System on chip, method for operating the system on chip and electronic device including the system on chip

Disclosed herein are a system on chip, a method of operating the system on chip, and an electronic device including the system on chip that execute artificial intelligence (AI) algorithms and/or machine learning algorithms in a 5G environment connected for Internet of Things in order to prevent an a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shin, Mark Dong Yeon, Lee, Ki Young, Woo, Je Min, Ku, Youn Ki, Lee, Sang Hee, Park, Sung Min
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Disclosed herein are a system on chip, a method of operating the system on chip, and an electronic device including the system on chip that execute artificial intelligence (AI) algorithms and/or machine learning algorithms in a 5G environment connected for Internet of Things in order to prevent an artificial intelligence product from being surreptitiously used, replaced, or modified by an attacker. The method for operating the system on chip may include a step of the system on chip receiving an encoded artificial intelligence product, a double-encoded asset key, and a private key distributed using a key exchange scheme, a step of receiving, from an electronic device including the system on chip, a unique key of the electronic device, a step of decoding the double-encoded asset key using the unique key of the electronic device in order to extract an encoded asset key, a step of decoding the encoded asset key using the private key in order to extract an asset key, a step of decoding the encoded artificial intelligence product using the asset key in order to extract an artificial intelligence product, and a step of performing artificial intelligence operation using the artificial intelligence product. It is possible to prevent an artificial intelligence product made by an individual, a company, or an organization from being reproduced and surreptitiously used, replaced, or arbitrarily modified by an attacker.