Core Viewpoint - The "Three-Dimensional Secret Computing System" integrates domestic chips, national encryption algorithms, and trusted computing to create an endogenous security protection framework that covers the entire link of computing power, data, and AI, reducing performance loss to less than one-third of traditional solutions [1][2]. Group 1: Technological Breakthroughs - The system represents a paradigm shift from "point defense" to "systematic endogenous security," addressing the limitations of traditional security solutions [2]. - It combines domestic chips, national encryption algorithms, and trusted computing 3.0 to create a comprehensive security space that protects every stage of data processing [2]. - The system's architecture includes five layers, from computing and encryption capabilities to trusted AI computing, ensuring full trust from hardware to cloud platforms [2]. Group 2: Cost and Efficiency - The CPU endogenous security technology is promoted at no cost, addressing the issue of high expenses [3]. - The distributed encryption resource pool technology enhances efficiency by allowing local CPU encryption, reducing network latency and avoiding plaintext transmission risks [3]. - The system achieves performance loss reduction to less than one-third compared to traditional encryption solutions, alleviating the pressure of security investments on business performance [2][3]. Group 3: Industry Applications - The system is initially applied within the company's 50 cloud computing centers, which support critical government and large enterprise operations [4]. - It has been deployed in sensitive sectors such as transportation, public security, and finance, with plans for broader applications [4]. - In transportation, the system has been implemented in a smart highway project, enhancing data security and traffic efficiency [4]. Group 4: Cross-Domain Challenges - The system addresses cross-entity identity authentication challenges in the transportation sector, ensuring active certification and identity unification for cross-platform data sharing [5]. - In public security and finance, it tackles the security issues of cross-regional data transmission, significantly improving safety and efficiency [5]. Group 5: Ecosystem Collaboration - The company aims to build an open collaborative ecosystem to promote the large-scale adoption of the Three-Dimensional Secret Computing System [6]. - It positions itself as a "security operating system" within the AI open architecture, enabling seamless integration with mainstream AI frameworks [6]. - The company plans to collaborate with research institutions to establish industry standards, addressing the fragmentation and compatibility issues of current security technologies [7]. Group 6: Future Outlook - The company will focus on deepening the application of the system in smart highways, smart road networks, and other sectors from 2024 to 2026 [5]. - The integration of security capabilities into practical productivity is emphasized, with the system likened to a "highway" for trust in the digital economy [8].
性能损耗压至1/3以下,立体密算破解“安全与算力两难”
2 1 Shi Ji Jing Ji Bao Dao·2025-11-26 10:48