-
公开(公告)号:US20230079112A1
公开(公告)日:2023-03-16
申请号:US18056037
申请日:2022-11-16
Applicant: Intel Corporation
Inventor: Ria Cheruvu , Anahit Tarkhanyan
Abstract: Embodiments are directed to immutable watermarking for authenticating and verifying artificial intelligence (AI)-generated output. An embodiment of a system includes a processor of a monitoring system, wherein the processor is to: receive first content from an edge device and second content from an adversary system, wherein the first content comprises output of a machine learning (ML) model as applied to captured content at the edge device; receive a digital signature corresponding to the first content; process the digital signature to extract a global unique identifier (GUID) of the ML model that generated the first content; verify the extracted GUID against data obtained from a shared registry; in response to successfully verifying the extracted GUID, provide the first content for consumption at a monitoring consumption application; and in response to determining that the second content is not associated with a verifiable GUID, refuse the second content at the monitoring consumption application.
-
公开(公告)号:US12003489B2
公开(公告)日:2024-06-04
申请号:US17544355
申请日:2021-12-07
Applicant: Intel Corporation
Inventor: Reshma Lal , Anahit Tarkhanyan , Jianping Xu , Christine E. Severns-Williams
CPC classification number: H04L63/0428 , H04L9/0819 , H04L9/321 , H04L9/3263 , H04L43/04 , H04L43/06 , H04L63/0823 , H04L63/10 , H04L63/1433 , H04L63/1475 , H04L43/0817 , H04L63/20
Abstract: One or more machine readable storage media, an apparatus, and a method. The apparatus provides a mechanism to implement a trusted telemetry governor (TTG) inside a trusted execution environment. The TTG is to determine a security policy to be applied to telemetry data corresponding to component of a computing infrastructure, receive the telemetry data in encrypted format and, based on the security policy: process the telemetry data including at least one of generating transformed telemetry data or analyzing the telemetry data to generate a report therefrom, and generating telemetry information from the telemetry data. The telemetry information includes at least one of processed telemetry data, a report, or a recommendation based on an analysis of the telemetry data. The TTG is to send the telemetry information outside of the trusted execution environment to a consumer of the telemetry data.
-
公开(公告)号:US20220141201A1
公开(公告)日:2022-05-05
申请号:US17544355
申请日:2021-12-07
Applicant: Intel Corporation
Inventor: Reshma Lal , Anahit Tarkhanyan , Jianping Xu , Christine E. Severns-Williams
Abstract: One or more machine readable storage media, an apparatus, and a method. The apparatus provides a mechanism to implement a trusted telemetry governor (TTG) inside a trusted execution environment. The TTG is to determine a security policy to be applied to telemetry data corresponding to component of a computing infrastructure, receive the telemetry data in encrypted format and, based on the security policy: process the telemetry data including at least one of generating transformed telemetry data or analyzing the telemetry data to generate a report therefrom, and generating telemetry information from the telemetry data. The telemetry information includes at least one of processed telemetry data, a report, or a recommendation based on an analysis of the telemetry data. The TTG is to send the telemetry information outside of the trusted execution environment to a consumer of the telemetry data.
-
公开(公告)号:US20240242128A1
公开(公告)日:2024-07-18
申请号:US18621771
申请日:2024-03-29
Applicant: Intel Corporation
Inventor: Ria Cheruvu , Anahit Tarkhanyan
CPC classification number: G06N20/00 , G06F9/30101 , H04L9/3242 , H04L9/3247
Abstract: Embodiments are directed to immutable watermarking for authenticating and verifying artificial intelligence (AI)-generated output. An embodiment of a system includes a processor of a monitoring system, wherein the processor is to: receive first content from a first device and second content from a second device, wherein the first content comprises output of inferences of a machine learning (ML) model as applied to captured content at the first device; extracting, from a digital signature corresponding to the first content, a global unique identifier (GUID) of the ML model that generated the first content; verify the extracted GUID against data obtained from a shared registry, the data comprising identifying information of the ML model including the GUID; in response to successfully verifying the extracted GUID, provide the first content for consumption at an application and indicate that the content is generated by the ML model having verified authenticity.
-
公开(公告)号:US20220094690A1
公开(公告)日:2022-03-24
申请号:US17541155
申请日:2021-12-02
Applicant: Intel Corporation
Inventor: Anahit Tarkhanyan , Reshma Lal , Jianping Xu , Christine E. Severns-Williams
Abstract: A system includes an orchestrator to receive a first request for resources for a workload of a tenant and to select a first node cluster in a first compute domain to be provisioned for the workload. The system also includes a first security manager to run in a trusted execution environment of one or more processors to receive attestation results for a second node cluster from a second security manager in a second compute domain, and to establish the first node cluster and the second node cluster as a trusted group of node clusters for the workload based, at least in part, on determining that a first compute node in the first node cluster meets one or more security requirements of a workload execution policy associated with the workload and that the attestation results indicate that a second compute node in the second node cluster meets the one or more security requirements.
-
公开(公告)号:US20210117578A1
公开(公告)日:2021-04-22
申请号:US17132748
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Sunil Cheruvu , Ria Cheruvu , Kshitij Doshi , Francesc Guim Bernat , Ned Smith , Anahit Tarkhanyan
Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.
-
公开(公告)号:US12251816B2
公开(公告)日:2025-03-18
申请号:US17130030
申请日:2020-12-22
Applicant: Intel Corporation
Inventor: Rajesh Poornachandran , Omesh Tickoo , Anahit Tarkhanyan , Vinayak Honkote , Stanley Mo
IPC: B25J13/00
Abstract: According to various aspects, controller for an automated machine may include: a processor configured to: compare information about a function of the automated machine with information of a set of tasks available to a plurality of automated machines; negotiate, with the other automated machines of the plurality of automated machines and based on a result of the comparison, which task of the set of tasks is allocated to the automated machine.
-
公开(公告)号:US12244601B2
公开(公告)日:2025-03-04
申请号:US17541155
申请日:2021-12-02
Applicant: Intel Corporation
Inventor: Anahit Tarkhanyan , Reshma Lal , Jianping Xu , Christine E. Severns-Williams
Abstract: A system includes an orchestrator to receive a first request for resources for a workload of a tenant and to select a first node cluster in a first compute domain to be provisioned for the workload. The system also includes a first security manager to run in a trusted execution environment of one or more processors to receive attestation results for a second node cluster from a second security manager in a second compute domain, and to establish the first node cluster and the second node cluster as a trusted group of node clusters for the workload based, at least in part, on determining that a first compute node in the first node cluster meets one or more security requirements of a workload execution policy associated with the workload and that the attestation results indicate that a second compute node in the second node cluster meets the one or more security requirements.
-
公开(公告)号:US12233552B2
公开(公告)日:2025-02-25
申请号:US17129982
申请日:2020-12-22
Applicant: Intel Corporation
Inventor: Rita H. Wouhaybi , Anahit Tarkhanyan , Vinayak Honkote , Rajesh Poornachandran , Francesc Guim Bernat
IPC: B25J9/16
Abstract: A device including a processor configured to detect an environment of an automated machine, wherein the environment comprises one or more further automated machines; determine an action taken by the one or more further automated machines; determine an action expected of the one or more further automated machines; compares the taken action with the expected action; determine an accuracy score associated with the one or more further automated machines based on the comparison.
-
公开(公告)号:US12153722B2
公开(公告)日:2024-11-26
申请号:US17132748
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Sunil Cheruvu , Ria Cheruvu , Kshitij Doshi , Francesc Guim Bernat , Ned Smith , Anahit Tarkhanyan
Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.
-
-
-
-
-
-
-
-
-