Academician Li Yuhang: identity authentication is the core part of the security system

Author:China Science and Technology N Time:2022.09.14

Li Yuhang, an academician of the National Academy of Engineering of Ukraine, the first batch of experts from China Science and Technology Think Tank, and a digital technology and network information security expert. He is currently the chairman of the United Nations Digital Security Alliance, chairman of the International Cloud Security Alliance Grand -China District, and chief scientist of security at the Safety Computing Center of the Chinese Academy of Sciences.

Li Yuhang has long been engaged in the forefront of network security fields and has achieved important influence scientific research results and industrial results. Microsoft has become a benchmark for information security. Huawei has become an industry model for cyber security and benefits billions of users and equipment worldwide. Essence

Help Microsoft as a benchmark for information security

Li Yuhang worked in Microsoft for nearly 16 years from 1998 to 2014. Since Microsoft's preparation of government security plans and Microsoft in 2002, Microsoft has set off a trustworthy calculation. Under the leadership, the Microsoft Terminal Terminal Project "Consent Decree" U.S. government antitrust reconciliation agreement has laid the foundation for the security of Microsoft Cloud computing. Although the Internet speed, computing power, and storage of the Internet data center could not reach the current level of cloud computing. In fact, Microsoft had already done the predecessor of cloud computing. At the same time, Li Yuhang led the team to do a lot of security automated management. Li Yuhang said, "Everyone said that Microsoft has fifteen or six years of experience in cloud computing, which starts with this project led by me. At that time, it was already done very solidly the predecessor of the cloud computing technology. There is no big breakthrough in calculation except virtualization. "

In order to share Microsoft's Windows source code on the Internet, Li Yuhang invention has designed a highly secure network "Microsoft Source Infrastic Infrastic Infrastic Infrastic Infrastic Infrastruction" based on trusted identity and dynamic verification. The solution extends the company's highly secure internal network to the Internet, allowing Microsoft employees to achieve secure and seamless connections with the company's network through the Internet through the Internet through every corner of the world, which greatly improves The productivity of the entire enterprise. At the RSA Conference in the world's largest security conference in 2007, Bill Gates specially talked about the safety strategy of Li Yuhang's conception when he retired. Many companies are now using this technology, so this strategy has actually implemented Microsoft's products through a large number of Microsoft architects and engineers. This is also an industrial practice based on similar concepts before the zero trusted model was proposed.

"Identity certification is the core part of the security system." Li Yuhang has repeatedly discussed with his friend Schmidt on a higher level of security security issues. Later, Schmidt became the "Internet Tsar" of US President Obama (2009, Obama announced the establishment of a network security office in the White House and appointed a network security coordination director to formulate a national network security strategy. The resource, after the office, is called "Internet Tsar"), and their discussion and consensus eventually promoted Obama to issue the United States' National Strategy of Network Space's Trusted Identity. "

Help Huawei becomes a role model for network security

"I want to give back my experience and knowledge to the world, especially in China." Professor, etc., bring the advanced technology of the industry to the academic world, a bridge between the industry and the academic world, and at the same time, it also plays a bridge role in China and foreign countries, bringing advanced American experience to China to help Chinese companies go international. In continuous contact with China, Li Yuxun selected Huawei as the new starting line and as Huawei's chief network security experts to help Huawei do a good job of "core-end-cloud" security work, so that customers around the world can use Huawei's cloud tube with confidence. The product. "The security incidents in the Internet and cloud computing services will continue to appear, because everyone also knows that hackers and criminal organizations will continue to attack cloud computing, but I think cloud computing is an industrial development trend and irreversible. It is necessary to unite the industry security experts to do a good job of network security work and escort cloud computing. "Li Yuhang believes that the overall level of China's network security needs to be improved. This work is mainly done from two aspects. One is the product Through the service, the most basic security requirements are made, such as obtaining a security certificate to prove to the user's proof of the most basic requirements and get the trust of the user. In addition We will carry out security protection and monitoring work more comprehensively. By reducing risks and reducing vulnerabilities to ensure that users' data and privacy can be protected in cloud computing. In addition, the use of digital technology to develop fundamental security structures and schemes is also important.

Lead the global digital security direction

As the technical strategic consultant of the International Cloud Safety Alliance and the Dean of the Greater China Research Institute, Li Yuhang led the leadership of cloud security guidelines, standards, and architectures, and expanded the deployment of security research on quantum computing, artificial intelligence, and the Internet of Things. Guidelines and standards for industrial development output series. He realized that the digital economy is hailed as the "key" of the Fourth Industrial Revolution, and has become a new engine of the global economic recovery. The digital economic governance system and a reliable digital economy security system. After 5 years of retirement from Huawei, in order to implement the country's "building a digital security barrier" spirit and the "digital cooperation roadmap" of the United Nations Secretary -General, Li Yuhang initiated The United Nations Digital Security Alliance. "In the process of the rapid development of the digital economy, the virtual world is integrated with the physical world, the security threats and security needs change, and the traditional security industry is backward in concept, which can no longer meet the demand for escorting the digital economy development. Therefore, the upgrade of network security and information security is the general trend, including parallel data security and privacy protection. This upgrade version can be called "digital security. "

Related Links:

Introduction to Academician Li Yuhang

Li Yuhang has long been engaged in the security of multinational enterprises for a long time. He Zeng served as the chief network security expert of Huawei Group and the International CSO of the International CSO, Microsoft Global Chief Security Architects and China CISO, IBM Global Service Chief Technology Architects and other technical enterprises. Zero trust and global pioneers in the field of IAM successfully build a technology company and digital transformation companies in the world's leading network security competitiveness. Won the International Cyber ​​Security Leadership Award, the United Nations Global Science and Technology Innovation Progress Award, China Big Data Technology Communication Award. It is also awarded academic positions such as Xi'an Jiaotong University senior Fellow/guest professor, honorary professor of Peking University, part -time professor of Nanjing University of Posts and Telecommunications, and University of Washington University. The formulation of network security and identity security strategies in many countries such as bricks and Shanghe has led the global digital economy, industrial Internet, and emerging technologies in the direction of security strategic development direction. ) More than ten works such as security architecture technical guide "," 5G security "," cloud computing 360 degrees "," Big Data Revolution-Theory, Model and Technology "have published a large number of academic papers and professional white books.

- END -

Can heavy rainy weather be artificially intervened?

From June 26th to 27th, a round of heavy rainfall approached Beijing -Tianjin -Heb...

Another heavyweight scientific research institution landed on the first phase of the West Lake District to tackle brain regeneration topics

Zhejiang News Client reporter Shen Lin Correspondent Yang Jianmin Yang Jianmin Che...