-
公开(公告)号:US20210089957A1
公开(公告)日:2021-03-25
申请号:US16576830
申请日:2019-09-20
Applicant: NXP B.V.
Inventor: Brian Ermans , Peter Doliwa , Christine van Vredendaal
Abstract: A method and machine learning system for detecting adversarial examples is provided. A first machine learning model is trained with a first machine learning training data set having only training data samples with robust features. A second machine learning model is trained with a second machine learning training data set, the second machine learning training data set having only training data samples with non-robust features. A feature is a distinguishing element in a data sample. A robust feature is more resistant to adversarial perturbations than a non-robust feature. A data sample is provided to each of the first and second trained machine learning models during an inference operation. if the first trained machine learning model classifies the data sample with high confidence, and the second trained machine learning model classifies the data sample differently with a high confidence, then the data sample is determined to be an adversarial example.
-
公开(公告)号:US20200007519A1
公开(公告)日:2020-01-02
申请号:US16021148
申请日:2018-06-28
Applicant: NXP B.V.
Inventor: Geoffrey Thorpe , Peter Doliwa , Vakul Garg , Jan René Brands
IPC: H04L29/06
Abstract: A method is provided for establishing a communication session in a communications system. The method includes providing a handshake layer functional block in a first communication peer, and providing a data communication layer functional block separate from the handshake layer functional block in the first communication peer. Functionality of the data communication layer is not duplicated in the handshake layer. If the data communication layer is unable to process a received encrypted message; transmitting, by the data communication layer, a configuration request message to the handshake layer, and transmitting, by the handshake layer, in response to the configuration request message, a set channel state message to enable the data communication layer to process application data after a handshake phase of the protocol session is complete. Then, application data can be communicated through the data communication layer functional block of the first communication peer to a second communication peer.
-
公开(公告)号:US10659228B2
公开(公告)日:2020-05-19
申请号:US16021125
申请日:2018-06-28
Applicant: NXP B.V.
Inventor: Vakul Garg , Peter Doliwa
Abstract: A method is provided for establishing a secure communication session in a communications system. The method includes providing a handshake layer functional block and providing a record layer functional block separate from the handshake layer functional block. A first ephemeral key pair is generated by the record layer functional block of a first communication peer. A public key of the first ephemeral key pair is transmitted to a second communication peer. The handshake layer functional block of the first communication peer generates a second ephemeral key pair. A public key of the second ephemeral key pair is transmitted to the second communication peer. The second communication peer generates a third ephemeral key pair. A handshake key is generated from the public key of the second communication peer and a private key of the handshake layer block of the first communication peer. A session key is generated from the public key of the second communication peer and a private key of the record layer block of the first communication peer
-
4.
公开(公告)号:US10482252B2
公开(公告)日:2019-11-19
申请号:US15707146
申请日:2017-09-18
Applicant: NXP B.V.
Inventor: Peter Doliwa
IPC: H04L29/00 , G06F21/57 , G06F21/44 , H04L9/32 , G06F21/60 , H04W4/70 , G06F21/73 , G06F21/79 , H04L9/08
Abstract: A method is provided for secure firmware provisioning of a device. In the method, an integrated circuit (IC) is manufactured by a first entity for use in the device. The IC is provided to a second entity for manufacturing the device using the IC. The IC has a unique identifier (UID) and secret key derivation data (KDD). A secure memory is provided to a third entity. The secure memory has a first key pair, and the secure memory is used with a firmware provisioning toolchain of the second entity. During manufacturing of the device by the second entity, the secure memory is enabled to verify the IC by verifying the UID. The secure memory stores a firmware decryption key, and is enabled to encrypt the firmware decryption key. The encrypted firmware decryption key is then provided to the IC, and the IC decrypts the encrypted firmware decryption key for use by the IC in decrypting the firmware.
-
公开(公告)号:US11501206B2
公开(公告)日:2022-11-15
申请号:US16576830
申请日:2019-09-20
Applicant: NXP B.V.
Inventor: Brian Ermans , Peter Doliwa , Christine van Vredendaal
Abstract: A method and machine learning system for detecting adversarial examples is provided. A first machine learning model is trained with a first machine learning training data set having only training data samples with robust features. A second machine learning model is trained with a second machine learning training data set, the second machine learning training data set having only training data samples with non-robust features. A feature is a distinguishing element in a data sample. A robust feature is more resistant to adversarial perturbations than a non-robust feature. A data sample is provided to each of the first and second trained machine learning models during an inference operation. if the first trained machine learning model classifies the data sample with high confidence, and the second trained machine learning model classifies the data sample differently with a high confidence, then the data sample is determined to be an adversarial example.
-
公开(公告)号:US10721219B2
公开(公告)日:2020-07-21
申请号:US16021148
申请日:2018-06-28
Applicant: NXP B.V.
Inventor: Geoffrey Thorpe , Peter Doliwa , Vakul Garg , Jan René Brands
Abstract: A method is provided for establishing a communication session in a communications system. The method includes providing a handshake layer functional block in a first communication peer, and providing a data communication layer functional block separate from the handshake layer functional block in the first communication peer. Functionality of the data communication layer is not duplicated in the handshake layer. If the data communication layer is unable to process a received encrypted message; transmitting, by the data communication layer, a configuration request message to the handshake layer, and transmitting, by the handshake layer, in response to the configuration request message, a set channel state message to enable the data communication layer to process application data after a handshake phase of the protocol session is complete. Then, application data can be communicated through the data communication layer functional block of the first communication peer to a second communication peer.
-
公开(公告)号:US10721061B2
公开(公告)日:2020-07-21
申请号:US16021174
申请日:2018-06-28
Applicant: NXP B.V.
Inventor: Peter Doliwa , Vakul Garg
Abstract: A method is provided for establishing a secure communication session in a communication system. The method includes providing a handshake layer functional block and providing a record layer functional block separate from the handshake layer functional block. Functionality of the record layer functional block is not duplicated in the handshake layer functional block. The record layer functional block of a first communication peer generates an ephemeral key pair. A public key of the ephemeral key pair is transmitted to the handshake layer functional block of a second communication peer via the handshake layer functional block of the first communication peer. A session key is generated from the public key of the second communication peer and a private key of the first communication peer. Messages communicated between the first communication peer and the second communication peer are protected using the session key.
-
公开(公告)号:US11688112B2
公开(公告)日:2023-06-27
申请号:US17302592
申请日:2021-05-07
Applicant: NXP B.V.
Inventor: Peter Doliwa
CPC classification number: G06T11/206 , G06N5/04 , G06N20/00 , G06T3/40 , G06T2210/22
Abstract: A method is provided for generating a visualization for explaining a behavior of a machine learning (ML) model, the method includes inputting an image into a machine learning (ML) model for an inference operation. A first heatmap is generated for the image using a first visualization method. An area of highest attention is selected on the first heatmap based a predetermined threshold. The selected area is cropped from the image. The cropped selected area is upscaled. A second heatmap is generated for the cropped and upscaled selected area of the image. A final visualization is presented for analysis. In another embodiment, a computer program comprising instructions for executing the method is provided.
-
公开(公告)号:US20230040470A1
公开(公告)日:2023-02-09
申请号:US17444682
申请日:2021-08-09
Applicant: NXP B.V.
Inventor: Brian Ermans , Peter Doliwa , Gerardus Antonius Franciscus Derks , Wilhelmus Petrus Adrianus Johannus Michiels , Frederik Dirk Schalij
Abstract: A method is provided for generating a visualization for explaining a behavior of a machine learning (ML) model. In the method, an image is input to the ML model for an inference operation. The input image has an increased resolution compared to an image resolution the ML model was intended to receive as an input. A resolution of a plurality of resolution-independent convolutional layers of the neural network are adjusted because of the increased resolution of the input image. A resolution-independent convolutional layer of the neural network is selected. The selected resolution-independent convolutional layer is used to generate a plurality of activation maps. The plurality of activation maps is used in a visualization method to show what features of the image were important for the ML model to derive an inference conclusion. The method may be implemented in a computer program having instructions executable by a processor.
-
公开(公告)号:US20220358695A1
公开(公告)日:2022-11-10
申请号:US17302592
申请日:2021-05-07
Applicant: NXP B.V.
Inventor: Peter Doliwa
Abstract: A method is provided for generating a visualization for explaining a behavior of a machine learning (ML) model, the method includes inputting an image into a machine learning (ML) model for an inference operation. A first heatmap is generated for the image using a first visualization method. An area of highest attention is selected on the first heatmap based a predetermined threshold. The selected area is cropped from the image. The cropped selected area is upscaled. A second heatmap is generated for the cropped and upscaled selected area of the image. A final visualization is presented for analysis. In another embodiment, a computer program comprising instructions for executing the method is provided.
-
-
-
-
-
-
-
-
-