Method for protecting a software program from copying

    公开(公告)号:US11409843B2

    公开(公告)日:2022-08-09

    申请号:US16598148

    申请日:2019-10-10

    Applicant: NXP B.V.

    Abstract: A method is provided for protecting a software program from copying. The method includes providing a first implementation of the software program. A second implementation of the software program is then provided. The second implementation provides a same functionality as the first implementation, and wherein the second implementation includes a plurality of dummy operations to increase a number of operations and an execution time of the second implementation compared to the first implementation. The dummy operations are encoded. The second implementation may then be compared to another software program to determine if the another software program is a copy of the first implementation of the software program. This allows a copy of the first implementation to be detected without disclosing the first implementation.

    Method for managing a machine learning model

    公开(公告)号:US11270227B2

    公开(公告)日:2022-03-08

    申请号:US16148502

    申请日:2018-10-01

    Applicant: NXP B.V.

    Abstract: A method is provided for managing a machine learning system. In the method, a database is provided for storing a plurality of data elements. A plurality of machine learning models is trained using assigned subsets of the plurality of data elements. The outputs of the plurality of machine learning models is provided to an aggregator. During inference operation of the machine learning system, the aggregator determines a final output based on outputs from the plurality of models. If it is determined that an assigned subset must be changed because, for example, a record must be deleted, then the data element is removed from the selected assigned subset. The affected machine learning model associated with the changed assigned subset is removed, and retrained using the changed assigned subset.

    DEVICE, INTEGRATED CIRCUIT AND METHODS THEREFOR

    公开(公告)号:US20210133362A1

    公开(公告)日:2021-05-06

    申请号:US17081589

    申请日:2020-10-27

    Applicant: NXP B.V.

    Abstract: A device and methods are described that comprise at least one host application and a rich execution environment. At least one interface is operably coupled to the REE for communicating with a remote server. A security sub-system comprises a security monitoring and control circuit coupled to the REE and connectable to the remote server via the REE and the at least one interface. The security monitoring and control circuit comprises an analytics circuit configured to detect an anomaly following a compromisation of the device. The security monitoring and control circuit is arranged to treat the REE as an untrusted component and in response to a detection of a compromisation of the REE or a component in the device that is accessible by the REE by the analytics circuit, the security monitoring and control circuit is configured to re-establish a secure connection to the remote server that tunnels through the REE and at least partially removes the compromisation from the device.

    MACHINE LEARNING MODEL AND METHOD FOR DETERMINING IF THE MACHINE LEARNING MODEL HAS BEEN COPIED

    公开(公告)号:US20210034721A1

    公开(公告)日:2021-02-04

    申请号:US16529882

    申请日:2019-08-02

    Applicant: NXP B.V.

    Abstract: A method and data processing system are provided for determining if a machine learning model has been copied. The machine learning model has a plurality of nodes, the plurality of nodes is organized as a plurality of interconnected layers, and the plurality of interconnected layers includes an input layer and an output layer. The output layer has a predetermined number of output nodes for classifying input samples into a predetermined number of categories, where each output node corresponds to a category. An additional watermarking node is added to the output layer. The model is trained to classify the input data into the predetermined number of categories and into an additional category for the additional node. The additional node may be added to another model to determine if the another model is a copy or clone of the ML model.

    System and method for implementing a host card emulation (HCE) command stack in a mobile phone

    公开(公告)号:US10068114B1

    公开(公告)日:2018-09-04

    申请号:US15701764

    申请日:2017-09-12

    Applicant: NXP B.V.

    Abstract: A method for implementing a host card emulation (HCE) service in a remote near field communication (NFC) device is provided. In the method, a first command application protocol data unit (APDU) is received at the remote NFC device from an NFC reader. A first response to the first command APDU is computed. A second command APDU from the NFC reader is predicted that is likely to follow receipt of the first command APDU from the NFC reader. A second response to the predicted second command APDU is computed. A third command APDU is received from the NFC reader. It is determined if the prediction of the second command APDU matches the third command APDU. If the second and third command APDUs match, then the computed second response is send directly to the NFC reader without having to traverse a NFC stack.

    METHOD OF GENERATING AN ELLIPTIC CURVE CRYPTOGRAPHIC KEY PAIR

    公开(公告)号:US20180115419A1

    公开(公告)日:2018-04-26

    申请号:US15335177

    申请日:2016-10-26

    Applicant: NXP B.V.

    Abstract: A method is provided for generating an elliptic curve cryptography key pair that uses two topologically identical pseudo-random number generators operating in parallel and in step with each other. One generator operates in the scalar number domain and the other generator operates in the elliptic curve point domain. Parallel sequences of pseudo-random elliptic curve points aG and corresponding scalars a are generated in this manner. A scalar a becomes a private key and an elliptic curve point aG is a public key of a key pair. Each generator is advanced by one iteration successively, and the isomorphic relationship ensures that the point domain generator always contains values which are multiples of the system base point according to values contained in the corresponding position in the number domain generator. In one embodiment, the pseudo-random number generators are each characterized as being lagged Fibonacci generators.

Patent Agency Ranking