xEdgeNode: Edge AI Model Protection
Protect AI models deployed at the edge with XorIDA split weights and threshold reconstruction. No single edge node holds a complete model.
The Problem
80% of AI inference is moving to edge devices, but each edge deployment creates a complete copy of the model that can be extracted or reverse-engineered.
Edge AI models represent millions of dollars in training investment. Physical access to edge devices makes model extraction trivial. Current protection relies on obfuscation that is routinely defeated.
TEE-based protection is hardware-dependent and unavailable on most edge devices. A universal, hardware-agnostic solution is needed for the heterogeneous edge computing landscape.
The Old Way
The PRIVATE.ME Solution
xEdgeNode splits model weights via XorIDA across edge nodes. No single node holds a complete model. Inference requires threshold reconstruction from cooperating nodes.
Model weights are XorIDA-split into K-of-N shares distributed to edge nodes. Each node holds one share that reveals zero information about the model. Inference requires K nodes to cooperate and reconstruct the relevant layers in memory.
xBoot verifies the integrity of each node’s share before reconstruction. HMAC-signed manifests detect any tampering. DID identity authenticates every edge node.
The New Way
How It Works
xEdgeNode combines XorIDA model splitting with xBoot integrity verification and threshold reconstruction for hardware-agnostic edge AI protection.
Use Cases
Prevent model extraction from edge devices with XorIDA split weights.
EdgeProtect autonomous driving models deployed across vehicle fleets.
ADASSecure quality control AI deployed on factory floor devices.
IndustrialProtect AI models deployed at multi-access edge computing nodes.
MECIntegration
import { EdgeModelGuard } from '@private.me/xedgenode'; const guard = await EdgeModelGuard.create({ modelPath: './model.bin', edgeNodes: [nodeA, nodeB, nodeC], threshold: { k: 2, n: 3 } }); await guard.deploy();
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Model weights | XorIDA K-of-N split | ✓ Information-theoretic |
| Integrity | xBoot + HMAC manifest | ✓ Triple verification |
| Identity | DID per-node | ✓ Ed25519 authenticated |
| Hardware | No TEE required | ✓ Universal edge support |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xEdgeNode?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xEdgenode generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xedgenode- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xEdgeNode is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.