Industry information

Ant trusted dense computing was selected as one of the “top ten digital hard core technologies” of the 2022 Digital China Construction Summit

The following is the Ant trusted dense computing was selected as one of the “top ten digital hard core technologies” of the 2022 Digital China Construction Summit recommended by recordtrend.com. And this article belongs to the classification: Industry information.

On July 24, the fifth digital China Construction Summit released the “top ten digital hard core technologies”. The trusted dense computing (TECC), which was first promoted by ant group, was selected for “breaking through the technical barriers of privacy computing”. Trusted dense computing technology (TECC) deeply integrates trusted computing technology and cryptography, can complete the XGB modeling of 100 million samples in one hour, and form a leap forward improvement in the dimensions of security, applicability, performance, etc., which is a strong support in the era of data confidentiality.

Figure: ant group trusted dense technology TECC won the “top ten digital hard core technology” award

The theme of this summit is “innovation drives new changes, and digital leads the new pattern”. It mainly highlights new features and highlights such as “high technology and Innovation Interaction”. For the first time, the “top ten digital hard core technology” award was set. After three rounds of discussion, a professional evaluation team composed of many academicians and dozens of industry authoritative experts selected 489 achievements.

Figure: list of “top ten digital hard core technologies” of the fifth digital China Construction Summit

The safe circulation of data elements has become a new challenge facing the industry. Privacy computing can analyze and calculate data on the premise that the data provider does not disclose the original data. However, the existing single privacy computing technology route is difficult to support large-scale, complex and changeable application requirements, and faces security risks. Ant group pioneered and promoted a new privacy computing technology, trusted dense computing (TECC), which broke through the limitations of using a single technology and obtained higher comprehensive capabilities. It is the most promising privacy computing technology to meet the infrastructure level requirements in the era of data privacy.

Trusted cryptographic computing (TECC) integrates cryptography and trusted computing technology to form a full ciphertext high-speed computing capability based on full stack trusted and dense fragmentation. It is the world’s first new privacy computing mode, which has significantly improved compared with traditional cross network privacy computing in terms of performance, reliability, applicability, etc. it is also the first privacy computing technology that can meet the requirements of multi-dimensional infrastructure level in the era of data confidentiality.

In terms of security, TECC has built a dual security guarantee capability based on the fusion of trusted computing technology and cryptography technology. Using high-speed full ciphertext computing in a full stack trusted tpm/tee environment that can be remotely verified can effectively resist supply chain attacks, side channel attacks, and plaintext data disclosure risks that plague tpm/tee, as well as conspiracy attacks, malicious adversary attacks, and information entropy disclosure risks that plague multi-party security computing and federated learning.

In terms of comprehensive ability, TECC can complete the XGB modeling of 100 million samples in one hour, which is applicable to any multi-party participation and any data division, and supports the 99.99% – 99.999% infrastructure level reliability requirements. It increases the practical cost of no more than an order of magnitude compared with plaintext distributed computing, and meets the multi-dimensional technical requirements of infrastructure level in the era of data confidentiality.

Figure: trusted dense state computation (TECC)

TECC has been practicing in ant group privacy machine learning training, privacy offline batch prediction, real-time prediction, dense data analysis and other scenarios. In the future, it can also meet industries with huge data volume such as energy and industrial Internet, as well as large-scale computing scenarios such as “computing from the east to the west”, making a forward-looking technical layout for the wider application of privacy computing.

Dr. Wei Tao, vice president and chief technical security officer of ant group, accepted the award on site. In an interview, Dr. Wei Tao said that ant group has adhered to the core technology in the field of security technology for many years, made a number of internationally pioneering technological breakthroughs, including trusted dense computing, secure parallel aspects, and actively participated in the industry construction with a mature and open attitude. Trusted dense computing (TECC) is an innovative achievement that integrates ants’ research in the fields of privacy computing technology and trusted computing technology for more than 6 years. It is an important component of ant trusted privacy computing technology system. Ant is very willing to share technological achievements with the society, jointly promote the industry security and privacy technology system, and provide technical infrastructure services for the field of data element circulation. In July this year, ant group has opened source the trusted privacy computing framework “cryptogram”, and trusted cryptogram computing (TECC) will also open source as a key component of cryptogram under the guidance of the competent authorities.

Read more: gyroscope Research Institute: privacy computing technology development report a light year: 2021 China’s privacy computing Market Research Report (with download) privacy computing datatrust: from product demand to Engineering Architecture Practice (Serial 2) IDC: the scale of China’s privacy computing market in 2021 exceeded 860 million yuan, and the revenue distribution of China’s privacy computing manufacturers in 2021 (with original data table) Economist: ant financial needs to develop faster, otherwise the Silicon Valley giant will catch up with ant financial. The consumer loan scale of ant financial will exceed 600billion yuan. 2020 China’s Digital Eco hero month – blockchain industry reception hall will be held soon | B.P business partner Tsinghua University and ant financial will establish China’s first financial technology laboratory to boost China’s independent research and development of new strengths in science and technology | Spring Festival big data | new year on your fingertips 2016 Spring Festival lifestyle change ma Ant financial Peng Yijie: in 2014, ant financial’s overseas active users reached 17.85 million. Ant financial yuan leiming: open up three capabilities to comprehensively support the development of the fund industry. Ant financial has entered the world’s top ten banking groups. Ant financial’s consumer lending scale exceeded 600 billion yuan. Ant financial: in 2017, the number of mobile payments on Alipay accounted for 82%

If you want to get the full report, you can contact us by leaving us the comment. If you think the information here might be helpful to others, please actively share it. If you want others to see your attitude towards this report, please actively comment and discuss it. Please stay tuned to us, we will keep updating as much as possible to record future development trends.

RecordTrend.com is a website that focuses on future technologies, markets and user trends. We are responsible for collecting the latest research data, authority data, industry research and analysis reports. We are committed to becoming a data and report sharing platform for professionals and decision makers. We look forward to working with you to record the development trends of today’s economy, technology, industrial chain and business model.Welcome to follow, comment and bookmark us, and hope to share the future with you, and look forward to your success with our help.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button