Our advantages

Safety self negotiation

Through technologies such as user holding key, two-way remote certification, encrypted storage, etc., the cloud vendor (CSP) is not in the user's trusted base (TCB).

Low threshold access

Through LibOS technology, user programs or images can be converted into programs or images that can be run directly on the confidential computing platform, which can achieve low threshold access to services and help businesses quickly realize the availability and invisibility of data.

Two way remote certification

Through the two-way TLS overlay remote proof function, the entire confidential computing control link and data link are more secure and reliable.

One stop platform

Through hosting services, one-stop operation and maintenance and other functions, users can better manage, operate and maintain confidential computing services.

Product characteristics

Low threshold access

The low threshold access of user business helps users to easily and quickly access the confidential computing platform and protect the confidentiality and integrity of user data.

Multi language support

Support mainstream programming languages, such as C/C++, Golang, Java, Python, Rust, etc. At the same time, it supports the low threshold access of language corresponding services.

Full custody service

It supports confidential computing hosting services, API interfaces, management, operation and maintenance and other functions to help users easily manage and maintain confidential computing related services.

Remote certification

Support SGX DCAP remote certification, self research certification, and overlay TLS two-way authentication function to protect user data confidentiality end-to-end.

secure environment

The trusted execution environment (TEE) enables the security isolation of user data during runtime to be available and invisible, so as to better protect user data.

Encrypted storage

The file encryption technology supports users to encrypt the designated directory/file with their own key to ensure the security of core data when it is downloaded.

Application scenarios

  • Medical privacy protection
  • Blockchain smart contract
  • model training
  • Multi party joint modeling

Pain spot

Medical data is a highly private data type. After medical collection, it will be encrypted. The database is in the state of ciphertext, but the encrypted data is difficult to support calculation. There are privacy problems when using plaintext data for calculation.

programme

The ciphertext is transmitted to TEE for decryption calculation, and the calculation result is re encrypted;
The user deploys the specified algorithm in TEE and supports integrity verification;
Control the boundary of TEE;
When the TEE is finished, provide a method to prove that it has been completely destroyed/reset.

common problem

What is confidential computing?

The confidential computing platform is a basic privacy security platform based on the trusted execution environment (TEE) launched by Tencent Cloud, which can provide users with easy access to confidential computing, service hosting, one-stop operation and maintenance and other functions, achieve end-to-end full life cycle protection of user data confidentiality and integrity, and meet the security needs of users for multiple applications, multiple services and multiple scenarios.

What is a TEE node?

How do I start using confidential computing?

What industries is confidential computing suitable for?

Does access to confidential computing require a large amount of system transformation?

For more questions, please check common problem , or in Q&A Community Ask questions in.

Tencent Cloud Confidential Computing Platform is a monthly pay as you go mechanism Getting Started Guide After a simple activation, you can enter the console to start secret operation.