17546768. METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENT simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENT

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Omar Ahmad Mohammad Alhussein of Ottawa (CA)

Peter Ashwood-smith of Gatineau (CA)

METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17546768 titled 'METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENT

Simplified Explanation

The abstract of the patent application describes a method, system, and computer program product for preventing unauthorized use of a deep reinforcement learning (DRL) agent. The DRL agent is trained to behave as expected only when it observes one or more required secret operational keys. Additionally, the DRL agent can operate at a diminished capacity when the required secret operational keys are unused.

  • The patent application proposes a method to prevent unauthorized use of a deep reinforcement learning agent.
  • The DRL agent is trained to behave correctly only when it detects specific secret operational keys.
  • The DRL agent can still operate, albeit at a reduced capacity, when the secret operational keys are not used.

Potential Applications

This technology can have various applications, including:

  • Protecting sensitive information or operations that require specific authorization.
  • Preventing unauthorized use of DRL agents in critical systems or applications.
  • Enhancing security measures in machine learning systems.

Problems Solved

The technology addresses the following problems:

  • Unauthorized use of deep reinforcement learning agents.
  • Ensuring that DRL agents only operate as intended when specific secret operational keys are present.
  • Mitigating the risk of unauthorized access to sensitive information or operations.

Benefits

The technology offers several benefits, such as:

  • Improved security by restricting the behavior of DRL agents to authorized users.
  • Enhanced control over the actions and capabilities of DRL agents.
  • Reduced risk of unauthorized access or misuse of DRL agents in critical systems.


Original Abstract Submitted

There are provided a method, system and computer program product for preventing unauthorized use of a deep reinforcement learning agent. The DRL agents are trained to behave as expected only when they observe the one or more required secret operational keys. In some embodiments, the DRL agents are further trained to operate at a diminished capacity when the one or more required secret operational keys are unused.