It supports multi-party data security "integration" and modeling, analysis and calculation, provides full process services from data analysis, model training, evaluation to application deployment, and has different cloud/end service deployment modes. Solve the business needs of multiple scenarios, such as risk control, precision marketing and cold start of new users, break the isolated island of data applications, effectively guarantee data security and user privacy, and achieve data availability, invisibility, security compliance, flow and sharing.