Yuanxin Technology is committed to the development of Yuanxin intelligent mobile operating system, mobile overall solution and Yuanxin OS ecological construction. Its self-developed Yuanxin intelligent mobile operating system is the only mobile operating system in China that has passed EAL4 security level.
"Mobile terminals, due to their portability, the physical environment and network environment will change over time, and because of the characteristics of their wireless access, the potential attack surface is greatly increased, and the uncertainty and risk are higher. It is necessary to break the traditional static protection thinking, and form a safe closed loop with innovative credible situational awareness + dynamic empowerment and empowerment." On October 12, at the 32nd National Computer Security Academic Exchange Conference Dr. Zou Shihong, Chief Security Officer of Yuanxin Technology, said that in response to the security problems faced by mobile new terminals and traditional terminals, Yuanxin Technology designed trusted situational awareness and dynamics based on the self-developed high-security trusted operating system. The secure closed-loop architecture of empowerment can change before the attacker and completely reverse the passive defense of the previous defense.
Based on the innovation, professionalism and expandability in the field of mobile information security, Yuanxin Technology won the "Special Contribution Award" in the "32nd National Computer Security Academic Exchange Conference".
At present, with the development of mobile Internet of Things, industry information, and 5G, in the context of the full connection of people, people and things, things and things, the demand for mobile terminals in the fields of cloud computing, Internet of Things, artificial intelligence, etc. is rapidly Growth, the space and environment faced by the mobile side are also more uncertain, such as the attack surface and the threat, the risk is higher, the complexity is higher.
As a pioneer of the domestic mobile intelligent operating system, Yuanxin Technology believes that the mobile terminal naturally has more sensors, and the perceptible data is more abundant, and the demand for security is more urgent. Based on the national information security strategy requirements, Yuanxin Technology is committed to breaking through the current monopoly in the field of mobile intelligent operating systems, providing safe, reliable and easy-to-use mobile operating systems and information for party, government, military and information-sensitive industry customers. Security service.
Dr. Zou Shihong introduced that Yuanxin Technology independently developed the CPU (central processing unit)/MCU (microcontroller)/MPU (microprocessor) management, core runtime library, network/communication protocol, development tools, resource management based on LINIX kernel. , application signature, loading process and other core functions of the operating system. After testing and evaluation by the Software and Integrated Circuit Test Center of the Ministry of Industry and Information Technology, Yuanxin Technology's mobile intelligent terminal operating system has 81.6% of its own code files.
It is understood that Yuanxin Technology's core product, SyberOS, has a series of core security innovation technologies, which realizes the controllability of intellectual property rights, the ability to control independently, the development of self-control, and the controllability of the supply chain. It is the only EAL level 4 security in China. The certified mobile intelligent operating system fills the gap in China's core technology in the field of information security.
Trusted Situational Awareness + Dynamic Empowerment Empowerment: Dynamic Security Closed Loop Based on Active Defense ThoughtCombining the security problems and severe challenges faced by mobile terminals, Yuanxin Technology has passed the high security and credible terminal operating environment, Root decentralization, data non-landing, and full lifecycle terminal security solutions on the basis of independent controllability. The series of measures such as integrated security solutions at the cloud network side are the first in China to implement a security architecture that focuses on the terminal side and covers the dynamic empowerment of the cloud, network and end.
High security and credible terminal operating environment: The independent research and development features of the operating system enable full security control from the hardware layer to the kernel layer to the user layer: signature legality through pre-run binary signature verification and runtime dynamic metrics Verification, dynamic tamper-proof verification, two-way authentication from the hardware layer to the kernel layer to the user layer, untrusted code can not join, thus building a credible, robust trust chain. On this basis, dynamic security metrics and perceptions are made. The 'end' becomes an important part of situational awareness. The Yuanxin security engine reports the behavior of the terminal and the perception of the environment to the Yuanxin Trusted Cloud, while the cloud and other data of the enterprise Do integration to form situational awareness of big data. The Meta-Intelligence Analysis Engine analyzes these big data to generate security risk reports, and the decision-making center issues corresponding security permissions and capabilities. â€
Root decentralization: Compared with the traditional permission mode, Root decentralization solves the important problem that Android system will be attacked or controlled by point-to-face once it is rooted, and it forms trusted computing and security guidance, multiple access control, End-to-end lifecycle security solutions based on file granularity encryption, multi-factor authentication, security centers, auditing systems, and typical MDM deployments have the advantage of "a little fall, other security."
The data does not fall to the ground: any application can be set to run in the data non-landing mode, the application itself does not need to be modified, and the setting is permanent. The application runs in a private security environment, and the data generated by the application is not persistently stored in the storage device, and the application does not perceive the existence of the private environment. After exiting the app, the runtime environment will be destroyed. It burned after reading, ensuring that the data did not fall.
End-Life Security Solution: EMM is based on Yuanxin intelligent mobile operating system. It has deep-rooted OS remote control for mobile terminals, human-centered device management concept, flexible configuration and control of hundreds of functions, and complete device life cycle. Management and other advantages, to achieve the full functionality of MDM (mobile device management), MAM (mobile application management), MCM (mobile content management). From the underlying OS to the upper-layer application, while taking care of employees' daily life, it can meet the security of enterprise mobile terminals and data.
Cloud network-side integrated security solution: The main feature of strong security and high trust in terminal security, key codes and modules will not be replaced, there is no risk of total loss of control, and supporting technologies include trusted booting and Root decentralization. In terms of network security, data leakage is the main feature. Support technologies include VPN, remote data destruction, data encryption, and data erasure. In the situational awareness, based on the autonomous controllable terminal and network for trusted data collection, the big data is aggregated on the cloud and the AI ​​technology is used to accurately sense the situation. In the dynamic strategy, dynamic empowerment is based on situational awareness, and the attacker takes the initiative to make changes.
Compared with the traditional protection rules of setting protection rules and setting protection indicators, Yuanxin Technology designs security based on trusted situational awareness and dynamic empowerment based on core capabilities and using cutting-edge technologies such as big data analysis. A closed-loop architecture enables a highly reliable security solution. The solution collects multi-dimensional information such as cloud, network, and end running status and physical attributes to perform security situational awareness and intelligent analysis. It has powerful edge computing capabilities and local decision-making capabilities. The local policies are flexible and configurable, and can be remotely updated at any time. Hardware, software, network, data, communication and other aspects provide dynamic active or passive security capabilities, which can dynamically change the security capabilities of the overall system, greatly improving the security capabilities of the system.
Yuanxin Technology's original information collection and cloud information communication protocol not only occupies very low computing, storage and bandwidth, but also is very flexible and configurable. It can adapt to various information types and is fully capable of covering military, industrial and various types. The Internet of Things and consumer information, encryption and verification schemes can be flexibly upgraded to adapt to the development of high-performance computing computers in the world and prevent brute force cracking.
Promote ecological construction and expand industry applicationAfter three years of rapid development, Yuanxin Technology has formed an ecosystem with the core operating system as the core and IM, EMM, OTA, etc. as a general service, and established a good ecosystem covering key hardware and software manufacturers, security vendors and application vendors. The environment has formed four major solutions for mobile government, smart policing, safe production and military-civilian integration.
At present, SyberOS, a domestically-made autonomous mobile terminal operating system, has successfully served the domestic military, public security, government affairs, fire protection, secrecy, energy, water conservancy, and judicial industries, and has been widely recognized by domestic users. Based on the innovation, professionalism and expandability in the field of mobile information security, Yuanxin Technology won the "Special Contribution Award" in the "32nd National Computer Security Academic Exchange Conference".
Different from traditional FR-4 (plastic), ceramic materials have good high-frequency performance and electrical properties, and have properties that organic substrates do not have, such as high thermal conductivity, excellent chemical stability and thermal stability. Ideal packaging material for large scale integrated circuits and power electronic modules.
Ceramic PCB Manufacturer,Ceramic PCB Board,Ceramic Circuit Board,Ceramic Printed Circuit Board,How to Manufacture PCB
Huizhou Liandajin Electronic Co., Ltd , https://www.ldjpcb.com