Inforpress Presidência da República promove terceira conferência da Década do Oceano na ilha do Sal Inforpress Preços dos produtos importados aumentaram 1,8% em Março Inforpress “Operação Menos Plástico” resulta na apreensão de grande quantidade de sacos plásticos importados ilegalmente Inforpress Fogo: Comité de Turismo Juvenil é uma forma dos jovens terem voz em matéria do turismo – responsável Inforpress Loco MusicCompany recebe autorização para emitir códigos internacionais de gravação padrão AIB La société minière Iamgold Essakane félicitée par le gouvernement pour son exemplarité AIP La CCI-CI plaide pour une facilitation des procédures d’obtention de visas entre la Côte d’Ivoire et le Vietnam AIP Football/Ligue 1 : L’ASEC en manque d’efficacité faute de joueur décisif en attaque AIP Beugré Mambé se félicite des fruits de la collaboration entre la Côte d’Ivoire et le Ghana dans le secteur du cacao MAP Les moyens de promouvoir la coopération agricole au centre d’entretiens entre M. Sadiki et son homologue de la Guinée-Bissau

Huawei holds Analysts Summit on security and privacy


  6 Juin      127        Innovation (142),

 

Feature Huawei Analysts

Accra, June 06, GNA – Huawei has officially held its 17th Analyst summit on the theme “seamless AI life” in Shenzhen, China, with an assurance to clients that their privacy and security would not be compromised.

It has also held a consumer business session with a wide range of experts.

The session had experts discussing the latest industry trends and innovative technologies in privacy and security; and Huawei’s privacy and security capabilities.

Mr Eric Tan, Vice President of Consumer Cloud Service of Huawei Consumer Business Group (CBG), in his keynote speech titled, “Rethink the Seamless AI Experience with the Global HMS Ecosystem,” spoke about privacy and security in Huawei’s global HMS ecosystem from the perspectives of global certification, application development, hardware, and cloud.
He said Huawei abides by GAPP, GDPR, and all local laws and regulations to ensure privacy compliance worldwide, adding that, the Company had obtained more than 20 privacy and security certifications globally and spares no efforts when protecting user privacy and data security.
He pointed out that while providing rich experiences, Huawei regards cyber security and privacy protection as its top priority.
Huawei is among the first companies to obtain the ISO/IEC 27701 certification globally, and the only one of the world’s top three vendors to possess the ISO 27701, CSA STAR, and EuroPriSe certifications.
Huawei ensures a secure application system for applications (including third-party applications) running in the Huawei ecosystem, Mr Tan said, explaining that Huawei assures security throughout the entire process, covering application release, download, and operation.
“The company implements real-name authentication for developers and exclusive quadruple detection, which includes malicious behavior detection, security vulnerability scanning, privacy breach checks, and manual real-name verification during the release phase,” he added.
Speaking about some advantages of using Huawei, Mr Tan said it also ensures chip-level payment security and has built-in SE hardware zone which is independently encrypted in the Kirin chip.
The Huawei Cloud offers consumers functions such as cloud backup and synchronization and implements multiple encryption measures such as local data encryption, transmission channel encryption, and cloud encryption to guarantee user privacy and data security.
Dr Wang Chenglu in his speech titled “Software-powered, Seamless AI Experiences and Ecosystems”, illustrated how distributed security is maintained to build trust between people, devices, and data, and ensures user privacy and data security in all scenarios.
He explained that it first ensures that users are using the correct devices to process data.
Huawei, he said, had developed a comprehensive security and privacy management system that covers smart phone chips, kernels, EMUI, and applications, which allows devices to establish trusted connections and transfer data based on end-to-end encryption.
It also ensures that right people access data and operate services via the distributed security architecture which makes coordinated, multi-device authentication possible.
“An authentication capability resource pool is established by combining the hardware capabilities of different devices. The system provides the best security authentication measures based on authentication requests and security level requirements in different business scenarios,” he said.
Dr Wang noted that data is classified by level, while protection standards are defined accordingly in order to protect data throughout its lifecycle, from generation and storage to usage and transmission to ensure that users use data in the right way.
“The core concept is to ensure that the right people access the right data with the right devices, and this will remain unchanged for a long time,” he reiterated.
The Summits were held on May 18 and May 19, respectively.
GNA
BAS
06 June 2020
Caption:
Image attached

Dans la même catégorie