Loading...

Case Study:
Protecting Machine Learning Algorithms with EmSPARKTM Security Suite

DOWNLOAD THE CASE STUDY

Featuring Machine Vision

Protecting Critical Intellectual Property (AI/ML Algorithms) with the EmSPARK™ Security Suite

Featuring Machine Vision

INTRODUCTION

Machine Vision (MV) technology provides inspection and analysis using imaging. It is used in applications including industrial automation, process control, robotics, vehicle guidance, and logistics. An industry-leading vendor of machine vision products required a solution to protect its Artificial Intelligence and Machine Vision (AI/ML) algorithms used to support its technology.

THE PROBLEM—PROTECTING BUSINESS-CRITICAL INTELLECTUAL PROPERTY BY SECURING AI/ML APPLICATIONS

Machine Vision products follow the process of 1) acquiring an image of a product or process, 2) processing the data delivered by the image, and 3) making critical decisions (such as quality or acceptance of a product or process) based on the data. The algorithms that deliver this functionality represent critical intellectual property (IP), and create significant value for the products. It is absolutely business critical that these algorithms are protected, and can only be seen and used by developers of the products themselves. When designing, manufacturing, and provisioning MV products, application protection must be provided.

THE EmSPARK™ SOLUTION

The industry-leading Machine Vision vendor selected Sequitur’s EmSPARK™ Security Suite in order to protect its critical IP, which would be required during product design, manufacturing, and deployment in the field. The following EmSPARK™ features and functions were implemented:

  • EmSPARK™’s CoreTEE™ operating system creates a secure enclave, separating secure applications and data from traditional “rich” applications (such as Linux and OpenSSL).
  • EmSPARK™ provides trusted applications (TA’s) for key and certificate management, secure storage, and cryptography to ensure protection of critical data. An end-to-end secure boot, update and failure recovery process was implemented to protect the product’s firmware integrity in manufacturing and deployment.
  • Using EmSPARK™’s Software Developer’s Kit (SDK), the vendor was able to develop applications that would house their algorithms in the CoreTEE’s Secure Enclave.
  • EmSPARK™ API’s enabled secure communication between the secure applications and the rich applications during device operation.
  • By providing encrypted code, housed in the EmSPARK™ secure environment, the vendor was able to ensure that the algorithms would be protected during the manufacturing, software provisioning, field deployment, and firmware upgrade stages of the Machine Vision product’s life cycle.

It is absolutely business critical that these algorithms are protected, and can only be seen and used by developers of the products themselves.

Header Image provided by Arseny Togulev on Unsplash.
Content Image provided by Mika Baumeister on Unsplash.

Explore Our Products

Get Started with Free Evaluation Kit:

EmSparkTM for Microchip SAMA5D2 Xplained Ultra & SAMA5D27 SOM1-EK1

Learn More:

EmSPARKTM for NXP® Semiconductors Layerscape® and i.MX applications processors

Download:

EmSPARKTM Whitepaper

Follow Us
Loading...