HIGH-THROUGHPUT PRIVACY-FRIENDLY HARDWARE ASSISTED MACHINE LEARNING ON EDGE NODES

    公开(公告)号:US20190332814A1

    公开(公告)日:2019-10-31

    申请号:US15964536

    申请日:2018-04-27

    Applicant: NXP B.V.

    Abstract: A device, including: a memory; a processor configured to implement an encrypted machine leaning model configured to: evaluate the encrypted learning model based upon received data to produce an encrypted machine learning model output; producing verification information; a tamper resistant hardware configured to: verify the encrypted machine learning model output based upon the verification information; and decrypt the encrypted machine learning model output when the encrypted machine learning model output is verified.

    ENCRYPTION SCHEMES WITH ADDITIONAL PROPERTIES

    公开(公告)号:US20190319791A1

    公开(公告)日:2019-10-17

    申请号:US15951590

    申请日:2018-04-12

    Applicant: NXP B.V.

    Abstract: Various embodiments relate to a method of encrypting a message m using a Paillier cryptosystem, including: computing a ciphertext c based upon the message m, N, and r, where N is the product of two distinct primes p and q, and r is randomly chosen such that r∈[1, N); computing a first verification value based upon u and N, where u is randomly chosen such that u∈[1, N); computing a second verification value s based upon u, r, the ciphertext c, the verification value, and a hash function H.

    FAULT TOLERANCE, CORRECTION, AND ATTACK DETECTION THROUGH MULTIPLE CONTINUOUS TRANSFORMATIONS OF INPUTS

    公开(公告)号:US20210019663A1

    公开(公告)日:2021-01-21

    申请号:US16512805

    申请日:2019-07-16

    Applicant: NXP B.V.

    Abstract: A method for processing information includes transforming first information based on a first function, transforming second information based on a second function, processing the first transformed information using a first machine-learning model to generate a first result, processing the second transformed information using a second machine-learning model to generate a second result, and aggregating the first result and the second result to generate a decision. The first and second information may be the same information. The first function may be different from the second function. The first machine-learning model may be based on a first algorithm, and the second machine-learning algorithm may be based on a second algorithm.

    PASSWORD AUTHENTICATION USING WHITE-BOX CRYPTOGRAPHY

    公开(公告)号:US20200099525A1

    公开(公告)日:2020-03-26

    申请号:US16140029

    申请日:2018-09-24

    Applicant: NXP B.V.

    Abstract: A white-box system for authenticating a user-supplied password, including: a password database including a salt value and an authentication value for each user; a white-box implementation of a symmetric cipher configured to produce an encrypted value by encrypting the user-supplied password using the salt value associated with the user as an encoded secret key; and a comparator configured to compare the encrypted value with the authentication value associated with the user to verify the user-supplied password.

    ANOMALY DETECTION BY CLASSIFYING PAST BEHAVIOR

    公开(公告)号:US20210064933A1

    公开(公告)日:2021-03-04

    申请号:US16554192

    申请日:2019-08-28

    Applicant: NXP B.V.

    Abstract: Various embodiments relate to a method for detecting anomalies in a system by an anomaly detector, including: receiving a trained machine learning model that detects anomalies; receiving a set of new inputs from the to the anomaly detector from the system; setting a label for each of the set of new inputs to a value indicating normal operation of the system; training a new anomaly detection model using incremental learning to update the trained machine learning model using the labeled set of new inputs; receiving a set of past model inputs with an associated label; producing a verification set by inputting the set of past model inputs into the new anomaly detection model; and comparing the verification set with the labelled past model inputs to determine if an anomaly is present.

    DETERMINISTIC DIGITAL SIGNATURE METHOD WITHOUT USING A HASH FUNCTION

    公开(公告)号:US20200076616A1

    公开(公告)日:2020-03-05

    申请号:US16117714

    申请日:2018-08-30

    Applicant: NXP B.V.

    Abstract: A white-box system and method for producing a digital signature of a message m, including: a white-box implementation of a symmetric cipher configured to produce a deterministic nonce value by encrypting the message m using a secret key; and a digital signature algorithm configured to produce a digital signature of the message m based upon the deterministic nonce, the message m, and a secret signing key.

    USING WHITE-BOX IN A LEAKAGE-RESILIENT PRIMITIVE

    公开(公告)号:US20190132116A1

    公开(公告)日:2019-05-02

    申请号:US15795890

    申请日:2017-10-27

    Applicant: NXP B.V.

    Abstract: A method for implementing a pseudo-random function (PRF) using a white-box implementation of a cryptographic function in N rounds, including: receiving an input to the PRF; receiving a cryptographic key in a first round; encrypting, using the white-box implementation of the cryptographic function and the cryptographic key, an input message that is one of M possible input messages based upon a portion of the input to produce a first output; for each succeeding round: encrypting, using the white-box implementation of the cryptographic function and an ith cryptographic key, further input messages that are one of M possible input messages based upon a further portion of the input to produce an ith output, wherein the ith cryptographic key is the output from the preceding round, wherein the white-box implementation of the cryptographic function only produces a correct output for the M possible input messages and produces an incorrect output for input messages that are not one of the M possible input messages.

Patent Agency Ranking