Normally, hardware implements TEEs, making it demanding for attackers to compromise the computer software running inside of them. With components-centered TEEs, we decrease the TCB for the components as well as the Oracle program working on the TEE, not all the computing stacks on the Oracle method. Approaches to real-item authentication:As compani