Cn
En
COPYRIGHT © 2018 TEEX ALL RIGHTS RESERVED

TEE

A TEE(Trusted Execution Environment) is an isolate and secure area of a main processor. It protects the integrity and confidentiality of code and data inside it. Applications running in TEE have secure memory and cryptographic operations to resist attacks from other applications, even the privileged software such as OS or hypervisor
A TEE provides remote attestation which allows a remote host to verify the application running in the enclave, which guarantees that workers can provides valid proof of work without perceiving any sensitive data
A TEE can establish a secure channel to communicate with remote parties where the messages are encrypted.
  • Full Isolation

    A trusted execution environment (TEE) is a secure area of a main processor. It guarantees code and data loaded inside to be protected with respect to confidentiality and integrity. A TEE as an isolated execution environment provides security features such as isolated execution, integrity of applications executing with the TEE, along with confidentiality of their assets.( From Wikipedia)

  • Remote Attestation

    Intel SGX provides remote attestation which allows a remote host to verify the application running in the enclave and generate a secure channel to communicate with it. In the process of initiation of an enclave, the software can acquire a report which contains the measurement signed by a hardware-protected key in CPU to prove that the measured software is running in SGX indeed. The remote attester can then verify the report with Intel Attestation Service (IAS) which can certify that the signature is valid.

Blockchain

A blockchain typically serves as an open, decentralized and trustless distributed ledger which is maintained by all participants. Each transaction which may modify the state of the chain will be broadcasted to all participants in the network. Once recorded, the data cannot be altered retroactively without alteration of all subsequent chain, which requires consensus of the network majority.
  • Decentralization and openness

    A blockchain typically serves as an open, decentralized and trustless distributed ledger which is maintained by all participants. Some participants, called miners, form a peer-to-peer network and all have the full copy of the blockchain. They generate blocks which organize the data as a sequential list, called a blockchain. Everyone can join the network and any transaction which may modify the state of the chain will be broadcasted to all miners in the network.

  • Irreversible ledger

    Transactions are signed by users. After validating the signatures, miners packed these transactions into a block. Once a block is generated, all the miners need to achieve a consensus on whether to accept it or not. In PoW consensus model, a miner needs to prove that he/she has done a certain amount of work before generating a block, which prevents Sybil attack.

  • Smart contract & Dapps

    Blockchain makes smart contracts possible. Users can write and deploy any Turing-complete program on the blockchain network. Emerging Dapps (decentralized applications), which are run by many users on a decentralized network with trustless protocols, reveal the new decentralized future.