US 12,332,989 B2
Authenticating usage data for processing by machine learning models
Jinpeng Liu, Shanghai (CN); Tianxiang Chen, Shanghai (CN); Sarah Evans, Parker, CO (US); and Zhen Jia, Shanghai (CN)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 17, 2022, as Appl. No. 17/967,220.
Prior Publication US 2024/0126859 A1, Apr. 18, 2024
Int. Cl. G06F 21/33 (2013.01)
CPC G06F 21/33 (2013.01) 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving, by at least one machine learning application installed in a user space of an operating system of a user device, a message from a software component, wherein the software component is: (i) configured to collect usage data associated with the user device, (ii) signed, by an application installed on the user device, using a private key corresponding to a digital certificate, and (iii) deployed in a kernel space of the operating system based at least in part on an evaluation of the digital certificate, and wherein the message comprises usage data collected by the software component signed using the private key corresponding to the digital certificate;
authenticating, by the at least one machine learning application, the usage data based at least in part on a public key corresponding to the digital certificate; and
processing, by the at least one machine learning application in response to a result of the authenticating, at least a portion of the authenticated usage data;
wherein the method is performed by at least one processing device comprising a processor coupled to a memory.