How to protect information security in the era of big data?

On December 23, 2015, the 2015 Mobile Smart Terminal Summit with the theme of “Creating the World, Zhilian Everything” was held in Beijing National Convention Center. Under the guidance of the Ministry of Industry and Information Technology, the conference was widely incorporated into the development of mobile intelligent terminals, and the authority issued guidelines for industry development.

Dr. Li Liyou, Chairman and CEO of Spreadtrum Communications, was invited to participate in the summit and delivered a keynote speech on "The Big Data Era, Chip Security for Information Security." For many years, Spreadtrum Communications has consistently ranked the world's third largest mobile phone baseband chip supplier. In 2015, Spreadtrum's mobile phone chip shipments exceeded 5.3-550 million, global chips shipped around 2 billion this year, Spreadtrum accounted for 25% to 26%, and performance increased by more than 30%.

Li Liyou said that no matter whether the smart terminal will disappear in the future, whether it will become the world of robots in five years, but only one thing, the "chip" will not change. So, what is the relationship between information security and chip design and chip manufacturing? Let's start with a few small stories to talk about the relationship between information security and chips.

1. Can the chip open the back door?

We know that if the chip opens the back door in the smartphone, all the information will leak out. In fact, the chip opens the back door very easily, as long as you don't pull the battery, all the information about all your actions can be obtained, and you still don't know. The most ridiculous thing is that recently, in order to make the mobile phone thin, in order to make it easier for hackers to intercept information, many of our smart phone batteries cannot be plugged in. In this case, if my chip opens the back door, then you Escape can't escape.

2. The missile system is controlled by the hacker. Where did it get from?

Germany deployed Patriot missiles in Syria and Iraq and suddenly discovered that one day the missile system was controlled by hackers. In fact, this is information obtained from chips. Therefore, information security has a 100% relationship with the design of the chip, and the relationship is extremely close.

3. Is the external encryption chip used?

We know that the US military has always used Qualcomm chips. For the sake of information confidentiality, an encrypted chip is added to the outside, so voice communication and data communication can be performed by encrypted communication. But you forgot the most important point, the chip itself is set by others, if there is a back door in this chip, the external encryption chip has no use.

Therefore, only self-controllable, designing chips and controlling intellectual property rights are the most important in information security. As a leader in local IC companies, Spreadtrum Communications provides a smart phone chip solution based on an autonomous security and trusted architecture to maintain national information security, providing a truly secure and controllable chip.

The solution can simultaneously carry dual OS systems for individual users and enterprise users, supporting fingerprint and iris dual biometric identification authentication. Spreadtrum trusted chip also supports Secure Boot, secure OS, trusted computing and trusted services, from hardware source. Solve the integrity of the system. At the same time, Spreadtrum has developed a long-term sustainable product planning route for security chips. We will analyze the use characteristics and security features of different target customers and application areas to customize their security chip solutions.

At the Wuzhen Mutual Global Networking Conference, President Xi said that “the way to benefit and the time to do it”, Spreadtrum is confident to follow the national “Internet +” action plan in the future and jointly promote China's transition from a network power to a network power.


LED Solar Street Lighting System

LED Street lighting is a fresh new alternative to traditional street lamps such as: LPS, HPS, or MH street lights.
LED lighting provides a multitude of advantages over conventional incandescent lights:

 

* Advantages of Our LED Solar Street Lighting Projects:

1). Green Energy, Lower Power Consumption, Save 60%-80% Than Others.
2). Higher power, higher brightness intensity, Good Color Rendition. 
3). Save electricity cost. Save electric transformer and cable cost. Free maintenance
4). Environmental Impact - Eliminate Hazardous Disposal, Low Light Pollution, No Radiation. 
5). Longer lifetime: Between 80000-100000 Hrs. If lighting 12 hrs/night, could use at least 12 - 22 Years
6). Less heat Generated compared to other sources,
7). Downward orientation of Light, could adjust lighting angles and lighting range and shape on the Ground to meet the road-Rectangular. Other lighting source just could give common round shape and small lighting range.


60W Solar Street Lights

60W Solar Street Lights,60W Solar Street Lighting,Solar Led Street Light 60W,Solar Led Street Light Outdoor

Yangzhou Bright Solar Solutions Co., Ltd. , https://www.solarlights.pl