IMMUTABLE WATERMARKING FOR AUTHENTICATING AND VERIFYING AI-GENERATED OUTPUT

    公开(公告)号:US20230079112A1

    公开(公告)日:2023-03-16

    申请号:US18056037

    申请日:2022-11-16

    Abstract: Embodiments are directed to immutable watermarking for authenticating and verifying artificial intelligence (AI)-generated output. An embodiment of a system includes a processor of a monitoring system, wherein the processor is to: receive first content from an edge device and second content from an adversary system, wherein the first content comprises output of a machine learning (ML) model as applied to captured content at the edge device; receive a digital signature corresponding to the first content; process the digital signature to extract a global unique identifier (GUID) of the ML model that generated the first content; verify the extracted GUID against data obtained from a shared registry; in response to successfully verifying the extracted GUID, provide the first content for consumption at a monitoring consumption application; and in response to determining that the second content is not associated with a verifiable GUID, refuse the second content at the monitoring consumption application.

    MECHANISMS TO REDUCE EXPOSURE OF SENSITIVE TELEMETRY DATA IN COMPUTING NETWORKS

    公开(公告)号:US20220141201A1

    公开(公告)日:2022-05-05

    申请号:US17544355

    申请日:2021-12-07

    Abstract: One or more machine readable storage media, an apparatus, and a method. The apparatus provides a mechanism to implement a trusted telemetry governor (TTG) inside a trusted execution environment. The TTG is to determine a security policy to be applied to telemetry data corresponding to component of a computing infrastructure, receive the telemetry data in encrypted format and, based on the security policy: process the telemetry data including at least one of generating transformed telemetry data or analyzing the telemetry data to generate a report therefrom, and generating telemetry information from the telemetry data. The telemetry information includes at least one of processed telemetry data, a report, or a recommendation based on an analysis of the telemetry data. The TTG is to send the telemetry information outside of the trusted execution environment to a consumer of the telemetry data.

    IMMUTABLE WATERMARKING FOR AUTHENTICATING AND VERIFYING AI-GENERATED OUTPUT

    公开(公告)号:US20240242128A1

    公开(公告)日:2024-07-18

    申请号:US18621771

    申请日:2024-03-29

    CPC classification number: G06N20/00 G06F9/30101 H04L9/3242 H04L9/3247

    Abstract: Embodiments are directed to immutable watermarking for authenticating and verifying artificial intelligence (AI)-generated output. An embodiment of a system includes a processor of a monitoring system, wherein the processor is to: receive first content from a first device and second content from a second device, wherein the first content comprises output of inferences of a machine learning (ML) model as applied to captured content at the first device; extracting, from a digital signature corresponding to the first content, a global unique identifier (GUID) of the ML model that generated the first content; verify the extracted GUID against data obtained from a shared registry, the data comprising identifying information of the ML model including the GUID; in response to successfully verifying the extracted GUID, provide the first content for consumption at an application and indicate that the content is generated by the ML model having verified authenticity.

    TRUSTED AND CONNECTED MULTI-DOMAIN NODE CLUSTERS

    公开(公告)号:US20220094690A1

    公开(公告)日:2022-03-24

    申请号:US17541155

    申请日:2021-12-02

    Abstract: A system includes an orchestrator to receive a first request for resources for a workload of a tenant and to select a first node cluster in a first compute domain to be provisioned for the workload. The system also includes a first security manager to run in a trusted execution environment of one or more processors to receive attestation results for a second node cluster from a second security manager in a second compute domain, and to establish the first node cluster and the second node cluster as a trusted group of node clusters for the workload based, at least in part, on determining that a first compute node in the first node cluster meets one or more security requirements of a workload execution policy associated with the workload and that the attestation results indicate that a second compute node in the second node cluster meets the one or more security requirements.

    APPARATUS, SYSTEMS, AND METHODS TO PROTECT HARDWARE AND SOFTWARE

    公开(公告)号:US20210117578A1

    公开(公告)日:2021-04-22

    申请号:US17132748

    申请日:2020-12-23

    Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.

    Automated machine collaboration
    7.
    发明授权

    公开(公告)号:US12251816B2

    公开(公告)日:2025-03-18

    申请号:US17130030

    申请日:2020-12-22

    Abstract: According to various aspects, controller for an automated machine may include: a processor configured to: compare information about a function of the automated machine with information of a set of tasks available to a plurality of automated machines; negotiate, with the other automated machines of the plurality of automated machines and based on a result of the comparison, which task of the set of tasks is allocated to the automated machine.

    Trusted and connected multi-domain node clusters

    公开(公告)号:US12244601B2

    公开(公告)日:2025-03-04

    申请号:US17541155

    申请日:2021-12-02

    Abstract: A system includes an orchestrator to receive a first request for resources for a workload of a tenant and to select a first node cluster in a first compute domain to be provisioned for the workload. The system also includes a first security manager to run in a trusted execution environment of one or more processors to receive attestation results for a second node cluster from a second security manager in a second compute domain, and to establish the first node cluster and the second node cluster as a trusted group of node clusters for the workload based, at least in part, on determining that a first compute node in the first node cluster meets one or more security requirements of a workload execution policy associated with the workload and that the attestation results indicate that a second compute node in the second node cluster meets the one or more security requirements.

    Autonomous machine collaboration
    9.
    发明授权

    公开(公告)号:US12233552B2

    公开(公告)日:2025-02-25

    申请号:US17129982

    申请日:2020-12-22

    Abstract: A device including a processor configured to detect an environment of an automated machine, wherein the environment comprises one or more further automated machines; determine an action taken by the one or more further automated machines; determine an action expected of the one or more further automated machines; compares the taken action with the expected action; determine an accuracy score associated with the one or more further automated machines based on the comparison.

    Apparatus, systems, and methods to protect hardware and software

    公开(公告)号:US12153722B2

    公开(公告)日:2024-11-26

    申请号:US17132748

    申请日:2020-12-23

    Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.

Patent Agency Ranking