US 12,309,263 B2
Post-quantum cryptography secured execution environments for edge devices
Jeb R. Linton, Manassas, VA (US); Samuel Matzek, Pine Island, MN (US); Siyamack Ghaeedan, Arlington Heights, IL (US); Kris Marie Murphy, Rochester, MN (US); and Jeff McNeely, Princeton, TX (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Mar. 30, 2021, as Appl. No. 17/217,326.
Prior Publication US 2022/0321332 A1, Oct. 6, 2022
Int. Cl. H04L 9/08 (2006.01); G06F 21/60 (2013.01); G06N 20/00 (2019.01); H04L 9/30 (2006.01)
CPC H04L 9/0852 (2013.01) [G06F 21/602 (2013.01); G06N 20/00 (2019.01); H04L 9/3093 (2013.01)] 12 Claims
OG exemplary drawing
 
1. A computer-implemented method (CIM) for use with an edge computing device including a trusted execution environment, the CIM comprising:
verifying a cryptographic attestation of a workload signed by a previously designated external source, wherein the workload is encrypted with a post-quantum encryption scheme;
responsive to a verified cryptographic attestation, reading the workload encrypted with the post-quantum encryption scheme into the trusted execution environment, wherein the trusted execution environment has an extended trust boundary encompassing one or more graphics processing units (GPUs), and wherein reading the workload into the trusted execution environment includes:
decoding, using the one or more GPUs, the workload encrypted with the post-quantum encryption scheme as the workload is read into machine readable storage of the one or more GPUS;
executing, using the one or more GPUs, the decoded workload to generate a data record for encryption, wherein executing the decoded workload to generate the data record for encryption includes generating one or more machine learning inferences using an algorithm executed by the one or more GPUs within the extended trust boundary of the trusted execution environment; and
encrypting, using the one or more GPUs, the data record with the post-quantum encryption scheme.