Topwalk-PPCP
Topwalk-PPCP
Topwalk-PPCP

The Topwalk Privacy-Preserving Computation Platform (Topwalk-PPCP) is an all-in-one solution integrated with privacy-preserving technologies including secure multi-party computation and federated learning. Purpose-built for data privacy protection, it optimizes edge device performance to address the pain points of data opening and sharing for entities in possession of sensitive information—while delivering secure, reliable services to unlock the full value of data utilization.

Home > Data Security >
Core Values

Data Assetization Management

Data Assetization Management

Supports multiple data resource formats and resource authorization methods, as well as various data resource preprocessing functions and resource detail displays.

Private Set Intersection and Private Query

Private Set Intersection and Private Query

- Private Set Intersection: Aligns intersecting IDs without disclosing the original data IDs of non-intersecting sets;

- Private Query: Enables querying parties to obtain results without revealing their query intentions to data holders.

Secure Data Analysis and Statistical Analysis

Secure Data Analysis and Statistical Analysis

- Secure Data Analysis: Allows querying parties to perform joint query analysis across distributed databases while keeping the data holders' data invisible to external parties;

- Statistical Analysis: Enables participants to complete statistical analysis tasks while preserving data privacy.

Federated Modeling and Federated Prediction

Federated Modeling and Federated Prediction

- Federated Modeling: Supports participants in conducting vertical federated modeling, such as vertical logistic regression and vertical XGBoost;

- Federated Prediction: Supports participants in conducting vertical federated prediction, such as vertical logistic regression prediction and vertical XGBoost prediction.

Product Advantages
Adaptable to Boundary Isolation Scenarios
Adaptable to Boundary Isolation Scenarios

Adaptable to boundary access requirements of high-security domains such as public security and government, compliant with industry policies and regulations. It achieves dual goals of privacy protection and data security, solving the data security opening and sharing challenges for public security and government departments.

End-to-End Security and Controllability
End-to-End Security and Controllability

Adopts security technologies such as data encryption, access control, secure channels, and isolation devices to ensure end-to-end security and controllability of data opening and sharing.

No Trusted Third Party Required
No Trusted Third Party Required

Eliminates the need for a centralized trusted third party to participate in data storage and computing, making the data processing and analysis process more secure and reducing the risk of data privacy leakage.

Modular and User-Friendly
Modular and User-Friendly

The platform features a modular design, allowing users to select and customize functional modules based on their needs to build privacy-preserving computing solutions tailored to specific scenarios and goals.

Application Scenarios

01

Application Scenarios

Application Scenarios

Standard Mode:

Each participant deploys a peer-to-peer environment locally, completes computing within their own security domain, and ensures no information leakage in interactive data.

Isolation Mode:

- Data Nodes: Participants' data nodes are deployed behind boundary isolation devices, with the core function of transforming data to protect the security of original data;

- Computing Nodes: Deployed in front of boundary isolation devices, with the core function of collaborating with external data to complete computing based on transformed data.