| CPC H04L 9/0852 (2013.01) [G06F 21/602 (2013.01); G06N 20/00 (2019.01); H04L 9/3093 (2013.01)] | 12 Claims |

|
1. A computer-implemented method (CIM) for use with an edge computing device including a trusted execution environment, the CIM comprising:
verifying a cryptographic attestation of a workload signed by a previously designated external source, wherein the workload is encrypted with a post-quantum encryption scheme;
responsive to a verified cryptographic attestation, reading the workload encrypted with the post-quantum encryption scheme into the trusted execution environment, wherein the trusted execution environment has an extended trust boundary encompassing one or more graphics processing units (GPUs), and wherein reading the workload into the trusted execution environment includes:
decoding, using the one or more GPUs, the workload encrypted with the post-quantum encryption scheme as the workload is read into machine readable storage of the one or more GPUS;
executing, using the one or more GPUs, the decoded workload to generate a data record for encryption, wherein executing the decoded workload to generate the data record for encryption includes generating one or more machine learning inferences using an algorithm executed by the one or more GPUs within the extended trust boundary of the trusted execution environment; and
encrypting, using the one or more GPUs, the data record with the post-quantum encryption scheme.
|