In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
Every once in a while, topics related to personal information security are widely discussed on the Internet. November 1 marks the second anniversary of the promulgation of China's personal Information Protection Law. I would like to take this opportunity to show you how the private information in our mobile phones is protected in our daily digital life. Taking HarmonyOS as an example, a secure and reliable computer environment is built through the functions and technologies of Huawei cloud space, such as layer-by-layer encryption and digital asset inheritance.
Cloud space is protected layer by layer, and personal privacy security is not disclosed.
Mobile phone memory is limited, more and more personal privacy is uploaded to the cloud, the security of cloud storage is very important. Huawei Cloud Space provides layer-by-layer protection on the whole cloud process of user data:
Before the data is uploaded to the server, it is encrypted and protected on the side of the device to ensure that no one else can access and obtain it in the subsequent transmission and storage process.
The transmission process is usually a high-risk part of data leakage. Huawei Cloud Space uses HTTPS encrypted channels to transmit data to fully protect the data from malicious interception and tampering during transmission.
When storing, Huawei Cloud Space does not directly encrypt the data, but breaks it into blocks. These ciphertext blocks will not exist in the same server as the user key. If there is no user key, even if someone illegally obtains the ciphertext block, there is no way to crack the data.
Real-time tracking of device location and remote erasure of personal data
We all keep a lot of personal private information on our mobile phones. Once the equipment is lost or stolen, the risk of personal information disclosure will greatly increase. Through Huawei Cloud Space's "find device" function or find device, users can remotely locate the lost device and narrow the search by letting the device ring. You can also turn on the "lost mode" with one button, remotely lock the screen of the lost phone, and display messages and contact information on the lock screen interface, making it easy for people who pick up the phone to contact the owner.
If the phone is lost and it is confirmed that it cannot be recovered, the user can also remotely erase personal data and permanently delete all contents and settings in the device to ensure that the data is not leaked. At the same time, the activation lock will be opened automatically, and the phone can only be reactivated and continue to use only by entering the bound Huawei account password.
More complete protection, so that personal digital assets can be inherited
Nowadays, users' pursuit of information security is more than the present. When people leave the world, can digital assets and information still be retained? Huawei's "digital asset inheritance" function allows users to choose digital assets including cloud map libraries, contacts, memos, calendars, cloud disks and other digital assets according to their own needs, and add trusted relatives and friends as their digital assets heirs. When the setup is complete, the system generates an inheritance key for the user. The inheritor who holds the key can gain access to the inherited data only after multiple verification. Users' personal information goes beyond the limitations of the life cycle and is protected for a long time.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.