Typically, components implements TEEs, which makes it tough for attackers to compromise the computer software managing within them. With components-centered TEEs, we decrease the TCB into the components as well as Oracle software program managing to the TEE, not the whole computing stacks from the Oracle method. Methods to real-item authentication: