Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Artificial intelligence processor security enhancement system and method based on key path encryption

An artificial intelligence, critical path technology, applied in key distribution, to achieve the effect of large market benefits, good application prospects, and security

Active Publication Date: 2019-07-05
INST OF INFORMATION ENG CAS
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem of the present invention is to overcome the deficiencies of the prior art, and provide an artificial intelligence processor security enhancement system and method based on critical path encryption, which can effectively decrypt the weight and operation instructions, encryption and decryption of the neural network model from the CPU encryption The intermediate data processed by the artificial intelligence processor makes up for the defect that the existing artificial intelligence processor is vulnerable to side channel attacks and ensures the safety of the artificial intelligence processor; it has novel structure, small size, high performance, strong encryption performance and adaptability Strong and other characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Artificial intelligence processor security enhancement system and method based on key path encryption
  • Artificial intelligence processor security enhancement system and method based on key path encryption
  • Artificial intelligence processor security enhancement system and method based on key path encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] General artificial intelligence processor system application architecture such as figure 1 As shown, it is mainly composed of a neural network model, an accelerator compiler, a CPU (including the accelerator's operating environment), an off-chip DRAM of the accelerator, and an artificial intelligence processor. For neural network models trained on deep learning platforms such as TensorFlow, Keras, Caffe, and PyTorch, the compiler of the accelerator is used to generate the operating instruction file of the artificial intelligence processor corresponding to the neural network model. The CPU encrypts the instruction file and weight data generated by the compiler, and then parses out the encrypted instructions of each layer of the neural network through the operating environment and sends them to the artificial intelligence processor for execution....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an artificial intelligence processor security enhancement system and method based on key path encryption. The artificial intelligence processor security enhancement system iscomposed of an instruction security unit, a data security unit and a universal artificial intelligence processor architecture. On the basis of a universal artificial intelligence processor architecture, an instruction security unit and a data security unit are added to ensure the security of instructions and weights of a neural network model and protect the security of intermediate data processedby an artificial intelligence processor. According to the technology, a private key is transmitted through an asymmetric encryption algorithm to decrypt an encrypted instruction and a weight, the integrity of a neural network model instruction can be verified through a bypass chain type verification method, and the instruction transmission performance of an artificial intelligence processor is notaffected. The system adopts encryption algorithms (e.g., advanced encryption algorithms such as AES-CTR mode) to encrypte a feature map of a critical path, so that the privacy of the feature map is protected, side channel information leakage of an artificial intelligence processor is reduced, and an attacker cannot infer the structure of the neural network model through an access mode of an off-chip DRAM. The method has wide practical value and application prospect.

Description

technical field [0001] The invention relates to an artificial intelligence processor security enhancement system and method, including model security, data security, and instruction security of the artificial intelligence processor. It is mainly used to protect the security of the model, data and instructions run by the AI ​​processor. The artificial intelligence processor security enhancement technology mainly uses encryption algorithms (such as AES encryption algorithm) to encrypt and decrypt model weights, instructions, and intermediate data processed by artificial intelligence processors to ensure the security of artificial intelligence processors. It belongs to computing systems and The field of microprocessor security. Background technique [0002] As the most energy-efficient artificial intelligence processor, ASIC has attracted extensive attention from industry and academia. In academia, in 2014, Chen Yunji's team from the Institute of Computing Technology, Chinese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/30
CPCH04L9/0631H04L9/0825H04L9/0869H04L9/302
Inventor 侯锐王兴宾孟丹
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products