Tagged articles
13 articles
Page 1 of 1
AntTech
AntTech
Oct 16, 2025 · Information Security

How Alipay’s Trusted Deep Defense System Secures Financial Transactions

Alipay’s trusted deep defense architecture, built on security parallel slices and trusted computing, was selected as a flagship case for the 2025 Important Industry Security Protection list, demonstrating zero‑false‑positive, zero‑miss, and zero‑business‑disruption protection against advanced threats such as 0‑day and APT attacks during high‑traffic events like Double 11.

Deep DefenseZero Trustcybersecurity
0 likes · 5 min read
How Alipay’s Trusted Deep Defense System Secures Financial Transactions
Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

IoT securitySecure BootTPM
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things
AntTech
AntTech
Dec 22, 2022 · Information Security

From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing

The article explores how the shift from plaintext data to fully encrypted "data‑in‑state" (密态) is reshaping data security, privacy‑preserving computation, regulatory compliance, and market commercialization, with insights from Ant Group’s VP Dr. Wei Tao on technology pathways, challenges, and future prospects.

Privacy Computingdata securityencrypted data
0 likes · 30 min read
From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing
AntTech
AntTech
Dec 3, 2022 · Information Security

IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group

The IEEE Standards Association has officially launched the Trusted Enclave Computing (P3181) standard project, led by Ant Group with participation from Chinese research institutes and companies, aiming to define technical frameworks, security requirements, and guidelines for designing, developing, testing, and maintaining privacy-preserving computing systems.

IEEE StandardPrivacy ComputingTECC
0 likes · 4 min read
IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group
AntTech
AntTech
Sep 3, 2022 · Information Security

Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions

The Trusted Privacy Computing Summit at the 2022 World AI Conference gathered leading scholars and industry experts to discuss cryptographic techniques, data security, and the practical rollout of privacy‑computing technologies across finance, healthcare, and cross‑border data services, emphasizing responsible digital economy development.

Privacy Computingaicryptography
0 likes · 8 min read
Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions
AntTech
AntTech
Aug 11, 2022 · Information Security

Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends

The article outlines Ant Financial’s evolving mobile endpoint security strategy, detailing three development stages, the challenges of balancing security with user experience, risk pre‑emptive control, and privacy compliance, and introduces the AntDTX trusted middleware that integrates hardware and software for cloud‑edge collaborative risk mitigation.

Endpoint Protectioncloud-edge collaborationprivacy compliance
0 likes · 15 min read
Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends
AntTech
AntTech
Jul 29, 2022 · Information Security

Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook

The 2022 Trusted Privacy Computing Research Report, released by the Privacy Computing Alliance and Ant Group, defines trusted privacy computing, outlines its five core elements, discusses security verification methods, introduces the TECC technology, and highlights policy and market drivers shaping the data‑in‑cipher era.

Privacy ComputingTECCcryptography
0 likes · 11 min read
Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook
AntTech
AntTech
Mar 30, 2022 · Information Security

Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality

The article examines how the rapid growth of industrial internet data demands robust privacy‑preserving technologies, outlines the regulatory backdrop, describes the technical challenges of achieving high performance, stability, low cost, flexibility and strong security, and proposes trusted privacy computing as a comprehensive solution for the emerging data‑confidentiality era.

Industrial InternetPrivacy Computingai
0 likes · 15 min read
Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality
AntTech
AntTech
Nov 26, 2021 · Information Security

Achieving “Computable but Not Identifiable”: Balancing Personal Data Protection and Industry Development with Trusted Computing

The article examines how the Personal Information Protection Law creates a new authorization framework and introduces the “computable but not identifiable” concept, arguing that trusted‑computing technologies and controlled environments can reconcile strict privacy safeguards with the data‑driven needs of AI and other industries.

Artificial IntelligenceData Governancedata anonymization
0 likes · 10 min read
Achieving “Computable but Not Identifiable”: Balancing Personal Data Protection and Industry Development with Trusted Computing
Alibaba Cloud Developer
Alibaba Cloud Developer
Apr 1, 2021 · Cloud Native

From Google to Ant: How He Zhengyu Built Ant’s Trusted Native Cloud Platform

This interview chronicles He Zhengyu’s journey from a prodigious student to a Google engineer and Ant Group leader, highlighting his role in shaping the Trusted Native initiative that combines cloud‑native, secure containers, confidential computing, and open‑source contributions to boost reliability and security for large‑scale financial services.

career adviceopen‑sourcesoftware reliability
0 likes · 15 min read
From Google to Ant: How He Zhengyu Built Ant’s Trusted Native Cloud Platform