METHOD FOR DETERMINING IF A MACHINE LEARNING MODEL HAS BEEN COPIED

    公开(公告)号:US20200233936A1

    公开(公告)日:2020-07-23

    申请号:US16250074

    申请日:2019-01-17

    Applicant: NXP B.V.

    Abstract: A method is provided for detecting copying of a machine learning model. A plurality of inputs is provided to a first machine learning model. The first machine learning model provides a plurality of output values. A sequence of bits of a master input is divided into a plurality of subsets of bits. The master input may be an image. Each subset of the plurality of subsets of bits corresponds to one of the plurality of output values. An ordered sequence of the inputs is generated based on the plurality of subsets of bits. The ordered sequence of the inputs is inputted to a second machine learning model. It is then determined if output values from the second machine learning model reproduces the predetermined master input. If the predetermined master input is reproduced, the second machine learning model is a copy of the first machine learning model.

    METHOD FOR DETECTING IF A MACHINE LEARNING MODEL HAS BEEN COPIED

    公开(公告)号:US20210019661A1

    公开(公告)日:2021-01-21

    申请号:US16511082

    申请日:2019-07-15

    Applicant: NXP B.V.

    Abstract: A method is provided for detecting copying of a machine learning model. In the method, the first machine learning model is divided into a plurality of portions. Intermediate outputs from a hidden layer of a selected one of the plurality of portions is compared to corresponding outputs from a second machine learning model to detect the copying. Alternately, a first seal may be generated using the plurality of inputs and the intermediate outputs from nodes of the selected portion. A second seal from a suspected copy that has been generated the same way is compared to the first seal to detect the copying. If the first and second seals are the same, then there is a high likelihood that the suspected copy is an actual copy. By using the method, only the intermediate outputs of the machine learning model outputs have to be disclosed to others, thus protecting the confidentiality of the model.

    METHOD AND DATA PROCESSING SYSTEM FOR REMOTELY DETECTING TAMPERING OF A MACHINE LEARNING MODEL

    公开(公告)号:US20200050766A1

    公开(公告)日:2020-02-13

    申请号:US16058094

    申请日:2018-08-08

    Applicant: NXP B.V.

    Inventor: JOPPE WILLEM BOS

    Abstract: A method and data processing system for detecting tampering of a machine learning model is provided. The method includes training a machine learning model. During a training operating period, a plurality of input values is provided to the machine learning model. In response to a predetermined invalid input value, the machine learning model is trained that a predetermined output value will be expected. The model is verified that it has not been tampered with by inputting the predetermined invalid input value during an inference operating period. If the expected output value is provided by the machine learning model in response to the predetermined input value, then the machine learning model has not been tampered with. If the expected output value is not provided, then the machine learning model has been tampered with. The method may be implemented using the data processing system.

    METHOD OF GENERATING CRYPTOGRAPHIC KEY PAIRS

    公开(公告)号:US20180212767A1

    公开(公告)日:2018-07-26

    申请号:US15414391

    申请日:2017-01-24

    Applicant: NXP B.V.

    Abstract: A method is provided for performing elliptic curve cryptography that reduces the number of required computations to produce, for example, a key pair. The number of computations is reduced by changing how a random nonce used in the computations is selected. In an embodiment, a look-up table is generated having pre-computed scalar values and elliptic curve points. Every time a new pseudo-random value is created for use in the ECDSA, a combination of the look-up table values is used to create multiple intermediate values. One of the multiple intermediate values is randomly chosen as a replacement value for one of the existing table entries. Each time the look-up table is used, multiple entries in the look-up table are updated to new look-up table values as described. In this manner, new randomness is provided in every step to more e□ciently generate the next pseudo-random nonce as a combination of multiple internally stored temporary look-up table values. Alternately, another mathematical group may be used.

Patent Agency Ranking