Tagged articles
26 articles
Page 1 of 1
Architects' Tech Alliance
Architects' Tech Alliance
Apr 28, 2026 · Information Security

Why Compute Power Gets You In, but Security Determines Survival—HaiGuang’s Two Game‑Changing Moves

The article analyzes the rapid expansion of AI compute demand, the shift toward domestic chip dominance, emerging security threats such as data poisoning, and HaiGuang’s hardware‑level “intrinsic security” architecture—including a full‑stack cryptographic platform and a trusted data space—to make AI systems both usable and secure for critical industries.

AI computeChinese semiconductordata poisoning
0 likes · 6 min read
Why Compute Power Gets You In, but Security Determines Survival—HaiGuang’s Two Game‑Changing Moves
Alimama Tech
Alimama Tech
Aug 6, 2025 · Information Security

How Privacy-Enhancing Technologies Are Revolutionizing Data Use in Digital Advertising

This article reviews the background, core techniques, and typical applications of privacy‑enhancing technologies—including secure multi‑party computation, privacy‑preserving machine learning, differential privacy, and trusted execution environments—highlighting their role in unlocking multi‑party data value while ensuring compliance and privacy protection.

Federated LearningPrivacy Computingdifferential privacy
0 likes · 20 min read
How Privacy-Enhancing Technologies Are Revolutionizing Data Use in Digital Advertising
AntTech
AntTech
Nov 29, 2024 · Artificial Intelligence

AI Inference with Trusted Execution Environment: HyperGPU and DistMSM Accelerated Zero‑Knowledge Proofs Win 2024 Financial Cipher Cup Innovation Award

The award‑winning solution combines a GPU‑accelerated TEE framework (HyperGPU) and a multi‑GPU zkSNARK acceleration scheme (DistMSM) to provide fast, privacy‑preserving AI inference proofs, earning the third‑place Innovation Team prize at the 2024 Financial Cipher Cup competition.

AIDistMSMFinancial Cipher
0 likes · 6 min read
AI Inference with Trusted Execution Environment: HyperGPU and DistMSM Accelerated Zero‑Knowledge Proofs Win 2024 Financial Cipher Cup Innovation Award
AsiaInfo Technology: New Tech Exploration
AsiaInfo Technology: New Tech Exploration
Feb 23, 2024 · Industry Insights

How Trusted Execution Environments are Shaping Data Security and Privacy Computing

The article examines the rapid growth of China's digital economy, the rising demand for secure data circulation, and how Trusted Execution Environments (TEE) are evolving through hardware and software advances, interoperability efforts, and large‑model privacy solutions to address emerging security challenges.

Privacy ComputingSecure ComputingTEE
0 likes · 17 min read
How Trusted Execution Environments are Shaping Data Security and Privacy Computing
OPPO Amber Lab
OPPO Amber Lab
Aug 18, 2023 · Information Security

How to Build TA‑to‑TA Communication in Qualcomm’s QSEE Trusted Execution Environment

This guide explains the fundamentals of Trusted Execution Environments, introduces ARM TrustZone and Qualcomm's QSEE, and provides step‑by‑step instructions—including IDL creation, service implementation, and client integration—to establish secure TA‑to‑TA communication with practical code examples and troubleshooting tips.

arm trustzoneqseesecure enclave
0 likes · 10 min read
How to Build TA‑to‑TA Communication in Qualcomm’s QSEE Trusted Execution Environment
AntTech
AntTech
Jul 19, 2023 · Information Security

IEEE 2952-2023 Standard for Secure Computing Based on Trusted Execution Environment – Technical Overview

The IEEE 2952-2023 standard, jointly released by Ant Group and multiple partners, defines a comprehensive technical framework for secure computing using Trusted Execution Environments, covering isolation, confidentiality, compatibility, performance, availability, and security, and outlines reference implementations, cluster management, and remote attestation mechanisms.

Confidential ComputingSecure ComputingSecurity Architecture
0 likes · 7 min read
IEEE 2952-2023 Standard for Secure Computing Based on Trusted Execution Environment – Technical Overview
Cloud Native Technology Community
Cloud Native Technology Community
Jul 6, 2023 · Industry Insights

How Confidential Computing Reinvents Security in Cloud‑Native Kubernetes

This article explains the concept of Confidential Computing, examines Trusted Execution Environments such as AMD SEV, Intel SGX and TDX, compares their security properties and performance overhead, and shows how cloud‑native platforms like Kubernetes can leverage these technologies for stronger data protection.

AMD SEVConfidential ComputingIntel SGX
0 likes · 16 min read
How Confidential Computing Reinvents Security in Cloud‑Native Kubernetes
vivo Internet Technology
vivo Internet Technology
Apr 5, 2023 · Information Security

TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones

TrustZone implements a hardware‑level privacy shield for smartphones by partitioning CPU, bus, memory, peripherals and interrupts into a Secure World and a Normal World, using ARMv8 exception levels and extensions such as SCR, TZPC, TZASC, GIC and MMU to isolate user data from non‑secure software.

ARM SecurityMobile SecurityTEE
0 likes · 12 min read
TrustZone Architecture: Hardware-Level Privacy Protection for Smartphones
AntTech
AntTech
Dec 11, 2022 · Information Security

Occlum v1.0: Open‑Source Trusted Execution Environment OS with Major Performance Gains and Spark Big Data Integration

Occlum v1.0, the open‑source trusted execution environment operating system released by Ant Group, delivers up to five‑fold performance improvements, supports over 150 Linux syscalls, introduces async I/O, dynamic memory management, and a Spark‑BigDL big‑data analysis solution, while outlining future GPU and TDX extensions.

Big DataConfidential ComputingOcclum
0 likes · 11 min read
Occlum v1.0: Open‑Source Trusted Execution Environment OS with Major Performance Gains and Spark Big Data Integration
DataFunSummit
DataFunSummit
Nov 5, 2022 · Information Security

TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance

The article introduces TECC, a privacy‑computing framework that balances security and performance by using trusted execution environments, data secret‑sharing, lightweight cryptographic protocols, and Rust‑based implementation to enable near‑plaintext speed for secure multi‑party machine learning and data analysis.

Privacy ComputingRustTECC
0 likes · 10 min read
TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance
DataFunSummit
DataFunSummit
Oct 8, 2022 · Information Security

Exploring Privacy Computing Technologies in the Open Financial Ecosystem

This article provides a comprehensive overview of privacy computing—covering its background, key techniques such as MPC, TEE, federated learning, homomorphic encryption, and differential privacy—and examines how these technologies are applied in open financial ecosystems, including use cases, challenges, and future directions.

BlockchainFederated LearningPrivacy Computing
0 likes · 25 min read
Exploring Privacy Computing Technologies in the Open Financial Ecosystem
DataFunSummit
DataFunSummit
Sep 22, 2022 · Information Security

Privacy Computing Enables Secure Medical Data Sharing and Analysis

This presentation introduces how privacy‑preserving computation technologies such as federated learning, trusted execution environments, and cryptographic methods empower the secure flow, analysis, and value extraction of large‑scale medical health data while addressing de‑identification risks and regulatory constraints.

AIFederated LearningPrivacy Computing
0 likes · 19 min read
Privacy Computing Enables Secure Medical Data Sharing and Analysis
DataFunSummit
DataFunSummit
Sep 11, 2022 · Information Security

Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination

This article presents a technical overview of the security challenges in multi‑party big‑data collaboration and explains how Trusted Execution Environments (TEE) and blockchain can be combined to protect data privacy, ensure computation integrity, and enable traceable data usage in distributed systems.

BlockchainTEEprivacy
0 likes · 12 min read
Privacy and Reliability in Big Data Collaboration: Trusted Execution Environments and Blockchain Coordination
AntTech
AntTech
Jul 14, 2022 · Information Security

HyperEnclave: An Open and Cross‑Platform Trusted Execution Environment

The article introduces HyperEnclave, an open and cross‑platform Trusted Execution Environment that overcomes hardware‑binding limitations of traditional TEEs, supports multiple CPU architectures, offers three flexible enclave modes, and demonstrates superior performance across diverse workloads while maintaining strong security guarantees.

HyperEnclaveSecuritycross‑platform
0 likes · 4 min read
HyperEnclave: An Open and Cross‑Platform Trusted Execution Environment
AntTech
AntTech
Jun 16, 2022 · Information Security

Privacy Computing: How Digital Technologies Address Privacy Protection Pain Points

This article examines the rapid growth of privacy computing in China, outlining policy and market drivers, explaining key technologies such as secure multiparty computation, trusted execution environments, homomorphic encryption, differential privacy and federated learning, and discussing the legal, technical and ecosystem challenges that hinder its wider adoption.

Federated LearningHomomorphic EncryptionPrivacy Computing
0 likes · 11 min read
Privacy Computing: How Digital Technologies Address Privacy Protection Pain Points
AntTech
AntTech
Dec 21, 2021 · Information Security

Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview

The article explains how combining hardware and software solutions can address the data‑lifecycle security and cryptographic performance challenges of privacy computing, describing the underlying technology stack, acceleration techniques, and the integrated privacy‑computing appliance released by Ant Group.

Hardware accelerationPrivacy Computingcryptography
0 likes · 13 min read
Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview
Baidu Geek Talk
Baidu Geek Talk
Jun 2, 2021 · Industry Insights

How Federated Computing Secures Data While Powering AI: Core Techniques Explained

This article provides a concise technical overview of federated computing, covering its origins, core cryptographic methods such as MPC, garbled circuits, secret sharing, homomorphic encryption, and TEE, and explains how Baidu applies these technologies to enable privacy‑preserving AI in advertising and other industries.

AIFederated Learningdata privacy
0 likes · 12 min read
How Federated Computing Secures Data While Powering AI: Core Techniques Explained
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 5, 2021 · Information Security

Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication

The article explains how Trusted Execution Environments (TEE), built on ARM TrustZone, provide a secure world separate from the Rich Execution Environment, detailing its architecture, GP API interactions, and how fingerprint enrollment and authentication are performed within TEE to protect sensitive biometric data.

GP APIMobile SecurityTEE
0 likes · 10 min read
Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication
Alibaba Cloud Native
Alibaba Cloud Native
Aug 27, 2020 · Cloud Native

How Inclavare Containers Bring Confidential Computing to Kubernetes

This article explains the fundamentals of confidential computing, introduces the open‑source Inclavare Containers project and its integration with Kubernetes, details its architecture, workflow, signing models, and the related ACK‑TEE platform, and answers common questions about deployment and performance.

Cloud NativeConfidential ComputingKubernetes
0 likes · 19 min read
How Inclavare Containers Bring Confidential Computing to Kubernetes
AntTech
AntTech
Jul 17, 2020 · Artificial Intelligence

Privacy-Preserving Shared Intelligence: Secure AI Techniques for Financial Services

This article outlines how Ant Group’s shared‑intelligence platform combines differential privacy, trusted execution environments, and secure multi‑party computation to enable privacy‑preserving AI and data collaboration across financial scenarios, addressing regulatory demands, technical challenges, and real‑world deployment cases.

data sharingdifferential privacyprivacy
0 likes · 19 min read
Privacy-Preserving Shared Intelligence: Secure AI Techniques for Financial Services
AntTech
AntTech
Jun 17, 2020 · Artificial Intelligence

Shared Intelligence: Combining Trusted Execution Environments and Multi‑Party Computation for Privacy‑Preserving Machine Learning at Ant Group

This article presents Ant Group's shared‑intelligence solution that integrates Trusted Execution Environments (TEE) and Multi‑Party Computation (MPC) to enable privacy‑preserving data sharing and large‑scale machine‑learning across untrusted parties, discusses industry progress, technical evolution, practical deployments, and future challenges.

data sharingmulti-party computationtrusted execution environment
0 likes · 17 min read
Shared Intelligence: Combining Trusted Execution Environments and Multi‑Party Computation for Privacy‑Preserving Machine Learning at Ant Group
AntTech
AntTech
Mar 4, 2020 · Artificial Intelligence

Shared Intelligence vs. Federated Learning: Ant Group’s Privacy‑Preserving Machine Learning Solutions for Finance

The article explains how Ant Group tackles the privacy‑usability trade‑off in AI by combining Trusted Execution Environments and Multi‑Party Computation into a “shared intelligence” framework, contrasting it with federated learning, detailing technical architectures, training workflows, and its impact on financial data sharing.

Federated Learningdata sharingfinancial technology
0 likes · 14 min read
Shared Intelligence vs. Federated Learning: Ant Group’s Privacy‑Preserving Machine Learning Solutions for Finance
AntTech
AntTech
Aug 17, 2019 · Artificial Intelligence

Shared Machine Learning: Tackling Data Islands with Trusted Execution Environments and Multi‑Party Computation

The article explains how data islands and privacy concerns hinder AI development and describes Ant Financial's shared machine learning approach, which combines Trusted Execution Environments (TEE) and Multi‑Party Computation (MPC) to enable secure, privacy‑preserving data sharing and collaborative model training across organizations.

AIAnt Financialdata sharing
0 likes · 15 min read
Shared Machine Learning: Tackling Data Islands with Trusted Execution Environments and Multi‑Party Computation
UCloud Tech
UCloud Tech
Jun 11, 2018 · Blockchain

Multisig, Trusted Enclaves, and Hybrid Consensus: Securing Blockchain

The article recaps the 2018 UCan afternoon tea, covering NEM’s multisignature technology, UCloud’s trusted blockchain data‑flow solution using Intel SGX, virtual‑currency security challenges, HPB’s hardware‑accelerated blockchain architecture, and Genaro Network’s hybrid consensus with SPoR, offering practical insights for developers seeking secure and high‑performance blockchain implementations.

BlockchainConsensusmultisignature
0 likes · 18 min read
Multisig, Trusted Enclaves, and Hybrid Consensus: Securing Blockchain
UCloud Tech
UCloud Tech
May 28, 2018 · Blockchain

How Intel SGX Enhances Blockchain Smart Contracts for Secure Data Flow

This article explains how integrating Intel SGX's trusted execution environment with blockchain smart contracts enhances data confidentiality, enables complex computations, and addresses privacy and scalability challenges in decentralized data exchange for various applications.

BlockchainDecentralizationIntel SGX
0 likes · 7 min read
How Intel SGX Enhances Blockchain Smart Contracts for Secure Data Flow
WeChat Client Technology Team
WeChat Client Technology Team
Sep 28, 2017 · Information Security

How Tencent’s SOTER Secures Fingerprint Payments on Android

This article examines the challenges of implementing fingerprint‑based payment on Android, explains why early Android versions lacked a unified API, describes how Google’s FingerprintManager and TEE improve security, and details Tencent’s open‑source SOTER framework—including its key hierarchy, authentication flow, and integration steps—for building robust, low‑overhead biometric payment solutions.

Android SecuritySOTERSecure Payment
0 likes · 17 min read
How Tencent’s SOTER Secures Fingerprint Payments on Android