AIP La Côte d’Ivoire et la province du Nouveau-Brunswick au Canada renforcent leur coopération multi sectorielle AIP La CCI-CI adhère au « Pacte mondial » des Nations Unies pour l’atteinte des ODD AIP REVUE DE PRESSE : Le point de presse du ministre gouverneur, Cissé Bacongo font les Unes des journaux ce vendredi AIP Les lauréats de la 1ère édition du concours de Dictée et de Mathématiques récompensés AIP La ministre Belmonde Dogo tisse des partenariats avec des organisations internationales aux Emirats Arabes Unis pour l’autonomisation des personnes vulnérables AIP Un accord de partenariat entre la BRVM et la GGGI pour la promotion de la finance verte MAP Côte d’Ivoire: la CAN 2023 rapporte un bénéfice de 80 millions de dollars à la CAF APS SENEGAL-LITTERATURE / La fondation Léopold Sédar Senghor va bientôt célébrer ses cinquante ans (secrétaire général) MAP RDC: plus de 24.000 décès dus au paludisme en 2023 (officiel) MAP La Côte d’Ivoire décide le rapatriement de 55.000 réfugiés burkinabè (ministre)

Huawei holds Analysts Summit on security and privacy


  6 Juin      127        Innovation (142),

 

Feature Huawei Analysts

Accra, June 06, GNA – Huawei has officially held its 17th Analyst summit on the theme “seamless AI life” in Shenzhen, China, with an assurance to clients that their privacy and security would not be compromised.

It has also held a consumer business session with a wide range of experts.

The session had experts discussing the latest industry trends and innovative technologies in privacy and security; and Huawei’s privacy and security capabilities.

Mr Eric Tan, Vice President of Consumer Cloud Service of Huawei Consumer Business Group (CBG), in his keynote speech titled, “Rethink the Seamless AI Experience with the Global HMS Ecosystem,” spoke about privacy and security in Huawei’s global HMS ecosystem from the perspectives of global certification, application development, hardware, and cloud.
He said Huawei abides by GAPP, GDPR, and all local laws and regulations to ensure privacy compliance worldwide, adding that, the Company had obtained more than 20 privacy and security certifications globally and spares no efforts when protecting user privacy and data security.
He pointed out that while providing rich experiences, Huawei regards cyber security and privacy protection as its top priority.
Huawei is among the first companies to obtain the ISO/IEC 27701 certification globally, and the only one of the world’s top three vendors to possess the ISO 27701, CSA STAR, and EuroPriSe certifications.
Huawei ensures a secure application system for applications (including third-party applications) running in the Huawei ecosystem, Mr Tan said, explaining that Huawei assures security throughout the entire process, covering application release, download, and operation.
“The company implements real-name authentication for developers and exclusive quadruple detection, which includes malicious behavior detection, security vulnerability scanning, privacy breach checks, and manual real-name verification during the release phase,” he added.
Speaking about some advantages of using Huawei, Mr Tan said it also ensures chip-level payment security and has built-in SE hardware zone which is independently encrypted in the Kirin chip.
The Huawei Cloud offers consumers functions such as cloud backup and synchronization and implements multiple encryption measures such as local data encryption, transmission channel encryption, and cloud encryption to guarantee user privacy and data security.
Dr Wang Chenglu in his speech titled “Software-powered, Seamless AI Experiences and Ecosystems”, illustrated how distributed security is maintained to build trust between people, devices, and data, and ensures user privacy and data security in all scenarios.
He explained that it first ensures that users are using the correct devices to process data.
Huawei, he said, had developed a comprehensive security and privacy management system that covers smart phone chips, kernels, EMUI, and applications, which allows devices to establish trusted connections and transfer data based on end-to-end encryption.
It also ensures that right people access data and operate services via the distributed security architecture which makes coordinated, multi-device authentication possible.
“An authentication capability resource pool is established by combining the hardware capabilities of different devices. The system provides the best security authentication measures based on authentication requests and security level requirements in different business scenarios,” he said.
Dr Wang noted that data is classified by level, while protection standards are defined accordingly in order to protect data throughout its lifecycle, from generation and storage to usage and transmission to ensure that users use data in the right way.
“The core concept is to ensure that the right people access the right data with the right devices, and this will remain unchanged for a long time,” he reiterated.
The Summits were held on May 18 and May 19, respectively.
GNA
BAS
06 June 2020
Caption:
Image attached

Dans la même catégorie