Micron technology, inc. (20240163265). Homomorphic Vigilance on Communication Channels simplified abstract

From WikiPatents
Jump to navigation Jump to search

Homomorphic Vigilance on Communication Channels

Organization Name

micron technology, inc.

Inventor(s)

Saideep Tiku of Folsom CA (US)

Poorna Kale of Folsom CA (US)

Homomorphic Vigilance on Communication Channels - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240163265 titled 'Homomorphic Vigilance on Communication Channels

Simplified Explanation

The patent application describes a device designed to detect anomalous communications on a communication channel without decrypting the encrypted messages. The device uses an artificial neural network trained to classify sequences of encrypted communications based on weight matrices stored in a non-volatile memory cell array.

  • The device has an interface to receive encrypted communications from a communication channel.
  • It includes a non-volatile memory cell array programmed with weight matrices of an artificial neural network.
  • The controller of the device identifies sequences of encrypted communications, performs multiplication and accumulation operations using the memory cells, and determines if the sequence is anomalous based on the neural network output.

Potential Applications

This technology could be used in cybersecurity systems to detect suspicious or malicious communications on networks.

Problems Solved

This device solves the problem of detecting anomalous communications without the need to decrypt the messages, thus maintaining the privacy and security of the data.

Benefits

The device provides a more secure and efficient way to monitor communication channels for potential threats without compromising the encryption of the messages.

Potential Commercial Applications

A potential commercial application of this technology could be in the development of advanced intrusion detection systems for network security.

Possible Prior Art

One possible prior art for this technology could be traditional intrusion detection systems that rely on decrypting messages to analyze their content for anomalies.

What are the specific encryption configurations used in this device?

The specific encryption configurations used in this device are not detailed in the abstract. Further information on the encryption methods employed would be necessary to understand the full scope of the technology.

How does the device handle false positives in detecting anomalous communications?

The abstract does not mention how the device handles false positives in detecting anomalous communications. It would be important to know if there are mechanisms in place to reduce false alarms and improve the accuracy of the detection system.


Original Abstract Submitted

a device to detect anomalous communications on a communication channel. the device has: an interface to receive from the communication channel, encrypted communications transmitted among a plurality of components; and a non-volatile memory cell array having memory cells programmed in a first mode according to weight matrices of an artificial neural network trained to classify sequences of encrypted communications generated according to an encryption configuration. a controller of the device is configured to: identify a sequence of encrypted communications according to the encryption configuration; perform, using the memory cells programmed in the first mode to facilitate multiplication and accumulation, operations of multiplication and accumulation; and determine, without decryption of the sequence of encrypted communications, whether the sequence of encrypted communications is anomalous, based on an output of the artificial neural network responsive to the sequence of encrypted communications as an input.