Method and system for artificial intelligence model training using a watermark-enabled kernel for a data processing accelerator

ABSTRACT

In one embodiment, a computer-implemented method performed by a data processing (DP) accelerator, includes receiving, at the DP accelerator, first data representing a set of training data from a host processor; receiving, at the DP accelerator, a watermark kernel from the host processor; and executing the watermark kernel within the DP accelerator on an artificial intelligence (AI) model. The watermark kernel, when executed, is configured to: generate a watermark, train the AI model using the set of training data, and implant the watermark within the AI model during training of the AI model. The DP accelerator then transmits second data representing the trained AI model having the watermark implanted therein to the host processor. In an embodiment, the method further includes receiving a pre-trained AI model and the training is performed for the pre-trained AI model.

TECHNICAL FIELD

Embodiments of the present disclosure relate generally to artificialintelligence model training and inference. More particularly,embodiments of the disclosure relate to artificial intelligence modeltraining and inference and the associated security performed by dataprocessing accelerators.

BACKGROUND

Artificial intelligence (AI) models (also termed, “machine learningmodels”) have been widely utilized recently as AI technology has beendeployed in a variety of fields such as image classification orautonomous driving. Similar to an executable image or binary image of asoftware application, an AI model, when trained, can perform aninference based on a set of attributes to classify as features. As aresult, an AI model can be “portable” and utilized withoutauthorization. Currently there has been a lack of effective digitalrights protection for AI models. In addition, a processing task using anAI model delegated to a secondary processing system, such as aprocessing (DP) accelerator or remote system, there has been lack ofproof that the results produced by the DP accelerator system areprotected by a “root of trust” system.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the disclosure are illustrated by way of example and notlimitation in the figures of the accompanying drawings in which likereferences indicate similar elements.

FIG. 1 is a block diagram illustrating a secure processing system,according to one embodiment.

FIGS. 2A and 2B are a block diagrams illustrating a secure computingenvironment between one or more hosts and one or more data processingaccelerators, according to one embodiment.

FIG. 3 is a block diagram illustrating a secure computing environmentbetween one or more hosts and one or more data processing accelerators,according to one embodiment.

FIGS. 4-5 are flow diagrams illustrating a process of implanting awatermark in an AI model, according to one embodiment.

FIGS. 6-7 are flow diagrams illustrating a process of implanting awatermark in a trained AI model according to one embodiment.

FIGS. 8-10 are flow diagram illustrating a process of training an AImodel and implanting a watermark in the AI model using awatermark-enabled kernel, according to one embodiment.

FIGS. 11-13 are flow diagrams illustrating a process of implanting awatermark of an AI model into an inference output from the AI model,according to one embodiment.

FIGS. 14-16 are flow diagrams illustrating a process of inheriting awatermark from a data object, training an AI model, and implanting theinherited watermark into the AI model, according to another embodiment.

FIGS. 17-19 are a flow diagram illustrating a process of inheriting awatermark from a data object, performing an inference using an AI model,and implanting the inherited watermark into the inference of the AImodel, according to another embodiment.

FIG. 20 is a block diagram illustrating an exemplary computing systemfor implementing the functionality disclosed herein.

DETAILED DESCRIPTION

Various embodiments and aspects of the disclosures will be describedwith reference to details discussed below, and the accompanying drawingswill illustrate the various embodiments. The following description anddrawings are illustrative of the disclosure and are not to be construedas limiting the disclosure. Numerous specific details are described toprovide a thorough understanding of various embodiments of the presentdisclosure. However, in certain instances, well-known or conventionaldetails are not described in order to provide a concise discussion ofembodiments of the present disclosures.

Reference in the specification to “one embodiment” or “an embodiment”means that a particular feature, structure, or characteristic describedin conjunction with the embodiment can be included in at least oneembodiment of the disclosure. The appearances of the phrase “in oneembodiment” in various places in the specification do not necessarilyall refer to the same embodiment.

The following embodiments relate to usage of a data processing (DP)accelerator to increase processing throughput of certain types ofoperations that may be offloaded (or delegated) from a host device tothe DP accelerator. A DP accelerator can be a general-purpose processingunit (GPU), an artificial intelligence (AI) accelerator, mathcoprocessor, digital signal processor (DSP), or other type of processor.A DP accelerator can be a proprietary design, such as a Baidu® AIaccelerator, or another GPU, and the like. While embodiments areillustrated and described with host device securely coupled to one ormore DP accelerators, the concepts described herein can be implementedmore generally as a distributed processing system.

The host device and the DP accelerator can be interconnected via ahigh-speed bus, such as a peripheral component interconnect express(PCIe), or other high-speed bus. The host device and DP accelerator canexchange keys and initiate a secure channel over the PCIe bus beforeperforming operations of the aspects of the invention described below.Some of the operations include the DP accelerator using an artificialintelligence (AI) model to perform inferences using data provided by thehost device. Before the AI model inferences are trusted by the hostdevice, the host device can engage the DP accelerator to perform one ormore validation tests, described below, including determining awatermark of the AI model. In some embodiments and operations, the DPaccelerator is not aware that the host device is testing the validity ofresults produced by the DP accelerator.

A watermark of an AI model is an identifier or indicator embedded withinthe AI model, or in outputs of the AI model, or a combination thereof,that identifies or indicates the source/maker of the AI model. In someembodiments, the watermark can be a subset of coefficients or parameterssuch as weights within the AI model that, when extracted from the AImodel, comprise the watermark. Some of the goals of the watermarkinclude: identifying the AI model by its watermark; storing information,such as digital rights, within the AI model but without affectinginferences generated by the model, and associating inferences generatedby an AI model to the AI model that generated the inferences, using thewatermark as an identifier. The watermark should not be easilydiscoverable outside of a secure computing environment.

In an embodiment, the host device can send an input to the DPaccelerator that, when the DP accelerator executes the AI model usingthe input, extracts the watermark from the AI model. The host device canvalidate the watermark before using the DP accelerator and/or AI modelfor trusted operations. A watermark-enabled AI model is an AI model thatcan extract its own watermark in response to specified input data.

In some embodiments, the host device can transmit a kernel to the DPprocessing device to use in performing one or more operations. In thiscontext, a kernel is a small piece of code, provided to the DPaccelerator, to be executed by the DP accelerator to perform theintended function of the kernel. In an embodiment, a kernel is providedto the DP accelerator by the host device as a part of performingproof-of-trust operations by the DP accelerator that will be validatedby the host device. In some embodiments, the DP accelerator is not awareof the purpose of the kernel it executes on behalf of the host device.

In some embodiments, the kernel can be a “watermark-enabled kernel.” Awatermark-enabled kernel is a kernel that, when executed, is capable ofextracting a watermark from an artificial intelligence (AI) model. An AIwatermark is associated with a specific AI model and can be embedded or“implanted,” within the AI model using several different methods. Thewatermark may be implanted into one or more weight variables of the oneor more nodes of the AI model. In an embodiment, the watermark is storedin one or more bias variables of the one or more nodes of the AI modes,or by creating one or more additional nodes of the AI model during thetraining to store the watermark.

In some embodiments, the kernel can be a “watermark-inherited kernel.” Awatermark-inherited kernel is a kernel that can inherit a watermark froma data object, e.g. an existing AI model, or other data object. Thekernel can then implant the inherited watermark into another AI model oran inference generated by an AI model.

In some embodiments, the kernel can be a “signature kernel,” that candigitally sign any input that it receives. The signature kernel cangenerate a hash or digest of the input data to be signed and can embedthat hash or digest into the input to be signed before signing theinput. The hash or digest can be any hash algorithm, such as SHA-1,SHA-2, or SHA-3, et al. The input data with hash or digest can beencrypted (signed) using a private key of the data processing (DP)accelerator, a symmetric key shared with a host device, or a keyreceived from the host device.

In some embodiments, a watermark-enabled AI model is an AI model havinga watermark implanted within the AI model. In some embodiments, a hostdevice may provide a watermark-enabled kernel to the DP accelerator sothat the DP accelerator can, e.g., use an AI model to make an inference,then use the watermark-enabled kernel to extract the watermark from theAI model, embed the watermark in the inference, and digitally sign theinference. Such an embodiment allows the host device to verify that theDP accelerator did, indeed, use the correct AI model to perform theinference, indicating that the inference may be trusted.

With respect to any of the following aspects, in one embodiment, awatermark may be embedded in one or more nodes of one or more layers ofan artificial intelligence (AI) model. For example, a watermark may beimplanted in one or more weight variables or bias variables.Alternatively, one or more nodes (e.g., fake nodes that are not used orunlikely used by the artificial intelligence model) may be created toimplant or store the watermark. A host processor may be a centralprocessing unit (CPU) and a DP accelerator may be a general-purposeprocessing unit (GPU) coupled to the CPU over a bus or interconnect. ADP accelerator may be implemented in a form of an application-specificintegrated circuit (ASIC), a field programmable gate array (FPGA)device, or other forms of integrated circuits (ICs). Alternatively, thehost processor may be a part of a primary data processing system while aDP accelerator may be one of many distributed systems as secondarysystems that the primary system can offload its data processing tasksremotely over a network (e.g., cloud computing systems such as asoftware as a service or SaaS system, or a platform as a service or PaaSsystem). A link between a host processor and a DP accelerator may be aperipheral component interconnect express (PCIe) link or a networkconnection such as Ethernet connection.

In a first aspect, a computer-implemented method performed by a dataprocessing (DP) accelerator, the method includes receiving, at the DPaccelerator, first data representing a set of training data from a hostprocessor and performing training of an artificial intelligence (AI)model based on the set of training data within the DP accelerator. Themethod further includes implanting, by the DP accelerator, a watermarkwithin the trained AI model and transmitting second data representingthe trained AI model having the watermark implanted therein to the hostprocessor. In an embodiment, the method further includes receiving apre-trained machine learning model; and performing training for thepre-trained AI model based on the set of training data within the DPaccelerator. The watermark may be implanted into one or more weightvariables of the one or more nodes of the AI model. In an embodiment,the watermark is stored in one or more bias variables of the one or morenodes of the AI modes, or creating one or more additional nodes of theAI model during the training to store the watermark.

In a second aspect, a computer-implemented method performed by a dataprocessing (DP) accelerator includes receiving, at the DP accelerator,first data representing an artificial intelligence (AI) model that hasbeen previously trained from a host processor; receiving, at the DPaccelerator, a request to implant a watermark in the AI model from thehost processor; and implanting, by the DP accelerator, the watermarkwithin the AI model. The DP accelerator then transmits second datarepresenting the AI model having the watermark implanted therein to thehost processor. In embodiment, the method further includes extracting,at the DP accelerator, a watermark algorithm identifier (ID) from therequest to implant a watermark; and generating the watermark using awatermark algorithm identified by the watermark algorithm ID.

In a third aspect, a computer-implemented method performed by a dataprocessing (DP) accelerator, includes receiving, at the DP accelerator,first data representing a set of training data from a host processor;receiving, at the DP accelerator, a watermark kernel from the hostprocessor; and executing the watermark kernel within the DP acceleratoron an artificial intelligence (AI) model. The watermark kernel, whenexecuted, is configured to: generate a watermark, train the AI modelusing the set of training data, and implant the watermark within the AImodel during training of the AI model. The DP accelerator then transmitssecond data representing the trained AI model having the watermarkimplanted therein to the host processor. In an embodiment, the methodfurther includes receiving a pre-trained AI model and the training isperformed for the pre-trained AI model. In an embodiment, the methodfurther includes receiving a set of input data from the host processor.The watermark kernel is executed on the set of input data, and thewatermark is generated based on the set of input data. In an embodiment,the set of input data includes information describing the watermark.

In a fourth aspect, a computer-implemented method performed by a dataprocessing (DP) accelerator, includes receiving, at the DP accelerator,first data representing an artificial intelligence (AI) model that hasbeen previously trained from a host processor and a set of input data;receiving, at the DP accelerator, a watermark kernel from the hostprocessor; and executing the watermark kernel within the DP acceleratoron the AI model. The watermark kernel, when executed, is configured to:perform inference operations of the artificial intelligence model basedon the input data to generate output data, and implant the watermarkwithin the output data. The DP accelerator then transmits the outputdata having the watermark implanted therein to the host processor. In anembodiment, the method further includes receiving a set of input datafrom the host processor. The watermark kernel is executed on the set ofinput data, and the watermark is generated based on the set of inputdata. The set of input data can include information describing thewatermark.

In a fifth aspect, a computer-implemented method performed by a dataprocessing (DP) accelerator, includes receiving, at the DP accelerator,first data representing a set of training data from a host processor;receiving, at the DP accelerator, a watermark kernel from the hostprocessor; and executing the watermark kernel within the DP acceleratoron an artificial intelligence (AI) model. The watermark kernel, whenexecuted, is configured to: generate a new watermark by inheriting anexisting watermark from a data object of the set of training data, trainthe AI model using the set of training data, and implant the newwatermark within the AI model during training of the AI model. The DPaccelerator then transmits second data representing the trained AI modelhaving the new watermark implanted therein to the host processor.

In a sixth aspect, a computer-implemented method performed by a dataprocessing (DP) accelerator, includes receiving, at the DP accelerator,an artificial intelligence (AI) model that has been previously trainedand a set of input data from a host processor; receiving, at the DPaccelerator, a watermark kernel from the host processor; executing thewatermark kernel within the DP accelerator on the AI model and the setof input data. The watermark kernel, when executed, is configured to:generate a new watermark by inheriting an existing watermark from a dataobject of the set of input data or the AI model, perform an AI inferenceusing the AI model based on the input data to generate output data, andimplant the new watermark within the output data. The DP acceleratorthen transmits output data having the new watermark implanted therein tothe host processor.

Any of the above functionality can be programmed as executableinstructions onto one or more non-transitory computer-readable media.When the executable instructions are executed by a processing systemhaving at least one hardware processor, the processing systems causesthe functionality to be implemented. Any of the above functionality canbe implemented by a processing system having at least one hardwareprocessor, coupled to a memory programmed with executable instructionsthat, when executed, cause the processing system to implement thefunctionality.

FIG. 1 is a block diagram illustrating an example of systemconfiguration for securing communication between a host 104 and dataprocessing (DP) accelerators 105-107 according to some embodiments.Referring to FIG. 1, system configuration 100 includes, but is notlimited to, one or more client devices 101-102 communicatively coupledto DP server 104 (e.g. host) over network 103. Client devices 101-102may be any type of client devices such as a personal computer (e.g.,desktops, laptops, and tablets), a “thin” client, a personal digitalassistant (PDA), a Web enabled appliance, a Smart watch, or a mobilephone (e.g., Smartphone), etc. Alternatively, client devices 101-102 maybe other servers. Network 103 may be any type of networks such as alocal area network (LAN), a wide area network (WAN) such as theInternet, or a combination thereof, wired or wireless.

Server (e.g., host) 104 may be any kind of servers or a cluster ofservers, such as Web or cloud servers, application servers, backendservers, or a combination thereof. Server 104 further includes aninterface (not shown) to allow a client such as client devices 101-102to access resources or services (such as resources and services providedby DP accelerators via server 104) provided by server 104. For example,server 104 may be a cloud server or a server of a data center thatprovides a variety of cloud services to clients, such as, for example,cloud storage, cloud computing services, artificial intelligencetraining services, data mining services, etc. Server 104 may beconfigured as a part of software-as-a-service (SaaS) orplatform-as-a-service (PaaS) system over the cloud, which may be aprivate cloud, public cloud, or a hybrid cloud. The interface mayinclude a Web interface, an application programming interface (API),and/or a command line interface (CLI).

For example, a client, in this example, a user application of clientdevice 101 (e.g., Web browser, application), may send or transmit aninstruction (e.g., AI training, inference instruction, etc.) forexecution to server 104 and the instruction is received by server 104via the interface over network 103. In response to the instruction,server 104 communicates with DP accelerators 105-107 to fulfill theexecution of the instruction. In some embodiments, the instruction is amachine learning type of instruction where DP accelerators, as dedicatedmachines or processors, can execute the instruction many times fasterthan execution by server 104. Server 104 thus can control/manage anexecution job for the one or more DP accelerators in a distributedfashion. Server 104 then returns an execution result to client devices101-102. A DP accelerator or AI accelerator may include one or morededicated processors such as a Baidu® artificial intelligence (AI)chipset available from Baidu, Inc.® or alternatively, the DP acceleratormay be an AI chipset from another AI chipset provider.

According to one embodiment, each of the applications accessing any ofDP accelerators 105-107 hosted by data processing server 104 (alsoreferred to as a host) may verify that the application is provided by atrusted source or vendor. Each of the applications may be launched andexecuted within a trusted execution environment (TEE) specificallyconfigured and executed by a central processing unit (CPU) of host 104.When an application is configured to access any one of the DPaccelerators 105-107, an obscured connection can be established betweenhost 104 and the corresponding one of the DP accelerator 105-107, suchthat the data exchanged between host 104 and DP accelerators 105-107 isprotected against attacks from malware/intrusions.

FIG. 2A is a block diagram illustrating an example of a multi-layerprotection solution for obscured communications between a host system104 and data process (DP) accelerators 105-107 according to someembodiments. In one embodiment, system 200 provides a protection schemefor obscured communications between host 104 and DP accelerators 105-107with or without hardware modifications to the DP accelerators. Referringto FIG. 2A, host machine or server 104 can be depicted as a system withone or more layers to be protected from intrusion such as userapplication(s) 205, runtime libraries 206, driver 209, operating system211, and hardware 213 (e.g., security module (trusted platform module(TPM))/central processing unit (CPU)). Memory safe applications 207 canrun in a sandboxed memory. Below the applications 205 and run-timelibraries 206, one or more drivers 209 can be installed to interface tohardware 213 and/or to DP accelerators 105-107.

Hardware 213 can include one or more processor(s) 201 and storagedevice(s) 204. Storage device(s) 204 can include one or more artificialintelligence (AI) models 202, and one or more kernels 203. Kernels 203can include signature kernels, watermark-enabled kernels, encryptionand/or decryption kernels, and the like. A signature kernel, whenexecuted, can digitally sign any input in accordance with theprogramming of the kernel. A watermark-enabled kernel can extract awatermark from a data object (e.g. an AI model or other data object). Awatermark-enabled kernel can also implant a watermark into an AI model,an inference output, or other data object. A watermark kernel (e.g. awatermark inherited kernel) can inherit a watermark from another dataobject and implant that watermark into a different object, such as aninference output or an AI model. A watermark, as used herein, is anidentifier associated with, and can be implanted into, an AI model or aninference generated by an AI model. For example, a watermark may beimplanted in one or more weight variables or bias variables.Alternatively, one or more nodes (e.g., fake nodes that are not used orunlikely used by the artificial intelligence model) may be created toimplant or store the watermark.

Host machine 104 is typically a CPU system which can control and manageexecution of jobs on the host machine 104 and/or DP accelerators105-107. In order to secure/obscure a communication channel 215 betweenDP accelerators 105-107 and host machine 104, different components maybe required to protect different layers of the host system that areprone to data intrusions or attacks. For example, a trusted executionenvironment (TEE) can protect the user application 205 layer and theruntime library 206 layer from data intrusions.

System 200 includes host system 104 and DP accelerators 105-107according to some embodiments. DP accelerators can include Baidu® AIchipsets or another AI chipset such as a graphical processing units(GPUs) that can perform artificial intelligence (AI)-intensive computingtasks. In one embodiment, host system 104 includes a hardware that hasone or more CPU(s) 213 equipped with a security module (such as atrusted platform module (TPM)) within host machine 104. A TPM is aspecialized chip on an endpoint device that stores cryptographic keys(e.g., RSA cryptographic keys) specific to the host system for hardwareauthentication. Each TPM chip can contain one or more RSA key pairs(e.g., public and private key pairs) called endorsement keys (EK) orendorsement credentials (EC), i.e., root keys. The key pairs aremaintained inside the TPM chip and cannot be accessed by software.Critical sections of firmware and software can then be hashed by the EKor EC before they are executed to protect the system againstunauthorized firmware and software modifications. The TPM chip on thehost machine can thus be used as a root of trust for secure boot.

The TPM chip also secure driver(s) 209 and operating system (OS) 211 ina working kernel space to communicate with the DP accelerators 105-107.Here, driver 209 is provided by a DP accelerator vendor and can serve asa driver for the user application to control a communication channel(s)215 between host and DP accelerators. Because the TPM chip and secureboot processor protects the OS 211 and drivers 209 in their kernelspace, TPM also effectively protects the driver 209 and OS 211.

Since communication channels 215 for DP accelerators 105-107 may beexclusively occupied by the OS 211 and driver 209, thus, communicationchannels 215 can be secured through the TPM chip. In one embodiment,communication channels 215 include a peripheral component interconnector peripheral component interconnect express (PCIE) channel. In oneembodiment, communication channels 215 are obscured communicationchannels.

Host machine 104 can include trusted execution environment (TEE) 210which is enforced to be secure by TPM/CPU 213. A TEE is a secureenvironment. TEE can guarantee code and data which are loaded inside theTEE to be protected with respect to confidentiality and integrity.Examples of a TEE may be Intel® software guard extensions (SGX), or AMD®secure encrypted virtualization (SEV). Intel® SGX and/or AMD® SEV caninclude a set of central processing unit (CPU) instruction codes thatallows user-level code to allocate private regions of memory of a CPUthat are protected from processes running at higher privilege levels.Here, TEE 210 can protect user applications 205 and runtime libraries206, where user application 205 and runtime libraries 206 may beprovided by end users and DP accelerator vendors, respectively. Here,runtime libraries 206 can convert application programming interface(API) calls to commands for execution, configuration, and/or control ofthe DP accelerators. In one embodiment, runtime libraries 206 provides apredetermined set of (e.g., predefined) kernels for execution by theuser applications. In an embodiment, the kernels may be stored instorage device(s) 204 as kernels 203.

Host machine 104 can include memory safe applications 207 which areimplemented using memory safe languages such as Rust, and GoLang, etc.These memory safe applications running on memory safe Linux® releases,such as MesaLock Linux®, can further protect system 200 from dataconfidentiality and integrity attacks. However, the operating systemsmay be any Linux® distributions, UNIX®, Windows® OS, or Mac® OS.

The host machine 104 can be set up as follows: A memory safe Linux®distribution is installed onto a system equipped with TPM secure boot.The installation can be performed offline during a manufacturing orpreparation stage. The installation can also ensure that applications ofa user space of the host system are programmed using memory safeprogramming languages. Ensuring other applications running on hostsystem 104 to be memory safe applications can further mitigate potentialconfidentiality and integrity attacks on host system 104.

After installation, the system can then boot up through a TPM-basedsecure boot. The TPM secure boot ensures only a signed/certifiedoperating system and accelerator driver are launched in a kernel spacethat provides the accelerator services. In one embodiment, the operating211 system can be loaded through a hypervisor (not shown). A hypervisoror a virtual machine manager is a computer software, firmware, orhardware that creates and runs virtual machines. A kernel space is adeclarative region or scope where kernels (i.e., a predetermined set of(e.g., predefined) functions for execution) are identified to providefunctionalities and services to user applications. In the event thatintegrity of the system is compromised, TPM secure boot may fail to bootup and instead shuts down the system.

After secure boot, runtime libraries 206 runs and creates TEE 210, whichplaces runtime libraries 206 in a trusted memory space associated withCPU 213. Next, user application 205 is launched in TEE 210. In oneembodiment, user application 205 and runtime libraries 206 arestatically linked and launched together. In another embodiment, runtimelibrary 206 is launched in TEE 210 first and then user application 205is dynamically loaded in TEE 210. In another embodiment, userapplication 205 is launched in TEE first, and then runtime 206 isdynamically loaded in TEE 210. Statically linked libraries are librarieslinked to an application at compile time. Dynamic loading can beperformed by a dynamic linker. Dynamic linker loads and links sharedlibraries for running user applications at runtime. Here, userapplications 205 and runtime libraries 206 within TEE 210 are visible toeach other at runtime, e.g., all process data are visible to each other.However, external access to the TEE is denied.

In one embodiment, the user application 205 can only call a kernel froma set of kernels as predetermined by runtime libraries 206. In anotherembodiment, user application 205 and runtime libraries 206 are hardenedwith side channel free algorithm to defend against side channel attackssuch as cache-based side channel attacks. A side channel attack is anyattack based on information gained from the implementation of a computersystem, rather than weaknesses in the implemented algorithm itself (e.g.cryptanalysis and software bugs). Examples of side channel attacksinclude cache attacks which are attacks based on an attacker's abilityto monitor a cache of a shared physical system in a virtualizedenvironment or a cloud environment. Hardening can include masking of thecache, outputs generated by the algorithms to be placed on the cache.Next, when the user application finishes execution, the user applicationterminates its execution and exits from the TEE.

In one embodiment, TEE 210 and/or memory safe applications 207 is notnecessary, e.g., user application 205 and/or runtime libraries 206 ishosted in an operating system environment of host 104.

In one embodiment, the set of kernels include obfuscation kernelalgorithms. In one embodiment, the obfuscation kernel algorithms can besymmetric or asymmetric algorithms. A symmetric obfuscation algorithmcan obfuscate and de-obfuscate data communications using a samealgorithm. An asymmetric obfuscation algorithm requires a pair ofalgorithms, where a first of the pair is used to obfuscate and thesecond of the pair is used to de-obfuscate, or vice versa. In anotherembodiment, an asymmetric obfuscation algorithm includes a singleobfuscation algorithm used to obfuscate a data set but the data set isnot intended to be de-obfuscated, e.g., there is absent a counterpartde-obfuscation algorithm.

Obfuscation refers to obscuring of an intended meaning of acommunication by making the communication message difficult tounderstand, usually with confusing and ambiguous language. Obscured datais harder and more complex to reverse engineering. An obfuscationalgorithm can be applied before data is communicated to obscure(cipher/decipher) the data communication reducing a chance of eavesdrop.In one embodiment, the obfuscation algorithm can further include anencryption scheme to further encrypt the obfuscated data for anadditional layer of protection. Unlike encryption, which may becomputationally intensive, obfuscation algorithms may simplify thecomputations.

Some obfuscation techniques can include but are not limited to, letterobfuscation, name obfuscation, data obfuscation, control flowobfuscation, etc. Letter obfuscation is a process to replace one or moreletters in a data with a specific alternate letter, rendering the datameaningless. Examples of letter obfuscation include a letter rotatefunction, where each letter is shifted along, or rotated, a predeterminenumber of places along the alphabet. Another example is to reorder orjumble up the letters based on a specific pattern. Name obfuscation is aprocess to replace specific targeted strings with meaningless strings.Control flow obfuscation can change the order of control flow in aprogram with additive code (insertion of dead code, insertinguncontrolled jump, inserting alternative structures) to hide a truecontrol flow of an algorithm/AI model.

In summary, system 200 provides multiple layers of protection for DPaccelerators (for data transmissions including machine learning models,training data, and inference outputs) from loss of data confidential andintegrity. System 200 can include a TPM-based secure boot protectionlayer, a TEE protection layer, and a kernel validation/verificationlayer. Furthermore, system 200 can provide a memory safe user space byensuring other applications on the host machine are implemented withmemory safe programming languages, which can further eliminate attacksby eliminating potential memory corruptions/vulnerabilities. Moreover,system 200 can include applications that use side-channel freealgorithms so to defend against side channel attacks, such as cachebased side channel attacks.

Runtime 206 can provide obfuscation kernel algorithms to obfuscate datacommunication between a host 104 and DP accelerators 105-107. In oneembodiment, the obfuscation can be pair with a cryptography scheme. Inanother embodiment, the obfuscation is the sole protection scheme andcryptography-based hardware is rendered unnecessary for the DPaccelerators.

FIG. 2B is a block diagram illustrating an example of a host channelmanager (HCM) 259 communicatively coupled to one or more acceleratorchannel managers (ACMs) 270 that interface to DP accelerators 105-107,according to some embodiments. Referring to FIG. 2B, in one embodiment,HCM 259 includes authentication module 251, termination module 252, keymanager 253, key(s) store 254, and cryptography engine 255.Authentication module 251 can authenticate a user application running onhost server 104 for permission to access or use a resource of a DPaccelerator 105.

Termination module 252 can terminate a connection (e.g., channelsassociated with the connection would be terminated). Key manager 253 canmanage (e.g., create or destroy) asymmetric key pairs or symmetric keysfor encryption/decryption of one or more data packets for differentsecure data exchange channels. Here, each user application (as part ofuser applications 205 of FIG. 2A) can correspond or map to differentsecure data exchange channels, on a one-to-many relationship, and eachdata exchange channel can correspond to a DP accelerator 105. Eachapplication can utilize a plurality of session keys, where each sessionkey is for a secure channel corresponding to a DP accelerator (e.g.,accelerators 105 . . . 107). Key(s) store 254 can store encryptionasymmetric key pairs or symmetric keys. Cryptography engine 255 canencrypt or decrypt a data packet for the data exchanged through any ofthe secure channels. Note that some of these modules can be integratedinto fewer modules.

In one embodiment, DP accelerator 105 includes ACM 270 and security unit(SU) 275. Security unit 275 can include key manager 271, key(s) store272, true random number generator 273, and cryptography engine 274. Keymanager 271 can manage (e.g., generate, safe keep, and/or destroy)asymmetric key pairs or symmetric keys. Key(s) store 272 can store thecryptography asymmetric key pairs or symmetric keys in secure storagewithin the security unit 275. True random number generator 273 cangenerate seeds for key generation and cryptographic engine 274 uses.Cryptography engine 274 can encrypt or decrypt key information or datapackets for data exchanges. In some embodiments, ACM 270 and SU 275 isan integrated module.

DP accelerator 105 can further includes memory/storage 280 that canstore artificial intelligence model(s) 277, watermark kernel(s) 278(including inherited watermark kernels watermark-enabled kernels,watermark-signature kernels, et al.), encryption and decryption kernels281, and data 279. HCM 259 can communicate with ACM 270 viacommunication channel 215.

In one embodiment, DP accelerator 105 further includes an AI unit, whichmay include an AI training unit and an AI inference unit. The AItraining and inference units may be integrated into a single unit. TheAI training module is configured to train an AI model using a set oftraining data. The AI model to be trained and the training data may bereceived from host system 104 via communication link 215. The AI modelinference unit can be configured to execute a trained artificialintelligence model on a set of input data (e.g., set of input features)to infer and classify the input data. For example, an image may be inputto an artificial intelligence model to classify whether the imagecontains a person, a landscape, etc. The trained artificial intelligencemodel and the input data may also be received from host system 104 viainterface 140 over communication link 215.

In one embodiment, watermark unit 276 may include a watermark generator,and a watermark inscriber (also termed, “watermark implanter”).Watermark unit 276 may include a watermark kernel executor or kernelprocessor (not shown) to execute a kernel. In an embodiment, a kernelmay be received from host 104, or retrieved from persistent ornon-persistent storage, and executed in memory (not shown) of DPaccelerator 105. The watermark generator is configured to generate awatermark using a predetermined watermark algorithm. Alternatively, thewatermark generator can inherit a watermark from an existing watermarkor extract a watermark from another data structure or data object, suchas an artificial intelligence model or a set of input data, which may bereceived from host system 104. The watermark implanter is configured toinscribe or implant a watermark into a data structure such as anartificial intelligence model or output data generated by an artificialintelligence model. The artificial intelligence model or output datahaving a watermark implanted therein may be returned from DP accelerator105 to host system 104 over communication link 215. Note that DPaccelerators 105-107 have the identical or similar structures orcomponents and the description concerning a DP accelerator would beapplicable to all DP accelerators throughout this application.

FIG. 3 is a block diagram illustrating an example of a data processingsystem according to one embodiment. System 2100 may be any dataprocessing intense systems, such as, a data processing system of a datacenter, an SaaS platform, a PaaS platform, an autonomous driving system,etc. Referring to FIG. 3, system 2100 include a host system 104 coupledto one or more DP accelerators 105-107 (collectively referred to as DPaccelerators 105) over a communication link 215. Although only two DPaccelerators 105 and 107 shown, more or fewer number of DP acceleratorsmay be applicable. Communication link 215 may be a bus (e.g., PCIe bus)or a network connection (e.g., Ethernet or Internet). Host system 104 istypically a CPU system configured to control and manage jobs run on hostsystem 104 and DP accelerators 150, while DP accelerators perform thereal data processing intensive computing jobs.

In one embodiment, host system 104 includes one or more processors 201,memory (not shown), and a persistent storage device 204. Processors 201(also referred to as host processors) may be CPUs and memory may be anykind of random-access memory (RAM), while storage device 203 may be ahard drive, a solid state storage device (e.g., flash memory), etc.Memory includes loaded therein and executed by one or more processors101, operating system (OS) 211 hosting one or more host applications205, and runtime libraries 206. Host system 104 may be implemented as atrusted platform, for example, using TPM (trusted platform module)technology supported by the hardware (e.g., CPU). TPM is published byTrusted Computing Group (TCP).

Host application 205 may be a user application to perform a specificdata intensive task, where application 205 is deployed in host system104. In this example, host 104 may operate as a part of asoftware-as-a-service (SaaS) or platform-as-a-service (PaaS) platform.For example, application 205 may be an image processing application suchas a face recognition application. The face recognition application mayinvoke an artificial intelligence model to classify an image, which maybe offloaded or distributed to DP accelerators 105. Alternatively, hostsystem 104 may be an artificial intelligence model training system,where the intensive training tasks are offloaded or distributed to DPaccelerators 105.

Runtime libraries 206 may be associated with DP accelerators 105 andprovided by a vendor of DP accelerators 105. Note that DP accelerator105 through 107 may be provided by different vendors, in which differentruntime libraries 206 and drivers 209 may be provided by differentvendors respectively. Runtime library 206 is responsible for convertingapplication calls from application 205 to a format compatible withdrivers 209. Communication link 215 between host 104 and DP accelerator105 may be a PCIe interface or Ethernet interface. Artificialintelligence (AI) models 202, stored in storage device(s) 204, may bethe AI models to be trained or the previously trained AI models.

DP accelerator 105 can include a security unit 275, an artificialintelligence unit 2105, watermark unit 2102, persistent ornon-persistent storage 2102, and one or more processors 2109. Persistentor non-persistent storage 2101 may include volatile or non-volatilememory which may hold one or more kernels (e.g. watermark-enabledkernels, encryption and/or decryption kernels, et al.), AI models, ordata received from host 104.

Each DP accelerator 105 can include a trusted or security unit 275.Security unit 275 can include key manager 271, key(s) store 272, truerandom number generator 273, and cryptography engine 274. Key manager271 can manage (e.g., generate, safe keep, and/or destroy) asymmetrickey pairs or symmetric keys. Key(s) store 272 can store the cryptographyasymmetric key pairs or symmetric keys in secure storage within thesecurity unit 275. True random number generator 273 can generate seedsfor key generation and cryptographic engine 274 uses. Cryptographyengine 274 can encrypt or decrypt key information or data packets fordata exchanges. In some embodiments, ACM 270 and SU 275 is an integratedmodule.

In one embodiment, artificial intelligence unit 2105 may includeartificial intelligence training unit 2106 and artificial intelligenceinference unit 2107, where these two units 2106-2107 may be integratedinto a single unit. The artificial intelligence training module 2106 isconfigured to train an artificial intelligence model using a set oftraining data. The artificial intelligence model to be trained and thetraining data may be received from host system 104 via communicationlink 215. The artificial intelligence model inference unit 2107 can beconfigured to execute a trained artificial intelligence model on a setof input data (e.g., set of input features) to infer and classify theinput data. For example, an image may be input to an artificialintelligence model to classify whether the image contains a person, alandscape, etc. The trained artificial intelligence model and the inputdata may also be received from host system 104 via interface 140 overcommunication link 215.

In one embodiment, watermark unit 2102 may include watermark generator2103, and watermark inscriber (also termed, “watermark implanter”) 2104.Watermark unit 2102 may include a watermark kernel executor or kernelprocessor (not shown) to execute a kernel. In an embodiment, a kernelmay be received from host 104, or retrieved from persistent ornon-persistent storage, and executed in memory (not shown) of DPaccelerator 105. The watermark generator 2103 is configured to generatea watermark using a predetermined watermark algorithm. Alternatively,watermark generator 2103 can inherit a watermark from an existingwatermark or extract a watermark from another data structure or dataobject, such as an artificial intelligence model or a set of input data,which may be received from host system 104. The watermark implanter 2104is configured to inscribe or implant a watermark into a data structuresuch as an artificial intelligence model or output data generated by anartificial intelligence model. The artificial intelligence model oroutput data having a watermark implanted therein may be returned from DPaccelerator 105 to host system 104 over communication link 215. Notethat DP accelerators 105-107 have the identical or similar structures orcomponents and the description concerning a DP accelerator would beapplicable to all DP accelerators throughout this application.

According to one aspect, DP accelerator 105 can train an artificialintelligence model and implant a watermark within the artificialintelligence model during the training. In one embodiment, DPaccelerator 105 is configured to receive first data representing anartificial intelligence model (also referred to as an AI model) to betrained and a set of training data from host processor 104 overcommunication link 215. The artificial intelligence model training unit2106 performs training of the artificial intelligence model based on theset of training data. A request to implant a watermark in the artificialintelligence model is received by the DP accelerator 105 from the hostprocessor 104. In response to the request, the watermark implanter orinscriber 2106 implants the watermark within the trained artificialintelligence model. Thereafter, DP accelerator 105 transmits second datarepresenting the trained artificial intelligence model having thewatermark implanted therein to the host processor 104 over thecommunication link 215. In one embodiment, the watermark generator 2103extracts a watermark algorithm identifier (ID) from the request andgenerates the watermark using a watermark algorithm identified by thewatermark algorithm ID.

FIGS. 11 and 12 are flow diagrams illustrating a processing flow ofimplanting a watermark in an artificial intelligence (AI) modelaccording to one embodiment. Referring to FIG. 4, via path 2151, hostsystem 104 sends a set of training data and, optionally, a pre-trainedAI model, to DP accelerator 105. In response, at block 2152, DPaccelerator 105 performs artificial intelligence model training on a newAI model, or the pre-trained AI model, using the set of training data.Once the AI model has been trained, via path 2153, DP accelerator 105sends a notification to host system 104 indicating that the artificialintelligence model has been trained. In response, at block 2154, hostsystem 104 selects a watermark algorithm that is supported by DPaccelerator watermark unit 2102 and sends a watermark algorithm ID to DPaccelerator 105 via path 2155. Based on the watermark algorithm ID, atblock 2156, DP accelerator watermark unit 2102 generates a watermarkusing a watermark algorithm identified by the watermark algorithm ID andimplants the watermark into the AI model. In an embodiment, thewatermark algorithm can be stored in persistent or non-persistentstorage 2101 of DP accelerator 105, accessible by watermark unit 2102.DP accelerator 105 then transmits the trained AI model having thewatermark implanted therein back to host system 104 via path 2157. Notethat sending a notification from DP accelerator 105 to host system 104may be optional. Host system 104 may send a request to implant awatermark to DP accelerator 105 without receiving a notification, wherethe request may include a watermark algorithm ID.

FIG. 5 is a flow diagram illustrating a process for implanting awatermark in an AI model, according to one embodiment. The process maybe performed by processing logic which may include software, hardware,or a combination thereof. Process 2170 may be performed by DPaccelerator 105. Referring to FIG. 5, at block 2171, a DP accelerator105 receives first data representing a set of training data, andoptionally, a pre-trained AI model, from a host processor 104 over acommunication link 215. At block 2172, the DP accelerator 105 performstraining of a new AI model, or the pre-trained AI model, if provided,using the set of training data. At block 2173, the DP acceleratorreceives a request to implant a watermark in the trained artificialintelligence model from the host processor. The request includes awatermark algorithm identifier (ID). At block 2174, the DP acceleratorwatermark unit 2102 generates a watermark using a watermark algorithmidentified in the request. At block 2175, the DP accelerator implantsthe watermark within the trained AI model. At block 2176, the DPaccelerator transmits second data representing the trained AI model,having the watermark implanted therein, to the host processor 104 overthe communication link 215.

According to another aspect, DP accelerator 105 can also implant awatermark into an existing or previously trained artificial intelligencemodel. Referring back to FIG. 3, in one embodiment, DP accelerator 105receives first data representing an artificial intelligence model thathas been previously trained (e.g., an existing legacy artificialintelligence model) from host processor 104 over a communication link215. The DP accelerator 105 further receives a request to implant awatermark in the AI model from the host processor 104 over thecommunication link 215. In response to the request, the watermarkgenerator 2103 extracts a watermark algorithm ID from the request andgenerates a watermark using a watermark algorithm identified by thewatermark algorithm ID. The watermark implanter 2104 then implants thewatermark in the artificial intelligence model received from the hostprocessor 101. Thereafter, the DP accelerator 105 transmits second datarepresenting the AI model having the watermark implanted therein to thehost processor 104 over the communication link 215. In this embodiment,DP accelerator 105 is configured to implant a watermark into an existingartificial intelligence model that has been trained.

FIG. 6 is a processing flow diagram illustrating a processing ofimplanting a watermark in a trained artificial intelligence (AI) model,according to one embodiment. Referring to FIG. 6, host system 104transmits an AI model previously trained to DP accelerator 105 via path2201. That is, the AI model is an existing model that has been trainedand generated. At block 2202, host system 104 selects a watermarkalgorithm that is supported by DP accelerator watermark unit 2102 andsends a watermark algorithm ID identifying the selected watermarkalgorithm to DP accelerator 105 via path 2203. In response, at block2204, DP accelerator watermark generation unit 2103 generates awatermark using a watermark algorithm identified by the watermarkalgorithm ID. At block 2205, DP accelerator implants the watermark inthe previously trained AI model. The artificial intelligence modelhaving the watermark implanted therein is then returned back to hostsystem via path 2206.

FIG. 7 is a flow diagram illustrating a process of implanting awatermark in a trained artificial intelligence (AI) model according toone embodiment. The process may be performed by processing logic whichmay include software, hardware, or a combination thereof. Process 2220may be performed by DP accelerator 105. Referring to FIG. 7 at block2221, a DP accelerator 105 receives first data representing an AI modelthat has been previously trained from a host processor 104 over acommunication link 215. At block 2222, the DP accelerator 105 receives arequest to implant a watermark in the AI model from the host processor104 over the communication link 215. At block 2223, the DP acceleratorwatermark generation unit 2103 generates a watermark using a watermarkalgorithm. At block 2224, the DP accelerator watermark implant unit 2104implants the watermark within the AI model. At block 2225, the AI modelhaving the watermark implanted therein is returned back to the hostprocessor.

According to another aspect, a watermark may be implanted by executing awatermark kernel within a DP accelerator 105. The watermark kernel maybe provided by the host system. The term, “kernel,” refers to a piece ofexecutable code that can be independently executed by an accelerator oran execution environment. Referring back to FIG. 3, in one embodiment,DP accelerator 105 receives first data representing an artificialintelligence model to be trained and a set of training data from a hostprocessor 104 over communication link 215. The DP accelerator 105further receives a watermark kernel (e.g., watermark-enabled kernel)from the host processor 104 over communication link 215. DP accelerator105 executes the watermark kernel on the AI model. The watermark kernel,when being executed, will generate a watermark, perform or invoke trainthe AI model, and implant or invoke watermark implanter 2104 to implantthe watermark into the AI as a part of the training processing.Thereafter, the DP accelerator 105 transmits the trained AI model havingthe watermark implanted therein to the host 104 over the communicationlink 215. In one embodiment, the watermark kernel is executed on a setof input data, where the input data includes information describing thewatermark.

FIG. 8 is a processing flow diagram illustrating a process of trainingan artificial intelligence (AI) model and implanting a watermark in theAI model, according to one embodiment. Referring to FIG. 8, host 104sends a set of training data, or optionally, a pre-trained AI model, toDP accelerator 105 via path 2241. At block 2242, host system 104generates a watermark kernel, or selects a watermark kernel, and sendsthe watermark kernel and a set of input data to DP accelerator 105 viapath 2243. At block 2244, DP accelerator 105 executes the watermarkkernel to train an AI model (which can be refining the optionallyreceived pre-trained model) using the set of training data, and implantsa watermark into the AI model during the training using the input data.The input data may contain information describing the watermark orwatermark algorithm. Thereafter, the trained AI model having thewatermark implanted therein is returned back to the host system 104 viapath 2245.

FIG. 9 is a flow diagram illustrating a process of training an AI modeland using a watermark-enabled kernel to implant a watermark in an AImodel according to one embodiment. A watermark-enabled kernel, e.g. asshown in FIG. 2B, reference 278, above, receives a first set of inputtraining data, and optionally, a pre-trained AI model. If thewatermark-enabled kernel receives the pre-trained AI model, then thefirst set of input training data will be used to refine the pre-trainedmodel. If the watermark-enabled kernel does not receive the pre-trainedAI model, then the watermark-enabled kernel will generate a new AI modelusing the first set of training data. The process may be performed byprocessing logic which may include software, hardware, or a combinationthereof.

Referring now to FIG. 10, process 2260 may be performed by DPaccelerator 105. At block 2261, a DP accelerator receives first datarepresenting a set of training data, and optionally, a pre-trained AImodel, from a host processor over a link. At block 2262, the DPaccelerator 105 further receives a watermark kernel from the hostprocessor over the link. At block 2263, the watermark kernel is executedto either refine the training of the pre-trained model or to generate anew model using the set of training data. During the training, at block2264, the watermark-enabled kernel generates a watermark and implantswithin the AI model. At block 2265, second data representing the trainedAI model having the watermark implanted therein is returned to the hostprocessor 104 over the communication link 215.

According to another aspect, a watermark kernel can also be utilized toimplant a watermark into an existing AI model that has been trainedpreviously. Referring back to FIG. 8, in one embodiment, DP accelerator105 receives first data representing a set of training data, andoptionally a pre-trained AI model, from a host 104 over communicationlink 215. The DP accelerator 105 further receives a watermark kernel(e.g., watermark enabled kernel) from the host 104 over thecommunication link 215. The DP accelerator 105 executes the watermarkkernel on the AI model. The watermark kernel, when being executed, willgenerate a watermark, perform training of the AI model, and implant orinvoke watermark implanter 2104 to implant the watermark into theartificial intelligence model as a part of the training processing.Thereafter, the DP accelerator 105 transmits the trained AI model havingthe watermark implanted therein to the host 104 over the link. In oneembodiment, the watermark kernel is executed on a set of input data,where the input data includes information describing the watermark.

FIG. 11 is a flow processing diagram illustrating a processing flow ofimplanting a watermark in an inference generated using an artificialintelligence (AI) model according to one embodiment. Referring to FIG.11, at block 2301, host 104 compiles and generates a watermark kerneland sends the watermark kernel to DP accelerator 105 via path 2302. Host104 further sends an AI model that has been previously trained to DPaccelerator 105 via path 2302, requesting DP accelerator 105 to implanta watermark. At block 2303, DP accelerator executes thewatermark-enabled kernel on the AI model to generate the watermark. Atblock 2304, DP accelerator 105 executes kernel on the AI model using theinput data to perform an inference, and to implant a watermark into theoutput data of the inference, for example, as shown in FIG. 12. In oneembodiment, the input data may include information describing thewatermark. The output data having the watermark implanted therein isthen transmitted from DP accelerator 105 to host 104 via path 2305.Thus, in this embodiment, the output data of the inference operationusing an AI model would include a watermark indicating AI model thatgenerated the inference.

FIG. 12 is a flow diagram illustrating a process of implanting awatermark in an inference output from an artificial intelligence (AI)model, according to one embodiment. The process may be performed byprocessing logic which may include software, hardware, or a combinationthereof. Input data and an AI model are input to a watermark-enabledkernel. The watermark-enabled kernel extracts the watermark from the AImodel, in part based on the input data, and the AI model generates aninference based on the input data. The watermark-enabled kernel thenimplants the watermark into the inference and outputs the inference,with implanted watermark.

Referring now to FIG. 13, a process for implanting a watermark in aninference output of an AI model includes, at block 2321, a DPaccelerator receiving first data representing an artificial intelligence(AI) model that has been trained previously from a host processor 104over a communication link 215. At block 2322, the DP accelerator furtherreceives a watermark-enabled kernel and second data from the hostprocessor 104 over the communication link 215. At block 2323, the DPaccelerator executes the watermark-enabled kernel to perform inferenceoperations of the AI model to generate output data and to implant thewatermark within the output data at block 2324. At block 2325, theoutput data having the watermark implanted therein is returned to thehost system 104 over the communication link 215.

According to another aspect, a watermark-enabled kernel may also beutilized to inherit a watermark from another data structure or dataobject, such as a set of input data or an artificial intelligence model,and to implant the inherited watermark in another artificialintelligence model. In this situation, a data object already includes awatermark implanted therein. A watermark kernel, when executed, canextract or inherit the watermark from the data object and use thatwatermark to implant into another artificial intelligence model.

FIG. 14 is a processing flow diagram illustrating a process ofinheriting a watermark from a data object, training an artificialintelligence (AI) model, and implanting the inherited watermark into theAI model, according to another embodiment. Referring to FIG. 14, atblock 2341, host system 104 generates a watermark kernel (e.g.watermark-inherited kernel) that is capable of extracting or inheritinga watermark from a data object or data structure other than the AImodel. Host system 104 sends the watermark kernel, a set of trainingdata, and optionally an AI model, to DP accelerator 105 via path 2342.In response, at block 2344, the watermark kernel is executed within DPaccelerator 105 to extract or inherit an existing watermark from a dataobject other than the AI model, and at block 2345, the AI model istrained. In an embodiment wherein the DP accelerator receives apre-trained AI model, the AI model is further trained, or refined,during the training process. In an embodiment wherein the DP acceleratordoes not receive a pre-trained AI model, the AI model is generatedduring the training. During the training, the inherited watermark isimplanted within the AI model. The trained AI model having the watermarkimplanted therein is returned to host system 104 via path 2346.

FIG. 15 is a flow diagram illustrating a process of inheriting awatermark from a data object, training an artificial intelligence (AI)model, and implanting the inherited watermark in the AI model accordingto another embodiment. The process may be performed by processing logicwhich may include software, hardware, or a combination thereof. Theprocess may be performed by DP accelerator 105. The watermark kernel(e.g. watermark-inherited kernel) receives a set of input representingtraining data and, optionally, an AI model. The watermark kernel caninherit a watermark from another data object. If the watermark kernelreceives the AI model, then the watermark kernel can train, or furtherrefine, the AI model and implant the watermark in the refined AI model.If the watermark kernel does not receive the AI model, the watermarkkernel can generate and train a new AI model and implant the watermarkin the new AI model, resulting in a trained AI model with an inheritedwatermark.

Referring back to FIG. 3, according to one embodiment, DP accelerator105 receives first data representing a set of training data, andoptionally, an artificial intelligence (AI) model to be trained, fromhost 104 over communication link 215. The DP accelerator 105 furtherreceives a watermark kernel (e.g., watermark-inherited kernel) from thehost 104. The watermark kernel is executed by the DP accelerator 105 onthe AI model. The watermark kernel, when executed within DP accelerator105, generates a new watermark by inheriting an existing watermark,trains the AI model, and implants the new watermark into the AI modelduring the training. The trained AI model having the watermark implantedtherein is then transmitted back to the host 104. The existing watermarkmay be received from the host processor, so that the watermark kernelcan inherit the existing watermark.

Referring to FIG. 16, at block 2361, a DP accelerator 105 receives firstdata representing a set of training data, and optionally a pre-trainedAI model, from a host system 104 over a communication link 215. At block2362, the DP accelerator further receives a watermark-enabled kernelfrom the host system 104 over the communication link 215. At block 2363,the DP accelerator generates a new watermark by inheriting an existingwatermark, either from a set of input data or from another data objectsuch as another AI model. At block 2364, the DP accelerator performstraining of the pre-trained model, or generates and trains a new AImodel, using the training data. At block 2365, the inherited watermarkis implanted within the AI model during the training. At block 2366, thetrained AI model having the inherited watermark is transmitted from theDP accelerator to the host system 104 over the communication link 215.

According to another aspect, a watermark can also be inherited by awatermark kernel (e.g. watermark-inherited kernel) during the inferenceof an existing AI model and be implanted in the output data of theinference of the AI model. As a result, there is no need to modify theAI model or a DP accelerator in order to generate an output having thedigital rights of the AI model implanted therein, for example, to provethat the AI model utilized to generate the inference output is from anauthorized entity.

Referring back to FIG. 3, according to one embodiment, DP accelerator105 receives first data representing a set of input data, and/or anartificial intelligence (AI) model that has been previously trained orgenerated, from host 104 over communication link 215. The DP accelerator105 further receives a watermark kernel (e.g., watermark-inheritedkernel) from the host 104. The watermark kernel is executed within theDP accelerator 105 on the AI model and the input data. The watermarkkernel, when executed, generates a new watermark based on an existingwatermark inherited from one of the input data or the AI model, performsartificial intelligence inference using the AI model to generate outputdata, and implants the new watermark within the output data. The outputdata having the watermark implanted therein is then returned back to thehost 104.

FIG. 17 is a processing flow diagram illustrating a processing flow ofimplanting a watermark in the inference output of an existing artificialintelligence (AI) model according to one embodiment. Referring to FIG.17, at block 2401, host 104 generates a watermark kernel (e.g.watermark-inherited kernel) that is capable of inheriting a watermark.Host 104 sends the watermark kernel, an existing AI model, and a set ofinput data to DP accelerator 105 via path 2402. At block 2404, thewatermark kernel inherits a watermark, either from the AI model oranother data objet. At block 2405 the AI model is executed with the setof input data to perform an inference. At block 2406 the watermarkkernel implants the inherited watermark within the inference output atblock. The inference output data having the watermark implanted thereinis transmitted back to host 104 via path 2407.

FIG. 18 is a flow diagram illustrating an example of a process ofinheriting and implanting a watermark during the inference of anartificial intelligence (AI) model according to one embodiment. Theprocess may be performed by processing logic which may include software,hardware, or a combination thereof. The watermark kernel (e.g.watermark-inherited kernel) is executed to generate a watermark byinheriting the watermark from an existing watermark or data object. TheAI model is executed using the input data to generate inference outputdata from the AI model. The watermark is implanted into the inferenceoutput data, resulting in an AI model inference having the inheritedwatermark embedded in the inference.

Referring now to FIG. 19, process 2420 illustrates a process ofinheriting a watermark from a data object, performing an inference usingan artificial intelligence (AI) model, and implanting the inheritedwatermark into the inference of the AI model. At block 2421, a DPaccelerator 105 receives an AI model that has been previously trainedand a set of input data from a host system 104 over a communication link215. At block 2422, the DP accelerator 105 further receives a watermarkkernel from the host system 104, where the watermark kernel is capableof inheriting a watermark from a data object. At block 2423, thewatermark kernel is executed within the DP accelerator 105 to generate anew watermark by inheriting an existing watermark. At block 2424, anartificial intelligence inference is performed using the AI modelreceived from the host system 104, generating inference output data. Atblock 2425, the watermark is implanted within the inference output data.The output data having the watermark implanted therein is transmittedback to the host 104 at block 2426.

With respect to any of the above aspects, in one embodiment, a watermarkmay be embedded in one or more nodes of one or more layers of anartificial intelligence model. For example, a watermark may be implantedin one or more weight variables or bias variables. Alternatively, one ormore nodes (e.g., fake nodes that are not used or unlikely used by theartificial intelligence model) may be created to implant or store thewatermark. A host processor may be a central processing unit (CPU) and aDP accelerator may be a general-purpose processing unit (GPU) coupled tothe CPU over a bus or interconnect. A DP accelerator may be implementedin a form of an application-specific integrated circuit (ASIC), a fieldprogrammable gate array (FPGA) device, or other forms of integratedcircuits (ICs). Alternatively, the host processor may be a part of aprimary data processing system while a DP accelerator may be one of manydistributed systems as secondary systems that the primary system canoffload its data processing tasks remotely over a network (e.g., cloudcomputing systems such as a software as a service or SaaS system, or aplatform as a service or PaaS system). A link between a host processorand a DP accelerator may be a peripheral component interconnect express(PCIe) link or a network connection such as Ethernet connection.

FIG. 20 is a block diagram illustrating an example of a data processingsystem 1500 which may be used with one embodiment of the disclosure. Forexample, system 1500 may represent any of data processing systemsdescribed above performing any of the processes or methods describedabove, such as, for example, establishing secure communications betweena host device 104 and data processing (DP) accelerator 105; running, bythe DP accelerator, kernels of code of artificial intelligence (AI)models received from host device 104; executing applications on hostdevice 104; executing API's and drivers on host device 104; runningencryption/decryption logic, seed generators, encryption/decryption keygenerators, and the like, as described above for DP accelerator 105.System 1500 can include many different components. These components canbe implemented as integrated circuits (ICs), portions thereof, discreteelectronic devices, or other modules adapted to a circuit board such asa motherboard or add-in card of the computer system, or as componentsotherwise incorporated within a chassis of the computer system.

Note also that system 1500 is intended to show a high level view of manycomponents of the computer system. However, it is to be understood thatadditional components may be present in certain implementations andfurthermore, different arrangement of the components shown may occur inother implementations. System 1500 may represent a desktop, a laptop, atablet, a server, a mobile phone, a media player, a personal digitalassistant (PDA), a Smart watch, a personal communicator, a gamingdevice, a network router or hub, a wireless access point (AP) orrepeater, a set-top box, or a combination thereof. Further, while only asingle machine or system is illustrated, the term “machine” or “system”shall also be taken to include any collection of machines or systemsthat individually or jointly execute a set (or multiple sets) ofinstructions to perform any one or more of the methodologies discussedherein.

In one embodiment, system 1500 includes processor 1501, memory 1503, anddevices 1505-1508 connected via a bus or an interconnect 1510. Processor1501 may represent a single processor or multiple processors with asingle processor core or multiple processor cores included therein.Processor 1501 may represent one or more general-purpose processors suchas a microprocessor, a central processing unit (CPU), or the like. Moreparticularly, processor 1501 may be a complex instruction set computing(CISC) microprocessor, reduced instruction set computing (RISC)microprocessor, very long instruction word (VLIW) microprocessor, orprocessor implementing other instruction sets, or processorsimplementing a combination of instruction sets. Processor 1501 may alsobe one or more special-purpose processors such as a Baidu® AI processor,a GPU, an ASIC, a cellular or baseband processor, an FPGA, a DSP, anetwork processor, a graphics processor, a communications processor, acryptographic processor, a co-processor, an embedded processor, or anyother type of logic capable of processing instructions.

Processor 1501, which may be a low power multi-core processor socketsuch as an ultra-low voltage processor, may act as a main processingunit and central hub for communication with the various components ofthe system. Such processor can be implemented as a system on chip (SoC).Processor 1501 is configured to execute instructions for performing theoperations and steps discussed herein. System 1500 may further include agraphics interface that communicates with optional graphics subsystem1504, which may include a display controller, a graphics processor,and/or a display device.

Processor 1501 may communicate with memory 1503, which in one embodimentcan be implemented via multiple memory devices to provide for a givenamount of system memory. Memory 1503 may include one or more volatilestorage (or memory) devices such as random access memory (RAM), dynamicRAM (DRAM), synchronous DRAM (SDRAM), static RAM (SRAM), or other typesof storage devices. Memory 1503 may store information includingsequences of instructions that are executed by processor 1501, or anyother device. For example, executable code and/or data of a variety ofoperating systems, device drivers, firmware (e.g., input output basicsystem or BIOS), and/or applications can be loaded in memory 1503 andexecuted by processor 1501. An operating system can be any kind ofoperating systems, such as, for example, Robot Operating System (ROS),Windows® operating system from Microsoft®, Mac OS®/iOS® from Apple,Android® from Google®, LINUX, UNIX, or other real-time or embeddedoperating systems.

System 1500 may further include IO devices such as devices 1505-1508,including network interface device(s) 1505, optional input device(s)1506, and other optional 10 device(s) 1507. Network interface device1505 may include a wireless transceiver and/or a network interface card(NIC). The wireless transceiver may be a WiFi transceiver, an infraredtransceiver, a Bluetooth transceiver, a WiMax transceiver, a wirelesscellular telephony transceiver, a satellite transceiver (e.g., a globalpositioning system (GPS) transceiver), or other radio frequency (RF)transceivers, or a combination thereof. The NIC may be an Ethernet card.

Input device(s) 1506 may include a mouse, a touch pad, a touch sensitivescreen (which may be integrated with display device 1504), a pointerdevice such as a stylus, and/or a keyboard (e.g., physical keyboard or avirtual keyboard displayed as part of a touch sensitive screen). Forexample, input device 1506 may include a touch screen controller coupledto a touch screen. The touch screen and touch screen controller can, forexample, detect contact and movement or break thereof using any of aplurality of touch sensitivity technologies, including but not limitedto capacitive, resistive, infrared, and surface acoustic wavetechnologies, as well as other proximity sensor arrays or other elementsfor determining one or more points of contact with the touch screen.

IO devices 1507 may include an audio device. An audio device may includea speaker and/or a microphone to facilitate voice-enabled functions,such as voice recognition, voice replication, digital recording, and/ortelephony functions. Other IO devices 1507 may further include universalserial bus (USB) port(s), parallel port(s), serial port(s), a printer, anetwork interface, a bus bridge (e.g., a PCI-PCI bridge), sensor(s)(e.g., a motion sensor such as an accelerometer, gyroscope, amagnetometer, a light sensor, compass, a proximity sensor, etc.), or acombination thereof. Devices 1507 may further include an imagingprocessing subsystem (e.g., a camera), which may include an opticalsensor, such as a charged coupled device (CCD) or a complementarymetal-oxide semiconductor (CMOS) optical sensor, utilized to facilitatecamera functions, such as recording photographs and video clips. Certainsensors may be coupled to interconnect 1510 via a sensor hub (notshown), while other devices such as a keyboard or thermal sensor may becontrolled by an embedded controller (not shown), dependent upon thespecific configuration or design of system 1500.

To provide for persistent storage of information such as data,applications, one or more operating systems and so forth, a mass storage(not shown) may also couple to processor 1501. In various embodiments,to enable a thinner and lighter system design as well as to improvesystem responsiveness, this mass storage may be implemented via a solidstate device (SSD). However, in other embodiments, the mass storage mayprimarily be implemented using a hard disk drive (HDD) with a smalleramount of SSD storage to act as a SSD cache to enable non-volatilestorage of context state and other such information during power downevents so that a fast power up can occur on re-initiation of systemactivities. Also a flash device may be coupled to processor 1501, e.g.,via a serial peripheral interface (SPI). This flash device may providefor non-volatile storage of system software, including BIOS as well asother firmware of the system.

Storage device 1508 may include computer-accessible storage medium 1509(also known as a machine-readable storage medium or a computer-readablemedium) on which is stored one or more sets of instructions or software(e.g., module, unit, and/or logic 1528) embodying any one or more of themethodologies or functions described herein. Processingmodule/unit/logic 1528 may represent any of the components describedabove, such as, for example, user applications 205, runtime libraries206, drivers 209 of host device 104, true random number generator 273,key manager 272, watermark unit 276, cryptographic engine 274 on DPaccelerator 105. Processing module/unit/logic 1528 may also reside,completely or at least partially, within memory 1503 and/or withinprocessor 1501 during execution thereof by data processing system 1500,memory 1503 and processor 1501 also constituting machine-accessiblestorage media. Processing module/unit/logic 1528 may further betransmitted or received over a network via network interface device1505.

Computer-readable storage medium 1509 may also be used to store some ofthe software functionalities described above persistently. Whilecomputer-readable storage medium 1509 is shown in an exemplaryembodiment to be a single medium, the term “computer-readable storagemedium” should be taken to include a single medium or multiple media(e.g., a centralized or distributed database, and/or associated cachesand servers) that store the one or more sets of instructions. The term“computer-readable storage medium” shall also be taken to include anymedium that is capable of storing or encoding a set of instructions forexecution by the machine and that cause the machine to perform any oneor more of the methodologies of the present disclosure. The term“computer-readable storage medium” shall accordingly be taken toinclude, but not be limited to, solid-state memories, and optical andmagnetic media, or any other non-transitory machine-readable medium.

Processing module/unit/logic 1528, components and other featuresdescribed herein can be implemented as discrete hardware components orintegrated in the functionality of hardware components such as ASICS,FPGAs, DSPs or similar devices. In addition, processingmodule/unit/logic 1528 can be implemented as firmware or functionalcircuitry within hardware devices. Further, processing module/unit/logic1528 can be implemented in any combination hardware devices and softwarecomponents.

Note that while system 1500 is illustrated with various components of adata processing system, it is not intended to represent any particulararchitecture or manner of interconnecting the components; as suchdetails are not germane to embodiments of the present disclosure. Itwill also be appreciated that network computers, handheld computers,mobile phones, servers, and/or other data processing systems which havefewer components or perhaps more components may also be used withembodiments of the disclosure.

Some portions of the preceding detailed descriptions have been presentedin terms of algorithms and symbolic representations of operations ondata bits within a computer memory. These algorithmic descriptions andrepresentations are the ways used by those skilled in the dataprocessing arts to most effectively convey the substance of their workto others skilled in the art. An algorithm is here, and generally,conceived to be a self-consistent sequence of operations leading to adesired result. The operations are those requiring physicalmanipulations of physical quantities.

It should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities. Unlessspecifically stated otherwise as apparent from the above discussion, itis appreciated that throughout the description, discussions utilizingterms such as those set forth in the claims below, refer to the actionand processes of a computer system, or similar electronic computingdevice, that manipulates and transforms data represented as physical(electronic) quantities within the computer system's registers andmemories into other data similarly represented as physical quantitieswithin the computer system memories or registers or other suchinformation storage, transmission or display devices.

Embodiments of the disclosure also relate to an apparatus for performingthe operations herein. Such a computer program is stored in anon-transitory computer readable medium. A machine-readable mediumincludes any mechanism for storing information in a form readable by amachine (e.g., a computer). For example, a machine-readable (e.g.,computer-readable) medium includes a machine (e.g., a computer) readablestorage medium (e.g., read only memory (“ROM”), random access memory(“RAM”), magnetic disk storage media, optical storage media, flashmemory devices).

The processes or methods depicted in the preceding figures may beperformed by processing logic that comprises hardware (e.g. circuitry,dedicated logic, etc.), software (e.g., embodied on a non-transitorycomputer readable medium), or a combination of both. Although theprocesses or methods are described above in terms of some sequentialoperations, it should be appreciated that some of the operationsdescribed may be performed in a different order. Moreover, someoperations may be performed in parallel rather than sequentially.

Embodiments of the present disclosure are not described with referenceto any particular programming language. It will be appreciated that avariety of programming languages may be used to implement the teachingsof embodiments of the disclosure as described herein.

In the foregoing specification, embodiments of the disclosure have beendescribed with reference to specific exemplary embodiments thereof. Itwill be evident that various modifications may be made thereto withoutdeparting from the broader spirit and scope of the disclosure as setforth in the following claims. The specification and drawings are,accordingly, to be regarded in an illustrative sense rather than arestrictive sense.

What is claimed is:
 1. A computer-implemented method performed by a dataprocessing (DP) accelerator, the method comprising: receiving, at the DPaccelerator, first data representing a set of training data from a hostprocessor; receiving, at the DP accelerator, a watermark kernel from thehost processor; executing the watermark kernel within the DP acceleratoron an artificial intelligence (AI) model, wherein the watermark kernel,when executed, is configured to: generate a watermark, train the AImodel using the set of training data, and implant the watermark withinthe AI model during training of the AI model; and transmitting seconddata representing the trained AI model having the watermark implantedtherein to the host processor.
 2. The method of claim 1, furthercomprising receiving a pre-trained AI model, wherein the training isperformed for the pre-trained AI model.
 3. The method of claim 1,further comprising receiving a set of input data from the hostprocessor, wherein the watermark kernel is executed on the set of inputdata, and wherein the watermark is generated based on the set of inputdata.
 4. The method of claim 3, wherein the set of input data includesinformation describing the watermark.
 5. The method of claim 1, whereinimplanting the watermark in the AI model comprises embedding thewatermark in one or more nodes of the AI model.
 6. The method of claim4, wherein the watermark is stored in one or more weight variables ofthe one or more nodes of the AI model.
 7. The method of claim 4, whereinthe watermark is stored in one or more bias variables of the one or morenodes of the AI model.
 8. The method of claim 1, wherein implanting thewatermark in the AI model comprises creating one or more additionalnodes of the AI model during the training to store the watermark.
 9. Adata processing (DP) accelerator, comprising: an interface to receivefirst data representing a set of training data and to receive awatermark kernel from a host processor; and a kernel executor to executethe watermark kernel on an artificial intelligence (AI) model, whereinthe watermark kernel, when executed, is configured to: generate awatermark, train the AI model using the set of training data, andimplant the watermark within the AI model during training of the AImodel, wherein second data representing the trained AI model having thewatermark implanted therein is transmitted to the host processor. 10.The DP accelerator of claim 9, the interface further configured toreceive a pre-trained AI model, wherein the training is performed forthe pre-trained AI model.
 11. The DP accelerator of claim 9, wherein theinterface is further to receive a set of input data from the hostprocessor, wherein the watermark kernel is executed on the set of inputdata, and wherein the watermark is generated based on the set of inputdata.
 12. The DP accelerator of claim 11, wherein the set of input dataincludes information describing the watermark.
 13. The DP accelerator ofclaim 9, wherein implanting the watermark in the AI model comprisesembedding the watermark in one or more nodes of the AI model.
 14. The DPaccelerator of claim 13, wherein the watermark is stored in one or moreweight variables of the one or more nodes of the AI model.
 15. The DPaccelerator of claim 13, wherein the watermark is stored in one or morebias variables of the one or more nodes of the AI model.
 16. The DPaccelerator of claim 9, wherein implanting the watermark in the AI modelcomprises creating one or more additional nodes of the AI model duringthe training to store the watermark.
 17. The DP accelerator of claim 9,wherein the receiving from, and transmitting to, the host processor isperformed over a link that comprises a peripheral component interconnectexpress (PCIe) channel.
 18. A non-transitory machine-readable mediumhaving instructions stored therein, which when executed by a dataprocessing (DP) accelerator, cause the DP accelerator to performoperations, the operations comprising: receiving, at the DP accelerator,first data representing a set of training data from a host processor;receiving, at the DP accelerator, a watermark kernel from the hostprocessor; executing the watermark kernel within the DP accelerator onan AI model, wherein the watermark kernel, when executed, is configuredto generate a watermark, train the AI model using the set of trainingdata, and implant the watermark within the AI model during training ofthe AI model; and transmitting second data representing the trained AImodel having the watermark implanted therein to the host processor. 19.The machine-readable medium of claim 18, wherein the operations furthercomprise receiving a set of input data from the host processor, whereinthe watermark kernel is executed on the set of input data, and whereinthe watermark is generated based on the set of input data.
 20. Themachine-readable medium of claim 19, wherein the set of input dataincludes information describing the watermark.
 21. The machine-readablemedium of claim 18, wherein implanting the watermark in the AI modelcomprises embedding the watermark in one or more nodes of the AI model.