跳转至主要内容
英特尔标志 - 返回主页
我的工具

选择您的语言

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
登录 以访问受限制的内容

使用 Intel.com 搜索

您可以使用几种方式轻松搜索整个 Intel.com 网站。

  • 品牌名称: 酷睿 i9
  • 文件号: 123456
  • Code Name: Emerald Rapids
  • 特殊操作符: “Ice Lake”、Ice AND Lake、Ice OR Lake、Ice*

快速链接

您也可以尝试使用以下快速链接查看最受欢迎搜索的结果。

  • 产品信息
  • 支持
  • 驱动程序和软件

最近搜索

登录 以访问受限制的内容

高级搜索

仅搜索

Sign in to access restricted content.

不建议本网站使用您正在使用的浏览器版本。
请考虑通过单击以下链接之一升级到最新版本的浏览器。

  • Safari
  • Chrome
  • Edge
  • Firefox


 

Intel® Trust Domain Extensions (Intel® TDX)

Isolation, confidentiality, and integrity at the virtual machine (VM) level.

  • Overview
  • Documentation

What is Intel TDX?

Intel® Trust Domain Extensions (Intel® TDX) is Intel's newest confidential computing technology. This hardware-based trusted execution environment (TEE) facilitates the deployment of trust domains (TD), which are hardware-isolated virtual machines (VM) designed to protect sensitive data and applications from unauthorized access.

A CPU-measured Intel TDX module enables Intel TDX. This software module runs in a new CPU Secure Arbitration Mode (SEAM) as a peer virtual machine manager (VMM), and supports TD entry and exit using the existing virtualization infrastructure. The module is hosted in a reserved memory space identified by the SEAM Range Register (SEAMRR). 

Intel TDX uses hardware extensions for managing and encrypting memory and protects both the confidentiality and integrity of the TD CPU state from non-SEAM mode. 

Intel TDX uses architectural elements such as SEAM, a shared bit in Guest Physical Address (GPA), secure Extended Page Table (EPT), physical-address-metadata table, Intel® Total Memory Encryption – Multi-Key (Intel® TME-MK), and remote attestation.

Intel TDX ensures data integrity, confidentiality, and authenticity, which empowers engineers and tech professionals to create and maintain secure systems, enhancing trust in virtualized environments.
 

Get Started

Key Benefits

The ideal choice to enhance security in virtualized environments.

Isolation

Hardware-level VM isolation for robust data protection against unauthorized access ensures confidentiality and integrity of your data.

Confidentiality

Unauthorized or altered software is prohibited from loading and accessing confidential data. Data in memory is opaque to cloud service providers (CSP) or operators and shared applications.

Integrity

Attestation confirms that hardware and software configurations and policies are as expected and provides assurance to the workload owner that the server is trustworthy.

 

 

Protect sensitive data and intellectual property (IP).
Ease of Use

Streamline your workflow by supporting the lift and shift of virtual machines and existing code. Migrate your applications without any modifications for a seamless and trouble-free experience.

Optimized Performance

Reduce reliance on complex software stacks for faster response times and increased overall performance.

Use Cases

Employ Intel TDX technology across a variety of use cases to enhance security, privacy, and performance. 

Data Security and IP Protection

Protect apps and data from attack, tampering, or theft.

Privacy and Compliance

Strengthen data confidentiality and regulatory compliance.

Data Sovereignty and Control

Prohibit access by cloud providers or other tenants. Add safeguards to data sovereignty and governance.

Confidential AI

Safeguard your AI data and models by providing robust isolation, integrity, and confidentiality.

Get Started with Intel TDX

Intel TDX technology is currently available in:

 

 

Alibaba Cloud*

Build an Intel TDX confidential computing environment on Alibaba Cloud* infrastructure.

Go to Alibaba


 

Intel® Developer Cloud

Experience optimized deployment environments with the latest Intel processors and performance-optimized software stacks.

Explore Intel® Developer Cloud


 

Microsoft Azure*

Harness the power of Intel TDX on Microsoft Azure*, a flexible and scalable cloud computing platform designed for secure and efficient operations.

Go to Azure


 

Google Cloud*

Use Intel TDX on this robust cloud infrastructure that offers advanced data protection and seamless integration with your existing systems.
 

 

 

Go to Google Cloud


 

Explore Intel's Confidential Computing Portfolio

Help secure and isolate your most sensitive data, AI, or model assets with hardware-enhanced memory encryption using Intel’s confidential computing technologies such as:

  • Intel® Trust Authority—a zero trust attestation SaaS service
  • Intel® Software Guard Extensions (Intel® SGX)—for the smallest trust boundary and software attack surface protection

 

Learn More

 

  • 公司信息
  • 英特尔资本
  • 企业责任部
  • 投资者关系
  • 联系我们
  • 新闻发布室
  • 网站地图
  • 招贤纳士 (英文)
  • © 英特尔公司
  • 沪 ICP 备 18006294 号-1
  • 使用条款
  • *商标
  • Cookie
  • 隐私条款
  • 请勿分享我的个人信息 California Consumer Privacy Act (CCPA) Opt-Out Icon

英特尔技术可能需要支持的硬件、软件或服务激活。// 没有任何产品或组件能够做到绝对安全。// 您的成本和结果可能会有所不同。// 性能因用途、配置和其他因素而异。请访问 intel.cn/performanceindex 了解更多信息。// 请参阅我们的完整法律声明和免责声明。// 英特尔致力于尊重人权,并避免成为侵犯人权行为的同谋。请参阅英特尔的《全球人权原则》。英特尔产品和软件仅可用于不会导致或有助于任何国际公认的侵犯人权行为的应用。

英特尔页脚标志