vivo: From mobile overseas to security escort in the AIGC era

2023.09.13

vivo: From mobile overseas to security escort in the AIGC era

As a technology company that creates great products driven by design and focuses on smart terminals and smart services, how does vivo protect users' data security and privacy? Recently, at the 2023 Amazon Cloud Technology re:Inforce China event, vivo Chief Security Officer Lu Jinghui introduced vivo’s security strategy and how vivo meets security challenges in the AIGC era.

After more than 20 years of development, vivo has transformed from a regional private enterprise into a global enterprise, witnessing the vigorous development of China's Internet, especially the mobile Internet industry.

According to relevant statistics, vivo has officially shipped to more than 60 countries. There are more than 500 million active vivo mobile phone users around the world, and there are more than 320,000 offline sales and after-sales outlets.

As a technology company that creates great products driven by design and focuses on smart terminals and smart services, how does vivo protect users' data security and privacy? Recently, at the 2023 Amazon Cloud Technology re:Inforce China event, vivo Chief Security Officer Lu Jinghui introduced vivo’s security strategy and how vivo meets security challenges in the AIGC era.

Propose security strategies and promote the development of a trusted ecosystem

Shen Wei, founder, president and CEO of Vivo, once said, “Data security and privacy protection are the basic rights of consumers and the cornerstone for companies to gain consumer trust. We must regard data security, privacy protection and legal compliance as corporate R&D and business activities. The red line and basic bottom line that must not be touched in the work should be used to guide the development of all work."

To this end, vivo has built a "PROTECT" security strategy, including seven aspects: data privacy protection, data risk management, product object security, key security technologies, security engineering, compliance management, and security attack and defense. And based on technical practice, vivo has created a thousand-mirror security paradigm to form an overall security technology architecture capability building through the three major aspects of security technology, security engineering, and security offense and defense.

Lu Jinghui said that based on the Qianjing security architecture, we hope to build a trusted environment within the terminal and create a product security experience for users, including key enabling points at the chip, kernel, framework and application levels.

At the same time, vivo empowers the industry through different technical service forms and in the form of open security capabilities. Through the construction of a trusted environment, it empowers payment partners, social partners, and game partners with trustworthy results. partners, etc., to jointly build a healthy and credible mobile Internet ecosystem.

Dual cooperation of technology + culture

In its business overseas and global expansion, vivo needs to choose suppliers with stable services, good infrastructure, excellent after-sales and responsiveness. Vivo hopes to build a more secure and secure digital world. It is precisely because we have seen that Amazon Cloud Technology is an advocate of global cloud computing and cloud security, with a rich node layout around the world, strong infrastructure capabilities, and an excellent innovation culture that Vivo chose to cooperate with Amazon Cloud Technology.

Lu Jinghui said that when companies provide global services, Chinese companies must prove their innocence and prove their innocence. To this end, vivo adopts the safe and reliable global infrastructure of Amazon Cloud Technology and directly inherits the security compliance certification related to Amazon Cloud Technology's global infrastructure, providing basic security guarantees for vivo's overseas expansion and greatly improving its overseas expansion. s efficiency.

In addition, vivo relies on a variety of security services from Amazon Cloud Technology, such as threat detection and incident response (Amazon GuardDuty), identity authentication and access control(Amazon IAM), network and infrastructure security (Amazon WAF), data protection and privacy (Amazon CloudTrail) and risk control and compliance(Amazon Trusted Advisor) and other related services have built corresponding cloud data security capabilities.

Third, vivo has benefited a lot from the co-creation of Amazon’s innovation culture and technological innovation points. In the past year, vivo and Amazon Cloud Technology have cooperated to hold the "No Bad Days" security compliance special exchange event. The event lasted 18 related co-creation and business exchanges, and the cumulative number of people participating in the on-site seminars exceeded 600. people.

Lu Jinghui pointed out, "vivo is a company that emphasizes the construction of corporate culture. Only long-term cultural construction can ensure the long-termism of the company. One of the cores is that 'technological innovation is one of the cornerstones of our long-termism.' We have accepted a While receiving excellent service, I also felt and learned from Amazon’s excellent innovation culture.”

Fourth, leveraging the technical strength of Amazon Cloud Technology, vivo also conducted 68 cloud security related inspections. Through cloud security inspections and related co-creation activities, potential points in the "PROTECT strategy" that require further improvement and cooperation were further clarified and sorted out.

Security capability building in the AIGC era

In the era of artificial intelligence, especially the era of generative artificial intelligence, vivo believes that data is the infrastructure of the artificial intelligence era and the underlying architecture for the development of artificial intelligence technology.

Lu Jinghui said that to promote the healthy, orderly and sustainable development of the artificial intelligence industry, we must pay attention to data security and personal information protection. Both are the "cornerstones" of the orderly and sustainable development of artificial intelligence. This is vivo's view on artificial intelligence. Understand how to protect data security and privacy in this era.

Lu Jinghui summarized the relationship between AI and security into two major dimensions, one is AI for Security, and the other is Security for AI. In terms of AI for Security, vivo already has security protection capabilities such as virus identification and discovery of unknown viruses, and uses many AI-related technologies when processing private data on the client side, such as private computing and federated learning.

In terms of Security for AI, vivo will also use innovative technologies to improve security protection methods in the AI ​​era. For example, generative artificial intelligence is used to solve problems such as endogenous security, content security, operational security and compliance. For example, for the issue of endogenous security, the core is to establish the baseline of corresponding management, the management process/system/standards/tool ​​support, and the control of the data source.

Lu Jinghui pointed out that vivo focuses on what it must do well as a smartphone manufacturer when providing generative artificial intelligence services. Other tasks can be built through the empowerment of our partners. “Because building a healthy and orderly generative artificial intelligence ecosystem requires the joint efforts of all parties .”