CYBER-PHYSICAL PROTECTIONS FOR EDGE COMPUTING PLATFORMS

    公开(公告)号:US20240106839A1

    公开(公告)日:2024-03-28

    申请号:US17954133

    申请日:2022-09-27

    CPC classification number: H04L63/1416 H04L63/1441

    Abstract: Various systems and methods are described to enable cyber-physical protections in edge computing platforms, including with countermeasures that mitigate and halt a variety of digital or real-world attacks. In an example, an attack detection and response engine is used to monitor processing circuitry, with operations that: identify operational data from processing circuitry that operates multiple layers (e.g., of an IP block) to perform compute operations, with trust of the processing circuitry established based on attestation of a hardware root of trust (RoT); evaluate the operational data to identify an attack condition at the processing circuitry, based on monitoring an operational layer of the multiple layers; and provide a digital attack response to the processing circuitry, in response to identifying the attack condition, to deploy the digital attack response and cause a countermeasure at the operational layer of the processing circuitry.

    METHODS AND APPARATUS FOR ATTESTATION OF AN ARTIFICIAL INTELLIGENCE MODEL

    公开(公告)号:US20230169397A1

    公开(公告)日:2023-06-01

    申请号:US17919510

    申请日:2021-05-17

    CPC classification number: G06N20/00

    Abstract: Methods, apparatus, systems and articles of manufacture to train a model using attestation data are disclosed. An example apparatus includes a model trainer to train a machine learning model using a golden training data set received from a server to generate golden training results; and an attestation result generator to: compare the shared model training results to the golden training results; and determine if attestation of the shared model training results passes based on the comparison of the shared model training results and the golden training results.

    MONITORING MEMORY STATUS USING CONFIGURABLE HARDWARE SECURED BY A DICE ROOT OF TRUST

    公开(公告)号:US20210089685A1

    公开(公告)日:2021-03-25

    申请号:US17100580

    申请日:2020-11-20

    Abstract: Methods, systems, and use cases for verifying operations of trusted hardware, such as with a memory monitor, are disclosed, with implementation in a computing system. In an example, a computing system includes memory circuitry including a DRAM device, processing circuitry operably coupled to the DRAM device, and a field programmable gate array (FPGA) configured to install and provision a memory monitor. The memory monitor is provided from an external verifier entity, and the memory monitor is operated by the FPGA to monitor operations of the DRAM device. The FPGA includes a Root of Trust (RoT) hardware component that is compliant with a Device Identifier Composition Engine (DICE) trusted computing specification, and DICE attestation using the RoT hardware component is used to verify a secure state of the memory monitor with the verifier entity, during operation of the memory monitor.

    CALCULUS FOR TRUST IN EDGE COMPUTING AND NAMED FUNCTION NETWORKS

    公开(公告)号:US20210021609A1

    公开(公告)日:2021-01-21

    申请号:US17064218

    申请日:2020-10-06

    Abstract: Various aspects of methods, systems, and use cases for verification and attestation of operations in an edge computing environment are described, based on use of a trust calculus and established definitions of trustworthiness properties. In an example, an edge computing verification node is configured to: obtain a trust representation, corresponding to an edge computing feature, that is defined with a trust calculus and provided in a data definition language; receive, from an edge computing node, compute results and attestation evidence from the edge computing feature; attempt validation of the attestation evidence based on attestation properties defined by the trust representation; and communicate an indication of trustworthiness for the compute results, based on the validation of the attestation evidence. In further examples, the trust representation and validation is used in a named function network (NFN), for dynamic composition and execution of a function.

    SECURE AND ATTESTABLE FUNCTIONS-AS-A-SERVICE

    公开(公告)号:US20230344871A1

    公开(公告)日:2023-10-26

    申请号:US18216412

    申请日:2023-06-29

    CPC classification number: H04L63/20 H04L67/60

    Abstract: Software and other electronic services are increasingly being executed in cloud computing environments. Edge computing environments may be used to bridge the gap between cloud computing environments and end-user software and electronic devices, and may implement Functions-as-a-Service (FaaS). FaaS may be used to create flavors of particular services, a chain of related functions that implements all or a portion of a FaaS edge workflow or workload. A FaaS Temporal Software-Defined Wide-Area Network (SD-WAN) may be used to receive a computing request and decompose the computing request into several FaaS flavors, enable dynamic creation of SD-WANs for each FaaS flavor, execute the FaaS flavors in their respective SD-WAN, return a result, and destroy the SD-WANs. The FaaS Temporal SD-WAN expands upon current edge systems by allowing low-latency creation of SD-WAN virtual networks bound to a set of function instances that are created to a execute a particular service request.

    APPARATUS, SYSTEMS, AND METHODS TO PROTECT HARDWARE AND SOFTWARE

    公开(公告)号:US20210117578A1

    公开(公告)日:2021-04-22

    申请号:US17132748

    申请日:2020-12-23

    Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.

    Apparatus, systems, and methods to protect hardware and software

    公开(公告)号:US12153722B2

    公开(公告)日:2024-11-26

    申请号:US17132748

    申请日:2020-12-23

    Abstract: Methods, apparatus, systems, and articles of manufacture to protect proprietary functionality and/or other content in hardware and software are disclosed. An example computer apparatus includes; a first circuit including a first interface, the first circuit associated with a first domain; a second circuit including a second interface, the second circuit associated with a second domain; and a chip manager to generate a first authenticated interface for the first interface using a first token and to generate a second authenticated interface for the second interface using a second token to enable communication between the first authenticated interface and the second authenticated interface.

Patent Agency Ranking