AI智能总结
National Standard of the People’s Republic of China Cybersecurity Technology–SafetySpecificationsfor GenerativeArtificial Intelligence Pre-Trainingand Fine-TuningData (Draft for Feedback) (Draft Completed on: March 28, 2024) When submitting feedback, please include relevant patents that you are aware ofalong with supporting documentation. State Administration for Market RegulationStandardization Administration of ChinaIssuers Contents Preface......................................................................................................................................................................11.Scope................................................................................................................................................................22.Normative References................................................................................................................................23.Terminology and Definitions....................................................................................................................23.1Generative Artificial Intelligence.....................................................................................................23.2GenAI Services.......................................................................................................................................23.3Service Provider.....................................................................................................................................33.4Service User............................................................................................................................................33.5Pre-Training............................................................................................................................................33.6Fine-Tuning.............................................................................................................................................33.7Pre-Training Data.................................................................................................................................33.8Fine-Tuning Data..................................................................................................................................34.Overview.........................................................................................................................................................34.1Safety and Security Risks...................................................................................................................34.2Safety and Security Framework.......................................................................................................35.General Safety and Security Requirements.........................................................................................46.Safety and Security Requirements for Pre-Training Data Processing Activities....................56.1Data Collection......................................................................................................................................56.2Data Pre-Processing............................................................................................................................56.3Data Usage.............................................................................................................................................67.Safety and Security Requirements for Fine-Tuning Data Processing Activities.....................67.1Data Collection......................................................................................................................................67.2Data Pre-Processing............................................................................................................................67.3Data Usage.............................................................................................................................................78.Evaluation Methods.....................................................................................................................................78.1General Safety and Security Evaluation Methods.....................................................................78.2Evaluation Methods for Pre-Training Data Processing Activities.........................................88.2.1Data Collection.........................................................................................................................88.2.2Data Pre-Processing...............................................................................................................98.2.3Data Usage..............................................................................................................................108.3Evaluation Methods for Fine-Tuning Data Processing Activities......................................118.3.1Data Collection.............................................................................................