The three major enterprises of the Internet of Things Information Security Shi Liangfang

The era of the Internet of Everything means that a large amount of data will continue to be derived. Whether for data storage, data management or data analysis, security is a top priority for designers. Therefore, the ability to integrate security into its own development design and provide customers with quality products that are trustworthy is a key factor in determining whether vendors can take advantage of the Internet of Things and maintain their leading position in the industry. Below, the author will take you one by one, those industry "pioneers" who provide strong guarantees for IoT information security, and see how they respond to the security challenges brought by the Internet of Things.

Infineon: a hundred schools of contention, security into the core competitiveness of mobile payment

The current mobile payment market can be described as "a hundred flowers bloom, a sudden rise." As far as the domestic situation is concerned, the three major operators have begun to adopt mobile payment solutions based on SWP SIM plus NFC mobile phones, and actively carry out the layout in the financial and public transportation sectors. Financial institutions such as Bank UnionPay also actively promote the construction of mobile financial TSM platform, and based on This launched the NFC microSD card mobile payment solution. Some organizations and mobile phone manufacturers have jointly launched an NFC full terminal solution based on built-in security chip. .. .. sudden rise, refers to the attention of mobile Internet payments (such as Alipay, QR code payment, etc.) due to its convenience and good user experience, in a short time to get a large market share.

However, in the face of such a fierce competition, Pan Xiaozhe, the China manager from Infineon's smart card and security department, said that the final direction of the market will gradually evolve into a competition for how to ensure the security of user data.

Pan Xiaozhe, China Manager, Infineon Smart Card and Security Department

Pan Xiaozhe, the China manager from Infineon's smart card and security department, pointed out that as the public's security awareness continues to increase, protecting personal privacy and data becomes the most basic requirement for mobile payments.

When asked how to look at emerging payment methods such as mobile Internet payments, Pan Xiaozhe said: "Square's box payment, as well as emerging payment methods based on Internet technology, are emerging in the market, which is conducive to further promoting the involvement of traditional institutions in mobile payments. Speed ​​and breadth. At the same time, in order to deal with the review of regulatory agencies, emerging payment methods will inevitably need to increase the security level of payment to enhance the competitiveness of the market."

As a well-known semiconductor manufacturer in the security field, Infineon focuses on payment solutions based on high-performance hardware security mechanisms. Pan Xiaozhe pointed out that Infineon is actively participating in the mobile operator's mobile payment plan based on SWP SIM, and has achieved certain market effects. “We are very pleased to see that the latest generation of SLE97 series products are recognized for their high safety, powerful processing power and good quality assurance, and on this basis, the best system interoperability and the fastest movement are achieved. In addition, Infineon is actively deploying a new generation of Boosted NFC full-card products, providing complete system solutions for the Chinese market based on years of research and development, including SIM and microSD, enabling optimal contactless communication. And transaction performance, will become a strong competition for ordinary mobile payments." Pan Xiaozhe added.

Neusoft: Cloud security technology hits the battle of the Internet of Things to protect the "Emperor"

The rapid development of the Internet of Things has caused a fundamental change in the IT architecture: more sensors and "end nodes" are deployed in different regions, and the "brains" of the entire system run on top of the cloud, "brains" and sensors. Connections may be in an incompletely reliable network environment, and these clouds, end nodes, and unreliable networks together constitute the future IT system.

In such a system, the entire cloud, the node end, and the middle network are the objects to be secured by information security, and the entire protected object is relatively dynamic and borderless. In this regard, the traditional information protection system obviously cannot meet the security requirements of the new IT system, so we need a new information security defense idea, and cloud security technology plays a very important role in it.

Du Qiang, Minister of Technology Development, Neusoft Network Security Division

Du Qiang, director of the technology development department of Neusoft Network Security Division, pointed out that the intelligence of the Internet of Things is provided through the back-end cloud computing or server architecture. The back-end is like the brain of the system. Ensuring the security of the brain is inevitably the top priority.

Du Qiang, Minister of Technology Development Department of Neusoft Network Security Division, said: “Cloud security technology first solves the most basic security problem for customers. When customers choose to use cloud computing technology as the back-end infrastructure, the main motivation is to save. Investing, improving the flexibility of system expansion, centralized and convenient management, resource reuse, etc. Designing security products for customers based on the architecture of cloud computing, can integrate the originally isolated systems that need to be managed separately into the cloud environment. A more secure and convenient defense system."

"Secondly, cloud computing technology can make information security products more 'intelligent'. In the past, information security products such as firewalls, because of limited computing and storage resources, tend to be very passive in the battle with intruders, but now, combined Cloud technology security products can easily win this offensive and defensive battle with its near-infinite computing and storage capabilities." Du Qiang added.

Based on this trend, Neusoft's Virtual Security Gateway (NISG-VA) is also based on the technology and demand characteristics of the cloud environment. Du Qiang introduced to us: "When users use NISM-VA, they don't feel that it is an isolated security product. The experience and experience are more like the extension of the cloud platform. It is the expansion and activity of the cloud. Migration and dynamic security protection. This concept has also been recognized by many customers."

——This article is selected from the Journal of the Internet of Things Conference. Electronic enthusiast network original, reproduced please indicate the source!


Supply all model Iphone Battery, it is 2750 mAh IPhone 6S Plus Battery. The battery cell is pure cobalt materials, so the cycle time is more longer than common one. Each battery was checked 3 times at least before shipment, our defective is about 0.01%. The size and capacity same as original. The circuit board have over voltage, over current, over charge and discharge, short circuit and temperature protection. It is your good choice for iPhone Battery Replacement.


All Model Iphone Battery

Iphone 6S Plus Battery

Iphone 6S Plus Battery,Apple 6S Plus Battery,Iphone 6S Plus External Battery,Apple Iphone 6S Plus Battery

Shenzhen Hequanqingnuo Electronic Technology Co., Ltd. , https://www.hqqnbattery.com

This entry was posted in on