Tag

Trusted Computing

0 views collected around this technical thread.

Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

ARM TrustZoneIoT securitySecure Boot
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things
AntTech
AntTech
Dec 22, 2022 · Information Security

From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing

The article explores how the shift from plaintext data to fully encrypted "data‑in‑state" (密态) is reshaping data security, privacy‑preserving computation, regulatory compliance, and market commercialization, with insights from Ant Group’s VP Dr. Wei Tao on technology pathways, challenges, and future prospects.

Data SecurityEncrypted DataTrusted Computing
0 likes · 30 min read
From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing
AntTech
AntTech
Dec 3, 2022 · Information Security

IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group

The IEEE Standards Association has officially launched the Trusted Enclave Computing (P3181) standard project, led by Ant Group with participation from Chinese research institutes and companies, aiming to define technical frameworks, security requirements, and guidelines for designing, developing, testing, and maintaining privacy-preserving computing systems.

Data SecurityIEEE StandardTECC
0 likes · 4 min read
IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group
AntTech
AntTech
Sep 3, 2022 · Information Security

Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions

The Trusted Privacy Computing Summit at the 2022 World AI Conference gathered leading scholars and industry experts to discuss cryptographic techniques, data security, and the practical rollout of privacy‑computing technologies across finance, healthcare, and cross‑border data services, emphasizing responsible digital economy development.

AIData SecurityTrusted Computing
0 likes · 8 min read
Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions
AntTech
AntTech
Aug 11, 2022 · Information Security

Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends

The article outlines Ant Financial’s evolving mobile endpoint security strategy, detailing three development stages, the challenges of balancing security with user experience, risk pre‑emptive control, and privacy compliance, and introduces the AntDTX trusted middleware that integrates hardware and software for cloud‑edge collaborative risk mitigation.

Cloud-Edge CollaborationMobile SecurityTrusted Computing
0 likes · 15 min read
Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends
AntTech
AntTech
Jul 29, 2022 · Information Security

Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook

The 2022 Trusted Privacy Computing Research Report, released by the Privacy Computing Alliance and Ant Group, defines trusted privacy computing, outlines its five core elements, discusses security verification methods, introduces the TECC technology, and highlights policy and market drivers shaping the data‑in‑cipher era.

Data SecurityTECCTrusted Computing
0 likes · 11 min read
Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook
AntTech
AntTech
Mar 30, 2022 · Information Security

Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality

The article examines how the rapid growth of industrial internet data demands robust privacy‑preserving technologies, outlines the regulatory backdrop, describes the technical challenges of achieving high performance, stability, low cost, flexibility and strong security, and proposes trusted privacy computing as a comprehensive solution for the emerging data‑confidentiality era.

AIData SecurityIndustrial Internet
0 likes · 15 min read
Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality
AntTech
AntTech
Nov 26, 2021 · Information Security

Achieving “Computable but Not Identifiable”: Balancing Personal Data Protection and Industry Development with Trusted Computing

The article examines how the Personal Information Protection Law creates a new authorization framework and introduces the “computable but not identifiable” concept, arguing that trusted‑computing technologies and controlled environments can reconcile strict privacy safeguards with the data‑driven needs of AI and other industries.

Trusted Computingartificial intelligencedata anonymization
0 likes · 10 min read
Achieving “Computable but Not Identifiable”: Balancing Personal Data Protection and Industry Development with Trusted Computing
Architects' Tech Alliance
Architects' Tech Alliance
May 20, 2020 · Information Security

Introduction to Trusted Computing, TPM, Server OS, and RAID Fundamentals

This article provides an overview of trusted computing concepts such as TPM and TCM, explains server operating system basics, details RAID card principles, disk cache protection, and connections, and includes references and resources for further study.

RAIDServer OSTPM
0 likes · 6 min read
Introduction to Trusted Computing, TPM, Server OS, and RAID Fundamentals