TW201802705A - System having artificial intelligence - Google Patents

System having artificial intelligence Download PDF

Info

Publication number
TW201802705A
TW201802705A TW106122439A TW106122439A TW201802705A TW 201802705 A TW201802705 A TW 201802705A TW 106122439 A TW106122439 A TW 106122439A TW 106122439 A TW106122439 A TW 106122439A TW 201802705 A TW201802705 A TW 201802705A
Authority
TW
Taiwan
Prior art keywords
artificial intelligence
aforementioned
module
information
intelligence module
Prior art date
Application number
TW106122439A
Other languages
Chinese (zh)
Inventor
江川將偉
Original Assignee
賽爾科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 賽爾科技股份有限公司 filed Critical 賽爾科技股份有限公司
Publication of TW201802705A publication Critical patent/TW201802705A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/20Ensemble learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/10Machine learning using kernel methods, e.g. support vector machines [SVM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/12Computing arrangements based on biological models using genetic models
    • G06N3/126Evolutionary algorithms, e.g. genetic algorithms or genetic programming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/01Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/01Probabilistic graphical models, e.g. probabilistic networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Medical Informatics (AREA)
  • Biomedical Technology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Molecular Biology (AREA)
  • Pure & Applied Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computer Hardware Design (AREA)
  • Algebra (AREA)
  • Human Computer Interaction (AREA)
  • Mathematical Analysis (AREA)
  • Bioethics (AREA)
  • Mathematical Optimization (AREA)
  • Computational Mathematics (AREA)
  • Physiology (AREA)
  • Genetics & Genomics (AREA)
  • Computer And Data Communications (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)
  • Navigation (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a system (1) having a first artificial intelligence module (30) that includes a function to assist in or autonomously perform information exchange in an open environment, and a second artificial intelligence module (50) for monitoring the operation of the first artificial intelligence module (30) and autonomously performing a process that accompanies information exchange in a closed environment. A system (1) can be provided that enables use outside (external) resources via the Internet or the like in order for the first artificial intelligence module (30) to learn or make inferences, and at the same time, to protect against illegal accesses from the outside.

Description

含人工智慧的系統 System with artificial intelligence

本發明係有關一種含人工智慧的系統。 The invention relates to a system containing artificial intelligence.

日本國特許公開公報2014-222517號中記載一種容易進行裝置與使用者對話,且更有效地容易使用局部服務及/或遠程服務。此文獻的智慧自動輔助系統為,使用自然語言對話且在基於統一對話有與使用者相關之適合於取得資訊或適合於執行各種行動之情況,調用外部服務。使用網站、電子郵件及智慧型手機等或其等所有的組合等之多種平台任一者而被實現。基於相互被賦予關係的領域及任務的集合,採用藉系統可對話的外部服務而供給電力之追加的功能性。 Japanese Patent Laid-Open Publication No. 2014-222517 describes that a device and a user can easily communicate with each other and use local services and / or remote services more efficiently. The intelligent automatic assistance system of this document is to call an external service when using natural language dialogue and when it is suitable for obtaining information or performing various actions related to the user based on the unified dialogue. It is realized using any of a variety of platforms such as websites, emails, and smartphones, or all combinations thereof. Based on a collection of fields and tasks that are given a relationship to each other, additional functionality is provided to supply power through external services that the system can talk to.

日本國特許公開公報2008-165824號記載提供一種用以評估顧客和銷售業者間之電子商務的不當交易風險之方法及系統。此文獻中,收到電子商務或電子購物的訂購,測定伴隨於各個訂購之風險等級而回報風險評分值。資料驗證、預測性極高的人工智慧模式配對、網路資料綜合及負評檢核(negative file check)是被運用在用以試驗不當交易風險計算用的極多數的要因。其他的分析還包含有本次的交易對過去已知的不當交 易之比較對照及異常的速度模式、姓名及住所變更以及用以識別已知的詐欺者之交易履歷資料庫的檢索。可微調用以使系統所提供的服務適合於新的或變化的不當交易模式。 Japanese Patent Laid-Open Publication No. 2008-165824 provides a method and system for assessing the risk of improper transaction of electronic commerce between customers and sellers. In this document, an order for e-commerce or e-shopping is received, and the risk score of return is determined along with the risk level of each order. Data verification, highly predictive artificial intelligence model matching, network data synthesis, and negative file check are the most important factors used to test the risk of improper trading. Other analyses also include this transaction's mishandling of known past Easy comparisons and unusual speed patterns, name and domicile changes, and retrieval of a transaction history database to identify known fraudsters. Micro-callable to adapt the services provided by the system to new or changing improper transaction models.

[先前技術文獻] [Prior technical literature] [專利文獻] [Patent Literature]

[專利文獻1]日本國特許公開公報2008-165824號 [Patent Document 1] Japanese Patent Publication No. 2008-165824

人工智慧(Artificial Intelligence,AI)被使用於執行、輔助使用者介面、不當行為的發現等各式各樣的處理,或功能,可料想今後人工智慧(人工智慧技術)會進一步適用於各式各樣的領域。人工智慧,例如係呈現一具備擁有像學習/推論/判斷之類的人類智慧之功能的電腦系統。以作為人類的輔助者之有用的系統被進行開發,例如有:將醫學/理學/工學等之專門領域中的困難問題以與其領域的人類的專家相同等級進行解決之系統、作多種語言間的翻譯之系統、操作進行智慧作業的機器人之系統、從網站中發掘有用的資訊之系統等,不受此等所限定。 Artificial intelligence (AI) is used for various processing or functions such as execution, assisting user interface, and discovery of inappropriate behavior. It is expected that artificial intelligence (artificial intelligence technology) will be further applied to various types of Kind of field. Artificial intelligence, for example, presents a computer system with functions of human intelligence such as learning / inference / judgment. A system that is useful as a human supplementary has been developed, for example, a system that solves difficult problems in specialized fields such as medicine / science / engineering at the same level as human experts in its field, and inter-lingual The system of translation, the system of operating robots that perform intelligent operations, and the system of discovering useful information from websites are not limited to these.

在取代人類使人工智慧進行語言的理解或推論、問題解決等之智慧的行動之情況,人工智慧正常地在無不當存取下進行作動是重要的。人工智慧為了進行學習、推論,必須經由網際網路等使用外界(外部)的資源,相反地,對來自於外部的不當存取之防禦日益困難。 It is important for artificial intelligence to operate normally without improper access in the case of replacing human beings with intelligent actions such as language understanding or inference, and problem solving. In order for artificial intelligence to learn and infer, it is necessary to use external (external) resources via the Internet, etc. On the contrary, it is increasingly difficult to defend against improper access from the outside.

本發明的一態樣為一種系統,其具有:第1人工智慧模組,含有輔助或自律地進行在開放的環境中之資訊交換的功能;及第2人工智慧模組,監控第1人工智慧模組的動作,在封閉的環境自律地進行伴隨著資訊交換的處理。第1人工智慧模組(front side人工智慧)係在開放的環境依據含有外部的資源之資訊,可輔助或自律地進行使用者或主機(host)所期望的資訊交換。第2人工智慧模組(back side人工智慧)係在封閉的環境作動,在不可能暴露在來自於外部的不當存取下監控第1人工智慧模組的動作。此系統中,第2人工智慧模組可間接地掌握使用者或主機所期望的資訊交換,在封閉且保全的環境下自律地進行基於資訊交換的處理。因此,含有第1人工智慧模組與第2人工智慧模組的系統,係在資訊的漏洩或因不當存取所致誤動作等之開放的環境且所擔心的障礙已作了防範之安全狀態下,成為可為一邊有效地活用在開放的環境所提供的多的資源,一邊回應使用者或主機的要求。 One aspect of the present invention is a system having: a first artificial intelligence module including a function to assist or autonomously exchange information in an open environment; and a second artificial intelligence module to monitor the first artificial intelligence The operation of the module performs processing accompanied by information exchange in a closed environment. The first artificial intelligence module (front side artificial intelligence) is based on information containing external resources in an open environment, and can assist or autonomously perform the information exchange desired by users or hosts. The second artificial intelligence module (back side artificial intelligence) operates in a closed environment and monitors the operation of the first artificial intelligence module without being exposed to improper access from the outside. In this system, the second artificial intelligence module can indirectly grasp the information exchange desired by the user or the host, and autonomously perform the information exchange-based processing in a closed and secure environment. Therefore, the system containing the first artificial intelligence module and the second artificial intelligence module is in a safe state in which the leakage of information or misoperation due to improper access, etc., and the obstacles that have been worried about have been prevented , It can respond to user or host requests while effectively utilizing many resources provided in an open environment.

開放的環境亦可包含:使用者介面、用以朝網際網路等之開放網路服務連接的第1網路連接介面、及儲存在和使用者介面或第1網路連接介面之間進行交換的資訊之第1記憶體。封閉的環境亦可包含:第1人工智慧模組無法存取的第2記憶體,第2人工智慧模組亦可包含:將是伴隨資訊交換而被要求的資訊且是已將儲存於第2記憶體的秘匿資訊加密化的資訊供予第1記憶體之功能。將卡片資訊、賬戶資訊等之有關付款的個人資訊、使用者ID、密碼等之個人資訊作為秘匿資訊,使用第2人 工智慧模組可安全地管理。 The open environment may also include a user interface, a first network connection interface for connecting to an open network service, such as the Internet, and an exchange with the user interface or the first network connection interface. Of the first memory. The closed environment may also include: the second memory that the first artificial intelligence module cannot access, and the second artificial intelligence module may also include: the information that will be requested along with the information exchange and will be stored in the second The secret information of the memory is encrypted for the function of the first memory. Use card information, account information, and other personal information about payment, user ID, password, and other personal information as secret information to use the second person Intelligent modules can be safely managed.

封閉的環境亦可包含:用以朝與家庭內LAN、車載LAN、工廠內LAN、店鋪內LAN等之開放網路分離的封閉網路服務連接之第2網路連接介面。作為家庭閘道器、車載閘道器及工廠閘道器,針對來自於開放的網路之存取係以第1人工智慧模組來對應,針對被分離的網路則以第2人工智慧模組來對應。藉此系統,可一邊擔保被分離的網路之保全性,一邊進行與外部網路的連接應答。第2人工智慧模組亦可含有監視第1人工智慧模組的異常之功能。 The closed environment may include a second network connection interface for connecting to a closed network service separated from an open network such as a home LAN, a car LAN, a factory LAN, and a store LAN. As a home gateway, a car gateway and a factory gateway, the first artificial intelligence module is used for access from the open network, and the second artificial intelligence module is used for the separated network. Group to correspond. With this system, the connection to the external network can be answered while guaranteeing the security of the separated network. The second artificial intelligence module may also include a function of monitoring the abnormality of the first artificial intelligence module.

此系統亦可具有:支援開放的環境之第1OS且是第1人工智慧模組運作之第1OS;及支援封閉的環境之第2OS且是第2人工智慧模組運作之第2OS。藉由在相對於第1OS分離之保全的環境動作的第2OS,可確保第2人工智慧模組的安全性。 This system may also have a first OS that supports an open environment and is the first OS operating by the first artificial intelligence module; and a second OS that supports the closed environment and is the second OS that operates by the second artificial intelligence module. The second OS operating in a protected environment separated from the first OS can ensure the safety of the second artificial intelligence module.

可使用典型的一種具有包含保全區域及非保全區域的記憶體、含有禁止朝保全區域存取的支援機構的處理器單元、及在處理器單元上運作的超管理器(hypervisor)之架構。超管理器包含:許可第2OS朝保全區域及非保全區域之存取且禁止朝開放的環境之存取的機構;及許可第1OS對非保全區域及非保全裝置之存取且禁止使用支援機構朝保全區域存取的機構。 A typical architecture having a memory including a secured area and a non-secured area, a processor unit including a support mechanism that prohibits access to the secured area, and a hypervisor operating on the processor unit may be used. The hypervisor includes: a mechanism that permits access to the second security zone and the non-security zone and prohibits access to the open environment; and a permission that the first OS accesses the non-security zone and the non-security device and prohibits use of the support mechanism North Korean security zone access agency.

超管理器亦可包含:將處理器單元所含有的硬體(裝置)虛擬化並提供予第1OS及第2OS之虛擬化支援機構。處理器單元亦可包含:1或複數個主處理器單元(CPU);及1或複數個圖形處理處理器單元(GPU)。超管理器亦可包含:至少1個CPU及至少1個GPU的虛擬化支援功能。 The hypervisor may further include: virtualizing hardware (device) included in the processor unit and providing the virtualization support mechanism to the first OS and the second OS. The processor unit may also include: 1 or a plurality of main processor units (CPUs); and 1 or a plurality of graphics processing processor units (GPUs). The hypervisor may also include: virtualization support functions for at least one CPU and at least one GPU.

第1人工智慧模組亦可包含:複數個機械學習模組;使用於各個機械學習模組之複數個機械學習資料;進行複數個機械學習模組之間的通信的機械學習模組間通信單元;及抑制複數個機械學習資料之混合的分離單元。作為機械學習模組(技法),提案有ID3(疊代二元樹3代,Iterative Dichotomiser 3)或隨機森林(Random Forest,Randomized trees)等之決策樹學習、相關規則學習、各種的神經網路(ANN(人工神經網路,Artificial Neural Network),DNN(深度神經網路,Deep Neural Network)、CNN(卷積神經網絡,Convolutional Neural Network)、RNN(遞歸神經網路,Recurrent Neural Network)等)、基因編程(GP,Genetic Programming)、歸納邏輯編程(ILP,Inductive Logic Programming)、支持向量機(SVM,Support Vector Machine)、叢集(Clustering)、貝氏網路(Bayesian Network)等各式各樣者,分別具有優點。 The first artificial intelligence module may also include: a plurality of mechanical learning modules; a plurality of mechanical learning materials used in each mechanical learning module; a communication unit between mechanical learning modules that performs communication between the plurality of mechanical learning modules ; And a separate unit that suppresses the mixing of multiple machine learning materials. As a mechanical learning module (technique), proposals include ID3 (Iterative Dichotomiser 3) or random forest (Random Forest, Randomized trees) and other decision tree learning, related rule learning, and various neural networks (ANN (Artificial Neural Network), DNN (Deep Neural Network), CNN (Convolutional Neural Network), RNN (Recurrent Neural Network), etc.) , Genetic Programming (GP), Inductive Logic Programming (ILP), Support Vector Machine (SVM), Clustering, Bayesian Network, etc. Each has its own advantages.

作為此系統的人工智慧模組,亦可使用包含有複數個機械學習模組、複數個機械學習資料、模組間通信單元及分離單元的機械學習統合平台。成為可提供適材適所之經統合複數個類型的機械學習模組之人工智慧模組,可提供適合於個性化的人工智慧模組。特別是,含有機械學習統合平台的人工智慧模組係適合於在多種多樣之目的使用的可能性高的第1人工智慧模組。第2人工智慧模組亦可含有機械學習統合平台。 As an artificial intelligence module of this system, a mechanical learning integration platform including a plurality of mechanical learning modules, a plurality of mechanical learning materials, a communication unit between modules, and a separate unit can also be used. Become an artificial intelligence module that can provide a suitable combination of several types of mechanical learning modules, and provide an artificial intelligence module suitable for personalization. In particular, the artificial intelligence module including the mechanical learning integration platform is a first artificial intelligence module that is suitable for use in a variety of purposes. The second artificial intelligence module may also include a machine learning integration platform.

第1人工智慧模組亦可包含:判斷針對使用者的應答之失敗與成功的單元;及從開放的環境自動收集用以將針對使用者的應答成功地引導之資料而自動建構個人資料庫的單 元。可自律地進行人工智慧的個性化。具備統合平台的人工智慧模組中亦可包含:從開放的環境自動收集用以將針對使用者的應答成功地引導之機械學習模組及機械學習資料並安裝於第1人工智慧模組之安裝單元。 The first artificial intelligence module may also include: a unit that judges the failure and success of the response to the user; and automatically collects data from an open environment to automatically construct a personal database of data that will successfully guide the response to the user single yuan. Personalization of artificial intelligence can be performed autonomously. The artificial intelligence module with a unified platform can also include: automatically collecting mechanical learning modules and mechanical learning data from the open environment to successfully guide the user's response and installing them in the installation of the first artificial intelligence module unit.

第1人工智慧模組及第2人工智慧模組亦可被建構在伺服器上,但分成開放的環境與封閉的環境,為了確保依據第2人工智慧模組的第1人工智慧模組的動作之可追溯性(traceability),宜在單一的晶片或晶片組搭載第1人工智慧模組及第2人工智慧模組的控制模組。 The first artificial intelligence module and the second artificial intelligence module can also be constructed on the server, but are divided into an open environment and a closed environment. In order to ensure the operation of the first artificial intelligence module according to the second artificial intelligence module For traceability, the control module of the first artificial intelligence module and the second artificial intelligence module should be equipped on a single chip or chipset.

此系統的一例包含連接於第1人工智慧模組的使用者介面之個人輔助系統,例如,PDP、PDA、智慧型手機等。系統的其他例的2個係包含連接於第1人工智慧模組的使用者介面及連接於第2人工智慧模組的家庭內LAN及/或設備控制介面之家庭閘道器系統。此系統的其他例的1個係包含連接於第1人工智慧模組的使用者介面及連接於第2人工智慧模組的車載LAN及/或設備控制介面之車載閘道器系統。此系統的其他例的1個係包含連接於第1人工智慧模組的網際網路介面及連接於第2人工智慧模組的工廠內LAN及/或設備介面之IoT閘道器。 An example of this system includes a personal assistance system connected to the user interface of the first artificial intelligence module, such as a PDP, a PDA, a smart phone, and the like. Two other examples of the system are a home gateway system including a user interface connected to the first artificial intelligence module and a home LAN and / or device control interface connected to the second artificial intelligence module. One of the other examples of this system is an on-vehicle gateway system including a user interface connected to the first artificial intelligence module and a vehicle-mounted LAN and / or device control interface connected to the second artificial intelligence module. One of other examples of this system is an IoT gateway that includes an Internet interface connected to the first artificial intelligence module and a factory LAN and / or device interface connected to the second artificial intelligence module.

1‧‧‧系統 1‧‧‧ system

2‧‧‧使用者 2‧‧‧ users

3、71‧‧‧智慧型手機 3.71‧‧‧Smartphone

5‧‧‧雲端服務 5‧‧‧ Cloud Service

6‧‧‧保全模式 6‧‧‧ Security Mode

7‧‧‧非保全模式 7‧‧‧ non-security mode

8‧‧‧封閉的環境 8‧‧‧ closed environment

9‧‧‧非保全的環境 9‧‧‧ Non-secure environment

10‧‧‧硬體平台 10‧‧‧hardware platform

11‧‧‧處理器單元 11‧‧‧ processor unit

12‧‧‧支援機構 12‧‧‧ Support Agency

12a、12b‧‧‧記憶體空間 12a, 12b‧‧‧Memory space

13、13a、13b‧‧‧記憶體 13, 13a, 13b‧‧‧Memory

14‧‧‧使用者介面 14‧‧‧user interface

15、17‧‧‧網路介面 15, 17‧‧‧ web interface

16、18‧‧‧連接介面 16, 18‧‧‧ connection interface

20‧‧‧超管理器 20‧‧‧ Hyper Manager

20v‧‧‧虛擬化支援機構 20v‧‧‧Virtualization Support Agency

21‧‧‧非保全OS 21‧‧‧ Non-Security OS

21a~21d‧‧‧功能OS 21a ~ 21d‧‧‧Function OS

22‧‧‧保全OS 22‧‧‧Security OS

30‧‧‧常規AI 30‧‧‧ conventional AI

38‧‧‧應答之失敗與成功的單元 38‧‧‧ Response Failure and Success Unit

39‧‧‧個人資料庫的單元 39‧‧‧ Unit of Personal Database

41~44、51~55‧‧‧功能模組 41 ~ 44, 51 ~ 55‧‧‧Function modules

41a‧‧‧聲音合成/對話代理 41a‧‧‧Sound Synthesis / Conversation Agent

41b‧‧‧聲音辨識功能 41b‧‧‧Voice recognition function

41c‧‧‧聲音對話平台 41c‧‧‧Voice dialogue platform

43a‧‧‧商店應用程式 43a‧‧‧ Store App

43b‧‧‧網路服務 43b‧‧‧Internet Services

43c‧‧‧編製應用程式 43c‧‧‧Programming

47‧‧‧非保全App 47‧‧‧ Non-Security App

49b‧‧‧導航系統 49b‧‧‧navigation system

49c‧‧‧安全系系統 49c‧‧‧security system

49d‧‧‧先進運作支援系統 49d‧‧‧Advanced Operation Support System

50‧‧‧保全AI 50‧‧‧Security AI

57‧‧‧保全App 57‧‧‧Security App

58‧‧‧動作異常之功能 58‧‧‧Function of abnormal movement

59‧‧‧監控功能 59‧‧‧Monitoring function

73‧‧‧家庭閘道器系統 73‧‧‧Home Gateway System

75‧‧‧車載閘道器 75‧‧‧Car gateway

80‧‧‧AI統合平台 80‧‧‧AI integration platform

81a~81d‧‧‧學習模組 81a ~ 81d‧‧‧Learning Module

81v、81x、81y‧‧‧引擎 81v, 81x, 81y‧‧‧ engines

82a~82d‧‧‧學習資料 82a ~ 82d‧‧‧Learning materials

83‧‧‧分離單元 83‧‧‧ separation unit

84‧‧‧聲音處理功能 84‧‧‧Sound processing function

85‧‧‧模組間通信單元 85‧‧‧ Inter-module communication unit

87a‧‧‧資料探勘 87a‧‧‧data exploration

87b‧‧‧資料叢集 87b‧‧‧ Data Cluster

87c‧‧‧網路檢索 87c‧‧‧Web Search

87d‧‧‧噪音濾波器 87d‧‧‧Noise Filter

87e‧‧‧任務代理 87e‧‧‧Mission Agent

87f‧‧‧言行履歷 87f‧‧‧CV

87g‧‧‧文型/語彙特徵分析 87g‧‧‧Type / vocabulary analysis

87h‧‧‧感測器I/F 87h‧‧‧Sensor I / F

88‧‧‧判斷單元 88‧‧‧judgment unit

89‧‧‧自律擴充單元 89‧‧‧ Self-discipline Expansion Unit

91‧‧‧初期學習 91‧‧‧Early Learning

92‧‧‧動態學習 92‧‧‧ Dynamic Learning

101‧‧‧主處理器單元 101‧‧‧ main processor unit

102‧‧‧圖形處理器單元 102‧‧‧Graphics Processor Unit

105‧‧‧電腦資源 105‧‧‧Computer Resources

圖1包含常規AI及保全AI的系統之方塊圖。 Figure 1 contains a block diagram of a conventional AI and security AI system.

圖2CPU及包含GPU的系統之方塊圖。 FIG. 2 is a block diagram of a CPU and a system including a GPU.

圖3顯示適用於個人輔助系統的例子之圖。 Figure 3 shows a diagram of an example applicable to a personal assistance system.

圖4顯示對應於不當的狀態之圖。 FIG. 4 shows a diagram corresponding to an inappropriate state.

圖5顯示適用於家庭閘道器系統的例子之圖。 FIG. 5 is a diagram showing an example applicable to a home gateway system.

圖6顯示AI統合平台之方塊圖。 Figure 6 shows a block diagram of an AI integration platform.

圖7深度學習之圖。 Figure 7 diagram of deep learning.

圖8顯示初期學習及動態學習之圖。 FIG. 8 shows a graph of initial learning and dynamic learning.

圖9顯示初期學習及動態學習的一例之圖。 FIG. 9 is a diagram showing an example of initial learning and dynamic learning.

圖10顯示初期學習及動態學習的其他例之圖。 FIG. 10 is a diagram showing another example of initial learning and dynamic learning.

圖11顯示初期學習及動態學習的其他例之圖。 FIG. 11 is a diagram showing another example of initial learning and dynamic learning.

圖12顯示利用對話的動態學習例之圖。 FIG. 12 shows an example of dynamic learning using dialogue.

圖13顯示聲音辨識的動態學習例之圖。 FIG. 13 shows a dynamic learning example of voice recognition.

圖1顯示具備2個人工智慧之系統的一例。此系統1係被裝入個人輔助終端,例如智慧型手機、筆記型電腦、家電製品、產業機械及自動車等之電腦系統,典型的是被裝入SoC(系統單晶片,system-on-chip)的系統。系統1包含:含有處理器單元11的硬體平台(HardWare flatform;H/W flatform)10;在其上運作的超管理器20;在超管理器20所提供之虛擬化環境運作的第1OS(非保全OS、非保全OS、泛用OS、多功能OS)21;及第2OS(保全OS)22。 Figure 1 shows an example of a system with two artificial intelligences. This system 1 is built into personal assistant terminals, such as computer systems for smart phones, notebook computers, home appliances, industrial machinery, and autos. It is typically loaded into a SoC (system-on-chip). system. The system 1 includes: a hardware platform (HardWare flatform; H / W flatform) 10 including a processor unit 11; a hypervisor 20 operating thereon; a first OS operating in a virtualized environment provided by the hypervisor 20 ( Non-secure OS, non-secure OS, general purpose OS, multi-function OS) 21; and 2nd OS (secure OS) 22.

處理器單元11雖提供複數個執行模式(執行環境),但本實施形態中,假想藉由在記憶體設定保全區域且禁止朝其保全區域存取之支援功能(記憶體保護功能)所實現的保全模式6、及保全等級低於保全模式6的低保全模式(以下稱為非保 全模式、非保全模式或常規模式)7等2個執行模式。在非保全模式7中禁止藉由處理器單元11的支援功能朝記憶體的保全區域存取。 Although the processor unit 11 provides a plurality of execution modes (execution environments), in this embodiment, it is supposed to be realized by a support function (memory protection function) that sets a security area in the memory and prohibits access to the security area. Security mode 6 and low security mode (hereinafter referred to as non-security) (Full mode, non-secure mode, or normal mode) 7 and 2 execution modes. In the non-security mode 7, access to the security area of the memory by the support function of the processor unit 11 is prohibited.

系統1具有:於保全模式6下操作之在保全OS22上是安全的但為於封閉的環境(Secure World,Closed World)8運作的被信賴的應用程式群(保全App)57;及在非保全模式7操作的多功能OS等之在非保全OS21之上是開放的但為於非保全的環境(Non-Secure World,Normal World,OpenWorld)9運作的客戶應用程式群(非保全App)47。 System 1 has: a trusted application group (security app) 57 that is safe on security OS 22 but operates in a secure environment (Secure World, Closed World) 8 operating in security mode 6; and in non-security The multi-function OS operating in mode 7 is a client application group (non-security app) 47 which is open on non-security OS 21 but operates for non-security environment (Non-Secure World, Normal World, OpenWorld) 9.

非保全App 47係包含:在多功能OS21之上運作的第1人工智慧模組(常規AI,前置AI,開放AI)30;及常規AI30所支援之各種的功能模組(application)41~44。保全App 57係包含:在封閉的環境的第2OS22運作的第2人工智慧模組(保全AI,後置AI,封閉AI)50;及保全AI50所支援之各種的功能模組(application)51~55。系統1亦可進一步具備與常規AI30獨立而在多功能OS21之上運作的功能模組,亦可進一步具備與保全AI50獨立而在保全OS22之上運作的功能模組。 The non-security app 47 series includes: the first artificial intelligence module (conventional AI, pre-AI, open AI) 30 operating on the multifunctional OS21; and various functional modules (application) 41 supported by the conventional AI30. 44. The security application 57 includes: the second artificial intelligence module (security AI, rear AI, closed AI) 50 that operates in the second OS22 in a closed environment; and various functional modules (applications) 51 supported by the security AI50. 55. System 1 may further be provided with a functional module that operates on the multifunctional OS21 independently from the conventional AI30, and may further be provided with a functional module that operates on the secure OS22 independently from the security AI50.

常規AI30所支援的功能模組係包含聲音處理功能41、畫像處理功能42、各種服務功能43及各種檢索功能44。聲音處理功能41係包含例如,聲音辨識、聲音合成及對話功能。畫像處理功能42係包含透過畫像的認證功能,例如包含顏面認證、周圍環境的辨識功能、室內外、場所、日夜等之辨識功能。服務功能43包含商店應用程式(Shop App)或網際網路等之開放的環境的網路連接服務。檢索功能44包含檢索此系統1所儲存的 資訊或經由網路檢索外部的資訊之功能。 The functional modules supported by the conventional AI 30 include a sound processing function 41, an image processing function 42, various service functions 43, and various search functions 44. The voice processing function 41 includes, for example, voice recognition, voice synthesis, and dialogue functions. The image processing function 42 includes an authentication function through an image, such as a face authentication, a recognition function of the surrounding environment, an indoor, outdoor, place, day and night recognition function. The service function 43 includes an Internet connection service in an open environment such as a shop app or the Internet. Retrieval function 44 includes retrieving Information or the function of retrieving external information via the network.

常規AI30所支援的功能模組及功能係不受上述所限定,再者,藉由個性化及/或定制,可增減功能模組數量及種類。為此,常規AI30含有:判斷針對使用者的應答之失敗與成功的單元38;及從開放的環境自動收集用以針對使用者的應答成功地引導之資料(資訊)而自動建構個人資料庫的單元39。 The function modules and functions supported by the conventional AI30 are not limited above. Furthermore, the number and type of function modules can be increased or decreased by personalization and / or customization. To this end, the conventional AI 30 includes: a unit 38 for judging the failure and success of the response to the user; and automatically collecting data (information) from an open environment to automatically guide the user's response to construct a personal database Unit 39.

保全AI50所支援的功能模組係包含:進行付款(結賬)的功能(付款功能單元)51;卡片資訊等之個人資料(個人資訊)及管理其他的秘密資訊或秘匿資訊(以下包含此等在內稱為秘匿資訊)的功能(單元)52;家庭內、車載、工廠內等之監視用,特別是,控制用以取得進行個人或其他保全(機密)管理較佳的資訊之感測器以取得資料的功能(單元)53;進行對設定在家庭內、車載、工廠內等的各種設備的開關等之控制,特別是進行對防止犯罪用的設備、保全或安全造成影響的設備之控制的功能(單元)54;及將秘匿資訊加密化的功能(單元)55。 The functional modules supported by the security AI50 include: the function of making payment (checkout) (payment function unit) 51; personal information such as card information (personal information) and management of other secret information or secret information (the following includes Function (unit) 52 for secret information); for monitoring in homes, vehicles, factories, etc., in particular, to control sensors for obtaining better information for personal or other security (confidential) management to Function (unit) 53 for obtaining data; control of switches and the like of various devices installed in homes, vehicles, factories, etc., especially control of devices for preventing crimes, devices that affect security or safety A function (unit) 54; and a function (unit) 55 that encrypts the secret information.

超管理器20的一例,係與控制朝記憶體的保全區域(Secure Area)之寫入的支援機構相對應的超管理器且係為本案申請人所提供的FOXvisor。其他的一例,係對應於支援機構且具備後述的機械學習間通信功能之超管理器且係申請人所提供的VAIOX。此等係裸金屬(bare metal)類型(類型I)的超管理器。 An example of the hypervisor 20 is a hypervisor corresponding to a support organization that controls writing to a secure area of a memory and is a FOXvisor provided by the applicant of the present application. The other example is a hypervisor corresponding to a support organization and having a communication function between mechanical learning described later, and a VAIOX provided by the applicant. These are bare metal type (type I) hypervisors.

如圖1所示,VAIOX20係可使用處理器(處理器單元)11所具有作為硬體的支援機構12將複數個OS分離。支援機 構12為,在安裝有ARM系的IP之處理器中可使用信賴的區域(Trust Zone,以下稱為TZ機構),在安裝有MIPS系的IP之處理器中可使用VZ機構,在英特爾系的處理器中可使用VT機構。支援機構12亦可以是虛擬化擴充功能,在安裝有ARM系的IP之處理器中可例舉虛擬化擴展(Virtualization Extension)及LPAE(大物理擴展;Large Physical Address Extension)。例如,在TZ機構12中,可分離非保全的環境的記憶體空間12a與封閉的環境的記憶體空間12b,或可分離對此等的記憶體空間12a及12b之存取,可建構從非保全的環境看不見封閉的環境的記憶體空間12b而無法存取(禁止存取)的環境。 As shown in FIG. 1, the VAIOX 20 series can use a processor (processor unit) 11 as a hardware support mechanism 12 to separate a plurality of OSs. Support machine Structure 12 is such that a Trust Zone (hereinafter referred to as TZ mechanism) can be used in a processor with ARM-based IP, and a VZ mechanism can be used in a processor with MIPS-based IP. VT mechanism can be used in the processor. The support organization 12 may also be a virtualized extension function, and a processor with an ARM-based IP may be exemplified by a Virtualization Extension and a LPAE (Large Physical Address Extension). For example, in the TZ mechanism 12, the memory space 12a of a non-secure environment can be separated from the memory space 12b of a closed environment, or the access to these memory spaces 12a and 12b can be separated, and a non-secure environment can be constructed. The protected environment is an environment in which the memory space 12b of the closed environment cannot be seen and cannot be accessed (access is prohibited).

因此,VAIOX20是作為強固的防火牆發揮功能,設為可在非保全的環境的常規AI30與封閉的環境的保全AI50被分離的狀態下運作。一方面,保全AI50在保護封閉的環境的記憶體空間12b的覆寫之狀態下,不僅記憶體空間12b,包含非保全的環境的記憶體空間12a在內亦可進行輸入輸出。因此,保全AI50係成為可監視常規AI30的輸入輸出,對常規AI30提供資訊。本例的保全AI50含有監控常規AI30的動作之監控功能59。監控功能59含有監視常規AI30的動作異常之功能58。常規AI30係包含監視在非保全的環境9運作之應用程式群47的各功能模組的異常之功能。因此,藉由監視常規AI30的動作之異常,在非保全的環境9,可確實地監視功能模組是因何種原因而動作異常,可防止其所導致受害的發生於未然或止於最小限度。異常的發生,例如已知異常偵測、預測分析、預兆監視等,不僅是藉由組合此等技法與機械學習所預先規定的異常,亦能以高的 機率偵測未預測之異常的發生。 Therefore, VAIOX20 functions as a sturdy firewall, and is designed to operate in a state where the conventional AI30 in a non-secure environment and the security AI50 in a closed environment are separated. On the one hand, in the state of overwriting of the memory space 12b that protects the closed environment, the security AI50 can perform input and output not only to the memory space 12b but also to the memory space 12a of the non-secure environment. Therefore, the security AI50 series can monitor the input and output of conventional AI30 and provide information to conventional AI30. The security AI50 in this example includes a monitoring function 59 that monitors the operation of the conventional AI30. The monitoring function 59 includes a function 58 for monitoring abnormal operation of the conventional AI 30. The conventional AI 30 includes a function of monitoring an abnormality of each functional module of the application group 47 operating in the non-secure environment 9. Therefore, by monitoring the abnormal operation of the conventional AI30, in a non-secure environment 9, it is possible to reliably monitor the cause of the function module for abnormal operation, and prevent the damage caused by it from happening to the minimum or to a minimum. . The occurrence of anomalies, such as known anomaly detection, predictive analysis, and omen monitoring, is not only by combining the anomalies pre-defined by these techniques and mechanical learning, but also by Probability of detecting unforeseen occurrences.

硬體平台10包含記憶體13,記憶體13包含在開放(常規,Normal、非保全,Non-Secure)的環境使用的記憶體13a及僅在保全的環境使用的記憶體13b。硬體平台10更包含在開放的環境(Non-Secure World)9使用的各種介面,例如利用視覺/聽覺等的使用者介面14、透過各式各樣的通信規格連接於網際網路等之開放網路的網路介面(第1網路介面)15、及與可在開放的環境使用的外部設備連接的連接介面16等。 The hardware platform 10 includes a memory 13. The memory 13 includes a memory 13 a used in an open (normal, normal, non-secure, non-secure) environment, and a memory 13 b used only in a secured environment. The hardware platform 10 also includes various interfaces used in an open environment (Non-Secure World) 9, such as the use of visual / audible user interfaces 14, and the open connection to the Internet through various communication specifications. A network interface (first network interface) 15 of the network, and a connection interface 16 connected to an external device that can be used in an open environment.

硬體平台10又包含在封閉的環境(Secure World)8使用的各種介面,例如與家庭內LAN、車載LAN等之封閉的網路連接的網路介面(第2網路介面)17、及與可在封閉的環境使用的外部設備連接的連接介面18等。 The hardware platform 10 also includes various interfaces used in a closed environment (Secure World) 8, such as a network interface (second network interface) 17 for closed network connections in a home LAN, a car LAN, and the like, and A connection interface 18 for connecting external devices that can be used in a closed environment.

超管理器的VAIOX20是藉由將記憶體13及介面14~18的連接及控制分別分配給多功能OS21及保全OS22,將開放的環境9與封閉的環境8建構在系統1之中,常規AI30及保全AI50係分別在開放的環境與封閉的環境運作。 The super manager's VAIOX20 allocates the connection and control of the memory 13 and the interfaces 14 to 18 to the multifunctional OS21 and the security OS22, respectively. The open environment 9 and the closed environment 8 are built into the system 1. Conventional AI30 And the security AI50 series operate in an open environment and a closed environment, respectively.

常規AI30係一般利用的AI,處理即便被攻佔損傷亦少的物(資訊)。例如,常規AI30係辨識使用者的語言或舉動,所辨識的內容是網路服務的情況則連繫雲端側。常規AI30係作為通常的網路服務的支援、顧問發揮功能,提供與天候、飲食關連、資訊檢索關連等大量且隨時變化的資訊且應係使用者在不同時間的要求之資訊。又,常規AI30係進行第三方所提供的功能模組之控制。例如,可例舉隨選視訊等之映像內容或服務、網路購物系功能模組。 Conventional AI30 is an AI that is generally used to deal with objects that have little damage even if they are captured (information). For example, the conventional AI30 recognizes the user's language or behavior, and when the recognized content is an Internet service, it is connected to the cloud side. The conventional AI30 functions as a support and consultant for ordinary Internet services, providing a large amount of information that is constantly changing, such as weather, diet, and information retrieval, and should be requested by users at different times. In addition, the conventional AI30 controls the function modules provided by third parties. For example, video content or services such as video-on-demand, and online shopping function modules can be cited.

一方面,保全AI50係處理作為閘道器被攻佔損傷大的物(資訊)。例如,保全AI50係進行依據家庭內的設備控制(感測器53或開關54等之控制)、使用者個人資料(Lifelog,例如行動履歷、控制設備的舉動或使用者的言行、購入履歷)52及使用者個人資料的個人服務。保全AI50更包含進行計費/購物等信用卡的資料之處理或履歷管理等之個人資訊(秘匿資訊)的儲存及管理,將其等在向常規AI30遞交資料之際予以加密化之功能55。再者,保全AI50包含監視常規AI30的功能58,藉由偵測對於使用者行動等未有附帶條件的攻擊等,判斷是否與通常的舉動不同,以監視常規AI30有無被攻佔。 On the one hand, the security AI50 series deals with objects that have been damaged as gateways (information). For example, the security AI50 is based on device control in the home (control by sensor 53 or switch 54), user personal data (Lifelog, such as action history, control device actions or user behavior, purchase history) 52 And personal services of user profiles. The security AI50 also includes the function of processing personal credit card information such as billing / shopping or the management and management of personal information (secret information) such as resume management, and encrypting it when submitting data to the conventional AI3055. In addition, the security AI50 includes a function 58 of monitoring the conventional AI30, and detects whether there is an unconditional attack on user actions and the like to determine whether it is different from the normal behavior to monitor whether the conventional AI30 is captured.

超管理器(VAIOX)20係仲介常規AI30及保全AI50之間的通信,擔保僅透過開發者所設定的介面可進行資料的遞交之構成。本例中,利用硬體的虛擬化技術(Hardware Virtualization)抑制朝向保全AI50側之不當存取。 The Super Manager (VAIOX) 20 is used to communicate between the conventional AI30 and the security AI50, and guarantees that the data can be submitted only through the interface set by the developer. In this example, hardware virtualization technology is used to suppress improper access to the security AI50 side.

圖2顯示作為系統1的一例之包含具備有支援GPGPU(利用GPU的泛用計算,General Purpose computing on Graphics processing units)的虛擬化支援機構20v之超管理器20的系統之概略構成。假設以車載設備作為主要適用端的SoC(系統單晶片,system-on-chip)的處理器單元11包含:作為硬體平台的複數個CPU(主處理器單元)101;GPU(圖形處理器單元)102;及含有受其等所控制的網路介面裝置等之其他的功能(單元)之電腦資源105。 FIG. 2 shows a schematic configuration of a system including a hypervisor 20 including a virtualization support mechanism 20v that supports GPGPU (General Purpose Computing on Graphics processing units) as an example of the system 1. Assume that the processor unit 11 of the SoC (system-on-chip) with the in-vehicle equipment as the main applicable end includes: a plurality of CPUs (main processor units) 101 as a hardware platform; GPUs (graphics processor units) 102; and a computer resource 105 containing other functions (units) such as a network interface device controlled by them.

導航系統49b等之IVI(車載資訊設備,In Vehicle Infotainment)亦多有連接於廣域網路的情形,使用像Linux(註 冊商標)、Android(安卓)的多功能OS(Rich OS)21b以建構成系統。圖示計等之安全系系統49c係使用功能安全經認證之輕量且精簡的RTOS(即時作業系統;Real-Time OS)21c來構成系統。RTOS21c係適應於和多功能OS完全不同用途的OS(作業系統),除了CPU101以外,進行圖形的顯示之部分,係使用GPU102等,與在多功能OS上運作的畫像系的App有類似之處。然而,安全系系統49c因為功能安全很重要,所以不會讓其等在多功能OS上動作。 IVI (In Vehicle Infotainment) systems such as the navigation system 49b are often connected to a wide area network. (Registered trademark), Android (Rich OS) 21b to build a system. The graphic system 49c is a system that uses a lightweight and simplified RTOS (Real-Time OS) 21c certified for functional safety. RTOS21c is an OS (operating system) that is completely different from the multifunctional OS. Except for the CPU101, the graphics display part uses GPU102, etc., and is similar to the portrait-based app that operates on the multifunctional OS. . However, since the safety system 49c is important for functional safety, it will not be allowed to operate on the multifunctional OS.

像ADAS(先進運作支援系統,Advanced Driver Assistance System)49d之類的運作支援系系統,係在多功能OS21d上運作,有即時處理從外部相機輸入之大量的資料之必要,除了CPU101以外,為了進行畫像辨識之計算而使用GPU102。常規AI30亦在多功能OS21a之上運作,除了CPU101以外,為了畫像辨識或高速處理以可使用GPU102者較理想。 Operation support systems such as ADAS (Advanced Driver Assistance System) 49d operate on the multifunctional OS21d. It is necessary to process a large amount of data input from an external camera in real time. In addition to the CPU101, in order to perform GPU 102 is used for image recognition calculation. The conventional AI30 also operates on the multi-functional OS21a. In addition to the CPU101, it is ideal for GPU102 for image recognition or high-speed processing.

對於在不同的OS21a~21d上動作的系統或功能模組30、49b~49d,超管理器20的虛擬化支援功能20v係透過將CPU101及GPU102虛擬化,作成將含有CPU101及GPU102的資源可在各個OS21a~21d所管理的狀態下使用,且作成可利用來自於複數來賓(application)的GPGPU。 For systems or function modules 30, 49b to 49d that operate on different OS21a to 21d, the hypervisor 20's virtualization support function 20v is created by virtualizing CPU101 and GPU102, and the resources containing CPU101 and GPU102 can be used in Each of the OSs 21a to 21d is used in a managed state, and a GPGPU from a plurality of applications can be used.

超管理器20包含切換保全模式6與非保全模式7的功能,在保全模式6中,就本例而言,藉由將CPU101虛擬化/準虛擬化而作為資源分配,在保全OS22之上使保全AI50或保全App 57運作。在保全模式6中,不僅CPU101亦可將GPU102作為資源分配予保全OS22。 The hypervisor 20 includes a function for switching between the security mode 6 and the non-security mode 7. In the security mode 6, for this example, the CPU 101 is virtualized / para-virtualized as a resource allocation. Security AI50 or Security App 57 operates. In the security mode 6, not only the CPU 101 but also the GPU 102 may be allocated as a resource to the security OS 22.

圖3顯示將具備常規AI30及保全AI50的系統1安裝於個人輔助裝置,例如智慧型手機71的例子。常規AI30係藉由是使用者介面的聲音辨識功能41b來辨識使用者2的發話,藉由聲音合成/對話代理41a朝使用者2提供資訊而與使用者2進行會話。保全AI50係經由VAIOX20藉由監控功能59監視(Watching)會話內容,監視常規AI30的行動,並針對會話內容自律地判斷保全AI50側之處理是否必要。 FIG. 3 shows an example in which the system 1 having the conventional AI30 and the security AI50 is installed on a personal assistant device, such as a smartphone 71. The conventional AI30 recognizes the speech of the user 2 by using the voice recognition function 41b of the user interface, and provides a conversation with the user 2 by providing information to the user 2 through a voice synthesis / conversation agent 41a. The security AI50 monitors the content of the conversation through the VAIOX 20 through the monitoring function 59, monitors the actions of the conventional AI30, and autonomously judges whether the processing on the security AI50 side is necessary for the content of the conversation.

例如,當使用者2與常規AI30的會話中決定要購入商品「XX」時,保全AI50係藉由監視其會話,辨識為依使用者2的正常的(意圖的)判斷將購入商品「XX」。在常規AI30中,將經聲音辨識的會話的內容變換成文字指令,轉送到商店應用程式43a,商店應用程式43a係使用網路連接功能向雲端服務5存取而進行商品「XX」之購入。在那時,當對於商店應用程式43a需要信用卡資料、比特幣資料或其認證資料等時,於保全AI50,從儲存於個人資料52所管理的保全區域的記憶體13b之秘匿資訊中,付款功能51抽出購入所需的資訊(結賬用的資訊),加密化功能55進行加密化並寫入常規AI30可存取的非保全區域的記憶體13a。 For example, when the user 2 decides to purchase the product "XX" in the conversation with the conventional AI30, the security AI50 recognizes that it will purchase the product "XX" according to the normal (intentional) judgment of the user 2 by monitoring its conversation . In the conventional AI30, the content of the voice-recognized conversation is converted into a text command and transferred to the store application 43a. The store application 43a uses the network connection function to access the cloud service 5 to purchase the product "XX". At that time, when credit card information, bitcoin information, or its authentication information is required for the store application 43a, in the security AI50, the payment function is stored from the secret information of the memory 13b stored in the security area managed by the personal data 52. 51 extracts the information required for purchase (information for checkout), and the encryption function 55 encrypts it and writes it into the memory 13a of the non-secure area accessible by the conventional AI 30.

商店應用程式43a或常規AI30係無需意識保全AI50的動作。商店應用程式43a或常規AI30為,於記憶體13a,保全AI50使用自律地準備的加密化之結賬用的資訊,進行購入商品「XX」的結賬,將其資訊(購入資訊)寫入記憶體13a。保全AI50係需要將購入資訊的記錄保持在保全區域,監視使用者2與常規AI30之交易的結果,當判斷其動作無不當且購入資訊是安 全時,將購入資訊取入並追加到個人資料52。因此,常規AI30係可在未意識到保全AI50之存在下,使用已自動準備的結賬用資訊進到購入處理。 The store application 43a or the conventional AI30 series does not need to be aware of the movement of the AI50. The store application 43a or the conventional AI30 is to use the encrypted checkout information prepared by the AI50 in the memory 13a, to check out the purchased product "XX", and write the information (purchase information) into the memory 13a. . Security AI50 needs to keep the record of purchase information in the security area, monitor the results of transactions between User 2 and conventional AI30, and judge that its actions are not inappropriate and the purchase information is safe. At all times, purchase information is fetched and added to the profile 52. Therefore, the conventional AI30 series can use the information that has been automatically prepared to enter the purchase process without realizing the existence of the security AI50.

圖4顯示有從室外(外部)向智慧型手機71進行不當存取的情況。在常規AI30未注意到經由網路服務43b入侵的不當存取下,不當存取已拴住商店應用程式43a。保全AI50係監視與使用者2的會話,再監視網路服務43b的通信內容,藉此能辨識不當存取正在發生的可能性高。再者,在保全AI50監視商店應用程式43a的舉動且和使用者2的會話內容不一致的情況,不準備結賬用的資訊。因此,常規AI30係由於沒有結賬用的資訊,所以無法推進到購入處理,可向使用者2通知異常。保全AI50在使用者2與常規AI30之間的購入被確認以前,不會準備結賬用的資訊。藉由保全AI50的此動作,可防止因不當存取而使得常規AI30不預期地發起行動,同時可防止卡片資訊等之個人資訊外洩。 FIG. 4 shows a case where the smart phone 71 is accessed improperly from the outside (outside). In a case where the conventional AI 30 did not notice the improper access invaded via the web service 43b, the improper access has tied the store application 43a. The security AI50 monitors the conversation with the user 2 and then monitors the communication content of the network service 43b, so that it is possible to recognize that improper access is occurring. Furthermore, when the security AI50 monitors the behavior of the store application 43a and does not agree with the conversation content of the user 2, it does not prepare information for checkout. Therefore, conventional AI30 series cannot advance to the purchase process because there is no information for checkout, and the user 2 can be notified of the abnormality. The security AI50 will not prepare information for checkout until the purchase between User 2 and regular AI30 is confirmed. By maintaining this action of the AI50, it is possible to prevent the conventional AI30 from unintentionally initiating actions due to improper access, and to prevent personal information such as card information from leaking.

圖5顯示將具備常規AI30及保全AI50的系統1安裝在閘道器系統、例如家庭閘道器系統(家庭閘道器)73的例子。此家庭閘道器73包含:連接於常規AI(第1人工智慧模組)30的使用者介面41(41b);及連接於保全AI(第2人工智慧模組)50的家庭內LAN及/或設備控制介面(切換功能)54。 FIG. 5 shows an example in which a system 1 including a conventional AI30 and a security AI50 is installed in a gateway system, such as a home gateway system (home gateway) 73. This home gateway 73 includes: a user interface 41 (41b) connected to a conventional AI (first artificial intelligence module) 30; and a home LAN connected to a security AI (second artificial intelligence module) 50 and / Or device control interface (switching function) 54.

在家庭閘道器73中,常規AI30係藉由是使用者介面的聲音辨識功能41b來辨識使用者2的發話,例如說出「希望涼爽點」之類的話,將發話內容變換成文字指令,將切換寫入於要指示的非保全區域的記憶體13a。保全AI50係透過VAIOX20及 監控功能59監視會話,若被寫入記憶體13a的切換指示之資訊與會話一致,則依據其指示控制切換功能54,使非保全的區域的編製應用程式43c驅動,進行例如空調機4等家電之開關或調整。 In the home gateway 73, the conventional AI30 recognizes the utterance of the user 2 by using the voice recognition function 41b of the user interface, for example, saying "hope to be cool", and transforming the content of the utterance into a text command. The switch is written in the memory 13a of the non-secure area to be designated. Security AI50 series via VAIOX20 and The monitoring function 59 monitors the session. If the information written in the switching instruction of the memory 13a is consistent with the session, the switching function 54 is controlled according to the instruction to drive the programming application 43c in the non-secure area to perform appliances such as the air conditioner 4. Switch or adjust.

若被寫入記憶體13a的切換指示之資訊與會話矛盾,則保全AI50係無視於被寫入記憶體13a的切換指示,在未控制切換功能54下不進行例如空調機4等家電之開關或調整。保全AI50係監視與使用者2的會話,防止常規AI30的不當利用。此外,保全AI50可監視過去事例、人類的行動原理外的動作以進行對策。又,保全AI50亦可進一步具備:當從常規AI30反覆不可能的設定或異常的指令時,則關閉切換功能54以停止家電的動作,直到由使用者2指示進行再設定為止的功能。 If the information of the switching instruction written in the memory 13a conflicts with the conversation, the security AI50 ignores the switching instruction written in the memory 13a and does not switch on or off appliances such as the air conditioner 4 without controlling the switching function 54 Adjustment. The security AI50 monitors the conversation with the user 2 to prevent improper use of the conventional AI30. In addition, the security AI50 can monitor past cases and actions outside the principle of human action for countermeasures. In addition, the security AI 50 may further include a function of turning off the switching function 54 to stop the operation of the home appliance when the setting or an abnormal command from the conventional AI 30 is repeated, until the user 2 instructs to perform the setting again.

保全AI50係藉由VAIOX20,使用硬體的虛擬化技術,例如信賴的區域等以阻斷來自於常規區域的入侵。因此,雖會監視常規AI30的動作,但是在與常規AI30同樣地不被不當入侵、不受常規AI30的異常動作所影響下,監視常規AI30的動作,在常規AI30正常的情況係自律地進行實現常規AI30的意圖之動作,在常規AI30異常的情況,係無視於常規AI30的意圖或自律地進行將常規AI30之異常的意圖予以正常化的處理。 Security AI50 uses VAIOX20 to use hardware virtualization technology, such as trusted areas, to block intrusions from conventional areas. Therefore, although the actions of the conventional AI30 will be monitored, the actions of the conventional AI30 will be monitored in the same manner as the conventional AI30 without being improperly invaded and affected by the abnormal actions of the conventional AI30, and will be implemented autonomously when the conventional AI30 is normal The intentional action of the conventional AI30, in the case of the abnormality of the conventional AI30, is to ignore the intention of the conventional AI30 or to self-discipline to normalize the abnormal intention of the conventional AI30.

有從室外的外部終端,例如智慧型手機3對家庭閘道器73輸入指示(操作)的情況。保全AI50,透過網路服務43b監視來自於智慧型手機3的通信,若其通信為透過VPN等之保全經擔保的路徑而接收者,則辨識成係為正常的指示並許可智慧型手機3操作家電。若來自於智慧型手機3的通信為經由非保全的路徑而接收者,則透過無視於來自智慧型手機3的指示而阻止 經由家庭閘道器73的不當存取。 There is a case where an instruction (operation) is input to the home gateway 73 from an external external terminal such as the smartphone 3. The security AI50 monitors the communication from the smartphone 3 through the network service 43b. If the communication is received through a secured path such as a VPN, it is recognized as a normal instruction and the smartphone 3 is permitted to operate Appliances. If the communication from the smartphone 3 is received via a non-secure path, it is blocked by ignoring the instructions from the smartphone 3 Improper access via home gateway 73.

可提供具備與此家庭閘道器73的構成共通之構成的車載閘道器或IoT閘道器。車載閘道器的情況係具有:被控制或連接於常規AI30的使用者介面;及被控制或連接於保全AI50的車載LAN及/或設備控制介面。常規AI30亦可具備包含網路連接在內的多種多樣的介面。 An on-vehicle gateway or an IoT gateway having a configuration common to the configuration of the home gateway 73 can be provided. The on-board gateway has a user interface that is controlled or connected to the conventional AI30, and a vehicle LAN and / or device control interface that is controlled or connected to the security AI50. Conventional AI30 can also have a variety of interfaces including network connection.

IoT閘道器的情況,係包含被控制或連接於常規AI30的網際網路介面、及被控制或連接於保全AI50的工廠內LAN及/或設備介面,可將從工廠內LAN等所獲得之資訊以保全的格式,經由常規AI30及網際網路供予收集中心。又,保全AI50係可僅將從收集中心以保全的格式取得的資訊取入包含工廠內LAN的封閉的環境。 The IoT gateway includes an Internet interface controlled or connected to a conventional AI30, and a factory LAN and / or device interface controlled or connected to a security AI50. It can be obtained from the factory LAN, etc. The information is provided to the collection center via a conventional AI30 and the Internet in a secure format. In addition, the security AI50 series can take only the information obtained from the collection center in a security format into a closed environment including the LAN in the factory.

常規AI30及保全AI50只要是可進行學習,推論及判斷的電腦系統(軟體)即可,類型不拘。人工智慧的體系化有很多種,例如亦可為包含決策樹、歸納邏輯編程(ILP)、強化學習、貝氏網路(BN)、支持向量機(SVM)等的資料/知識型AI(線形型),亦可為包含神經網路(NL)、深度神經網路(DNN)的腦型AI,亦可為使用模糊演算、基因演算、改良式演算者,亦可為使用深層學習(Deep Learining)的技術使其等改良者。 The conventional AI30 and security AI50 are not limited as long as they are computer systems (software) that can learn, reason and judge. There are many types of artificial intelligence system.For example, it can also be data / knowledge AI (linear) including decision tree, inductive logic programming (ILP), reinforcement learning, Bayesian network (BN), support vector machine (SVM), etc. Type), can also be a brain-type AI including neural network (NL), deep neural network (DNN), or use fuzzy calculus, gene calculus, improved calculus, or use deep learning (Deep Learining ) Technology makes it wait for the innovators.

圖6顯示在常規AI30採用本案申請人所提供之機械學習統合平台(VAIOLIN平台,AI統合平台)80的例子。此外,以下所謂的機械學習(ML),係指包含用以發揮作為人工智慧的功能所提案或提倡之各種技術、架構者。此AI統合平台80係能使複數個ML有助於1個AI30的學習、推論及判斷,進而,搭 載適合於各式各樣問題的不同類型的ML並予以統合。 FIG. 6 shows an example of using a mechanical learning integrated platform (VAIOLIN platform, AI integrated platform) 80 provided by the applicant in the conventional AI30. In addition, the following so-called machine learning (ML) refers to those who include various technologies and architectures proposed or promoted to exert their functions as artificial intelligence. This AI integration platform 80 series can enable multiple MLs to facilitate the learning, inference, and judgment of an AI 30, and then, Contain and integrate different types of ML suitable for a wide range of problems.

AI統合平台80包含:複數個機械學習模組81a~81d(要作為代表時係設為ML模組81);被用在各個的機械學習模組81a~81d之複數個機械學習資料82a~82d(要作為代表時係設為學習資料82);進行複數個機械學習模組(ML模組)81之間的通信的機械學習模組間通信單元(VAIOX)85(20);抑制複數個機械學習資料82a~82d的混合之分離單元(VAIOLET)83;是使用者介面的聲音處理功能84(41);判斷針對使用者的應答之失敗與成功的成否判斷單元88(38);及依成否判斷單元88的結果從網路(開放的環境)收集機械學習模組81及機械學習資料82而自動建構(自動產生)的自律擴充單元89(39)。模組間通信單元85(20)亦可僅在開放(非保全,Non-Secure)的空間控制ML模組81間的通信,如上述般,亦能以將非保全的空間與保全的空間分離,從保全的空間可監控非保全的空間之方式控制ML模組81間的通信。 The AI integration platform 80 includes: a plurality of mechanical learning modules 81a ~ 81d (to be represented as the ML module 81); a plurality of mechanical learning materials 82a ~ 82d used in each of the mechanical learning modules 81a ~ 81d (It should be set as the learning material 82 as the representative time); the mechanical learning module communication unit (VAIOX) 85 (20) that performs communication between multiple mechanical learning modules (ML modules) 81; suppresses multiple machines A mixed separation unit (VAIOLET) 83 of learning materials 82a-82d; a voice processing function 84 (41) of the user interface; a judgment unit 88 (38) for judging the failure and success of the user's response; The result of the determination unit 88 is an autonomous expansion unit 89 (39) that collects the mechanical learning module 81 and the mechanical learning data 82 from the network (open environment) and automatically constructs (automatically generates). The inter-module communication unit 85 (20) can also control the communication between the ML module 81 only in an open (non-secure) space. As described above, it can also separate the non-secure space from the secured space. The communication between the ML modules 81 is controlled in such a way that the non-secured space can be monitored from the preserved space.

例如,機械學習模組81a包含DNN、CNN及GSN等之各種神經網路,機械學習模組81b包含增強(Boosting)、DAE(降噪自動編碼器,Denoising Autoencoder)、知覺(Perception)等,機械學習模組81c包含SVM(支持向量機)、RF(隨機森林)、及GMM(高斯混合模型,Gaussian Mixture Model),機械學習模組81d包含貝氏模型(Bayes NP)、相乘加總網路、及DBN(深度置信網路,Deep Belief Network)。機械學習的手法不受此等所限定。 For example, the mechanical learning module 81a includes various neural networks such as DNN, CNN, and GSN, and the mechanical learning module 81b includes boosting, DAE (Denoising Autoencoder), perception, etc. The learning module 81c includes SVM (Support Vector Machine), RF (random forest), and GMM (Gaussian Mixture Model, Gaussian Mixture Model), and the mechanical learning module 81d includes Bayes model (Bayes NP), multiplication and summing network , And DBN (Deep Belief Network). The techniques of mechanical learning are not limited by these.

此外,括弧內的編號係顯示在參照圖1的系統1中執 行共通的功能之單元(模組)的編號。例如,超管理器20亦可具備作為進行複數個機械學習模組81間之通信的機械學習模組間通信單元85之功能,不僅是CPU、GPU及其他的電腦資源,亦可將複數個機械學習模組81虛擬化並分配成藉由AI統合平台80所提供的各種功能。 In addition, the numbers in parentheses are shown in the system 1 with reference to FIG. 1. Number of units (modules) that share common functions. For example, the hypervisor 20 may also have the function of a communication unit 85 between mechanical learning modules that performs communication between a plurality of mechanical learning modules 81. Not only the CPU, GPU, and other computer resources, but also a plurality of mechanical The learning module 81 is virtualized and assigned to various functions provided by the AI integration platform 80.

藉此AI統合平台(VIOLIN平台)80所能提供之功能的幾個例子為:含有存取解析/資料可視化/使用者模式建構的資料探勘87a;將各資料的屬性與特徵進行叢集/冷啟動(0資料)對應的屬性資料叢集87b;包含朝網路資料收集/ML與屬性資料叢集遞交資料之網路檢索87c;過濾在網路或言行學習產生的噪音之噪音濾波器87d;進行針對於使用者之任務執行的任務代理87e;從任務代理的結果記憶各使用者的履歷之言行履歷87f;針對新的語言形成混合文型/語彙模式並隨機地產生文句的文型/語彙特徵分析87g;及提供感測器等之物理介面的感測器I/F87h。 Some examples of the functions provided by the AI unified platform (VIOLIN platform) 80 are: data exploration 87a with access analysis / data visualization / user mode construction; clustering / cold start of the attributes and characteristics of each data (0 data) Corresponding attribute data cluster 87b; network retrieval 87c including data submission to network data collection / ML and attribute data cluster; noise filter 87d for filtering noise generated on the network or speech and behavior learning; Task agent 87e performed by the user's task; memorizing the history and speech history of each user from the result of the task agent; 87f; forming a mixed pattern / vocabulary pattern for a new language and randomly generating a pattern / vocabulary feature analysis of the sentence 87g; Sensor I / F87h, which provides a physical interface for sensors, etc.

圖7顯示深度學習的地圖(配置)。即便僅圖解了有關深度學習所提倡的機械學習模組(ML模組),但還是有適合於學習的深度、複雜的資訊處理之神經網路系、及適合於大量資料的處理之機率模式系等。AI統合平台80係可包含1個或多數個圖7所示的多種類的ML模組81。在AI統合平台80中,藉由ML間通信單元85(20),可統合多種多樣的ML模組81間之通信作為1個AI30發揮功能。相反地,作成藉由分離單元(VAIOLET)83分離各個ML模組81所建構的學習資料82,防止學習資料的損害(contami),使多數個ML模組81可發揮所期望的功能。因此,可組合適合作為個人輔助系統71、各種閘道器系統73等之常規 AI30來作為最佳的解決(solution)(ML模組)81。亦可使用AI統合平台80建構保全AI50。 Figure 7 shows a map (configuration) for deep learning. Even if only the machine learning module (ML module) advocated by deep learning is illustrated, there are still deep networks suitable for learning, a complex neural network processing system, and a probabilistic model system suitable for processing a large amount of data. Wait. The AI integration platform 80 series may include one or a plurality of types of ML modules 81 shown in FIG. 7. In the AI integration platform 80, the communication between the various ML modules 81 can be integrated to function as one AI30 by the inter-ML communication unit 85 (20). Conversely, a learning unit 82 constructed by separating each ML module 81 by a separation unit (VAIOLET) 83 is prepared to prevent damage to the learning materials (contami), so that a plurality of ML modules 81 can perform desired functions. Therefore, it is possible to combine conventional routines suitable for personal assistance systems 71, various gateway systems 73, and the like. AI30 is the best solution (ML module) 81. The AI integration platform 80 can also be used to construct the security AI50.

此AI統合平台80係包含判斷針對使用者2的應答之失敗與成功的成否判斷單元88(38)及視需要追加新的ML模組81之自律擴充單元89(39),藉由失敗可加速個性化。 This AI integration platform 80 includes a success judgment unit 88 (38) for judging the failure and success of the response to the user 2 and an autonomous expansion unit 89 (39) for adding a new ML module 81 as needed, which can be accelerated by failure. personalise.

如圖8所示,此AI統合平台80係從基於教師資料的初期學習91來進行含有針對個人的學習之動態學習92,適合於提供改良的AI30。例如,具備AI統合平台80的AI30為,於初期學習91開始時(0歳)以最小的ML模組81啟動,藉由採用了教師資料的教育,取得基本的意圖推定、預測支援、任務代理、自律學習的功能。之後,於動態學習92,依據在使用者2之下進行動作,成否判斷單元88判斷針對使用者2的應答之失敗與成功,藉由失敗,自律擴充單元89視需要追加新的ML模組81而可加速個性化。特別是,不受限於初期的ML模組81的特性,藉由追加特性相異的ML模組81,能提供更靈活且可個性化的AI30。 As shown in FIG. 8, the AI integration platform 80 performs dynamic learning 92 including individual learning from the initial learning 91 based on teacher data, which is suitable for providing improved AI 30. For example, the AI30 equipped with the AI integration platform 80 is started with the smallest ML module 81 at the beginning of the initial learning 91 (0 歳), and obtains basic intention estimation, prediction support, and task agency through education using teacher materials. , The function of self-discipline learning. After that, in the dynamic learning 92, based on the actions performed under the user 2, the success / failure judgment unit 88 judges the failure and success of the response to the user 2. With the failure, the autonomous expansion unit 89 adds a new ML module 81 as necessary. It can speed up personalization. In particular, it is not limited to the characteristics of the initial ML module 81. By adding an ML module 81 having different characteristics, it is possible to provide a more flexible and personalized AI30.

圖9顯示搭載著含有AI30及50的系統1之車載閘道器75的一例。此車載閘道器75包含進行自動判別,進一步判別使用者視點的正確答案之功能。AI統合平台80的成否判斷單元88將失敗與正確答案予以資料化並作判斷,自律擴充單元89將其結果向系統1反映,使AI30的基本性能大大提升。特別是,此系統1係晶片搭載的系統,藉由在AI統合平台80組合ML模組81與學習資料82,大幅地提升系統1在局部的環境單獨能發揮AI30的,性能。因此,在個別地擁有資訊的局部環境與集中地擁有資訊的中心,可個別地收集使用者的資訊,在網路連接環境差的狀 況亦可確實地輔助使用者2或使車載的設備正常地動作。 FIG. 9 shows an example of an on-vehicle gateway 75 on which the system 1 including AI 30 and 50 is mounted. The on-vehicle gateway 75 includes a function of automatically determining and further determining the correct answer of the user's viewpoint. The success / failure judgment unit 88 of the AI integration platform 80 documents failures and correct answers and makes a judgment, and the self-discipline expansion unit 89 reflects the results to the system 1, which greatly improves the basic performance of the AI 30. In particular, this system 1 is a chip-mounted system. By combining the ML module 81 and the learning materials 82 on the AI integration platform 80, the performance of the system 1 in the local environment alone can greatly improve the performance of AI30. Therefore, in the local environment where the information is individually held and the center where the information is centralized, the user's information can be collected individually. In some cases, the user 2 can be reliably assisted or the in-vehicle device can be normally operated.

圖10顯示在初期學習9中依據集體智能的基礎模式建構、及在動態學習92中依據個性化特徵量進行推薦。在初期學習91中,產生依據作為AI統合平台80的基礎構成的集體智能的基礎模式建構、及特徵空間的基礎模式。在動態學習92中,依個性化,於AI統合平台80進行個人特徵量的對應(mapping)與類型選擇模式的更新,而可作符合於個人的嗜好與行動的各種推薦。 FIG. 10 shows the basic mode construction based on collective intelligence in the initial learning 9 and the recommendation based on the personalized feature amount in the dynamic learning 92. In the initial learning 91, a basic mode construction based on collective intelligence, which is a basic structure of the AI integration platform 80, and a basic mode of feature space are generated. In the dynamic learning 92, according to personalization, the mapping of the individual characteristic quantities and the update of the type selection mode are performed on the AI integration platform 80, and various recommendations can be made according to personal preferences and actions.

圖11顯示從初期學習91中的巨量資料,於動態學習92進行個人特徵的定義之過程。此AI統合平台80中,可局部地產生學習資料82並發揮局部的性能。與此同時,以與伺服器之組合亦可進行複合的對應,於初期學習91進行朝向被儲存於伺服器側的巨量資料之存取,亦可於動態學習92中從巨量資料抽出個人資料而取得個人特徵。又,亦可因回避危險等之要因而從個性化將AI30的思考變更為一般輔助。例如,車載閘道器中,可將個性化的危險運作變更為一般輔助以回避危險、或以導航等之危險資訊為基礎變更為一般輔助。 FIG. 11 shows the process of defining personal characteristics in the dynamic learning 92 from the huge amount of data in the initial learning 91. In this AI integration platform 80, learning materials 82 can be locally generated and local performance can be exerted. At the same time, the combination with the server can also be used for composite correspondence. In the initial learning 91, access to the huge amount of data stored on the server side can be performed, and individuals can be extracted from the huge amount of data in the dynamic learning 92. Information to obtain personal characteristics. In addition, it is also possible to change the thinking of AI30 from generalization to general assistance to avoid danger and so on. For example, in an on-vehicle gateway, a personalized dangerous operation can be changed to general assistance to avoid danger, or based on dangerous information such as navigation to general assistance.

圖12顯示搭載有包含常規AI30及保全AI50的系統1之車載閘道器75藉聲音處理功能41的聲音對話平台41c和使用者2一邊會話,一邊學習使用者行動,自律地擴充AI統合平台80的構成,而且,以無法進行不當行為的方式使保全AI50監控常規AI30的處理之形態。 FIG. 12 shows that the on-vehicle gateway 75 of the system 1 including the conventional AI30 and the security AI50 borrows a voice dialogue platform 41c of the voice processing function 41 and talks with the user 2 while learning the user's actions, and autonomously expands the AI integration platform 80. In addition, in a manner that improper behavior cannot be performed, the security AI50 monitors the processing of the conventional AI30.

此對話平台41c係以收集在車內的使用者2說話的資訊為目的之聲音對話平台,收集使用者2在車內說話的內容,在 中心加以巨量資料化。對話平台41c係減少與使用者2說話的次數,用更短時間能提供目的之方式設定一問一答而實現與使用者之自然的對話之平台。對於對話所包含的內容(例:預約、購物、資訊引導等),實現滿足使用者需求的任務指向對話。而且藉由將閒談對話摻雜於任務指向對話而得以自然的交談。 This dialogue platform 41c is a voice dialogue platform for the purpose of collecting information of the user 2 speaking in the car, collecting the content of the user 2 speaking in the car, and The center has a huge amount of information. The dialogue platform 41c is a platform that reduces the number of times of talking with the user 2 and provides a question and answer in a manner that can provide a purpose in a shorter time to realize a natural dialogue with the user. Regarding the content contained in the dialogue (for example: reservation, shopping, information guidance, etc.), the task that meets the needs of users is directed to the dialogue. And natural conversations can be achieved by blending gossip conversations with task-oriented conversations.

此際,成否判斷單元88為成功引導針對於使用者2的對話,當判斷以搭載於現在的AI統合平台80的ML模組81是不足的情況,自律擴充單元89亦可從網際網路(雲端)等之開放的環境,自動收集用以成功引導對話的ML模組81及作為基礎的學習資料82,並安裝於AI統合平台80。例如,若在初期學習91未安裝有可針對於使用者2所表示興趣的領域之音樂的應答之ML模組81,則可在動態學習92安裝。亦可作成被安裝在此AI統合平台80的方式將預先準備有適合於各種領域的應答之ML模組81及使其ML模組81初期學習的學習資料82的儲存器設置於雲端,系統1視需要向儲存器存取而能擴充ML模組81。 At this time, the success / failure determination unit 88 is to successfully guide the dialogue for the user 2. When it is determined that the ML module 81 mounted on the current AI integration platform 80 is insufficient, the self-discipline expansion unit 89 may also be downloaded from the Internet ( Cloud) and other open environments, automatically collect the ML module 81 and the learning materials 82 as the basis for successfully guiding the dialogue, and install them on the AI integration platform 80. For example, if the ML module 81 that can respond to music in the area of interest expressed by the user 2 is not installed in the initial learning 91, the dynamic learning 92 may be installed. It is also possible to create a way to be installed on the AI integration platform 80, and set the storage of the ML module 81 suitable for various fields of response and the learning materials 82 for the initial learning of the ML module 81 in the cloud. System 1 The ML module 81 can be expanded by accessing the memory as needed.

對話平台41c為,藉閒談對話對應使用者所關心廣泛的興趣並伺機轉換為特定的任務指向對話,例如購物。相較於誘導,針對廣泛的主題提供自然的推薦是可預期的。 The dialogue platform 41c is to respond to a wide range of interests that the user cares about by means of a chat, and to turn into a specific task-oriented dialogue such as shopping. Compared to induction, providing natural recommendations for a wide range of topics is to be expected.

保全AI50係監控利用常規AI30的此等會話。經會話誘導的結果是購物時,保全AI50將其辨識,作成將購物必要的結賬資訊準備成保全的狀態,例如加密化,使得常規AI30可使用於購物。 Security AI50 monitors these sessions using conventional AI30. As a result of session induction, when shopping, the security AI50 recognizes it and prepares the necessary checkout information for shopping in a secured state, such as encryption, so that the conventional AI30 can be used for shopping.

ML模組81的變更或追加對聲音辨識之功能提升上亦有效。例如,如圖13所示,對於輸入聲音,在利用聲音辨識 的任務成功率低的情況,藉由成否判斷單元88及自律擴充單元89將初期被搭載於AI統合平台80的規則庫之意圖理解引擎81x變更為統計的意圖理解引擎81y,即便聲音辨識引擎81v的辨識正確率不變亦可提升任務的成功率。 The change or addition of the ML module 81 is also effective in improving the function of voice recognition. For example, as shown in FIG. 13, for input sound, voice recognition is being used In the case of a low task success rate, the intent understanding engine 81x initially installed on the rule base of the AI integration platform 80 is changed to a statistical intent understanding engine 81y by the success / failure determination unit 88 and the self-discipline expansion unit 89, even though the voice recognition engine 81v The same rate of correct identification can also improve the success rate of the task.

以上雖使用了含有常規AI30及保全AI50的系統1的幾個例子來說明本發明,但此等僅為例示,本發明不受此等所限定,可較佳地被使用在經由應用人工智慧(AI)或有AI支援的可能性之所有領域、功能模組、設備、終端、網路所提供的服務。 Although the above uses several examples of the system 1 containing conventional AI30 and security AI50 to illustrate the present invention, these are only examples, and the present invention is not limited by these, and can be preferably used in the application of artificial intelligence ( AI) or services provided by all areas, function modules, devices, terminals, and networks with the possibility of AI support.

1‧‧‧系統 1‧‧‧ system

6‧‧‧保全模式 6‧‧‧ Security Mode

7‧‧‧非保全模式 7‧‧‧ non-security mode

8‧‧‧封閉的環境 8‧‧‧ closed environment

9‧‧‧非保全的環境 9‧‧‧ Non-secure environment

10‧‧‧硬體平台 10‧‧‧hardware platform

11‧‧‧處理器單元 11‧‧‧ processor unit

12‧‧‧支援機構 12‧‧‧ Support Agency

12a、12b‧‧‧記憶體空間 12a, 12b‧‧‧Memory space

13、13a、13b‧‧‧記憶體 13, 13a, 13b‧‧‧Memory

14‧‧‧使用者介面 14‧‧‧user interface

15、17‧‧‧網路介面 15, 17‧‧‧ web interface

16、18‧‧‧連接介面 16, 18‧‧‧ connection interface

20‧‧‧超管理器 20‧‧‧ Hyper Manager

21‧‧‧非保全OS 21‧‧‧ Non-Security OS

22‧‧‧保全OS 22‧‧‧Security OS

30‧‧‧常規AI 30‧‧‧ conventional AI

38‧‧‧應答之失敗與成功的單元 38‧‧‧ Response Failure and Success Unit

39‧‧‧個人資料庫的單元 39‧‧‧ Unit of Personal Database

41~44、51~55‧‧‧功能模組 41 ~ 44, 51 ~ 55‧‧‧Function modules

50‧‧‧保全AI 50‧‧‧Security AI

57‧‧‧保全App 57‧‧‧Security App

58‧‧‧動作異常之功能 58‧‧‧Function of abnormal movement

59‧‧‧監控功能 59‧‧‧Monitoring function

Claims (15)

一種含人工智慧的系統,具有:第1人工智慧模組,含有輔助或自律地進行在開放的環境中之資訊交換的功能;及第2人工智慧模組,監控前述第1人工智慧模組的動作,在封閉的環境自律地進行伴隨著前述資訊交換的處理。 A system containing artificial intelligence, comprising: a first artificial intelligence module including a function of assisting or autonomously performing information exchange in an open environment; and a second artificial intelligence module that monitors the aforementioned first artificial intelligence module The operation voluntarily performs the process accompanied by the aforementioned information exchange in a closed environment. 如請求項1之含人工智慧的系統,其中前述開放的環境係包含使用者介面、用以朝開放網路服務連接的第1網路連接介面、及儲存在和前述使用者介面或第1網路連接介面之間進行交換的資訊之第1記憶體,前述封閉的環境係包含前述第1人工智慧模組無法存取的第2記憶體,前述第2人工智慧模組包含將是伴隨前述資訊交換而被要求的資訊且是已將儲存於前述第2記憶體的秘匿資訊加密化的資訊供予前述第1記憶體之功能。 For example, the artificial intelligence-containing system of claim 1, wherein the aforementioned open environment includes a user interface, a first network connection interface for connecting to an open network service, and stored in the aforementioned user interface or the first network The first memory for information exchanged between the connection interfaces. The closed environment includes the second memory that cannot be accessed by the first artificial intelligence module. The second artificial intelligence module contains information that will accompany the foregoing information. The information requested and exchanged is the function of encrypting the secret information stored in the aforementioned second memory to the aforementioned first memory. 如請求項2之含人工智慧的系統,其中前述封閉的環境係包含用以朝封閉網路服務連接的第2網路連接介面。 For example, the artificial intelligence-containing system of claim 2, wherein the closed environment includes a second network connection interface for connecting to a closed network service. 如請求項1至3中任一項之含人工智慧的系統,其中前述第2人工智慧模組係包含監視前述第1人工智慧模組的異常之功能。 For example, the artificial intelligence-containing system of any one of claims 1 to 3, wherein the second artificial intelligence module includes a function of monitoring the abnormality of the first artificial intelligence module. 如請求項1至4中任一項之含人工智慧的系統,其中具有:支援前述開放的環境之第1OS且是前述第1人工智慧模組運作之第1OS;及支援前述封閉的環境之第2OS且是前述第2人工智慧模組運作之第2OS。 For example, the artificial intelligence-containing system of any one of claims 1 to 4, which includes: the first OS supporting the aforementioned open environment and the first OS operating the aforementioned first artificial intelligence module; and the first OS supporting the aforementioned closed environment. 2OS is also the second OS operated by the aforementioned second artificial intelligence module. 如請求項5之含人工智慧的系統,其中具有:處理器單元,包含:含有保全區域和非保全區域的記憶體;及禁止朝前述保全區域存取之支援機構;及超管理器,在前述處理器單元上運作,前述超管理器包含:許可前述第2OS朝前述保全區域及前述非保全區域之存取且禁止朝前述開放的環境存取的機構;及許可前述第1OS對前述非保全區域及前述非保全裝置之存取且禁止使用前述支援機構朝前述保全區域存取的機構。 For example, the artificial intelligence-containing system of claim 5, which includes: a processor unit including: a memory containing a secured area and a non-secured area; and a support organization forbidding access to the aforementioned secured area; and a hypervisor, in the aforementioned Operated on a processor unit, the hypervisor includes: a mechanism that permits the second OS to access the secure area and the non-secure area and prohibits access to the open environment; and permits the first OS to the non-secure area. And the access to the aforementioned non-secure device, and the use of the aforementioned support mechanism to access to the aforementioned security area is prohibited. 如請求項6之含人工智慧的系統,其中前述處理器單元包含:至少1個主處理器單元;及至少1個圖形處理器單元,前述超管理器包含:前述至少1個主處理器單元及前述至少1個圖形處理器單元的虛擬化支援功能。 If the artificial intelligence-containing system of claim 6, wherein the aforementioned processor unit includes: at least one main processor unit; and at least one graphics processor unit, the hypervisor includes: the at least one main processor unit and The virtualization support function of the at least one graphics processor unit. 如請求項1至7中任一項之含人工智慧的系統,其中前述第1人工智慧模組包含:複數個機械學習模組;用在各個機械學習模組的複數個機械學習資料;進行前述複數個機械 學習模組之間的通信之機械學習模組間通信單元;及抑制前述複數個機械學習資料之混合的分離單元。 For example, a system containing artificial intelligence according to any one of claims 1 to 7, wherein the aforementioned first artificial intelligence module includes: a plurality of mechanical learning modules; a plurality of mechanical learning materials used in each mechanical learning module; and performing the foregoing Multiple machinery A communication unit between mechanical learning modules for communication between the learning modules; and a separate unit that suppresses the mixing of the aforementioned plurality of mechanical learning materials. 如請求項8之含人工智慧的系統,其中前述第1人工智慧模組包含:判斷針對使用者的應答之失敗與成功的單元;及從前述開放的環境自動收集用以將針對使用者的應答成功地引導之機械學習模組及機械學習資料並安裝於前述第1人工智慧模組之安裝單元。 For example, the artificial intelligence-containing system of claim 8, wherein the aforementioned first artificial intelligence module includes: a unit for judging the failure and success of the response to the user; and automatically collecting the response for the user from the aforementioned open environment The successfully guided mechanical learning module and mechanical learning data are installed in the installation unit of the aforementioned first artificial intelligence module. 如請求項1至8中任一項之含人工智慧的系統,其中前述第1人工智慧模組包含:判斷針對使用者的應答之失敗與成功的單元;及從前述開放的環境自動收集用以將針對使用者的應答成功地引導之資料而自動建構個人資料庫的單元。 For example, the artificial intelligence-containing system of any one of claims 1 to 8, wherein the aforementioned first artificial intelligence module includes: a unit for judging the failure and success of the response to the user; and automatically collecting and using the information from the aforementioned open environment for A unit of a personal database will be automatically constructed for the information successfully guided by the user's response. 如請求項1至10中任一項之含人工智慧的系統,其中具有:搭載有前述第1人工智慧模組及前述第2人工智慧模組的控制模組。 The artificial intelligence-containing system according to any one of claims 1 to 10, which includes a control module equipped with the aforementioned first artificial intelligence module and the aforementioned second artificial intelligence module. 如請求項1至11中任一項之含人工智慧的系統,其中該系統係含有連接於前述第1人工智慧模組的使用者介面之個人輔助系統。 The artificial intelligence-containing system according to any one of claims 1 to 11, wherein the system is a personal assistance system including a user interface connected to the aforementioned first artificial intelligence module. 如請求項1至11中任一項之含人工智慧的系統,其中該系統係家庭閘道器系統,其含有連接於前述第1人工智慧模組的使用者介面及連接於前述第2人工智慧模組的家庭內LAN及/或設備控制介面。 The artificial intelligence-containing system according to any one of claims 1 to 11, wherein the system is a home gateway system, which includes a user interface connected to the aforementioned first artificial intelligence module and an artificial intelligence connected to the aforementioned second artificial intelligence. Module's home LAN and / or device control interface. 如請求項1至11中任一項之含人工智慧的系統,其中該系統係車載閘道器系統,其含有連接於前述第1人工智慧模組的使用者介面及連接於前述第2人工智慧模組的車載LAN及/或設備控制介面。 The artificial intelligence-containing system according to any one of claims 1 to 11, wherein the system is an on-vehicle gateway system, which includes a user interface connected to the aforementioned first artificial intelligence module and connected to the aforementioned second artificial intelligence. Module's on-board LAN and / or device control interface. 如請求項1至11中任一項之含人工智慧的系統,其中該系統係IoT閘道器,其含有連接於前述第1人工智慧模組的網際網路介面及連接於前述第2人工智慧模組的工廠內LAN及/或設備介面。 The artificial intelligence-containing system according to any one of claims 1 to 11, wherein the system is an IoT gateway, which includes an Internet interface connected to the aforementioned first artificial intelligence module and an artificial interface connected to the aforementioned second artificial intelligence. Factory LAN and / or device interface of the module.
TW106122439A 2016-07-04 2017-07-04 System having artificial intelligence TW201802705A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2016132851 2016-07-04
JP2016-132851 2016-07-04

Publications (1)

Publication Number Publication Date
TW201802705A true TW201802705A (en) 2018-01-16

Family

ID=60912154

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106122439A TW201802705A (en) 2016-07-04 2017-07-04 System having artificial intelligence

Country Status (3)

Country Link
JP (3) JP6329331B1 (en)
TW (1) TW201802705A (en)
WO (1) WO2018008605A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020048879A1 (en) 2018-09-03 2020-03-12 Deutsches Zentrum für Luft- und Raumfahrt e.V. Arrangement and method for controlling a device
TWI708158B (en) * 2018-11-06 2020-10-21 國家中山科學研究院 Edge network information security detection and prevention system and method

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018008605A1 (en) * 2016-07-04 2018-01-11 株式会社Seltech System having artificial intelligence
US10972366B2 (en) * 2017-12-14 2021-04-06 International Business Machines Corporation Orchestration engine blueprint aspects for hybrid cloud composition
US10833962B2 (en) 2017-12-14 2020-11-10 International Business Machines Corporation Orchestration engine blueprint aspects for hybrid cloud composition
US11025511B2 (en) 2017-12-14 2021-06-01 International Business Machines Corporation Orchestration engine blueprint aspects for hybrid cloud composition
WO2019172943A1 (en) 2018-03-08 2019-09-12 Google Llc Mitigation of client device latency in rendering of remotely generated automated assistant content
JPWO2019181099A1 (en) * 2018-03-20 2021-03-18 ソニー株式会社 Information processing device and information processing method
KR102185369B1 (en) * 2018-03-28 2020-12-01 삼성전자주식회사 System and mehtod for generating information for conversation with user
US11443182B2 (en) * 2018-06-25 2022-09-13 International Business Machines Corporation Privacy enhancing deep learning cloud service using a trusted execution environment
US20200082279A1 (en) * 2018-09-11 2020-03-12 Synaptics Incorporated Neural network inferencing on protected data
JP2020052960A (en) * 2018-09-28 2020-04-02 株式会社デンソーテン Vehicle control device and vehicle control method
WO2020198542A1 (en) * 2019-03-26 2020-10-01 The Regents Of The University Of California Distributed privacy-preserving computing on protected data
US11372780B2 (en) 2019-05-30 2022-06-28 Synaptics Incorporated Granular access control for secure memory
JP7131498B2 (en) * 2019-07-09 2022-09-06 株式会社デンソー Arithmetic device and data transmission method
US11899765B2 (en) 2019-12-23 2024-02-13 Dts Inc. Dual-factor identification system and method with adaptive enrollment
JP2021105798A (en) * 2019-12-26 2021-07-26 パナソニックIpマネジメント株式会社 Artificial intelligence system
US11561704B2 (en) * 2019-12-27 2023-01-24 Seagate Technology Llc Artificial intelligence (AI) assisted anomaly detection of intrusion in storage systems
KR20210107288A (en) * 2020-02-24 2021-09-01 삼성전자주식회사 Electronic apparatus and control method thereof
JP7080922B2 (en) * 2020-05-21 2022-06-06 Necパーソナルコンピュータ株式会社 Network system, host device, and network control method
JP7413924B2 (en) 2020-05-25 2024-01-16 富士フイルムビジネスイノベーション株式会社 Information processing device and information processing program

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05225152A (en) * 1992-02-13 1993-09-03 Hitachi Ltd Process controller
JPH09218836A (en) * 1996-02-13 1997-08-19 Hitachi Ltd Security protection method for network
US20080083029A1 (en) * 2006-09-29 2008-04-03 Alcatel Intelligence Network Anomaly Detection Using A Type II Fuzzy Neural Network
US8739177B2 (en) * 2010-06-21 2014-05-27 Intel Corporation Method for network interface sharing among multiple virtual machines
JP5719244B2 (en) * 2011-06-29 2015-05-13 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method, program, and computer apparatus for constructing a safely managed virtual machine execution environment
JP6067449B2 (en) * 2013-03-26 2017-01-25 株式会社東芝 Information processing apparatus and information processing program
US9357411B2 (en) * 2014-02-07 2016-05-31 Qualcomm Incorporated Hardware assisted asset tracking for information leak prevention
WO2016103881A1 (en) * 2014-12-25 2016-06-30 エイディシーテクノロジー株式会社 Robot
WO2018008605A1 (en) * 2016-07-04 2018-01-11 株式会社Seltech System having artificial intelligence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020048879A1 (en) 2018-09-03 2020-03-12 Deutsches Zentrum für Luft- und Raumfahrt e.V. Arrangement and method for controlling a device
TWI708158B (en) * 2018-11-06 2020-10-21 國家中山科學研究院 Edge network information security detection and prevention system and method

Also Published As

Publication number Publication date
WO2018008605A1 (en) 2018-01-11
JP2018085136A (en) 2018-05-31
JP6329331B1 (en) 2018-05-23
JP6329333B1 (en) 2018-05-23
JP6913311B2 (en) 2021-08-04
JP2018085135A (en) 2018-05-31
JPWO2018008605A1 (en) 2018-07-05

Similar Documents

Publication Publication Date Title
TW201802705A (en) System having artificial intelligence
Giuffrida et al. A legal perspective on the trials and tribulations of AI: how artificial intelligence, the internet of things, smart contracts, and other technologies will affect the law
US11142190B2 (en) System and method for controlling autonomous driving vehicle
US20210403004A1 (en) Driver monitoring system (dms) data management
Vögel et al. Emotion-awareness for intelligent vehicle assistants: A research agenda
US11188720B2 (en) Computing system including virtual agent bot providing semantic topic model-based response
CN109408709A (en) With interested third party application content augment search results
Wintersberger et al. Trust in technology as a safety aspect in highly automated driving
Ahmad et al. Developing future human-centered smart cities: Critical analysis of smart city security, interpretability, and ethical challenges
US11755771B2 (en) System, method, and computer-accessible medium for training models on mixed sensitivity datasets
US11645566B2 (en) Methods and systems for graph computing with hybrid reasoning
Tychola et al. Tactile IoT and 5G & beyond schemes as key enabling technologies for the future metaverse
US20070130098A1 (en) System and method for predictive analysis for an optimal course of action for desired effects
US20210240770A1 (en) Application search system
Bashir Adaptive Human-Computer Interfaces for Cybersecurity Situational Awareness in Autonomous Vehicles
JP6895873B2 (en) Information processing device
US20230394173A1 (en) Systems and methods for data security associated with execution of tasks
Waghmare et al. Introduction: Azure Chatbots
Mayor et al. Long short-term memory prediction of user’s locomotion in virtual reality
Reński Computational simulation of a motion of the car equipped with the lane departure avoidance system
Sharma et al. Artificial Intelligence: Legal Aspects, Risks: Are We Ready for Such Intelligent Autonomous Machines?
Benzie et al. Bias, Privacy and Mistrust: Considering the Ethical Challenges of Artificial Intelligence
Addo Designing human-centered collective intelligence
Song Sensor Data Processing for Vehicular Cyber Physical System with Context Awareness
Akash et al. ALLY: AN INTELLIGENT VIRTUAL ASSISTANT USING AI