Ungate Wukong
  • 🔥Introduction
    • Overview
    • Features & Benefits
    • Scope
  • 📓ARCHITECTURE
    • Abstract
    • Keys Components
      • Confidential Compute
      • Proof Generation
      • Verification
      • Proof Exploration
  • 👩‍💼Operators
    • TestNet
      • Installation
      • Registration
      • Quickstart
Powered by GitBook
On this page
  1. ARCHITECTURE
  2. Keys Components

Confidential Compute

Confidential Compute - TEE & Virtual Enclave Network

Ungate Wukong ensures confidential and verifiable execution of agents by leveraging Trusted Execution Environments (TEEs) and a Virtual Enclave Network. This model enables secure, tamper-proof execution while maintaining decentralization and transparency.

What is a TEE?

A Trusted Execution Environment (TEE) is a secure area of a processor that isolates sensitive computations, preventing unauthorized access or modification even by the system administrator. TEEs provide:

  • Hardware-based isolation: Ensures agents execute in a controlled environment without external interference.

  • Tamper-proof execution: Protects the integrity of agent computations.

  • Confidential data processing: Allows sensitive operations to run securely while keeping the underlying data private.

How Ungate Wukong Uses TEEs

  1. Agents execute inside an isolated TEE, ensuring code and data integrity.

  2. Each execution is cryptographically attested, producing a verifiable proof.

  3. Execution proofs are distributed across a decentralized verification network.

  4. Users and validators can inspect execution history before interacting with an agent.

The result is a provable execution environment where agents are verifiably autonomous, tamper-resistant, and shielded from unauthorized access.

PreviousKeys ComponentsNextProof Generation

Last updated 3 months ago

📓