METHOD AND 3D-PRINTING SYSTEM FOR EMBEDDING AN INTEGRATED CIRCUIT INTO A 3D-PRINTED OBJECT

    公开(公告)号:US20200061929A1

    公开(公告)日:2020-02-27

    申请号:US16109154

    申请日:2018-08-22

    Applicant: NXP B.V.

    Abstract: A method is provided for embedding an integrated circuit (IC) into a 3D-printed object. The method includes providing a filament having a material for 3D-printing an object, and an integrated circuit embedded within the filament material. The filament is used to form at least part of the 3D-printed object. A 3D-printing system is provided for implementing the method. The 3D-printing system includes a filament dispenser for storing and dispensing the 3D-printing filament. A platform provides a work surface for supporting the object as the object is being printed. A processor is provided for controlling a printing operation of the 3D-printer, and for 3D-printing the object with the filament having the ICs embedded therein. A configuration circuit is provided for configuring the IC as the IC is embedded in the 3D-printed object.

    METHOD FOR DETECTING IF A MACHINE LEARNING MODEL HAS BEEN COPIED

    公开(公告)号:US20210019661A1

    公开(公告)日:2021-01-21

    申请号:US16511082

    申请日:2019-07-15

    Applicant: NXP B.V.

    Abstract: A method is provided for detecting copying of a machine learning model. In the method, the first machine learning model is divided into a plurality of portions. Intermediate outputs from a hidden layer of a selected one of the plurality of portions is compared to corresponding outputs from a second machine learning model to detect the copying. Alternately, a first seal may be generated using the plurality of inputs and the intermediate outputs from nodes of the selected portion. A second seal from a suspected copy that has been generated the same way is compared to the first seal to detect the copying. If the first and second seals are the same, then there is a high likelihood that the suspected copy is an actual copy. By using the method, only the intermediate outputs of the machine learning model outputs have to be disclosed to others, thus protecting the confidentiality of the model.

    METHOD AND DATA PROCESSING SYSTEM FOR DETECTING A MALICIOUS COMPONENT ON AN INTEGRATED CIRCUIT

    公开(公告)号:US20210004499A1

    公开(公告)日:2021-01-07

    申请号:US16502668

    申请日:2019-07-03

    Applicant: NXP B.V.

    Abstract: A method and data processing system are provided for detecting a malicious component in a data processing system. The malicious component may be of any type, such as a hardware trojan, malware, or ransomware. In the method, a plurality of counters is used to count events in the data processing system during operation, where each event has a counter associated therewith. A machine learning model is trained a normal pattern of behavior of the data processing system using the event counts. After training, an operation of the data processing system is monitored using the machine learning model. Current occurrences of events in the data processing system are compared to the normal pattern of behavior. If a different pattern of behavior is detected, an indication, such as a flag, of the different pattern of behavior is provided.

    METHOD FOR DETERMINING IF A MACHINE LEARNING MODEL HAS BEEN COPIED

    公开(公告)号:US20200233936A1

    公开(公告)日:2020-07-23

    申请号:US16250074

    申请日:2019-01-17

    Applicant: NXP B.V.

    Abstract: A method is provided for detecting copying of a machine learning model. A plurality of inputs is provided to a first machine learning model. The first machine learning model provides a plurality of output values. A sequence of bits of a master input is divided into a plurality of subsets of bits. The master input may be an image. Each subset of the plurality of subsets of bits corresponds to one of the plurality of output values. An ordered sequence of the inputs is generated based on the plurality of subsets of bits. The ordered sequence of the inputs is inputted to a second machine learning model. It is then determined if output values from the second machine learning model reproduces the predetermined master input. If the predetermined master input is reproduced, the second machine learning model is a copy of the first machine learning model.

    SHUFFLING MECHANISM FOR SHUFFLING AN ORDER OF DATA BLOCKS IN A DATA PROCESSING SYSTEM

    公开(公告)号:US20200012782A1

    公开(公告)日:2020-01-09

    申请号:US16027521

    申请日:2018-07-05

    Applicant: NXP B.V.

    Abstract: A method is provided for shuffling an order of a plurality of data blocks. In the method, a random number is generated, the random number corresponding to an index for a data block of the plurality of data blocks, where each data block of the plurality of data blocks has an index that uniquely identifies each data block of the plurality of data blocks. The increment function with a parameter is applied to the random number to generate a new index, the new index corresponds to a data block of the plurality of data blocks. The data block corresponding to the new index is selected as the next data block of a reordering of the plurality of data blocks. The method is iterated until the reordering of the plurality of data blocks is complete.

    SECURE SPECULATIVE INSTRUCTION EXECUTION IN A DATA PROCESSING SYSTEM

    公开(公告)号:US20190310941A1

    公开(公告)日:2019-10-10

    申请号:US15945047

    申请日:2018-04-04

    Applicant: NXP B.V.

    Abstract: A data processing system includes a processor, a cache memory, a speculative cache memory, and a control circuit. The processor is for executing instructions. The cache memory is coupled to the processor and is for storing the instructions and related data. A speculative cache is coupled to the processor and is for storing only speculative instructions and related data. The control circuit is coupled to the processor, to the cache memory, and to the speculative cache. The control circuit is for causing speculative instructions to be stored in the speculative cache in response to receiving an indication from the processor. Also, a method is provided for speculative execution in the data processing system.

Patent Agency Ranking