Tagged articles
35 articles
Page 1 of 1
DataFunSummit
DataFunSummit
Sep 2, 2025 · Information Security

How HyperGPU Unlocks Secure GPU Power for Large AI Models

This article introduces HyperGPU, a confidential‑computing infrastructure that transforms ordinary GPUs into trusted execution environments for large‑model inference, covering its background, design goals, architecture, security mechanisms, performance results, future optimizations, and open‑source plans.

Confidential ComputingGPU securityHyperGPU
0 likes · 12 min read
How HyperGPU Unlocks Secure GPU Power for Large AI Models
Deepin Linux
Deepin Linux
Jan 23, 2025 · Backend Development

Zero‑Copy Techniques in Linux: sendfile, mmap, splice and tee

This article explains the concept of zero‑copy in Linux, compares the four main system calls—sendfile, mmap, splice and tee—describes their APIs, internal mechanisms, performance characteristics, typical use‑cases and provides practical code examples for high‑performance network programming.

TEElinuxmmap
0 likes · 37 min read
Zero‑Copy Techniques in Linux: sendfile, mmap, splice and tee
Liangxu Linux
Liangxu Linux
Dec 9, 2024 · Fundamentals

Master Linux Zero‑Copy: Sendfile, Splice, mmap+write, and tee Explained

This article explains how Linux zero‑copy techniques—DMA, sendfile, splice, mmap + write, and tee—reduce CPU involvement in large file and network transfers by moving data directly within kernel space, detailing their workflows, code examples, performance trade‑offs, and suitable use cases.

DMASystem ProgrammingTEE
0 likes · 20 min read
Master Linux Zero‑Copy: Sendfile, Splice, mmap+write, and tee Explained
AntTech
AntTech
Oct 22, 2024 · Information Security

Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications

The Asterinas open‑source confidential computing stack, released by leading Chinese research institutions and Ant Group, combines HyperEnclave, Occlum, and TrustFlow to provide a secure, nationally‑trusted TEE foundation for cloud, AI, and data‑intensive workloads, addressing the shortcomings of existing commercial TEEs and enabling trustworthy data flow across diverse industries.

AsterinasTEEcloud security
0 likes · 8 min read
Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications
AntTech
AntTech
Oct 18, 2024 · Information Security

CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts

The second Confidential Computing Forum at CNCC2024, held on October 26 in Hangzhou, gathers leading experts to discuss TEE‑based secure computing, present cutting‑edge research on confidentiality, side‑channel attacks, collaborative trust, and cryptographic applications, and outlines future directions for data security in the digital economy.

TEEcryptographydata security
0 likes · 10 min read
CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts
AntTech
AntTech
Apr 24, 2024 · Information Security

Beijing FinTech Alliance Releases Privacy Computing Interoperability Platform Technical Specification

Under the guidance of the People’s Bank of China, the Beijing FinTech Industry Alliance has published the 'Financial Industry Privacy Computing Interconnection Platform Technical Specification', a standard co‑authored by China UnionPay, major banks, universities, tech firms and telecom operators, with Ant Group playing a key role.

Ant GroupInteroperabilityPrivacy Computing
0 likes · 4 min read
Beijing FinTech Alliance Releases Privacy Computing Interoperability Platform Technical Specification
AsiaInfo Technology: New Tech Exploration
AsiaInfo Technology: New Tech Exploration
Feb 23, 2024 · Industry Insights

How Trusted Execution Environments are Shaping Data Security and Privacy Computing

The article examines the rapid growth of China's digital economy, the rising demand for secure data circulation, and how Trusted Execution Environments (TEE) are evolving through hardware and software advances, interoperability efforts, and large‑model privacy solutions to address emerging security challenges.

Privacy ComputingSecure ComputingTEE
0 likes · 17 min read
How Trusted Execution Environments are Shaping Data Security and Privacy Computing
AntTech
AntTech
Jul 19, 2023 · Information Security

IEEE 2952-2023 Standard for Secure Computing Based on Trusted Execution Environment – Technical Overview

The IEEE 2952-2023 standard, jointly released by Ant Group and multiple partners, defines a comprehensive technical framework for secure computing using Trusted Execution Environments, covering isolation, confidentiality, compatibility, performance, availability, and security, and outlines reference implementations, cluster management, and remote attestation mechanisms.

Confidential ComputingSecure ComputingSecurity Architecture
0 likes · 7 min read
IEEE 2952-2023 Standard for Secure Computing Based on Trusted Execution Environment – Technical Overview
AntTech
AntTech
Jul 7, 2023 · Information Security

Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”

At the 2023 World AI Conference summit, Ant Group unveiled its YinYu Open‑Source Framework 1.0 and the HyperEnclave financial‑grade TEE, detailing their technical features, industry‑wide standards contributions, and how they aim to boost the usability, security, and interoperability of privacy computing for AI applications.

AIAnt GroupPrivacy Computing
0 likes · 7 min read
Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”
AntTech
AntTech
Jun 28, 2023 · Information Security

Research Report on Interoperability of Heterogeneous Trusted Execution Environments in Financial Privacy Computing

The report details a collaborative effort led by UnionPay and Ant Group to create a unified remote attestation framework that enables interoperability among diverse TEE solutions, demonstrating successful integration of five major TEE platforms and highlighting the significance for secure data flow in the financial sector.

TEEsecure enclave
0 likes · 6 min read
Research Report on Interoperability of Heterogeneous Trusted Execution Environments in Financial Privacy Computing
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 2, 2023 · Mobile Development

Android File‑Based Encryption (FBE) Key Management and Architecture Overview

The article explains Android’s multi‑layered file‑based encryption system, describing how FDE, FBE and metadata encryption work together, and detailing the end‑to‑end key‑management flow that spans the HAL, VOLD, Linux kernel, fscrypt, the Trusted Execution Environment and hardware crypto engines to generate, derive, and program per‑file encryption keys.

AndroidFile-Based EncryptionTEE
0 likes · 21 min read
Android File‑Based Encryption (FBE) Key Management and Architecture Overview
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMobile SecurityTEE
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
DataFunSummit
DataFunSummit
Mar 13, 2023 · Information Security

Unified Remote Attestation for TEE Interoperability: A Practical Overview

This article presents a comprehensive overview of TEE interoperability, describing the background of trusted execution environments, their remote attestation processes, a unified remote attestation framework, and the overall strategy for achieving cross‑TEE compatibility, including open‑source implementations and future directions.

SecurityTEEUnified Attestation
0 likes · 9 min read
Unified Remote Attestation for TEE Interoperability: A Practical Overview
DataFunSummit
DataFunSummit
Feb 12, 2023 · Information Security

Privacy Computing: Technical Routes Overview and Ant Group’s Contributions

This article introduces and compares major privacy computing technologies—including MPC, federated learning, TEE, and proxy MPC—evaluating them across security, development cost, operational cost, accuracy, performance, participant scale, control, hardware cost, and trust, and then outlines Ant Group’s privacy computing framework, applications, and standards work.

Ant GroupFederated LearningMPC
0 likes · 8 min read
Privacy Computing: Technical Routes Overview and Ant Group’s Contributions
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 16, 2022 · Information Security

Analysis of OP-TEE SFS Secure Storage Implementation (OPTEE 3.18)

The article examines OP‑TEE 3.18’s SFS secure storage, detailing its GP API, kernel file‑system module, REE daemon interactions, file format with header, hash‑tree nodes, key hierarchy (SSK, TSK, FEK), and encryption using AES‑GCM, and highlights the single‑point‑of‑failure risk of the dirf.db directory.

OP-TEESFSSecure Storage
0 likes · 13 min read
Analysis of OP-TEE SFS Secure Storage Implementation (OPTEE 3.18)
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Dec 2, 2022 · Information Security

Understanding ARM TrustZone TEE and SMC Calls: Architecture, Conventions, and Implementation

The article explains how ARM TrustZone creates a Secure World Trusted Execution Environment, details the REE‑to‑TEE interaction via Secure Monitor Calls, outlines AArch32/AArch64 register conventions, fast versus yielding SMCs, service registration, and the low‑level boot and handling flow of the Secure Monitor.

ARMSMCSecure Monitor
0 likes · 14 min read
Understanding ARM TrustZone TEE and SMC Calls: Architecture, Conventions, and Implementation
DataFunSummit
DataFunSummit
Nov 28, 2022 · Artificial Intelligence

Introduction to Federated Learning: Concepts, Key Technologies, and the Dianshi Federated Learning Platform

This article introduces the concept of federated learning, outlines its industry opportunities and challenges, explains the evolution of data‑sharing technologies, details core techniques such as MPC, TEE, and differential privacy, and presents the architecture and capabilities of the Dianshi federated learning platform.

AIMPCTEE
0 likes · 20 min read
Introduction to Federated Learning: Concepts, Key Technologies, and the Dianshi Federated Learning Platform
DataFunSummit
DataFunSummit
Sep 18, 2022 · Information Security

Privacy Computing and Blockchain: Enabling Secure Data Collaboration

This article explains how privacy computing technologies such as federated learning, multi‑party computation, and trusted execution environments, combined with blockchain, address data sharing challenges in the digital economy by protecting privacy, ensuring compliance, and enabling secure, trusted collaboration across enterprises and government agencies.

BlockchainConfidential ComputingPrivacy Computing
0 likes · 11 min read
Privacy Computing and Blockchain: Enabling Secure Data Collaboration
DataFunSummit
DataFunSummit
Sep 11, 2022 · Information Security

Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination

This article presents a technical overview of the security challenges in multi‑party big‑data collaboration and explains how Trusted Execution Environments (TEE) and blockchain can be combined to protect data privacy, ensure computation integrity, and enable traceable data usage in distributed systems.

BlockchainTEEprivacy
0 likes · 12 min read
Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination
Liangxu Linux
Liangxu Linux
Jun 8, 2022 · Fundamentals

Master the Linux tee Command: Write, Append, and Redirect Output Efficiently

This guide explains the Linux tee utility, covering its purpose, installation verification, basic syntax, useful options, and seven practical examples that demonstrate writing to files, appending data, handling multiple outputs, ignoring interrupts, and combining tee with sudo for privileged writes.

Shell scriptingTEEUnix
0 likes · 7 min read
Master the Linux tee Command: Write, Append, and Redirect Output Efficiently
AntTech
AntTech
Apr 6, 2021 · Information Security

Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack

The article explains how confidential computing, built on trusted execution environments like Intel SGX, addresses data‑in‑use security, outlines the technical hurdles developers face, and showcases Ant Group's open‑source SOFAEnclave components—Occlum, HyperEnclave, and KubeTEE—highlighting Rust’s pivotal contribution.

KubernetesRustSGX
0 likes · 13 min read
Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 5, 2021 · Information Security

Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication

The article explains how Trusted Execution Environments (TEE), built on ARM TrustZone, provide a secure world separate from the Rich Execution Environment, detailing its architecture, GP API interactions, and how fingerprint enrollment and authentication are performed within TEE to protect sensitive biometric data.

GP APIMobile SecurityTEE
0 likes · 10 min read
Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication
Liangxu Linux
Liangxu Linux
Feb 13, 2021 · Fundamentals

How Linux Zero‑Copy I/O Works: mmap, sendfile, splice & tee Explained

The article explains Linux zero‑copy I/O techniques—mmap, sendfile, splice, and tee—detailing their design principles, execution flows, context‑switch and data‑copy reductions, advantages, limitations, and appropriate use cases, helping developers choose the optimal method for high‑performance file and network transfers.

I/OTEEZero Copy
0 likes · 11 min read
How Linux Zero‑Copy I/O Works: mmap, sendfile, splice & tee Explained
AntTech
AntTech
Jan 20, 2021 · Information Security

IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group

Ant Group has led the IEEE to approve the world’s first standard for secure computing based on Trusted Execution Environments (TEE), outlining framework, functions, and security requirements, and aims to protect data privacy and sensitive code across cloud, blockchain, AI, and other emerging applications.

IEEE StandardSecure ComputingTEE
0 likes · 6 min read
IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group
JD Tech Talk
JD Tech Talk
Dec 30, 2020 · Information Security

Design and Implementation of Fingerprint Authentication Using the FIDO Protocol

This article introduces the design principles and core technologies of fingerprint authentication, explains the FIDO protocol’s security model, describes the server‑client architecture—including REE and TEE environments—and discusses how these components combine to deliver a privacy‑preserving, user‑friendly mobile authentication solution.

FIDOMobile SecurityTEE
0 likes · 9 min read
Design and Implementation of Fingerprint Authentication Using the FIDO Protocol
Liangxu Linux
Liangxu Linux
Nov 4, 2020 · Fundamentals

Mastering the tee Command: 7 Practical Linux Examples

This guide explains how the Linux tee command reads from standard input and simultaneously writes to both a file and the screen, providing seven detailed examples that cover basic usage, writing to multiple files, silent output, appending, sudo integration, piping between commands, and using tee within vim.

Shell scriptingTEEUnix utilities
0 likes · 6 min read
Mastering the tee Command: 7 Practical Linux Examples
AntTech
AntTech
Sep 30, 2020 · Cloud Native

KubeTEE: An Open‑Source Cloud‑Native Confidential Computing Framework for Large‑Scale TEE Clusters

KubeTEE is an open‑source cloud‑native framework that integrates Trusted Execution Environment (TEE) technology with Kubernetes to provide a complete solution for developing, deploying, and operating large‑scale confidential computing applications, simplifying the entire lifecycle from code signing to runtime management.

Confidential ComputingKubeTEEKubernetes
0 likes · 9 min read
KubeTEE: An Open‑Source Cloud‑Native Confidential Computing Framework for Large‑Scale TEE Clusters
AntTech
AntTech
Aug 18, 2020 · Artificial Intelligence

Shared Intelligence vs. Federated Learning: Techniques, Challenges, and Ant Group’s Practical Experience

The article compares shared intelligence and federated learning, examines privacy‑preserving techniques such as MPC, TEE, and differential privacy, discusses gradient‑inversion attacks and their mitigations, and presents Ant Group’s end‑to‑end system design and real‑world deployments in finance.

AI securityAnt GroupFederated Learning
0 likes · 22 min read
Shared Intelligence vs. Federated Learning: Techniques, Challenges, and Ant Group’s Practical Experience
Tencent Cloud Developer
Tencent Cloud Developer
Jul 23, 2020 · Information Security

IoT Security: Challenges, Differences from Traditional Internet Security, and Capability Building

As IoT devices proliferate across industries, their fragmented, resource‑constrained nature and continuous operation create security challenges distinct from traditional Internet security, prompting the need for specialized authentication, lightweight TLS, secure chips, trusted execution environments, software hardening, and emerging standards to protect the ecosystem.

Industry standardsIoT securityTEE
0 likes · 14 min read
IoT Security: Challenges, Differences from Traditional Internet Security, and Capability Building
Liangxu Linux
Liangxu Linux
Aug 1, 2019 · Operations

Mastering the tee Command: Capture and Redirect Linux Output Efficiently

This guide explains how to use the Linux tee command to capture command output, append to files, write to multiple destinations, ignore interrupts, pipe results to other commands, and integrate tee into shell scripts, providing practical examples and syntax details.

Shell scriptingTEEcommand-line
0 likes · 8 min read
Mastering the tee Command: Capture and Redirect Linux Output Efficiently