Building a "call security" defense line, there are more than one "security lock
Author:Yueyang.com Time:2022.06.30
"Quietly planting the Trojan horse in the mobile phone, you can steal the other party data remotely; if you secretly install the eavesdropping software in the mobile phone, you can tap the other party's call content at any time ..." This is the classic bridge in many movies,
However, if this scene in film and television works is staged in reality, how terrible it will be!
Ren Kui Team of Zhejiang University School of Network Space, the research team of the University of McGill, Canada, and the University of Toronto jointly published a research result focusing on the eavesdropping attack of smartphones: the smartphone app can use the built -in acceleration of the mobile phone when the user knows without knowing it. The sensor realizes the voice of user voice, and the accuracy rate reaches 90%. Without a special authorization of the system, the smartphone APP can eavesdropping through the acceleration sensor collecting the sound of the sound of the phone speaker.
Think carefully! The mobile phone is an indispensable communication tool for modern life. If this illegal eavesdropping method is used for personal consumers, then personal users are undoubtedly like "naked". The risk of property loss; if this illegal eavesdropping method is used in industry users, especially sensitive industries, the consequences may be unimaginable. As small as personal privacy, as large as property and even life safety, the problem of calling for calling should not be smaller.
Industry custom terminals have continuously improved the demand for call security capabilities
At present, with the rapid development of information and communication technology and the widespread popularity of smart terminals, the mobile Internet has strongly promoted the deep integration of the Internet and the real economy with its high advantages such as its general, connecting, intelligent, and inclusive, and it has also become a digitalization of thousands of industries. The strong driving force for transformation and innovation.
For example, government affairs, finance, emergency, electricity, taxation, industry and commerce, finance and other industries have a strong demand for mobile office and digital transformation. As the equipment closest to end users, the industry custom terminal plays a key role in the industry's digital transformation process.
With the frequent global network security and information security incidents in recent years, more and more industry customers have increased information security and data security requirements. In particular, some special industries involve sensitive information. The requirements for "call security" are more stringent, which also puts forward higher requirements for the call security capabilities of the industry custom terminal.
Construct a three -dimensional security protection system for customers
In this regard, the custom terminal of Dingqiao industry has created a three -dimensional security protection system from "end, tube, cloud". The "black technology" defense line built by Dingqiao's call security for the industry can be more than one "security lock". Among them, on the terminal side, Dingqiao Industry custom terminal can help industry customers to achieve communication security, which can meet the three -level requirements of equivalent 2.0, and provide a variety of security customization functions, including encryption input methods, encrypted calls, encrypted storage, and instantaneous communication. Help industry customer business safety, compliance, and efficient.
· Encryption call: VOIP encrypted call or Volte encrypted call can achieve end -to -end call information security;
· Secret letters: Input and encryption of various instant messaging tools such as WeChat, nailing, WhatsApp and other instant messaging tools;
· IM transmission encryption: information encryption transmission, automatic decryption display;
· File storage encryption: Support pictures, video, audio files and photos, video, recording encryption preservation in mobile phones; also support email encryption, office flow encryption/secret reading, etc.;
· Number hidden: hide the key part of the number to prevent the leakage of customer information and being maliciously stolen;
· Calling full recording: automatically turn on the call recording function when answering the phone. The recording file is saved in the mobile phone, and the call content and telephone usage can be traced back to the content of the recording;
· Call recording: Save the recording of both parties in different documents to facilitate subsequent audit needs;
· Tell the white list: can block the three -party call. After entering the specific working area, you can only get the medium number of the white list. All other numbers cannot be played.
It is worth noting that the custom terminal of Dingqiao Industry has also launched the industry custom terminal privacy three defense characteristics software: anti -eavesdropping, anti -sneak shot, anti -positioning function characteristics, support the privacy mode to completely turn off the mobile phone to obtain sound, video, location information on the bottom layer of the operating system Wuling up to avoid being eavesdropped, sneaked, and located without knowing it.
As mentioned earlier, "Rogue Software" may use the audio signal of the mobile phone to sample the mobile phone with the acceleration of the mobile phone without perception of the user, and then restore it to achieve the purpose of eavesdropping. In response to the acceleration sensor eavesdropping, the customized terminal of Dingqiao Industry can perform system -level security customization. Through in -depth customized innovation algorithms, the acceleration sensor anti -eavesdropping characteristics are achieved to ensure the privacy and security of customers' calls.
- END -
Lenovo Wang Liping: stronger "1" to make "n" is the direction of smart office release corporate productivity
Cover reporter Ouyang Hongyu intern Shao LijunThe 1 of the industry must strengthe...
Live Trailer | Summer Solstice Star Watching Tour
Recently, propaganda words such as Seven Stars Lianzhu, One Hundred Years of Encou...