diff --git a/README-en.md b/README-en.md new file mode 100644 index 0000000000000000000000000000000000000000..e79d2b37bf34a3e9b4ecaeffe290f6aca79b0928 --- /dev/null +++ b/README-en.md @@ -0,0 +1,14 @@ +# tee-gp-proxy + +## introduce + +The project (tee-gp-proxy) aims to enable the CA on the REE side to use TrustZone in various scenarios, including RPC invocation and access to TrustZone in virtualization scenarios. + +## Solution introduction +### Confidential computing resource pool + +By deploying a socket-based proxy on the host, multiple remote clients can access the TEE. The remote client can be a VM or a container, and the CA can use the TEE as if it were local. This scenario is suitable for nodes that deploy TEE confidential computing in an integrated manner, and various types of clients share TEE resource pools. Solution details + +### TrustZone-aware confidential VMs + +This is a solution that allows the Guest OS to be aware of the TEE of the host hardware, that is, the VM can use TrustZone as if it were on the host. This solution focuses on the efficiency of using TEE capabilities, so the communication with TEE is carried out through memory mapping and copying. At the same time, the driver layer also maintains and manages the VM and the applications deployed by the VM to ensure that only the VM can obtain the output of the corresponding application.