# Naai-STEE Protocol

**Naai DePIN** is a groundbreaking ecosystem built upon the **STEE protocol**—a powerful framework that enables seamless communication and data exchange between AI agents and smart devices. The protocol simplifies system complexity, ensures device interoperability, and unlocks new possibilities for intelligent and interactive computing.

At its foundation, the **Naai DePIN supercomputing blockchain** provides a secure, transparent, and decentralized infrastructure. The STEE protocol leverages this foundation to seamlessly connect smart devices with AI agents in a trustless, distributed environment.

The **STEE protocol** is a system-level security framework designed to safeguard sensitive data and executable code. It achieves this by creating a **secure enclave** within hardware devices, ensuring that all code and data running inside this isolated environment are protected from external threats or tampering.

STEE offers a **hardware-enforced trusted execution environment (TEE)** that guarantees both data confidentiality and the integrity of computation. It enables the secure execution of AI models and services, forming the trust backbone for the entire Naai DePIN decentralized compute infrastructure.

<figure><img src="https://content.gitbook.com/content/9g0HeEbf2IlRZaujMdlQ/blobs/shd2oTN0tCwyGtKH8NiR/naai3.jpg" alt=""><figcaption></figcaption></figure>

## **Technical Framework and Underlying Architecture**

The **STEE protocol** is built on Trusted Execution Environment (**TEE**) technologies supported by mainstream chip architectures, including ARM TrustZone, Intel SGX, and RISC-V PMP. At its core, STEE establishes a secure, encrypted, and tamper-proof execution zone within smart devices through hardware isolation. This ensures that AI models and sensitive data processed locally on the device remain confidential and intact.

STEE functions as a secure communication and data exchange framework between AI agents and edge devices. It defines a standardized interaction workflow, allowing smart devices worldwide to act as nodes in a decentralized supercomputing network and securely collaborate with AI model agents.

Through the STEE protocol, each device can establish an encrypted communication channel with on-chain AI task scheduling agents—uploading sensor data, downloading AI tasks, and submitting results. Only authorized code and verified data can be exchanged, ensuring that all communication is confidential and resistant to tampering or interception.

***

## **STEE Operation on the HPCS Supercomputing Chain and G7 Scheduler**

The STEE protocol operates on top of the **Naai-HPCS supercomputing public chain**, with task allocation and remote verification managed by the **G7 scheduling center**. Upon device startup, STEE generates a secure identity and attestation report through a trusted boot process. The G7 scheduler verifies the device’s trust status via **Remote Attestation**, then securely delivers AI tasks to the device’s TEE for execution. Once the task is completed, the result and attestation proof are uploaded back to the blockchain, ensuring full trust along the task lifecycle.

Within the Naai DePIN architecture, the **HPCS chain** serves as the trusted base layer for global settlement and verification, while the **G7 scheduler** orchestrates task assignment and resource management. STEE spans the entire lifecycle—from device onboarding and task dispatching to result validation—ensuring that all computation and communication remain encrypted, verifiable, and secure from end to end.

***

## **Security Architecture: TEE-Powered STEE Protocol**

The credibility of the STEE protocol lies in its integration with hardware-level TEE security. TEE is a hardware-backed isolated execution environment that guarantees the confidentiality and integrity of code and data. Regardless of the chip platform, TEE enables each smart device to operate secure sandboxes for AI tasks—executing them locally in a verifiable manner.

***

## **Four Core Security Capabilities**

1. **Trusted Boot and Remote Attestation**:\
   The entire boot process is verifiable, allowing remote verification that the runtime environment is uncompromised.
2. **Runtime Isolation**:\
   AI code and data run exclusively within the TEE, completely isolated from the main operating system—even in the event of a system breach.
3. **Trusted I/O and Encrypted Interfaces**:\
   All data input/output operations are conducted through encrypted channels, ensuring secure end-to-end communication.
4. **Persistent Encrypted Storage**:\
   Sensitive assets such as task states and AI model parameters are securely stored and can only be decrypted within the TEE.

***

## **The Value and Advantages of STEE**

Thanks to the wide deployment of TEE hardware and the thoughtful design of the STEE protocol, Naai DePIN strikes a critical balance between **security** and **cost-efficiency**, forming a solid foundation for AI + DePIN compute scheduling.

* **Hardware Root of Trust**:\
  STEE provides device-level trust guarantees essential for decentralized AI computing.
* **Low-Cost Deployment**:\
  Compatible with mainstream chips without requiring specialized hardware, making it globally scalable.
* **High-Performance Trusted Execution**:\
  Unlike homomorphic encryption or MPC, TEE enables secure yet efficient on-device computation.
* **Verifiable On-Chain Task Lifecycle**:\
  Combined with the HPCS chain and G7 scheduler, every step—from task dispatch to result verification—is fully auditable and traceable on-chain.

***

#### **Conclusion**

The STEE protocol forms a secure, scalable foundation for Naai DePIN’s ambitious vision. It lowers the barrier to deploying secure compute networks at scale, enhances trusted execution in heterogeneous environments, and ultimately enables even the smallest compute resources around the world to be safely and efficiently aggregated—powering AI applications for the Web3 era.
