-
公开(公告)号:US10715317B2
公开(公告)日:2020-07-14
申请号:US15839117
申请日:2017-12-12
发明人: Suresh Chari , Hasini Gunasinghe , Ashish Kundu , Kapil Kumar Singh , Dong Su
摘要: A processor-implemented method improves security in a blockchain network of devices, which supports a blockchain, by protecting security, privacy, financial fairness, and secure transfer of identity assets. An identity asset provider device creates an identity asset related to an entity. The identity asset provider also creates a provider key, which is composed of multiple bits, and which is needed to decrypt an encrypted version of the identity asset. The identity asset provider device transmits the provider key bit-by-bit to an identity asset consumer device. A price for the provider key depends on how many bits have been transmitted to the identity asset consumer device.
-
公开(公告)号:US20190188830A1
公开(公告)日:2019-06-20
申请号:US15843453
申请日:2017-12-15
发明人: Benjamin J. Edwards , Heqing Huang , Taesung Lee , Ian M. Molloy , Dong Su
摘要: Mechanisms are provided to implement an adversarial network framework. Using an adversarial training technique, an image obfuscation engine operating as a generator in the adversarial network framework is trained to determine a privacy protection layer to be applied by the image obfuscation engine to input image data. The image obfuscation engine applies the determined privacy protection layer to an input image captured by an image capture device to generate obfuscated image data. The obfuscated image data is transmitted to a remotely located image recognition service, via at least one data network, for performance of image recognition operations.
-
公开(公告)号:US20190188562A1
公开(公告)日:2019-06-20
申请号:US15844442
申请日:2017-12-15
发明人: Benjamin J. Edwards , Taesung Lee , Ian M. Molloy , Dong Su
CPC分类号: G06N3/08 , G06N3/04 , H04L63/1441
摘要: Mechanisms are provided to implement a hardened neural network framework. A data processing system is configured to implement a hardened neural network engine that operates on a neural network to harden the neural network against evasion attacks and generates a hardened neural network. The hardened neural network engine generates a reference training data set based on an original training data set. The neural network processes the original training data set and the reference training data set to generate first and second output data sets. The hardened neural network engine calculates a modified loss function of the neural network, where the modified loss function is a combination of an original loss function associated with the neural network and a function of the first and second output data sets. The hardened neural network engine trains the neural network based on the modified loss function to generate the hardened neural network.
-
公开(公告)号:US11853436B2
公开(公告)日:2023-12-26
申请号:US17231369
申请日:2021-04-15
发明人: Taesung Lee , Ian M. Molloy , Dong Su
CPC分类号: G06F21/602 , G06N3/04 , G06N3/08 , G06N3/082 , G06Q10/06 , H04L2209/16
摘要: Mechanisms are provided for obfuscating training of trained cognitive model logic. The mechanisms receive input data for classification into one or more classes in a plurality of predefined classes as part of a cognitive operation of the cognitive system. The input data is processed by applying a trained cognitive model to the input data to generate an output vector having values for each of the plurality of predefined classes. A perturbation insertion engine modifies the output vector by inserting a perturbation in a function associated with generating the output vector, to thereby generate a modified output vector. The modified output vector is then output. The perturbation modifies the one or more values to obfuscate the trained configuration of the trained cognitive model logic while maintaining accuracy of classification of the input data.
-
公开(公告)号:US20190392305A1
公开(公告)日:2019-12-26
申请号:US16016752
申请日:2018-06-25
发明人: Zhongshu Gu , Heqing Huang , Jialong Zhang , Dong Su , Dimitrios Pendarakis , Ian M. Molloy
摘要: Mechanisms are provided to implement an enhanced privacy deep learning system framework (hereafter “framework”). The framework receives, from a client computing device, an encrypted first subnet model of a neural network, where the first subnet model is one partition of multiple partitions of the neural network. The framework loads the encrypted first subnet model into a trusted execution environment (TEE) of the framework, decrypts the first subnet model, within the TEE, and executes the first subnet model within the TEE. The framework receives encrypted input data from the client computing device, loads the encrypted input data into the TEE, decrypts the input data, and processes the input data in the TEE using the first subnet model executing within the TEE.
-
公开(公告)号:US20220269942A1
公开(公告)日:2022-08-25
申请号:US17743571
申请日:2022-05-13
发明人: Zhongshu Gu , Heqing Huang , Jialong Zhang , Dong Su , Dimitrios Pendarakis , Ian M. Molloy
摘要: Mechanisms are provided to implement an enhanced privacy deep learning system framework (hereafter “framework”). The framework receives, from a client computing device, an encrypted first subnet model of a neural network, where the first subnet model is one partition of multiple partitions of the neural network. The framework loads the encrypted first subnet model into a trusted execution environment (TEE) of the framework, decrypts the first subnet model, within the TEE, and executes the first subnet model within the TEE. The framework receives encrypted input data from the client computing device, loads the encrypted input data into the TEE, decrypts the input data, and processes the input data in the TEE using the first subnet model executing within the TEE.
-
公开(公告)号:US20210303703A1
公开(公告)日:2021-09-30
申请号:US17231369
申请日:2021-04-15
发明人: Taesung Lee , Ian M. Molloy , Dong Su
摘要: Mechanisms are provided for obfuscating training of trained cognitive model logic. The mechanisms receive input data for classification into one or more classes in a plurality of predefined classes as part of a cognitive operation of the cognitive system. The input data is processed by applying a trained cognitive model to the input data to generate an output vector having values for each of the plurality of predefined classes. A perturbation insertion engine modifies the output vector by inserting a perturbation in a function associated with generating the output vector, to thereby generate a modified output vector. The modified output vector is then output. The perturbation modifies the one or more values to obfuscate the trained configuration of the trained cognitive model logic while maintaining accuracy of classification of the input data.
-
公开(公告)号:US11886989B2
公开(公告)日:2024-01-30
申请号:US16125983
申请日:2018-09-10
发明人: Zhongshu Gu , Heqing Huang , Jialong Zhang , Dong Su , Dimitrios Pendarakis , Ian Michael Molloy
摘要: Using a deep learning inference system, respective similarities are measured for each of a set of intermediate representations to input information used as an input to the deep learning inference system. The deep learning inference system includes multiple layers, each layer producing one or more associated intermediate representations. Selection is made of a subset of the set of intermediate representations that are most similar to the input information. Using the selected subset of intermediate representations, a partitioning point is determined in the multiple layers used to partition the multiple layers into two partitions defined so that information leakage for the two partitions will meet a privacy parameter when a first of the two partitions is prevented from leaking information. The partitioning point is output for use in partitioning the multiple layers of the deep learning inference system into the two partitions.
-
公开(公告)号:US11178151B2
公开(公告)日:2021-11-16
申请号:US16226336
申请日:2018-12-19
发明人: Kapil Kumar Singh , Suresh N. Chari , Ashish Kundu , Sridhar Muppidi , Dong Su
摘要: An example operation may include one or more of receiving, by a blockchain node or peer of a blockchain network, attribute data for a user profile, creating blockchain transactions to store attribute hashes and metadata to a shared ledger, receiving a user profile query from an identity consumer, creating blockchain transactions to retrieve attribute hashes and metadata corresponding to the query, reconstructing the user profile from the metadata, responding to the query by providing attribute data to the identity consumer, and creating and storing hashes of the attribute data and metadata to the shared ledger.
-
公开(公告)号:US10944560B2
公开(公告)日:2021-03-09
申请号:US16053189
申请日:2018-08-02
发明人: Suresh N. Chari , Hasini Gunasinghe , Ashish Kundu , Kapil Kumar Singh , Dong Su
摘要: A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.
-
-
-
-
-
-
-
-
-