ASKA
SecureSphere: Distilled Technical Overview & Patents Author: Paul Lowndes [email protected] Date: 20241031
SecureSphere System Overview: SecureSphere is a hardware-rooted secure computing architecture for high-assurance AGI-era operations. It employs modularity (IES), hardware-enforced isolation, dynamic trust (DTMS), AI-driven security (AESDS), decentralized governance (DLT, MDATS), and quantum-resistant technologies. Core principles include defense-in-depth, zero-trust, and continuous adaptation.
Key Core Technologies/Principles:
- Modular Isolated Execution Stacks (IES - P1): Hardware-isolated stacks (CPU, memory, I/O, network), dynamically partitionable into child-IES. Hierarchical zones with mini-TRCs. Secure resource borrowing (SRBM - P9).
- Dynamic Trust Management System (DTMS - P4): Manages trust between IES/zones via TRCs on a decentralized ledger (P15). Uses behavioral metrics (P2, P7, P10) and security posture (P13).
- Automated Evolutionary Software Development System (AESDS - P16): AI-driven system for continuous software monitoring, updates, and improvement. Uses IAMA (P16) for legacy system vulnerability analysis and patch generation.
- Sovereign Trust Network (STN - P27): Highly isolated network for sensitive data/keys.
- Dynamic Trust Gateway (DTG - P28): Mediates ATN (P3) and STN communication with dynamic channel provisioning and DPI.
- Hardware-Enforced Security: Includes HESE-DAR (P24) for data-at-rest encryption, anomaly detection (P7), memory protection (P8), secure boot (P1, P13, P33).
- Multi-Channel Network (P3): Physically segregated channels, each with a dedicated firewall.
- Quantum Resistance (P5, P29): QKD, DKM, PQC for communication; QE-OTP module.
- Decentralized Audit & Governance (P13, P14, P15, P17): DLT and 3D-Microstructure Audit Trails (MDATS).
Patented Technologies:
- Group I: Core Architecture
- P1: Modular IES: Isolated hardware stacks (IES) with hierarchical zones (mini-TRCs), dynamic partitioning, capability-based inter-component communication (CE-PCFS P26). Includes hierarchical out-of-band security monitoring (LSM, Watcher Meshes, AI Hub).
- P2: Secure Inter-IES Communication: Data diodes & capability-augmented PCFS. Hierarchical Security Mesh (MSM) with LSMs. Adaptive security based on declarative policies. Hybrid enforcement (closed-loop limited, open-loop critical actions via Hub).
- P3: Adaptive Multi-Channel Network: Physically segregated channels, out-of-band hardware firewall (per-channel instances), capability-aware forwarding, declarative policy enforcement (TRC-based rules). Channel Manager integrates with DTMS, MSM, AESDS.
- P4: Dynamic Trust Management System (DTMS): Decentralized Zone Management (DZMS), TRC-based trust, dynamic trust metrics, distributed consensus, policy negotiation. Integrates with IES, MSM, Governance AI.
- Group II: Enhanced Security & Privacy
- P5: Quantum-Resistant Secure Communication: QKD, DKM, PQC. Path-aware key distribution, dynamic QKD endpoint discovery, SIBRA bandwidth reservation.
- P6: Zero-Knowledge Execution Environment (ZKEE): Computation on encrypted data. Decentralized verification, zone-based trust.
- P7: Hardware-Enforced Anomaly Detection, Isolation, Self-Healing: Secure SCMP reporting, zonal response policies, timing side-channel detection.
- P8: Hardware-Based Memory Protection: Capability-based access control, dynamic obfuscation, ORAM-like design.
- Group III: Dynamic Resource Management
- P9: Secure Resource Borrowing & Granular I/O Management: TRC-based policies, multipath communication (MCM), hardware-enforced isolation (IIG, ZTIOH). Multi-Layered Virtual Console (MLVC).
- P10: AI-Powered Predictive Resource Allocation & Adaptive Scaling for IES: Multipath optimization, declarative policies, secure sharing, trust-aware optimization (DTMS).
- Group IV: Secure UI & Chiplet Integration
- P11: Secure UI Kernel: Zonal isolation (dedicated TRC), hardware-enforced CFI, declarative policy-based rendering, multi-region display buffer (dynamic trust levels), unidirectional data flow from IES. Secure UI Integration Module with SIZCF for inter-zone comms & remote attestation.
- P12: Secure & Adaptive Chiplet Architecture: Dynamic resource allocation, capability-based access control, hardware-enforced isolation. Chiplet Orchestration Module, SIBRA integration, blockchain provenance.
- Group V: Decentralized Governance & Auditing
- P13: Secure Zonal Governance System: AI-driven authentication, DLT, secure boot integration, bootstrapping certificates for voting terminals.
- P14: 3D-Printed Microstructure Audit Trail: Tamper-evident physical audit for voting systems, unique identifiers linked to digital records.
- P15: AI-Powered Governance Auditing & Transparency: AI Auditing Module analyzes DLT records, TRCs, physical microstructures (P14), software provenance (P17). Automated TRC conflict resolution. Real-time policy simulation engine.
- P16: Automated Evolutionary Software Development (AESDS): AI-driven code generation/refinement using knowledge base, metrics, feedback, threat intel. Secure zoned deployment (SCION paths), TRC-based verification. Adaptive AI-driven security (SCMP vulnerability reports, proactive patches, timing side-channel mitigations). Includes Isomorphic Architecture Monitoring & Adaptation (IAMA) for legacy systems: creates isomorphic model, monitors via data diodes, predicts vulnerabilities, generates SecureSphere patches.
- P17: Multi-Dimensional Audit Trail System (MDATS): Integrates DLT records (P13, P15) with 3D microstructures (P14). AI-driven analysis of microstructures and digital logs for tampering/inconsistencies. Software provenance tracking (links AESDS P16 updates to microstructures).
- Group VI: Secure Collaboration & Data Management
- P18: Secure & Adaptive Hyper-Virtualization System (SHVS): For collaborative workloads. Decentralized policy management (zone-specific policies, consensus for conflict resolution), real-time security monitoring (hierarchical mesh, AI anomaly detection), privacy-preserving data sharing (Secure Data Enclaves P20, Differential Privacy, Homomorphic Encryption, MPC P19). Manages collaboration contexts with dynamic capabilities (P2).
- P19: Privacy-Preserving Federated Learning System: Uses MPC across IES. Dynamic orchestrator adapts model selection, aggregation, privacy techniques.
- P20: Secure Data Enclave System: Privacy-preserving collaborative data analytics within IES. Uses differential privacy, homomorphic encryption, MPC (P19). Dynamic configuration.
- P21: Blockchain-Enabled Self-Evolving Software System: Integrates AESDS (P16) with blockchain & 3D microstructure (P14, P17) provenance tracking for secure, verifiable software evolution.
- P22: Secure Inter-Zone Collaboration Framework (SIZCF): Secure communication & data sharing between zones. Privacy-preserving data exchange (P20), distributed ledger synchronization (P13, P15). Zone discovery, trust assessment (P4).
- Group VII: Foundational Security, Communication & Media
- P23: Adaptive Context-Aware MFA: Biometric & behavioral analysis, out-of-band token verification, MPC for private biometric processing. DLT logging.
- P24: Hardware-Enforced Secure Encrypted Enclave for Data at Rest (HESE-DAR): Per-IES encrypted storage, hardware crypto (PQC P5), granular access control (DTMS P4, DLT P13), dynamic resource allocation (P9, P10), anti-tamper, 3D microstructure audit for key management (P14, P17).
- P25: Dynamically Reconfigurable Capability-Based Inter-IES Communication (DRCI): Capabilities (R/W/E, address ranges) for inter-IES memory access, dynamically managed by Hub’s Capability Manager based on DTMS (P4), workload (P10), governance (P13,P15), errors. Hardware-assisted.
- P26: Capability-Enhanced Packet-Carried Forwarding State (CE-PCFS): Integrates capabilities into PCFS hop fields for fine-grained, data-plane-level access control between components/IES.
- P27: Sovereign Trust Network (STN): Isolated data/control planes for keys/auth. Multi-level control (primary & recovery planes). MFA, HESE-DAR. Key recovery via hierarchical trusted sync nodes. Isomorphic security stack (isolated MSM/DTMS, uses IAMA P16 for legacy threat intel to patch STN).
- P28: Adaptive Secure Inter-Zone Communication (DTG - Dynamic Trust Gateway): Mediates ATN (P3) & STN (P27). Dynamic channel provisioning, multi-path capability aggregation, DPI, data sanitization. Uses DTMS, TRCs. DLT audit.
- P29: Quantum-Entangled One-Time Pad (QE-OTP) Module: QEKD for key fragment distribution. DKG in HESE-DAR (P24). FKM. ILSI for legacy compatibility (PQC P5). Verifiable read-once access & state-based key progression.
- P30: Spatiotemporal Digest for Raster Content Verification: Generates non-isomorphic “spatiotemporal metadata digest” from environmental sensor data (spatial, temporal, physical params) at time of raster content (audio, image, video) capture. One-way link to physical reality. Optional cryptographic signature.
- P31: SecureSphere Integrated Spatiotemporal Raster Content Verification: Implements P30 within HESE-DAR (P24) under DTMS (P4) control. Binds digest to content, records on DLT (P13, P15). Quick verification & legacy integration (IAMA P16).
- P32: Decentralized Privacy Blurring Standard with SecureSphere Integration: Opt-in DLT (P13, P15) (managed by DTMS P4 & Gov. Trusted Authority) stores anonymized biometric templates. AI agents on capture devices blur content based on templates & spatiotemporal context (P30, P31). SecureSphere Verification & Blurring Module (in HESE-DAR P24) cross-checks.
- P33: Decentralized, Hierarchical Bootstrapping and Attestation: Hardware Root of Trust to IES zones. Dynamic trust integration with DTMS (P4). Tamper-evident audit trail (DLT P13, P15, Microstructures P14).
- P34a: Quantum-Entangled Auxiliary Memory System (QEAMS): Out-of-band integrity verification via quantum entanglement between auxiliary memory (chiplet P12 in IES P1) and primary storage.
- P34b: Spatiotemporal Auxiliary Memory System (SAMS): Out-of-band integrity verification using spatiotemporal metadata digests captured during data writes.
- P34c: Passively Radiative Spatiotemporal Auxiliary Memory System (PR-SAMS): Low-power SAMS using passive radiative sensor array for environmental metadata capture.
- P35: Out-of-Band Error Module (Implied): Collects logs from IES Local Error Modules (P7) & MSM (P2). Secure Log Redactor (AI P16, MDATS P17) for sensitive info. Multi-level output to SIEM via dedicated unswitched network paths (MCN P3).
- P36: Secure & Adaptive Onboard AI Agent: AI agent in IES (P1). Secure UI (P11) monitoring (unidirectional). Local LLM engine (HESE-DAR P24 model storage). Integrates with DTMS, MSM, AESDS, DLT. Secure API (P2, P25). Secure update process (AESDS P16, IAMA P16, sandbox P1).
- P37: Secure UI Interaction Auditing with Tamper-Evident Data Lineage: Captures UI inputs, system modifications, rendered outputs. Correlates into time-ordered lineage. Tamper-evident log (DLT P13, microstructures P14, or AI anomaly detection). Analysis tool for forensics. Leverages P11, P35.
- P38: Quantum Phase Tunneling Framework: Point-to-multipoint cascading quantum entanglements for secure data transition between quantum & traditional channels. Dynamic operator-cluster failover. Adaptive security/privacy balancing algorithm (optimizes quantum resource allocation). Transparent cryptographic attestation (PUF-based auth, DLT logging).
Diagram Summaries (Concise):
- D1 (1.md & 2.md): SecureSphere Overview: Hub, IES Cluster, Networks (ATN, STN, DTG), Data/Resources (HESE-DAR, QEAMS/SAMS), Security (MSM, DTMS), Audit (DLT, MDATS), Media Handling.
- D2 (2.md): IES Lifecycle: Hub Orchestrator manages IES provisioning, deployment (Secure Boot), scaling, termination via Resource Allocator, DTMS, AESDS, Policy Engine.
- D3 (1.md & 2.md): UI Data Flow / Multi-Channel Network Comms: User -> Secure UI (P11) -> Sanitizer -> IES (P1) -> App. IES communicates via MCN (P3) (capability-aware NICs, secure channels, out-of-band firewall, Channel Mgr driven by DTMS/MSM).
- D4 (1.md & 2.md): DTG Architecture / HESE-DAR Data Flow:
- DTG (1.md): ATN -> DTG (Channel Provisioner, Capability Aggregator, Security Monitor, Audit Logger) -> STN. DLT for logs.
- HESE-DAR (2.md): App (IES P1) -> IOMMU (P9) -> HESE-DAR Controller (Access Control P4/P13, Key Mgr P5, Crypto Engine P5/P7) -> Secure Storage. MSM/DTMS integration. 3D Microstructure for key audit (P14/P17).
- D5 (1.md & 2.md): SecureSphere Detailed Overview / SIZCF Zone Interaction:
- Detailed (1.md): Hub, IES (child-IES, CE-PCFS P26, ZKEE P6, HESE-DAR P24), DTMS, AESDS (IAMA P16), DTG, STN (P27), ATN (P3), SIZCF (P22), SHVS (P18). Supporting Tech: DLT, MDATS, MSM, MCN, QR Comm, Chiplets, FL, SDE, MFA.
- SIZCF (2.md): Zone A & B Hubs/Ledgers interact via SIZCF (P22) (Zone Discovery, Trust Assessment P4, Secure Comm Agent P3/P5, Privacy-Preserving Data Sharing P20, Ledger Sync).
- D6 (1.md & 2.md): Security Monitoring & Response / AESDS AI Engine:
- Monitoring (1.md): Data sources (IES, Network, HESE-DAR, UI) -> Local MSM (P2) -> MSM -> Policy Engine/DTMS/Access Control & Anomaly Detection (F) -> Alert (G) / Response (H) (Isolator, Self-Healer, Resource Mgr). MDATS/DLT log.
- AESDS AI (2.md): Knowledge Base, Dynamic Inputs (Metrics, Feedback, Threat Intel) -> AI Engine (Code Gen/Refinement) -> Sandbox (IES P1) -> Secure Repo -> Deployment. Integrates MSM, DTMS, HESE-DAR.
- D7 (1.md & 2.md): Key Management & Recovery / Chiplet Integration Lifecycle:
- Key Mgt (1.md): Hub KMS (Gen, Storage P24, Monitor, Revoke). STN (P27) Key Mgr, Auth Mgr, Recovery Controller (Sync Nodes, External High-Trust). DTG (P28) Cap Mgr. MDATS/DLT log.
- Chiplet (2.md): Chiplet Insertion -> Auth -> Resource Alloc -> Workload Assign -> Operation (in IES P1 via SCI P12) -> Removal. Chiplet Orchestration Module (P12) manages.
- D8 (1.md & 2.md): Zone Mgt & Inter-Zone Comm / Decentralized Governance (Voting):
- Zone Mgt (1.md): Global Control Plane -> Zone Creation/Mgt, TRC Mgt (DLT). Zone (Hub, IES, LSM, Secure Comm Agent, MCN P3) -> Other Zones via SIZCF (P22). MDATS/DLT log.
- Voting (2.md): Voter -> Auth (P11, P13, P14) -> Secure UI (P11) -> Encrypted Vote (P5) -> DLT (P13,P15) tally. Microstructure Gen (P14). Auditor verifies (MDATS P17).
- D9 (1.md & 2.md): Data Flow & Security Processes / AESDS Lifecycle:
- Data Flow (1.md): Hub (DTMS, AESDS, Policy) -> IES (Apps, SDE P20, FL P19) -> Local MSM -> MSM -> Anomaly/Response. Data I/O via MCN (P3) to other zones/external. DLT logs.
- AESDS Cycle (2.md): AI Engine (Knowledge Base, Threat Intel) -> Testing (IES Sandbox P1) -> Validation -> Governance (DLT P13/P15) -> Deployment (IES/Apps). Monitoring (P2) & Feedback loop. Microstructure audit (P14/P17).
- D10 (1.md & 2.md): Bootstrapping & Attestation / Adaptive MCN (Quantum Highway):
- Boot (1.md): Power On -> HW Root of Trust -> Secure Boot ROM (TRC) -> Bootloader Verify (DTMS) -> Secure OS -> IES Init (Mini-TRC Verify) -> DTMS Integ -> App Load -> Attestation (DLT).
- MCN (2.md): IES NICs (Capability-Aware P2/P25) -> Secure Channels (Trust Levels) -> Firewall Checkpoints (P3) -> Channel Mgr (Dynamic Routing via DTMS/MSM) -> External (QR Gateway P5, SIZCF P22) / Legacy.
- D11 (1.md & 2.md): Security Meshes / DTMS in Action:
- Meshes (1.md): IES -> LSM -> Watcher Mesh -> AI Hub. MSM oversees. Passive RAM/SSD monitoring. Unidirectional control (MSM->LSM, Watcher->LSM). Bidirectional (Watcher<->AI Hub). Consensus-based enforcement option.
- DTMS (2.md): IES (Trust Level X) requests Resource (Sensitivity Y). DTMS Trust Hub (Trust Level, Monitoring Data, Threat Intel Z, Policies) -> Trust Calc -> Consensus Engine -> Access Gate.
- D12 (1.md & 2.md): Config Mgt & Deployment / Data Enclave (Sanctuary):
- Config (1.md): DLT/Policy Input -> CMM (Validators, Merge, Conflict Resolver P13/P15, Generator, Versioning, Store P24) -> DA -> IES. Simulator & Impact Analysis (AI P10/P16, MSM P2, GovAI P15) -> User (P11). Integrates DTMS, AESDS, IAMA.
- Enclave (2.md): IES A/B (Data Sources) -> Secure Ingestion (Auth Channels P2/P3/P5) -> Enclave (Validation, Processing, MPC P19, DP, HE) -> Sanitized Output -> External (SIZCF P22). DTMS (P4) controls access. DLT (P13/P15) audits.
- D13 (1.md & 2.md): Error Handling & Logging / Hub (Command Center):
- Error (1.md): IES App/Kernel -> Local Error Log -> Local Error Module (P7) -> Error Aggregator (P35, MSM P2 input) -> Secure Log Redactor (P16,P17, DTMS input) -> Multi-Level Output (A, B, Legacy) -> Secure Unswitched Channels (P3) -> SIEM. DLT logs.
- Hub (2.md): Operators view Display (IES Status, Network Traffic, Alerts, Resource Use). Control Panel interacts with Hub Modules (Orchestrator, Policy Engine, MSM/DTMS/SIZCF/AESDS/Microstructure/Ledger Interfaces). External connections to IES, MSM, DTMS etc.
- D14 (1.md & 2.md): Onboard AI Agent / Control-Data Planes:
- AI Agent (1.md): User -> Secure UI (P11) -> UI Monitor (P37, Data Diode P2) -> Sanitizer -> LLM Engine (in IES P1: Model Store P24, Inference P12, Tokenizer, Context Mgt). Integrates DTMS, MSM, AESDS, DLT, RM, SIZCF, IAMA. Agent API (P2, P25) -> Aggregation Hub. Optional FL (P19), External Sys Integ.
- Planes (2.md): Control Plane (Hub CP -> DTMS, ZM, CM, RM, AESDS CP, MSM -> IES CP -> NIC CP -> MCN -> External). Data Plane (IES DP -> NIC DP -> MCN & IOMMU/Peripherals. IES Internals: App, SecOS, SecKernel, MMU, Memory P8, HESE-DAR P24). UI Plane (P11). DLT audits all.
- D15 (1.md & 2.md): BCI Integration / Detailed Integration:
- BCI (1.md): BCI Hardware (P1 in IES) -> Secure Kernel (P1) (Encryption P2, TEE) -> Data Enclaves (P20) (AI Model, FL P19). HESE-DAR (P24) for storage. Secure Channels (P3,P5) to Cloud. UI (P11) via Data Diode. User/BCI input -> UI Monitor -> AI modules.
- Detailed (2.md): IES Cluster (Internals: Child IES/Zones, MiniTRC, Local DTMS/RM, LSM, AD P7, Secure Boot P1/P13) -> Inter-IES Comm (Data Diode, CE-PCFS P26, CapMgr) & MCN (P3/P5 QR GW, Global FW). Hub (DTMS, ZM, CM, RM, AESDS, MSM). UI Plane (P11). External (SIZCF P22). DLT. Data Services (FL P19, SDE P20, ZKEE P6). SHVS (P18). 3D Microstructures (P14/P17). MFA (P23).
- D16 (1.md & 2.md): Remote UI / Automated Software & Trust Systems Integration:
- Remote UI (1.md): Client App -> Secure Channel (P2,P3,P5) -> Hub (Auth MFA P23, Session Mgr, CapMgr P25, DTMS P4, Audit DLT) -> Remote UI Session IES (P1) (SecureUI P11, Sanitizer, Renderer, Session Monitor P2/P7 -> MSM).
- SW & Trust (2.md):
- 16a (Main): AESDS (P16, IAMA P16C9 from Legacy Sys) updates STN (P27, Iso Sec Stack), DTG (P28), Core. STN (Key/Auth Mgr, NonSwitched FW) & DTG (MultiPath, CapMgr, AuthZ) interact with ATN/Core. DLT/MDATS audit.
- 16b (AESDS+IAMA): AI Engine (Knowledge Base, IsoModel from IAMA/LegacySys, Metrics, Feedback, ThreatIntel) -> Specialized Code Gens (STN, DTG, Core) -> Parallel Sandboxes (STN/DTG/Core specific internals) -> SecureSphere Interface (P2,P3,P4) for deployment. Vulnerability DB fed by IAMA/AI.
- 16c (STN Ext): Data Plane (Input -> NonSwitch FW -> Router -> IES P1 -> HESE-DAR P24 -> DTG P28; Ext High-Trust Comm via Data Diode P2, QR GW P5, Ded. Channel P3). Min Control Plane (Ded. Channel -> STN CP -> AuthMgr MFA P23, RM P9/P10, IAMA I/F P16C9 to AESDS P16). Iso Sec Stack (IAMA P16C9 from Legacy -> IsoMSM P2 -> IsoDTMS P4 -> IsoPEP -> IES). Key Recovery (Sync Nodes -> Recovery Ctrl MFA P23 -> KeyMgr PQC P5 -> HESE-DAR; Auth Channel to Ext High-Trust). Fully Seg. Pathway to Remote Multicloud.
- 16d (STN Int): Similar to 16c but focused on internal data flow within STN components.
- 16e (DTG Int): SCA (ATN I/F P3 -> MultiPath Mgr using DTMS P4, AESDS IAMA P16C9 -> Secure Paths P5 with Data Diodes P2, Encryptors P5, MACs P26 -> STN I/F). CapMgr (Policy Engine TRC -> CapGen -> CapStore HW-backed/Chiplet P12; MPA from SCA paths). Data Handling (STN I/F -> DPI HW-Accel -> Sanitizer -> AuthZ Cap-Based -> Data Handler/Formatter -> STN P27; MSM P2 feeds DPI). DLT Audit.
- 16f (Ext. Integ): STN (NonSwitch FW -> QR GW P5 -> Ded.Chan P3 -> Ext.High-Trust; Min CP to Hub; KeyRecNet Sync Nodes -> Ext.High-Trust). DTG (Switch FW -> DataDiode P2 -> QR GW P5 -> MCN P3 -> Ext.Sys/Zones P22; NonSwitch FW to STN’s QR GW; CP to Hub). AESDS (Switch FW -> SecComm P2/P3/P5 -> Ext.Untrusted Monitored; IAMA P16C9 to Legacy@STN; Updates to STN/DTG/Core).
- Patents 30-32 Integration (5.md): SecureSphere Core (Hub, DTMS, AESDS, IES, HESE-DAR). P30: Sensor Array + Raster Capture -> Spatiotemporal Digest Gen -> Digest -> Verification (vs. Raster Content). P31: HESE-DAR hosts Spatiotemporal Content Verif. Module, integrates P30. P32: Privacy Blurring AI Agent (device) + Local Policy -> Anonymized Bio Hash -> Privacy Verif. & Blurring Module (in HESE-DAR, uses DTMS, P31, DLT for opt-in from Gov. Trusted Authority).
- PR-SAMS (P34c) (5.md): Data Write -> Spatiotemporal Metadata Capture (Passive Radiative Sensor Array, Timestamp/Auth) -> Spatiotemporal Digest Gen (SecureSphere Hashes/Metadata + Spatiotemporal -> Digest Calc -> Crypto Sig) -> Aux Memory Sys (Physical Microfeatures Read-Only + SecureSphere Crypto ID) & Crypto Sig DB. Data Read -> Spatiotemporal Verif. Module (Context Retrieval -> Digest Regen; AMS Digest/ID -> Physical Verif; Sig DB -> Sig Verif) -> Match/Mismatch (Alert to Hub/MSM).
Abbreviations List: (From original 1.md, ensure all key new ones are added if not present) AESDS, ATN, BCI, CE-PCFS, CFI, CMM, CapMgr, ChannelMgr, DLT, DPI, DTG, DTMS, DZMS, FL, HESE-DAR, HW, IAMA, IES, IIG, ILSI, IOMMU, KCM, KMS, LSIM, LSM, MCM, MDATS, MFA, MPC, MSM, MTE, MTLS, NIC, NVMM, OTP, PCFS, PEP, PQC, PR-SAMS, PUF, QEAMS, QEKD, QE-OTP, QRNG, QVM, RBAC, RM, SAMS, SCA, SCMP, SDE, SDEaaS, SDG, SDM, SHVS, SIBRA, SIZCF, SMC, SRBM, STN, SVM, TEE, TRC, UI, ZKEE, ZTIOH.