估值确定所述业务的评估结果。A business evaluation method in an embodiment of the present invention includes: obtaining an evaluation model for business evaluation; performing homomorphic encryption on the evaluation model, and sending the encrypted evaluation model to a data provider; receiving the data provided The ciphertext fed back by the party is analyzed by using the first private key to obtain the evaluation value corresponding to the evaluation model; wherein, the ciphertext is the encrypted business data and the encrypted Calculated by the evaluation model; determine the evaluation result of the business according to the evaluation value.
可选地,所述对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方,包括:将所述评估模型转化为线性函数;对所述线性函数中的系数进行同态加密;对所述线性函数进行同态加密,并将加密后的线性函数发送至数据提供方。Optionally, performing homomorphic encryption on the evaluation model, and sending the encrypted evaluation model to the data provider includes: converting the evaluation model into a linear function; Homomorphic encryption: perform homomorphic encryption on the linear function, and send the encrypted linear function to the data provider.
可选地,所述对所述线性函数进行同态加密,包括:通过概率公钥加密算法对所述线性函数中一个或多个业务数据对应的系数分别进行同态加密。Optionally, performing homomorphic encryption on the linear function includes: performing homomorphic encryption on coefficients corresponding to one or more service data in the linear function by using a probabilistic public key encryption algorithm.
可选地,该方法还包括:利用业务营业收入以及影响所述业务营业收入的一个或多个业务数据,构建所述评估模型。Optionally, the method further includes: constructing the evaluation model by using business revenue and one or more business data that affect the business revenue.
可选地,所述利用业务营业收入以及影响所述业务营业收入的一个或多个业务数据,构建所述评估模型,包括:获取所述业务营业收入;确定所述一个或多个业务数据分别对应的系数;以各个所述业务数据与对应系数的乘积之和作为分母,以所述业务营业收入作为分子,构建所述评估模型。Optionally, constructing the evaluation model by using business revenue and one or more business data affecting the business revenue includes: obtaining the business revenue; determining the one or more business data respectively Corresponding coefficients; using the sum of the products of each of the business data and the corresponding coefficients as the denominator and the business revenue as the numerator to construct the evaluation model.
可选地,在所述业务为互联网数据中心租赁业务时,所述业务数据包括:业务的用电量以及用水量;所述评估模型的评估值指示了所述业务的风险情况;所述利用业务营业收入以及影响所述业务营业收入的一个或多个业务数据,构建所述评估模型,包括:根据单位机柜的租售价格确定租赁业务的营业收入;根据业务的用电量、用水量以及电量和水量的单位价格,确定业务所用的水费以及电费;以与所述水费对应的第一系数与所述水费的乘积、以及与所述电费对应的第二系数与所述电费的乘积之和作为分母,以所述租赁业务的营业收入作为分子,构建所述评估模型。Optionally, when the business is an Internet data center leasing business, the business data includes: power consumption and water consumption of the business; the evaluation value of the evaluation model indicates the risk situation of the business; the utilization Business revenue and one or more business data that affect the business revenue, constructing the evaluation model, including: determining the business revenue of the leasing business according to the rental and sales price of the unit cabinet; The unit price of electricity and water volume is used to determine the water fee and electricity fee used by the business; the product of the first coefficient corresponding to the water fee and the water fee, and the second coefficient corresponding to the electricity fee and the product of the electricity fee The sum of the products is used as the denominator, and the operating income of the leasing business is used as the numerator to construct the evaluation model.
可选地,所述对所述线性函数进行同态加密,包括:对所述第一系数、所述第二系数以及所述评估模型对应的评估值分别进行同态加密。Optionally, performing homomorphic encryption on the linear function includes: performing homomorphic encryption on the first coefficient, the second coefficient, and the evaluation value corresponding to the evaluation model respectively.
可选地,所述密文为所述数据提供方对所述用电量以及所述用水量分别进行同态加密后,将所述加密后的用电量以及用水量填充至所述评估模型得到的评估值。Optionally, the ciphertext is that the data provider performs homomorphic encryption on the electricity consumption and the water consumption respectively, and fills the encrypted electricity consumption and water consumption into the evaluation model The obtained evaluation value.
可选地,所述根据所述评估值确定所述业务的评估结果,包括:在所述评估值超过预设范围的情况下,确定所述业务的评估结果为存在异常风险;在所述评估值不超过预设范围的情况下,确定所述业务的评估结果为不存在异常风险。Optionally, the determining the evaluation result of the business according to the evaluation value includes: when the evaluation value exceeds a preset range, determining that there is an abnormal risk in the evaluation result of the business; When the value does not exceed the preset range, it is determined that there is no abnormal risk in the evaluation result of the business.
可选地,在所述业务为商铺租赁业务时,所述业务数据包括:客流量以及客户消费单价;所述评估模型的评估值指示了所述业务的风险情况。Optionally, when the business is a store leasing business, the business data includes: passenger flow and customer consumption unit price; the evaluation value of the evaluation model indicates the risk situation of the business.
为实现上述目的,根据本发明实施例的一个方面,提供了另一种应用于数据提供方的业务评估的方法。To achieve the above object, according to an aspect of the embodiments of the present invention, another method for service evaluation applied to a data provider is provided.
本发明实施例的另一种业务评估的方法包括:接收模型提供方发送的加密后的评估模型,并获取业务所需的业务数据;对所述业务数据进行同态加密;根据加密后的业务数据以及所述加密后的评估模型,确定所述业务对应的密文;将所述密文发送至所述模型提供方,以使所述模型提供方根据所述密文确定所述业务的评估结果。Another business evaluation method in the embodiment of the present invention includes: receiving the encrypted evaluation model sent by the model provider, and obtaining the business data required by the business; performing homomorphic encryption on the business data; Data and the encrypted evaluation model, determine the ciphertext corresponding to the business; send the ciphertext to the model provider, so that the model provider can determine the evaluation of the business according to the ciphertext result.
可选地,所述加密后的业务数据对应第二私钥,且所述第二私钥与第一私钥不同。Optionally, the encrypted service data corresponds to a second private key, and the second private key is different from the first private key.
可选地,所述根据加密后的业务数据以及所述加密后的评估模型,确定所述业务对应的密文,包括:利用加法同态算法和/或乘法同态算法对所述加密后的业务数据和所述加密后的评估模型进行计算,确定所述业务对应的密文。Optionally, the determining the ciphertext corresponding to the service according to the encrypted service data and the encrypted evaluation model includes: using an additive homomorphic algorithm and/or a multiplicative homomorphic algorithm to encrypt the encrypted The business data and the encrypted evaluation model are calculated to determine the ciphertext corresponding to the business.
为实现上述目的,根据本发明实施例的又一方面,提供了一种应用于模型提供方的业务评估的装置。In order to achieve the above purpose, according to yet another aspect of the embodiments of the present invention, an apparatus for service evaluation applied to a model provider is provided.
本发明实施例的一种业务评估的装置包括:获取模块,用于获取用于业务评估的评估模型;加密模块,用于对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;解析模块,用于接收所述数据提供方反馈的密文,利用第一私钥对所述密文进行解析,以得到所述评估模型对应的评估值;其中,所述密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;评估模块,用于根据所述评估值确定所述业务的评估结果。A service evaluation device according to an embodiment of the present invention includes: an acquisition module, configured to obtain an evaluation model for service evaluation; an encryption module, configured to perform homomorphic encryption on the evaluation model, and send the encrypted evaluation model to To the data provider; the parsing module is configured to receive the ciphertext fed back by the data provider, and use the first private key to parse the ciphertext to obtain the evaluation value corresponding to the evaluation model; wherein, the ciphertext The text is calculated by the data provider based on the encrypted business data and the encrypted evaluation model; the evaluation module is configured to determine the evaluation result of the business according to the evaluation value.
为实现上述目的,根据本发明实施例的又一方面,提供了一种应用于数据提供方的业务评估的装置。In order to achieve the above object, according to yet another aspect of the embodiments of the present invention, an apparatus for service evaluation applied to a data provider is provided.
本发明实施例的一种业务评估的装置包括:获取模块,用于接收模型提供方发送的加密后的评估模型,并获取业务所需的业务数据;加密模块,用于对所述业务数据进行同态加密;计算模块,用于根据加密后的业务数据以及所述加密后的评估模型,确定所述业务对应的密文;发送模块,用于将所述密文发送至所述模型提供方,以使所述模型提供方根据所述密文确定所述业务的评估结果。A business evaluation device according to an embodiment of the present invention includes: an acquisition module, configured to receive the encrypted evaluation model sent by the model provider, and acquire business data required by the business; an encryption module, configured to process the business data Homomorphic encryption; a calculation module, used to determine the ciphertext corresponding to the service according to the encrypted business data and the encrypted evaluation model; a sending module, used to send the ciphertext to the model provider , so that the model provider determines the evaluation result of the service according to the ciphertext.
为实现上述目的,根据本发明实施例的又一方面,提供了一种业务评估的系统。To achieve the above object, according to still another aspect of the embodiments of the present invention, a service evaluation system is provided.
本发明实施例的一种业务评估的系统包括:上述模型提供方以及数据提供方,其中,A business evaluation system in an embodiment of the present invention includes: the above-mentioned model provider and data provider, wherein,
所述模型提供方,用于获取用于业务评估的评估模型;对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;The model provider is used to obtain an evaluation model for business evaluation; perform homomorphic encryption on the evaluation model, and send the encrypted evaluation model to the data provider;
所述数据提供方,用于接收模型提供方发送的加密后的评估模型,并获取业务所需的业务数据;对所述业务数据进行同态加密;根据加密后的业务数据以及所述加密后的评估模型,确定所述业务对应的密文;将所述密文发送至所述模型提供方;The data provider is used to receive the encrypted evaluation model sent by the model provider, and obtain the business data required by the business; perform homomorphic encryption on the business data; according to the encrypted business data and the encrypted An evaluation model for determining the ciphertext corresponding to the business; sending the ciphertext to the model provider;
所述模型提供方还用于接收所述数据提供方反馈的密文,利用第一私钥对所述密文进行解析,以得到所述评估模型对应的评估值;其中,所述密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;根据所述评估值确定所述业务的评估结果。The model provider is also used to receive the ciphertext fed back by the data provider, and use the first private key to analyze the ciphertext to obtain the evaluation value corresponding to the evaluation model; wherein, the ciphertext is Calculated by the data provider based on the encrypted business data and the encrypted evaluation model; determine the evaluation result of the business based on the evaluation value.
为实现上述目的,根据本发明实施例的又一方面,提供了一种用于业务评估的电子设备。To achieve the above purpose, according to yet another aspect of the embodiments of the present invention, an electronic device for service evaluation is provided.
本发明实施例的一种业务评估的电子设备包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现本发明实施例的一种业务评估的方法。An electronic device for business evaluation in an embodiment of the present invention includes: one or more processors; a storage device for storing one or more programs, when the one or more programs are executed by the one or more processors Executing, so that the one or more processors implement a service evaluation method in an embodiment of the present invention.
为实现上述目的,根据本发明实施例的再一方面,提供了一种计算机可读存储介质。To achieve the above purpose, according to still another aspect of the embodiments of the present invention, a computer-readable storage medium is provided.
本发明实施例的一种计算机可读存储介质,其上存储有计算机程序,所述程序被处理器执行时实现本发明实施例的一种业务评估的方法。A computer-readable storage medium in an embodiment of the present invention stores a computer program thereon, and when the program is executed by a processor, a service evaluation method in an embodiment of the present invention is implemented.
上述发明中的一个实施例具有如下优点或有益效果:无需利用可信的第三方服务端使用模型,模型提供方和数据提供方分别对各自持有的评估模型和业务数据进行加密,并仅由模型提供方存储可以用于解析评估模型的第一私钥,利用同态加密技术实现了加密后的业务数据与加密后评估模型之间的计算,进而保证在模型提供方不知晓真实的业务数据的情况下,也可以利用第一私钥对数据提供方反馈的密文进行解析,得到评估模型对应的评估值。An embodiment of the above invention has the following advantages or beneficial effects: no need to use a trusted third-party server to use the model, the model provider and the data provider respectively encrypt the evaluation model and business data held by them, and only by The model provider stores the first private key that can be used to analyze the evaluation model, and uses homomorphic encryption technology to realize the calculation between the encrypted business data and the encrypted evaluation model, thereby ensuring that the model provider does not know the real business data In the case of , the first private key can also be used to analyze the ciphertext fed back by the data provider to obtain the evaluation value corresponding to the evaluation model.
上述的非惯用的可选方式所具有的进一步效果将在下文中结合具体实施方式加以说明。The further effects of the above-mentioned non-conventional alternatives will be described below in conjunction with specific embodiments.
附图说明Description of drawings
附图用于更好地理解本发明,不构成对本发明的不当限定。其中:The accompanying drawings are used to better understand the present invention, and do not constitute improper limitations to the present invention. in:
图1是根据本发明实施例的用于模型提供方的业务评估的方法的流程示意图;FIG. 1 is a schematic flowchart of a method for business evaluation of a model provider according to an embodiment of the present invention;
图2是根据本发明实施例的同态加密的流程示意图;Fig. 2 is a schematic flow chart of homomorphic encryption according to an embodiment of the present invention;
图3是根据本发明实施例的构建评估模型的流程示意图;Fig. 3 is a schematic flow chart of constructing an evaluation model according to an embodiment of the present invention;
图4是根据本发明实施例的确定业务的评估结果的流程示意图;Fig. 4 is a schematic flowchart of determining the evaluation result of a service according to an embodiment of the present invention;
图5是根据本发明实施例的互联网数据中心租赁业务下构建评估模型的流程示意图;Fig. 5 is a schematic flow diagram of constructing an evaluation model under an Internet data center leasing service according to an embodiment of the present invention;
图6是根据本发明实施例的用于数据提供方的业务评估的方法的流程示意图;FIG. 6 is a schematic flowchart of a method for business evaluation of a data provider according to an embodiment of the present invention;
图7是根据本发明实施例的用于模型提供方的业务评估的装置示意图;Fig. 7 is a schematic diagram of a device for business evaluation of a model provider according to an embodiment of the present invention;
图8是根据本发明实施例的用于数据提供方的业务评估的装置示意图;Fig. 8 is a schematic diagram of a device for service evaluation of a data provider according to an embodiment of the present invention;
图9是根据本发明实施例的业务评估的系统的示意图;Fig. 9 is a schematic diagram of a service evaluation system according to an embodiment of the present invention;
图10是本发明实施例可以应用于其中的示例性系统架构图;Fig. 10 is an exemplary system architecture diagram to which the embodiment of the present invention can be applied;
图11是适于用来实现本发明实施例的终端设备或服务器的计算机系统的结构示意图。Fig. 11 is a schematic structural diagram of a computer system suitable for implementing a terminal device or a server according to an embodiment of the present invention.
具体实施方式detailed description
以下结合附图对本发明的示范性实施例做出说明,其中包括本发明实施例的各种细节以助于理解,应当将它们认为仅仅是示范性的。因此,本领域普通技术人员应当认识到,可以对这里描述的实施例做出各种改变和修改,而不会背离本发明的范围和精神。同样,为了清楚和简明,以下的描述中省略了对公知功能和结构的描述。Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
需要指出的是,在不冲突的情况下,本发明的实施例以及实施例中的技术特征可以相互结合。It should be noted that, in the case of no conflict, the embodiments of the present invention and the technical features in the embodiments can be combined with each other.
图1是根据本发明实施例的应用于模型提供方的业务评估的方法的主要步骤的示意图。Fig. 1 is a schematic diagram of main steps of a method for business evaluation applied to a model provider according to an embodiment of the present invention.
如图1所示,本发明实施例的业务评估的方法主要包括以下步骤:As shown in Figure 1, the method for service evaluation in the embodiment of the present invention mainly includes the following steps:
步骤S101:获取用于业务评估的评估模型;Step S101: Obtain an evaluation model for business evaluation;
步骤S102:对评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;Step S102: Perform homomorphic encryption on the evaluation model, and send the encrypted evaluation model to the data provider;
步骤S103:接收数据提供方反馈的密文,利用第一私钥对密文进行解析,以得到评估模型对应的评估值;其中,密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;Step S103: Receive the ciphertext fed back by the data provider, and use the first private key to analyze the ciphertext to obtain the evaluation value corresponding to the evaluation model; where the ciphertext is the encrypted business data and the encrypted Calculated by the evaluation model;
步骤S104:根据评估值确定业务的评估结果。Step S104: Determine the evaluation result of the business according to the evaluation value.
其中,评估模型是用于对业务进行评估的模型,在风控领域,投资方通常会设计针对不同业务的评估模型,也就是模型提供方,为了对各个上市公司进行风险评估,以避免上市公司所提供的营业收入以及各种其他数据存在造假现象,进而对上市公司进行合理投资。Among them, the evaluation model is a model used to evaluate the business. In the field of risk control, investors usually design evaluation models for different businesses, that is, the model provider. The operating income and various other data provided are falsified, so as to make reasonable investments in listed companies.
需要说明的是,步骤S102中仅可使用同态加密,而不能使用其他加密算法,是因为同态加密(homomorphic encryption,HE)技术允许在加密之后的密文上直接进行计算,且计算结果解密后正好与明文的计算结果一致。按照支持的功能划分,目前的全同态加密方案可以分为“部分同态加密”和“全同态加密”(fully homomorphic encryption,FHE)两类。由于部分同态加密仅支持一种同态运算的方案,支持的运算单一,仅能实现均值、线性回归等简单统计运算,无法满足复杂应用场景的实际需求。因此在一种可选的实施例中,根据应用场景的不同,本发明实施例中的同态加密是指全同态加密,可以同时支持加法同态和乘法同态。It should be noted that only homomorphic encryption can be used in step S102, and other encryption algorithms cannot be used, because the homomorphic encryption (homomorphic encryption, HE) technology allows direct calculation on the encrypted ciphertext, and the calculation result is decrypted After that, it is exactly the same as the calculation result of the plaintext. According to the supported functions, the current fully homomorphic encryption schemes can be divided into two categories: "partially homomorphic encryption" and "fully homomorphic encryption" (FHE). Because some homomorphic encryption only supports one homomorphic operation scheme, the supported operation is single, and only simple statistical operations such as mean value and linear regression can be realized, which cannot meet the actual needs of complex application scenarios. Therefore, in an optional embodiment, according to different application scenarios, the homomorphic encryption in the embodiment of the present invention refers to fully homomorphic encryption, which can support additive homomorphism and multiplicative homomorphism at the same time.
在同态加密过程中,会生成对应的公钥和私钥,以对评估模型进行加密和解密,步骤S103中的第一私钥则是模型提供方在对模型进行加密的过程中生成的私钥,仅由模型提供方保管,因此保证了评估模型的安全性,在外界无法获得第一私钥的情况下,无法对评估模型进行解密,得到真实的评估模型。另外,由于数据提供方反馈的密文是数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的,因此在计算之前数据提供方也需要先对业务数据也进行同态加密,即会生成仅由数据提供方保管的第二私钥。由于第一私钥和第二私钥分别由加密的一方进行单独保管,因此可以同时保证评估模型和业务数据的隐私。During the homomorphic encryption process, the corresponding public key and private key will be generated to encrypt and decrypt the evaluation model. The first private key in step S103 is the private key generated by the model provider during the process of encrypting the model. The key is only kept by the model provider, so the security of the evaluation model is guaranteed. If the first private key cannot be obtained by the outside world, the evaluation model cannot be decrypted and the real evaluation model can be obtained. In addition, since the ciphertext fed back by the data provider is calculated by the data provider based on the encrypted business data and the encrypted evaluation model, the data provider also needs to perform homomorphic encryption on the business data before calculation, that is, A second private key is generated that is kept only by the data provider. Since the first private key and the second private key are separately kept by the encrypted party, the privacy of the evaluation model and business data can be guaranteed at the same time.
对于步骤S102中的加密过程,在一种可选的实施例中,如图2所示,包括:For the encryption process in step S102, in an optional embodiment, as shown in Figure 2, including:
步骤S201:将评估模型转化为线性函数;Step S201: converting the evaluation model into a linear function;
步骤S202:对线性函数进行同态加密,并将加密后的线性函数发送至数据提供方。Step S202: Perform homomorphic encryption on the linear function, and send the encrypted linear function to the data provider.
通过将评估模型转化为线性函数,可以得到评估模型对应的评估值的简化表达式,以便于在同态加密后可以进行乘法或加法运算,对于复杂的评估模型,可以转化为多个线性函数,然后针对每个线性函数进行同态加密,并将加密后的多个线性函数发送至数据提供方。在进一步可选的实施例中,步骤S202中对线性函数进行同态加密,可以包括:通过概率公钥加密算法对线性函数中一个或多个业务数据对应的系数分别进行同态加密。其中,概率公钥加密算法可以理解为paillier同态加密算法,可以同时满足加法和乘法同态。By converting the evaluation model into a linear function, the simplified expression of the evaluation value corresponding to the evaluation model can be obtained, so that multiplication or addition can be performed after homomorphic encryption. For complex evaluation models, it can be converted into multiple linear functions. Then perform homomorphic encryption for each linear function, and send the encrypted multiple linear functions to the data provider. In a further optional embodiment, performing homomorphic encryption on the linear function in step S202 may include: respectively performing homomorphic encryption on coefficients corresponding to one or more service data in the linear function by using a probabilistic public key encryption algorithm. Among them, the probabilistic public key encryption algorithm can be understood as a paillier homomorphic encryption algorithm, which can satisfy addition and multiplication homomorphism at the same time.
对于风险评估场景,一种可选的实施例中,可以利用业务营业收入以及影响所述业务营业收入的一个或多个业务数据,构建评估模型。具体如图3所示,包括:For a risk assessment scenario, in an optional embodiment, an assessment model may be constructed using business revenue and one or more business data that affect the business revenue. Specifically as shown in Figure 3, including:
步骤S301:获取业务营业收入;Step S301: Obtain business operating income;
步骤S302:确定一个或多个业务数据分别对应的系数;Step S302: Determine coefficients respectively corresponding to one or more business data;
步骤S303:以各个业务数据与对应系数的乘积之和作为分母,以业务营业收入作为分子,构建评估模型。Step S303: The sum of the products of each business data and the corresponding coefficient is used as the denominator, and the operating income of the business is used as the numerator to construct an evaluation model.
其中,各个上市公司为了获得投资,会提供其业务营业收入,以向各个投资方表明公司营业良好,具备投资前景。而准备进行投资的模型提供方则需要根据上市公司所外报的业务营业收入,来判断上市公司是否虚报,以及经营状况是否具备良好。本发明实施例中的业务营业收入就是上市公司所申报的业务营业收入,可以通过官方的经营状况中获得,评估模型的评估值则指示了业务的风险情况。Among them, in order to obtain investment, each listed company will provide its business operating income to show each investor that the company is operating well and has investment prospects. The model provider who is going to invest needs to judge whether the listed company has made false reports and whether the operating conditions are good based on the business revenue reported by the listed company. The business operating income in the embodiment of the present invention is the business operating income declared by the listed company, which can be obtained from the official operating conditions, and the evaluation value of the evaluation model indicates the risk of the business.
进一步地,步骤S302中的业务数据,可以理解为判断业务营业收入是否正常的因素,例如,在一种可选的实施例中,当业务为互联网数据中心租赁业务时,业务数据可以包括:业务的用电量以及用水量。在另一种可选的实施例中,当业务为商铺租赁业务时,业务数据可以包括:客流量以及客户消费单价。对于不同的业务,影响业务营业收入的因素也不相同,因此对应的业务数据也不相同,本发明对此不做限制。Further, the business data in step S302 can be understood as a factor for judging whether the business revenue is normal. For example, in an optional embodiment, when the business is Internet data center leasing business, the business data may include: business electricity and water consumption. In another optional embodiment, when the business is a store leasing business, the business data may include: passenger flow and customer consumption unit price. For different businesses, the factors affecting business operating income are also different, so the corresponding business data are also different, which is not limited in the present invention.
通过步骤S303中将业务营业收入除以各个业务数据加权求和后的值,即可得到用于判断是否具备风险的评估值,在一种可选的实施例中,在风险评估场景下,步骤S104如图4所示,进一步包括:By dividing the business operating income by the weighted and summed value of each business data in step S303, the evaluation value for judging whether there is risk can be obtained. In an optional embodiment, in the risk evaluation scenario, the step S104, as shown in Figure 4, further includes:
步骤S401:在评估值超过预设范围的情况下,确定业务的评估结果为存在异常风险;Step S401: When the evaluation value exceeds the preset range, determine that the evaluation result of the business is abnormal risk;
步骤S402:在评估值不超过预设范围的情况下,确定业务的评估结果为不存在异常风险。Step S402: If the evaluation value does not exceed the preset range, it is determined that the evaluation result of the business is that there is no abnormal risk.
具体地,以互联网数据中心租赁业务为例,对上述构建评估模型的过程进行具体说明,利用业务营业收入以及影响业务营业收入的一个或多个业务数据,构建所述评估模型的过程,如图5所示,包括:Specifically, taking the Internet data center leasing business as an example, the above-mentioned process of constructing an evaluation model is described in detail, using business revenue and one or more business data that affect business revenue to construct the process of the evaluation model, as shown in the figure 5, including:
步骤S501:根据单位机柜的租售价格确定租赁业务的营业收入;Step S501: Determine the operating income of the leasing business according to the leasing and selling price of the unit cabinet;
步骤S502:根据业务的用电量、用水量以及电量和水量的单位价格,确定业务所用的水费以及电费;Step S502: Determine the water fee and electricity fee used by the business according to the electricity consumption, water consumption, and unit price of the electricity and water volume of the business;
步骤S503:以与水费对应的第一系数与水费的乘积、以及与电费对应的第二系数与电费的乘积之和作为分母,以租赁业务的营业收入作为分子,构建评估模型。Step S503: The sum of the product of the first coefficient corresponding to the water fee and the water fee, and the product of the second coefficient corresponding to the electricity fee and the electricity fee is used as the denominator, and the operating income of the leasing business is used as the numerator to construct an evaluation model.
互联网数据中心租赁业务(Internet Data Center,IDC),也就是机柜的租赁业务,营业收入则是来自机柜租赁的数量以及租赁的单价,判断营业收入的因素则主要是机柜的用水量以及机柜的用电量,通过根据机柜的用水量以及用电量可以知道机柜的运行情况,进而得到机柜的租赁情况以及业务营业收入是否异常。具体地,评估模型可以如下式(一)所示:Internet data center leasing business (Internet Data Center, IDC), that is, the leasing business of cabinets, operating income comes from the number of cabinets leased and the unit price of leasing, and the factors for judging operating income are mainly the water consumption of cabinets and the use of cabinets. According to the water consumption and electricity consumption of the cabinet, the operation status of the cabinet can be known, and then the rental status of the cabinet and whether the business operating income is abnormal. Specifically, the evaluation model can be shown in the following formula (1):
其中,σ表示风险评估值,Eincome表示给定时间区间内IDC收入,awater表示给定时间区间内IDC用水量,belectricity表示给定时间区间内IDC的用电量,α,β表示建模系数,分别为第一系数和第二系数,对应于用水量以及用电量,[a,b]表示风险评估值的预设范围。Among them, σ represents the risk assessment value, E income represents the income of IDC in a given time interval, a water represents the water consumption of IDC in a given time interval, b electricity represents the electricity consumption of IDC in a given time interval, α, β represent the construction The modulus coefficients are the first coefficient and the second coefficient, corresponding to water consumption and electricity consumption, and [a,b] represent the preset range of risk assessment values.
在一种可选的实施例中,针对上述互联网数据中心租赁业务,步骤S202中对线性函数进行同态加密的过程包括:对第一系数以及第二系数分别进行同态加密。由于用水量以及用电量是由数据提供方存储的,模型提供方并不知道真实的数据值,因此需要将加密后的模型发送给数据提供方,以使数据提供方填充对应的数据,才可以得到最终的风险评估值。而对于评估模型来说,只需要对第一系数、以及第二系数以及所述评估模型对应的评估值分别进行同态加密即可,将加密后的评估模型发送给数据提供方也可以保证评估模型不会被泄露。在进一步可选的实施例中,密文是数据提供方对用电量以及用水量分别进行同态加密后,将加密后的用电量以及用水量填充至评估模型得到的评估值。In an optional embodiment, for the above-mentioned Internet data center leasing service, the process of performing homomorphic encryption on the linear function in step S202 includes: performing homomorphic encryption on the first coefficient and the second coefficient respectively. Since the water consumption and electricity consumption are stored by the data provider, the model provider does not know the real data value, so the encrypted model needs to be sent to the data provider so that the data provider can fill in the corresponding data. The final risk assessment value can be obtained. For the evaluation model, it is only necessary to perform homomorphic encryption on the first coefficient, the second coefficient, and the evaluation value corresponding to the evaluation model, and sending the encrypted evaluation model to the data provider can also ensure the evaluation Models will not be leaked. In a further optional embodiment, the ciphertext is an evaluation value obtained by filling the encrypted electricity consumption and water consumption into the evaluation model after the data provider performs homomorphic encryption on the electricity consumption and water consumption respectively.
根据本发明实施例的业务评估的方法可以看出,本方法无需利用可信的第三方服务端使用模型,模型提供方和数据提供方分别对各自持有的评估模型和业务数据进行加密,并仅由模型提供方存储可以用于解析评估模型的第一私钥,利用同态加密技术实现了加密后的业务数据与加密后评估模型之间的计算,进而保证在模型提供方不知晓真实的业务数据的情况下,也可以利用第一私钥对数据提供方反馈的密文进行解析,得到评估模型对应的评估值。According to the business evaluation method of the embodiment of the present invention, it can be seen that this method does not need to use a trusted third-party server to use the model, and the model provider and the data provider respectively encrypt the evaluation model and business data held by them, and Only the model provider stores the first private key that can be used to analyze the evaluation model, and uses homomorphic encryption technology to realize the calculation between the encrypted business data and the encrypted evaluation model, thereby ensuring that the model provider does not know the real In the case of business data, the first private key can also be used to analyze the ciphertext fed back by the data provider to obtain the evaluation value corresponding to the evaluation model.
图6是根据本发明实施例的应用于数据提供方的业务评估的方法的主要步骤的示意图。Fig. 6 is a schematic diagram of main steps of a method for service evaluation applied to a data provider according to an embodiment of the present invention.
如图6所示,本发明实施例的业务评估的方法主要包括以下步骤:As shown in Figure 6, the method for service evaluation in the embodiment of the present invention mainly includes the following steps:
步骤S601:接收模型提供方发送的加密后的评估模型,并获取业务所需的业务数据;Step S601: Receive the encrypted evaluation model sent by the model provider, and obtain the business data required by the business;
步骤S602:对业务数据进行同态加密;Step S602: Perform homomorphic encryption on business data;
步骤S603:根据加密后的业务数据以及加密后的评估模型,确定业务对应的密文;Step S603: Determine the ciphertext corresponding to the business according to the encrypted business data and the encrypted evaluation model;
步骤S604:将密文发送至模型提供方,以使模型提供方根据密文确定业务的评估结果。Step S604: Send the ciphertext to the model provider, so that the model provider can determine the evaluation result of the business according to the ciphertext.
其中,数据提供方可以存储多种业务数据,对于不同的评估模型所需的业务数据不同,因此在步骤S601中可以根据评估模型获取对应的业务数据。Wherein, the data provider can store various business data, and the business data required for different evaluation models is different, so in step S601, the corresponding business data can be obtained according to the evaluation model.
为了使加密后的业务数据可以与加密后的评估模型直接进行计算,步骤S602中的同态加密与模型提供方的加密方法相同,均采用概率公钥加密算法进行同态加密。以互联网数据中心租赁业务为例,则是对真实的用水量和用电量两项业务数据进行分别加密,即对式(一)中的awater和belectricity分别进行同态加密,并将加密得到的虚拟用水量和虚拟用电量分别填充至式(一)中,与加密后的虚拟第一系数以及虚拟第二系数进行乘法同态以及加法同态,最终得到加密后的风险评估值。In order to enable the encrypted business data to be directly calculated with the encrypted evaluation model, the homomorphic encryption in step S602 is the same as the encryption method of the model provider, using a probabilistic public key encryption algorithm for homomorphic encryption. Taking the Internet data center leasing business as an example, the two business data of real water consumption and electricity consumption are encrypted separately, that is, a water and b electricity in formula (1) are respectively homomorphically encrypted, and the encrypted The obtained virtual water consumption and virtual electricity consumption are respectively filled into formula (1), and multiplicative homomorphism and additive homomorphism are performed with the encrypted virtual first coefficient and virtual second coefficient, and finally the encrypted risk assessment value is obtained.
对于步骤S603中确定密文的过程,根据应用场景以及评估模型的差异,可能用到多算法,在本发明所涉及的互联网数据中心租赁业务中,可以利用加法同态算法和/或乘法同态算法对加密后的业务数据和加密后的评估模型进行计算,确定业务对应的密文。For the process of determining the ciphertext in step S603, multiple algorithms may be used depending on the application scenario and the difference in the evaluation model. In the Internet data center leasing business involved in the present invention, the additive homomorphic algorithm and/or the multiplicative homomorphic algorithm can be used The algorithm calculates the encrypted business data and the encrypted evaluation model to determine the ciphertext corresponding to the business.
通过模型提供方与数据提供方分别对持有的评估模型和业务数据进行加密,保证了双方在不获取对方真实信息的情况下,仍能得到加密后的风险评估值,而由于采用了同态加密的加密方法,使得加密后的风险评估值与真实得到的风险评估值数值相同,保证了数据的准确性,实现了在不利用第三方服务端且不获取真实数据的情况下,对业务进行风险评估,同时提高了业务数据和评估模型的安全性。需要说明的是,加密后的业务数据对应第二私钥,且第二私钥与第一私钥不同,也就是说,数据提供方和模型提供方在各自加密后,分别保存各自的私钥,进一步提高了数据安全性。The evaluation model and business data held by the model provider and the data provider are respectively encrypted to ensure that both parties can still obtain the encrypted risk evaluation value without obtaining the other party's real information. The encrypted encryption method makes the encrypted risk assessment value the same as the real risk assessment value, which ensures the accuracy of the data and realizes the business without using the third-party server and without obtaining real data. Risk assessment, while improving the security of business data and assessment models. It should be noted that the encrypted business data corresponds to the second private key, and the second private key is different from the first private key, that is to say, the data provider and the model provider save their own private keys after encryption , further improving data security.
下面以式(一)为例,对数据提供方以及模型提供方的加密过程进行具体说明。The following uses formula (1) as an example to describe the encryption process of the data provider and the model provider in detail.
模型提供方先对式(一)中的第一系数α、第二系数β、以及风险评估值σ进行同态加密,将第一系数α、第二系数β、以及风险评估值σ分别加密成密文m、n和q,即得到式(二):The model provider first performs homomorphic encryption on the first coefficient α, the second coefficient β, and the risk assessment value σ in formula (1), and encrypts the first coefficient α, the second coefficient β, and the risk assessment value σ respectively into Ciphertext m, n and q, that is, formula (2):
其中,q表示加密后的风险评估值,m表示加密后的第一系数,n表示加密后的第二系数,且在加密过程中生成公钥和用于解析的第一私钥。Wherein, q represents the risk assessment value after encryption, m represents the first coefficient after encryption, n represents the second coefficient after encryption, and the public key and the first private key for parsing are generated during the encryption process.
在加密完成后,模型提供方将加密后的评估模型(即式(二))发送给数据提供方,由数据提供方填充数据awater和belectricity。After the encryption is completed, the model provider sends the encrypted evaluation model (ie, formula (2)) to the data provider, and the data provider fills in the data a water and b electricity .
此时数据提供方在接收到加密后的评估模型后,获取真实的数据awater和belectricity,并对真实数据也进行同态加密,得到加密后的数据A和B,其中A是加密后的用水量,B是加密后的用电量。且在加密过程中同样生成公钥和用于解析的第二私钥。然后将加密后的用水量A和用电量B分别填充至式(二)中,即可以得到式(三)如下:At this time, after receiving the encrypted evaluation model, the data provider obtains the real data a water and b electricity , and performs homomorphic encryption on the real data to obtain encrypted data A and B, where A is the encrypted data Water consumption, B is the encrypted electricity consumption. And the public key and the second private key used for parsing are also generated during the encryption process. Then fill the encrypted water consumption A and electricity consumption B into formula (2) respectively, and formula (3) can be obtained as follows:
由于Eincome是上市公司公开的业务收入,为已知量,因此通过式(三)即可计算得到加密后的风险评估值q,即密文,并将密文反馈给模型提供方。Since E income is the public business income of listed companies and is a known quantity, the encrypted risk assessment value q, which is the ciphertext, can be calculated by formula (3), and the ciphertext is fed back to the model provider.
模型提供方在获取到加密后的风险评估值q后,利用第一私钥即可进行解析,得到真实的风险评估值,并根据风险评估值是否满足预设范围,确定业务的评估结果。After obtaining the encrypted risk assessment value q, the model provider can analyze it with the first private key to obtain the real risk assessment value, and determine the business assessment result according to whether the risk assessment value meets the preset range.
根据本发明实施例的业务评估的方法可以看出,无需利用可信的第三方服务端使用模型,模型提供方和数据提供方分别对各自持有的评估模型和业务数据进行加密,并仅由模型提供方存储可以用于解析评估模型的第一私钥,提高了数据的安全性。同时利用同态加密技术实现了加密后的业务数据与加密后评估模型之间的计算,进而保证在模型提供方不知晓真实的业务数据的情况下,也可以利用第一私钥对数据提供方反馈的密文进行解析,得到评估模型对应的评估值,方便快捷。According to the business evaluation method of the embodiment of the present invention, it can be seen that there is no need to use a trusted third-party server to use the model, the model provider and the data provider respectively encrypt the evaluation model and business data held by them, and only The model provider stores the first private key that can be used to parse and evaluate the model, improving data security. At the same time, homomorphic encryption technology is used to realize the calculation between the encrypted business data and the encrypted evaluation model, thereby ensuring that the first private key can also be used to pair the data provider with the model provider without knowing the real business data. The feedback ciphertext is analyzed to obtain the evaluation value corresponding to the evaluation model, which is convenient and quick.
图7是根据本发明实施例的用于模型提供方的业务评估的装置示意图。Fig. 7 is a schematic diagram of an apparatus for service evaluation of a model provider according to an embodiment of the present invention.
如图7所示,本发明实施例的用于模型提供方的业务评估的装置700包括:As shown in FIG. 7 , an
获取模块701,用于获取用于业务评估的评估模型;An obtaining
加密模块702,用于对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;An
解析模块703,用于接收所述数据提供方反馈的密文,利用第一私钥对所述密文进行解析,以得到所述评估模型对应的评估值;其中,所述密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;The
评估模块704,用于根据所述评估值确定所述业务的评估结果。An
在本发明一种可选的实施例中,所述加密模块702还用于,将所述评估模型转化为线性函数;对所述线性函数进行同态加密,并将加密后的线性函数发送至数据提供方。In an optional embodiment of the present invention, the
在本发明一种可选的实施例中,所述加密模块702还用于,通过概率公钥加密算法对所述线性函数中一个或多个业务数据对应的系数分别进行同态加密。In an optional embodiment of the present invention, the
在本发明一种可选的实施例中,所述装置还包括构建模块,用于利用业务营业收入以及影响所述业务营业收入的一个或多个业务数据,构建所述评估模型。In an optional embodiment of the present invention, the device further includes a construction module, configured to use business revenue and one or more business data that affect the business revenue to construct the evaluation model.
在本发明一种可选的实施例中,所述构建模块还用于,获取所述业务营业收入;确定所述一个或多个业务数据分别对应的系数;以各个所述业务数据与对应系数的乘积之和作为分母,以所述业务营业收入作为分子,构建所述评估模型。In an optional embodiment of the present invention, the building module is also used to obtain the business revenue; determine the corresponding coefficients of the one or more business data; use each of the business data and the corresponding coefficient The sum of the products of is used as the denominator, and the operating income of the business is used as the numerator to construct the evaluation model.
在本发明一种可选的实施例中,在所述业务为互联网数据中心租赁业务时,所述业务数据包括:业务的用电量以及用水量;所述评估模型的评估值指示了所述业务的风险情况;所述构建模块还用于,根据单位机柜的租售价格确定租赁业务的营业收入;根据业务的用电量、用水量以及电量和水量的单位价格,确定业务所用的水费以及电费;以与所述水费对应的第一系数与所述水费的乘积、以及与所述电费对应的第二系数与所述电费的乘积之和作为分母,以所述租赁业务的营业收入作为分子,构建所述评估模型。In an optional embodiment of the present invention, when the business is an Internet data center leasing business, the business data includes: power consumption and water consumption of the business; the evaluation value of the evaluation model indicates the The risk situation of the business; the building block is also used to determine the operating income of the leasing business according to the rental and sales price of the unit cabinet; to determine the water fee used by the business according to the power consumption, water consumption, and the unit price of the power and water volume of the business and electricity charges; with the sum of the product of the first coefficient corresponding to the water charge and the water charge and the product of the second coefficient corresponding to the electric charge and the electric charge as the denominator, the business of the leasing business Income is used as the numerator to build the valuation model.
在本发明一种可选的实施例中,所述加密模块702还用于对所述第一系数、所述第二系数以及所述评估模型对应的评估值分别进行同态加密。In an optional embodiment of the present invention, the
在本发明一种可选的实施例中,所述密文为所述数据提供方对所述用电量以及所述用水量分别进行同态加密后,将所述加密后的用电量以及用水量填充至所述评估模型得到的评估值。In an optional embodiment of the present invention, the ciphertext is after the data provider performs homomorphic encryption on the electricity consumption and the water consumption respectively, and the encrypted electricity consumption and water consumption The water consumption is filled to the evaluation value obtained by the evaluation model.
在本发明一种可选的实施例中,所述评估模块704还用于在所述评估值超过预设范围的情况下,确定所述业务的评估结果为存在异常风险;在所述评估值不超过预设范围的情况下,确定所述业务的评估结果为不存在异常风险。In an optional embodiment of the present invention, the
在本发明一种可选的实施例中,在所述业务为商铺租赁业务时,所述业务数据包括:客流量以及客户消费单价;所述评估模型的评估值指示了所述业务的风险情况。In an optional embodiment of the present invention, when the business is a store leasing business, the business data includes: passenger flow and customer consumption unit price; the evaluation value of the evaluation model indicates the risk situation of the business .
根据本发明实施例的业务评估的装置可以看出,无需利用可信的第三方服务端使用模型,模型提供方和数据提供方分别对各自持有的评估模型和业务数据进行加密,并仅由模型提供方存储可以用于解析评估模型的第一私钥,提高了数据的安全性。同时利用同态加密技术实现了加密后的业务数据与加密后评估模型之间的计算,进而保证在模型提供方不知晓真实的业务数据的情况下,也可以利用第一私钥对数据提供方反馈的密文进行解析,得到评估模型对应的评估值,方便快捷。According to the business evaluation device of the embodiment of the present invention, it can be seen that there is no need to use a trusted third-party server to use the model, the model provider and the data provider respectively encrypt the evaluation model and business data held by them, and only The model provider stores the first private key that can be used to parse and evaluate the model, improving data security. At the same time, homomorphic encryption technology is used to realize the calculation between the encrypted business data and the encrypted evaluation model, thereby ensuring that the first private key can also be used to pair the data provider with the model provider without knowing the real business data. The feedback ciphertext is analyzed to obtain the evaluation value corresponding to the evaluation model, which is convenient and quick.
图8是根据本发明实施例的用于数据提供方的业务评估的装置示意图。Fig. 8 is a schematic diagram of an apparatus for service evaluation of a data provider according to an embodiment of the present invention.
如图8所示,本发明实施例的业务评估的装置800包括:As shown in Figure 8, the
获取模块801,用于接收模型提供方发送的加密后的评估模型,并获取业务所需的业务数据;An
加密模块802,用于对所述业务数据进行同态加密;An
计算模块803,用于根据加密后的业务数据以及所述加密后的评估模型,确定所述业务对应的密文;A
发送模块804,用于将所述密文发送至所述模型提供方,以使所述模型提供方根据所述密文确定所述业务的评估结果。A sending
在本发明一种可选的实施例中,所述加密后的业务数据对应第二私钥,且所述第二私钥与第一私钥不同。In an optional embodiment of the present invention, the encrypted service data corresponds to a second private key, and the second private key is different from the first private key.
在本发明一种可选的实施例中,所述计算模块803还用于利用加法同态算法和/或乘法同态算法对所述加密后的业务数据和所述加密后的评估模型进行计算,确定所述业务对应的密文。In an optional embodiment of the present invention, the
根据本发明实施例的业务评估的装置可以看出,通过模型提供方与数据提供方分别对持有的评估模型和业务数据进行加密,保证了双方在不获取对方真实信息的情况下,仍能得到加密后的风险评估值,而由于采用了同态加密的加密方法,使得加密后的风险评估值与真实得到的风险评估值数值相同,保证了数据的准确性,实现了在不利用第三方服务端且不获取真实数据的情况下,对业务进行风险评估,同时提高了业务数据和评估模型的安全性。需要说明的是,加密后的业务数据对应第二私钥,且第二私钥与第一私钥不同,也就是说,数据提供方和模型提供方在各自加密后,分别保存各自的私钥,进一步提高了数据安全性。According to the business evaluation device of the embodiment of the present invention, it can be seen that the evaluation model and business data held by the model provider and the data provider are respectively encrypted to ensure that the two parties can still obtain the other party's real information. The encrypted risk assessment value is obtained, and due to the homomorphic encryption encryption method, the encrypted risk assessment value is the same as the real risk assessment value, which ensures the accuracy of the data and realizes Risk assessment is performed on the business without obtaining real data on the server side, and at the same time, the security of business data and evaluation models is improved. It should be noted that the encrypted business data corresponds to the second private key, and the second private key is different from the first private key, that is to say, the data provider and the model provider save their own private keys after encryption , further improving data security.
图9是根据本发明实施例的业务评估的系统的示意图。Fig. 9 is a schematic diagram of a service evaluation system according to an embodiment of the present invention.
如图9所示,本发明实施例的业务评估的系统900包括:上述模型提供方901以及数据提供方902,其中,As shown in Figure 9, the
所述模型提供方901,用于获取用于业务评估的评估模型;对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;The
所述数据提供方902,用于接收模型提供方发送的加密后的评估模型,并获取业务所需的业务数据;对所述业务数据进行同态加密;根据加密后的业务数据以及所述加密后的评估模型,确定所述业务对应的密文;将所述密文发送至所述模型提供方;The
所述模型提供方901还用于接收所述数据提供方反馈的密文,利用第一私钥对所述密文进行解析,以得到所述评估模型对应的评估值;其中,所述密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;根据所述评估值确定所述业务的评估结果。The
图10示出了可以应用本发明实施例的业务评估的方法或业务评估的装置的示例性系统架构1000。Fig. 10 shows an
如图10所示,系统架构1000可以包括终端设备1001、1002、1003,网络1004和服务器1005。网络1004用以在终端设备1001、1002、1003和服务器1005之间提供通信链路的介质。网络1004可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。As shown in FIG. 10 , a
用户可以使用终端设备1001、1002、1003通过网络1004与服务器1005交互,以接收或发送数据等。终端设备1001、1002、1003上可以安装有各种通讯客户端应用,例如购物类应用、网页浏览器应用、搜索类应用、即时通信工具、邮箱客户端、社交平台软件等。Users can use
终端设备1001、1002、1003可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、膝上型便携计算机和台式计算机等等。The
服务器1005可以是提供各种服务的服务器,例如对用户利用终端设备1001、1002、1003所上传的评估模型或者业务数据提供支持的后台管理服务器。后台管理服务器可以对接收到的评估模型或者业务数据等数据进行分析等处理,并将处理结果(例如评估结果)反馈给终端设备。The
需要说明的是,本发明实施例所提供的业务评估的方法一般由服务器1005执行,相应地,业务评估的装置一般设置于服务器1005中。It should be noted that the service evaluation method provided by the embodiment of the present invention is generally executed by the
应该理解,图10中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。It should be understood that the numbers of terminal devices, networks and servers in FIG. 10 are only illustrative. According to the implementation needs, there can be any number of terminal devices, networks and servers.
下面参考图11,其示出了适于用来实现本发明实施例的终端设备的计算机系统1100的结构示意图。图11示出的终端设备仅仅是一个示例,不应对本发明实施例的功能和使用范围带来任何限制。Referring now to FIG. 11 , it shows a schematic structural diagram of a
如图11所示,计算机系统1100包括中央处理单元(CPU)1101,其可以根据存储在只读存储器(ROM)1102中的程序或者从存储部分1108加载到随机访问存储器(RAM)1103中的程序而执行各种适当的动作和处理。在RAM 1103中,还存储有系统1100操作所需的各种程序和数据。CPU 1101、ROM 1102以及RAM 1103通过总线1104彼此相连。输入/输出(I/O)第一接口1105也连接至总线1104。As shown in FIG. 11 , a
以下部件连接至I/O第一接口1105:包括键盘、鼠标等的输入部分1106;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1107;包括硬盘等的存储部分1108;以及包括诸如LAN卡、调制解调器等的网络第一接口卡的通信部分1109。通信部分1109经由诸如因特网的网络执行通信处理。驱动器1110也根据需要连接至I/O第一接口1105。可拆卸介质1111,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1110上,以便于从其上读出的计算机程序根据需要被安装入存储部分1108。The following components are connected to the I/O first interface 1105: an
特别地,根据本发明公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本发明公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分1109从网络上被下载和安装,和/或从可拆卸介质1111被安装。在该计算机程序被中央处理单元(CPU)1101执行时,执行本发明的系统中限定的上述功能。In particular, according to the disclosed embodiments of the present invention, the processes described above with reference to the flowcharts can be implemented as computer software programs. For example, the disclosed embodiments of the present invention include a computer program product, which includes a computer program carried on a computer-readable medium, where the computer program includes program codes for executing the methods shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via
需要说明的是,本发明所示的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本发明中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本发明中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、RF等等,或者上述的任意合适的组合。It should be noted that the computer-readable medium shown in the present invention may be a computer-readable signal medium or a computer-readable storage medium or any combination of the above two. A computer readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to, electrical connections with one or more wires, portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above. In the present invention, a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device. In the present invention, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, carrying computer-readable program codes therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. A computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device. . Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in a flowchart or block diagram may represent a module, program segment, or portion of code that includes one or more logical functions for implementing specified executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also be noted that each block in the block diagrams or flowchart illustrations, and combinations of blocks in the block diagrams or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified function or operation, or can be implemented by a A combination of dedicated hardware and computer instructions.
描述于本发明实施例中所涉及到的模块可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的模块也可以设置在处理器中,例如,可以描述为:一种处理器包括获取模块、加密模块、解析模块和评估模块。其中,这些模块的名称在某种情况下并不构成对该模块本身的限定,例如,获取模块还可以被描述为“获取用于业务评估的评估模型的模块”。The modules involved in the embodiments described in the present invention may be realized by software or by hardware. The described modules can also be set in a processor, for example, it can be described as: a processor includes an acquisition module, an encryption module, an analysis module and an evaluation module. Wherein, the names of these modules do not constitute a limitation on the module itself under certain circumstances, for example, the obtaining module may also be described as "a module for obtaining an evaluation model for service evaluation".
作为另一方面,本发明还提供了一种计算机可读介质,该计算机可读介质可以是上述实施例中描述的设备中所包含的;也可以是单独存在,而未装配入该设备中。上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被一个该设备执行时,使得该设备包括:获取用于业务评估的评估模型;对所述评估模型进行同态加密,并将加密后的评估模型发送至数据提供方;接收所述数据提供方反馈的密文,利用第一私钥对所述密文进行解析,以得到所述评估模型对应的评估值;其中,所述密文为数据提供方根据加密后的业务数据以及加密后的评估模型计算得到的;根据所述评估值确定所述业务的评估结果。As another aspect, the present invention also provides a computer-readable medium. The computer-readable medium may be contained in the device described in the above embodiments, or it may exist independently without being assembled into the device. The above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the device, the device includes: acquiring an evaluation model for service evaluation; performing homomorphic encryption on the evaluation model , and send the encrypted evaluation model to the data provider; receive the ciphertext fed back by the data provider, and use the first private key to analyze the ciphertext to obtain the evaluation value corresponding to the evaluation model; wherein , the ciphertext is calculated by the data provider according to the encrypted service data and the encrypted evaluation model; and the evaluation result of the service is determined according to the evaluation value.
根据本发明实施例的技术方案,无需利用可信的第三方服务端使用模型,模型提供方和数据提供方分别对各自持有的评估模型和业务数据进行加密,并仅由模型提供方存储可以用于解析评估模型的第一私钥,提高了数据的安全性。同时利用同态加密技术实现了加密后的业务数据与加密后评估模型之间的计算,进而保证在模型提供方不知晓真实的业务数据的情况下,也可以利用第一私钥对数据提供方反馈的密文进行解析,得到评估模型对应的评估值,方便快捷。According to the technical solution of the embodiment of the present invention, there is no need to use a trusted third-party server to use the model, the model provider and the data provider respectively encrypt the evaluation model and business data held by them, and only the model provider can store The first private key used to parse the evaluation model improves data security. At the same time, homomorphic encryption technology is used to realize the calculation between the encrypted business data and the encrypted evaluation model, thereby ensuring that the first private key can also be used to pair the data provider with the model provider without knowing the real business data. The feedback ciphertext is analyzed to obtain the evaluation value corresponding to the evaluation model, which is convenient and quick.
上述具体实施方式,并不构成对本发明保护范围的限制。本领域技术人员应该明白的是,取决于设计要求和其他因素,可以发生各种各样的修改、组合、子组合和替代。任何在本发明的精神和原则之内所作的修改、等同替换和改进等,均应包含在本发明保护范围之内。The above specific implementation methods do not constitute a limitation to the protection scope of the present invention. It should be apparent to those skilled in the art that various modifications, combinations, sub-combinations and substitutions may occur depending on design requirements and other factors. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211128186.XA CN115442152A (en) | 2022-09-16 | 2022-09-16 | Method and device for service evaluation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211128186.XA CN115442152A (en) | 2022-09-16 | 2022-09-16 | Method and device for service evaluation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115442152A true CN115442152A (en) | 2022-12-06 |
Family
ID=84249944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211128186.XA Pending CN115442152A (en) | 2022-09-16 | 2022-09-16 | Method and device for service evaluation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115442152A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116346303A (en) * | 2023-02-20 | 2023-06-27 | 中银金融科技有限公司 | Rating method, rating device, rating equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019168590A (en) * | 2018-03-23 | 2019-10-03 | Kddi株式会社 | Information processing method and information processing system |
CN114124343A (en) * | 2020-11-16 | 2022-03-01 | 神州融安数字科技(北京)有限公司 | Privacy-protecting risk scoring information query method, device, system and equipment |
CN114337984A (en) * | 2020-09-27 | 2022-04-12 | 中国移动通信有限公司研究院 | Data processing method, device and equipment |
-
2022
- 2022-09-16 CN CN202211128186.XA patent/CN115442152A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019168590A (en) * | 2018-03-23 | 2019-10-03 | Kddi株式会社 | Information processing method and information processing system |
CN114337984A (en) * | 2020-09-27 | 2022-04-12 | 中国移动通信有限公司研究院 | Data processing method, device and equipment |
CN114124343A (en) * | 2020-11-16 | 2022-03-01 | 神州融安数字科技(北京)有限公司 | Privacy-protecting risk scoring information query method, device, system and equipment |
Non-Patent Citations (1)
Title |
---|
秦宝东等: "基于双陷门同态加密的决策树分类模型", 技术研究, vol. 2, no. 22, 7 March 2022 (2022-03-07), pages 9 - 17 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116346303A (en) * | 2023-02-20 | 2023-06-27 | 中银金融科技有限公司 | Rating method, rating device, rating equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10861023B2 (en) | Method and system for question prioritization based on analysis of the question content and predicted asker engagement before answer content is generated | |
CN110189192A (en) | A method and device for generating an information recommendation model | |
CN110335130A (en) | Blockchain-based customs declaration generation method, device, equipment, and storage medium | |
Alabdulatif et al. | Privacy‐preserving cloud‐based billing with lightweight homomorphic encryption for sensor‐enabled smart grid infrastructure | |
CN116680324A (en) | Data anonymous tracking method and device, storage medium, electronic equipment | |
US20220385739A1 (en) | Method and apparatus for generating prediction information, electronic device, and computer readable medium | |
CN112149706B (en) | Model training methods, devices, equipment and media | |
CN111881329A (en) | An account balance management method and system | |
CN114781351A (en) | Method, device, equipment and medium for parsing bidding documents based on power data | |
CN115442152A (en) | Method and device for service evaluation | |
CN116402159A (en) | Federal learning method, federal learning prediction device, federal learning electronic device, and federal learning storage medium | |
CN117014233B (en) | Tamper-resistant contract data acquisition and generation method and tamper-resistant contract data acquisition and generation device | |
US20120101829A1 (en) | Wholesale device registration system, method, and program product | |
CN112257081B (en) | Longitudinal federal standard deviation comprehensive scoring method, system, medium and equipment | |
CN110602074B (en) | A method, device and system for using business identity based on master-slave association | |
CN113485902A (en) | Method, device, equipment and computer readable medium for testing service platform | |
CN112583602A (en) | Information code data transmission method, device, system, computer device and medium | |
CN115222528B (en) | A method, terminal and system for splitting digital currency during a transaction | |
CN116049904B (en) | Electronic bill encryption signature method based on blockchain multi-point certificate and electronic equipment | |
CN115994806B (en) | Power transaction method, device and system based on blockchain and privacy calculation | |
CN110784602A (en) | Soft telephone communication method, device, terminal and storage medium | |
US10447777B1 (en) | Method and system for providing a dynamically updated expertise and context based peer-to-peer customer support system within a software application | |
CN115766384A (en) | Automatic early warning method and device for certificate deadline | |
Guo et al. | Authorized function homomorphic signature | |
CN119494714A (en) | Method, device, equipment and computer-readable medium for processing business data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |