Do you dare to think about it?
is connected to an unknown power bank, and all the information on the phone may be transferred instantly;
unknown links received on the phone may make you lose both people and money;
also has free Wi-Fi, gifts for scanning codes on the street, and photos posted on social platforms, which hide various loopholes in data security... These are the plots in the recent hit drama "Hare you safe ", but they are also real life scenes.
As people become increasingly dependent on mobile phones, various black industries around mobile phones are emerging one after another. In response, at the Boao Forum for Asia in September, Lu Jinghui, chief security officer of vivo explained vivo's strategy and practice in data security, and said that technological progress should return to the ability to make users happy and return to the source of people-oriented.
vivo Chief Security Officer Lu Jinghui
1. The security logic of hardware manufacturers
In fact, the "lost" of data and privacy is not a sudden vulnerability, but a "pain" that the Internet must experience from development to maturity.
In the past 20 years, China's Internet industry has grown wildly and has emerged a group of world-leading companies. It uses data to analyze consumption preferences and provides Chinese people with convenient, fast and omnipotent online services.
At the same time, most Chinese people lack awareness of data protection, which has formed a huge privacy loophole. Incidents such as Didi , which was listed in the United States, consumers who were killed by big data, and users who were betrayed their facial information, have repeatedly touched the red line of network security and the bottom line of privacy protection, and have also increased the demands for personal data security and privacy interests.
Nowadays, more and more attention is being focused on this field. The government has successively issued the " Network Security Law ", " Data Security Law ", and " Personal Information Protection Law ", which has initially established a legal line of defense in terms of data security; at the enterprise level, the technology community is also developing a number of innovative technologies to build a scientific and technological line of defense. For example, Tencent 's zero-trust security solution, Baidu 's intelligent data security gateway, and anti-fraud actions by major operators, etc.
But hardware manufacturers cannot avoid it when it comes to how to form the most scientific and effective "firewall". As an example, when sharing photos in daily life, we always ignore the time, place, parameters and other information contained in the photos, giving criminals an opportunity to take advantage of. And if you can have the option of privacy removal when sharing on the hardware side, you can cut off the risk of data leakage.
Hardware like mobile phones is a personal item that modern people cannot live without, and it is also a storage place for all data and privacy. Therefore, there are huge security challenges that are endogenous and exogenous. The endogenous problem is to curb the abuse and exploitation of data by some products and APPs, such as illegal application downloads and illegal data readings, which require systematic defense; the exogenous problem is that mobile phones have become the center of the Internet of Things and have also become the focus of firepower for data leakage, so data security protection also needs to move simultaneously towards the construction of the entire intelligent ecological construction.
Therefore, all-round and three-dimensional hardware security protection cannot be ignored. We have seen that many mobile phone manufacturers have begun to assume the social responsibility of data security, adding prevention mechanisms to more specific and more operational terminals to provide users with a safer network environment.
Regarding the issue of security and privacy, vivo has always been at the forefront of the industry, always oriented towards user needs, deepened security technology innovation, and tried its best to establish a security barrier for user privacy data.
2. How is mobile phone data protected?
So how does the mobile phone protect the user's data security? Before answering this question, we can first look at a ridiculous news: a man was hit by a car and flew three meters away while crossing the road. After making a difficult time formatting the mobile phone, he fainted with peace of mind.
But in fact, I want to keep my innocence in the world. In addition to formatting, there are many ways for mobile phones to protect personal privacy. For example, the "atomic privacy system" launched by the Boao Forum for Asia officially designated mobile phones vivo X Fold and X Note. APPs, pictures, and videos that you do not want to be seen can be directly added to the "second world" in this mobile phone. No one can open it except the owner himself.
Therefore, every component and every link of the mobile phone may become a "safe" for privacy. Based on its persistence in privacy protection, vivo regards data security as a systematic project.
From a technical perspective, vivo has built a security capability of soft and hard collaboration to protect user rights.
hardware security, vivo uses a core to truly lock the user's sensitive information from the inside. Specifically, the Qualcomm Snapdragon 8 Gen1 chip equipped with vivo X Fold and X Note not only brings strong computing and processing performance to the phone, but also has a built-in security processing unit SPU that protects you. The SPU has an independent hardware processor and an independent OS, which can provide financial-grade hardware security capabilities for the entire machine.
software is on the security of the software, vivo uses a network to protect privacy and security across the entire link. The Qian Mirror Security Architecture created by vivo covers four levels: chip, core, framework and application, and can solve security needs that cannot be fully covered by traditional single technology.
From the perspective of application, under the Thousand Mirror architecture, vivo has provided the implementation of security functions through comprehensive insight into user needs, effectively solving user security problems.
In response to the hidden dangers of privacy leakage of input methods that many users are concerned about, vivo's self-developed Jovi input method Pro provides users with a "local mode". It not only fundamentally separates the risks of "peeping" of third-party applications, but also has the ability to have a large local thesaurus, more accurate handwriting recognition, and higher input efficiency.
Not only that, vivo's self-developed minimalist browser can provide a purer surfing space and a safer Internet experience. Compared with common browsers, it has unique one-click switching of two interface functions: "minimal mode" and "news mode", which reduces unnecessary information interference and also brings multiple guarantees in personal information protection. It can intelligently block malicious advertisements and risky websites, and prevent third-party websites from using cookie and other settings to target and track users, enhancing user browsing privacy and security.
even, considering that business talks and other occasions require extreme privacy, vivo's hidden mode can turn off camera, microphone and positioning in one click, eliminate sensitive information leakage, and provide a safer environment for important occasions.
, and vivo's remote lock card, thousand mirror trusted engine, camera detection and other security functions, all of which allow users to feel, know and controllable about their data and privacy. Vivo's security capabilities are contained in countless details of daily life.
From chips, architectures to application functions, vivo's security capabilities have also been recognized by authoritative organizations. Last year, vivo's Origin OS obtained the first five-star product of mobile smart terminal operating system personal information protection capability in Taier Labs. This year, X Fold and X Note both obtained the Level 5 certificates of "Mobile Smart Terminal Security Capability Grading Test" of Tel Laboratory.
It is worth mentioning that it is not easy to achieve good results from Tel Laboratory. Its strict testing standards have extremely high authority in the industry.The ability to obtain the fifth-level certificate of the highest security level is enough to prove that vivo flagship products are leading the industry's data privacy protection as a new benchmark for business flagship security.
3. Security is the rocket that helps digital economy take off
For vivo, data security is not only a technical problem, but also a principled issue.
Previously, Lu Jinghui talked about vivo's three major privacy protection principles, namely transparency and controllability, privacy-side processing and data minimization. He believes that "to transfer user privacy with ease" is a false proposition. Only by handing over the right to know and initiative of privacy and security to users and avoiding abuse of data can we create an orderly, healthy and sustainable business ecosystem. "At this year's Boao Forum for Asia, Lu Jinghui once again emphasized that technology companies must assume their due responsibilities for data security, and data security and privacy protection are "iron laws" that must be elevated to the corporate strategic level.
This is vivo's attitude towards security and privacy protection, and it is also the goal that the entire industry must work tirelessly for. However, even if there are mobile phone manufacturers represented by vivo "take the lead", in the entire digital ecosystem, consumers, developers, and supervisors in the industrial chain should actively participate in data security in order to complete the joint construction of the industry ecosystem. is currently on a global scale, and data security is far from reaching the mature stage of technology, and 80% of data security-related technologies are in the early stage. Therefore, in addition to improving technology, we can also make up for shortcomings from all levels such as sociology, social data security awareness education, etc.
In this regard, vivo not only sets an example, but also actively participates in the formulation of industry standards. At present, more than 130 national standards and pre-order standards in the field of personal information protection and data security led and participated by vivo. From this point of view, vivo hopes to join hands with all parties in the industry to innovate in the security field and promote the healthy development of the industry.
data security is a new problem in the new era, and the future is actually a new opportunity. In 2021, the scale of my country's digital economy has reached 45.5 trillion yuan, and the average annual growth rate is significantly higher than the average growth rate of GDP in the same period. Obviously, the digital economy has become a key force supporting the high-quality development of my country's economy .
But without data security, all digital economy will be a castle in the air. Only with data security can we firmly control the economic momentum brought by the new round of scientific and technological revolution and industrial transformation. Because in today's game between great powers, for the country, data is a core asset with strategic value; for individuals, it is a necessary prerequisite for personal property security and privacy protection; for enterprises, data is becoming a key production factor for enterprises.
Only by ensuring data security can we move forward steadily and open up a new blue ocean of business. This means that the subsequent commercial competition will increase the security responsibility of multiple parties in the process of releasing data value. Vivo not only firmly locates a secure mobile terminal, but also based on years of experience rooted in the security field, providing experience and effective solutions for more smart terminal scenarios and obtaining greater market space.
At the Boao Forum for Asia Sub-forum, Lu Jinghui also clearly stated that with the continuous accumulation of basic factors such as data, algorithms, and computing power, AI will empower thousands of industries to bring economic dividends. The productivity of AI requires a large amount of data for training, so ensuring the safety and reliability of data in the flow process is an important issue facing the moment. As a link in the artificial intelligence ecosystem, smart phones Hardware manufacturers are using data protection and serving users to help build smart life with a lot of imagination space. Vivo's superimposed innovation on chips only gives us hope.
If the problem of data security in the development of the Internet in the past 20 years has mainly focused on "being able to hold on", then in the future data security, hardware manufacturers will not only play the role of "gatekeeper", but also have the opportunity to solve the problem of "using" under the premise of security.
From this perspective, vivo can be said to have stepped into the pain points of the times and may be the first to enter the blue ocean of digital economy transformation.
4. Conclusion
When people enjoy the convenience brought by these Internet, their personal data has also become the "gold mine" that everyone covets. As a technology company, vivo is escorting the digital economy era with its leading capabilities in data security and ecological partners.
Author: Qian Hao, Kedayi
Edited by: Angela