MAP Afrique du Sud: 45 morts dans un accident d’autocar au Limpopo APS SENEGAL-ITALIE-TRANSPORTS / ITA Airways va inaugurer en juillet une ligne Rome-Dakar APS SENEGAL-ENVIRONNEMENT / Bonne amélioration des taux d’accès à l’eau et à l’assainissement (expert) ANP Signature de convention entre le Niger et la Société WAPCO Niger pour un programme de formation de talents à Southwest Petroleum University de Chine ANP Le gouvernement Italien réaffirme sa disponibilité à renforcer sa coopération avec le Niger APS SENEGAL-TRANSPORT / Air Sénégal renforce sa flotte avec deux nouveaux aéronefs APS SENEGAL-PRESIDENTIELLE-REACTION / Le président du Niger adresse ses félicitations à Bassirou Diomaye Faye pour son ‘’éclatante victoire’’ APS SENEGAL-LITTERATURE / Bakel abrite la première édition de la journée du livre, en avril AIP CAN 2023 : 10 fois plus de revenus enregistrés par rapport à l’édition précédente ACI Congo/Femmes: Incorporer le port du pagne dans les activités du 8 mars, selon Olga Rachelle Mangouandza.

Huawei holds Analysts Summit on security and privacy


  6 Juin      126        Innovation (142),

 

Feature Huawei Analysts

Accra, June 06, GNA – Huawei has officially held its 17th Analyst summit on the theme “seamless AI life” in Shenzhen, China, with an assurance to clients that their privacy and security would not be compromised.

It has also held a consumer business session with a wide range of experts.

The session had experts discussing the latest industry trends and innovative technologies in privacy and security; and Huawei’s privacy and security capabilities.

Mr Eric Tan, Vice President of Consumer Cloud Service of Huawei Consumer Business Group (CBG), in his keynote speech titled, “Rethink the Seamless AI Experience with the Global HMS Ecosystem,” spoke about privacy and security in Huawei’s global HMS ecosystem from the perspectives of global certification, application development, hardware, and cloud.
He said Huawei abides by GAPP, GDPR, and all local laws and regulations to ensure privacy compliance worldwide, adding that, the Company had obtained more than 20 privacy and security certifications globally and spares no efforts when protecting user privacy and data security.
He pointed out that while providing rich experiences, Huawei regards cyber security and privacy protection as its top priority.
Huawei is among the first companies to obtain the ISO/IEC 27701 certification globally, and the only one of the world’s top three vendors to possess the ISO 27701, CSA STAR, and EuroPriSe certifications.
Huawei ensures a secure application system for applications (including third-party applications) running in the Huawei ecosystem, Mr Tan said, explaining that Huawei assures security throughout the entire process, covering application release, download, and operation.
“The company implements real-name authentication for developers and exclusive quadruple detection, which includes malicious behavior detection, security vulnerability scanning, privacy breach checks, and manual real-name verification during the release phase,” he added.
Speaking about some advantages of using Huawei, Mr Tan said it also ensures chip-level payment security and has built-in SE hardware zone which is independently encrypted in the Kirin chip.
The Huawei Cloud offers consumers functions such as cloud backup and synchronization and implements multiple encryption measures such as local data encryption, transmission channel encryption, and cloud encryption to guarantee user privacy and data security.
Dr Wang Chenglu in his speech titled “Software-powered, Seamless AI Experiences and Ecosystems”, illustrated how distributed security is maintained to build trust between people, devices, and data, and ensures user privacy and data security in all scenarios.
He explained that it first ensures that users are using the correct devices to process data.
Huawei, he said, had developed a comprehensive security and privacy management system that covers smart phone chips, kernels, EMUI, and applications, which allows devices to establish trusted connections and transfer data based on end-to-end encryption.
It also ensures that right people access data and operate services via the distributed security architecture which makes coordinated, multi-device authentication possible.
“An authentication capability resource pool is established by combining the hardware capabilities of different devices. The system provides the best security authentication measures based on authentication requests and security level requirements in different business scenarios,” he said.
Dr Wang noted that data is classified by level, while protection standards are defined accordingly in order to protect data throughout its lifecycle, from generation and storage to usage and transmission to ensure that users use data in the right way.
“The core concept is to ensure that the right people access the right data with the right devices, and this will remain unchanged for a long time,” he reiterated.
The Summits were held on May 18 and May 19, respectively.
GNA
BAS
06 June 2020
Caption:
Image attached

Dans la même catégorie