FIELD: physics.
SUBSTANCE: invention relates to a secure machine learning system based on limited access data from different sources. System comprises two embedded one into the other protection circuits, a blind data processing software-hardware complex (BDP SHC), located in an external protection circuit, outside of which there are external terminals, and a blind data processing computer (BDPC) located in the internal protection circuit, within the boundaries of which the protected data are processed in an open form, wherein all functional subsystems, apart from the machine learning subsystem which processes the protected data in the open form, are implemented in such a way that their parts, which process data of different degrees of criticality, are located on the structural elements of different levels of nesting of the circuits, and the machine learning subsystem is fully implemented within the internal protection circuit, wherein the system provides for the execution of computational processes of constructing a predictive machine learning model, its validation and application, including decrypting data using a supplier key, processing and encrypting data using a storage key, prepared for issuing as resultant reports, without disclosure of data combined from different sources, excluding acquaintance with them, copying and modification, but with possibility of their use for extraction of knowledge at the stage of machine learning, for which data are loaded into system from different sources in pre-encrypted form, after which in the system at the stage of machine learning a process of their automatic processing is performed, which includes a fixed sequence of data processing commands, which does not lead to acquaintance with them of personnel and to data leakage within the information system.
EFFECT: high level of data security.
4 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PREVENTING UNAUTHORISED ACCESS TO INFORMATION STORED IN COMPUTER SYSTEMS | 2011 |
|
RU2470349C1 |
METHOD FOR SECURE EXTENSION OF FUNCTIONS OF INFORMATION SECURITY HARDWARE | 2014 |
|
RU2574347C2 |
TRUSTED BOOT TOOL WITH BUILT-IN BINARY TRANSLATOR OF OPERATING SYSTEM AND WIRELESS CONTROL CHANNEL | 2023 |
|
RU2820971C1 |
METHOD FOR PROTECTING NEURAL NETWORKS AND A HARDWARE AND SOFTWARE COMPLEX FOR ITS IMPLEMENTATION | 2021 |
|
RU2779846C1 |
SOFTWARE AND HARDWARE COMPLEX FOR AUTOMATION OF CATALOGUING SYSTEM OF MILITARY EQUIPMENT OF RUSSIAN FEDERATION | 2017 |
|
RU2687216C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
METHOD FOR UNAMBIGUOUS HASHING OF AMBIGUOUS BIOMETRIC DATA | 2010 |
|
RU2451409C2 |
METHOD OF SESSION AUTHENTICATION OF USERS BY IMAGES OF THEIR FACES | 2024 |
|
RU2830390C1 |
SYSTEM AND METHOD FOR PROVIDING INFORMATION AND SERVICES TO CUSTOMERS | 2014 |
|
RU2614537C2 |
METHOD AND SYSTEM FOR PROTECTING AUTHENTICITY OF IMAGES GENERATED BY MACHINE LEARNING MODEL | 2024 |
|
RU2829566C1 |
Authors
Dates
2024-11-18—Published
2024-05-22—Filed