Geng Jingxin, Director of Lenovo GIC Global Security Lab, explained on the spot
Titanium Media App reported on June 17 that Lenovo’s “Innovative Technology Protects a Better Life” salon was held in the Security Lab of Lenovo Global Innovation Center (GIC). The event showcased the core of Lenovo products under the dual mechanisms of product life cycle security protection, data security and privacy protection, product security defense system, red-blue confrontation and product security sampling in the Lenovo GIC Global Security Lab.
The use of Lenovo smart home smart scene equipment was demonstrated on site, such as improving the protection of electromagnetic shielding materials for key devices, optimizing the filtering logic in the circuit, designing and restarting the electromagnetic protection logic, and strengthening the security verification of the firmware core algorithm.
In response to the biometric authentication problem of simulated smart door locks encountering “fake faces”, Lenovo GIC Global Security Lab has developed a face recognition algorithm against sample generation technology and a special physical medium. While more accurate, it further improves the ability of Lenovo smart devices to resist attacks. For example, ThinkPad notebooks equipped with the Real Sense facial recognition algorithm can solve the problems of face replacement and forgery, leakage and theft of sensitive confidential information based on infrared and depth perception RGB video authentication.
In order to improve the security level of fingerprint unlocking, Lenovo has designed a biometric identification solution through its self-developed fingerprint security detection technology. Through the self-learning anti-counterfeiting algorithm, the false fingerprints of different materials are eliminated to the maximum extent, and the anti-attack ability of the product is improved.
In addition to smart door lock systems, commonly used home smart devices are also the research targets of Lenovo GIC Global Security Lab. Lenovo GIC Global Security Lab research found that some fast charging adapters have security vulnerabilities, attackers can use this vulnerability to modify the firmware to achieve malicious functions, causing the charging equipment to be burned, and even cause fire and explosion.
In order to improve the stability and security of the adapter, Lenovo GIC Global Security Lab, together with upstream and downstream suppliers, led the drafting of the group standard “Security Requirements and Test Methods for Fast Charging Adapters for Mobile Terminals”, and established a comprehensive system for identifying the security risks of fast charging adapters. Unify the standards and basis, convert the mitigation measures of security risks into security requirements, and promote the overall security upgrade of the industry.
In addition, Lenovo has always rooted data security and privacy protection in the design of products. Through AI technologies such as differential privacy and federated learning, it has implemented the R&D system to data security and privacy protection throughout the R&D process.
In addition to solving technical difficulties, Lenovo GIC Global Security Lab also launched a product security management process for the whole life cycle, participated in the unification of network security standards and other contents, and promoted the security ecological construction of smart devices.
Lenovo GIC Global Security Lab has currently deployed product security architecture design, security research and innovation, security compliance and solutions, data security and privacy protection, security red and blue confrontation and other fields.
When talking about future security protection issues, Geng Jingxin, director of Lenovo GIC Global Security Lab, told Titanium Media App that products will become more and more intelligent in 3-5 years, and the technology, means and methods of attack may also be intelligent in the future , is no longer a manual attack. A team in the Lenovo GIC Global Security Lab is mainly researching future threats and attack methods, and how future attackers will treat our devices. Through the continuous accumulation of safety technology, the current products are pushed forward, and their architecture and design are continuously optimized. (This article was first published on Titanium Media App, author/Wu Honglei, editor/Zhong Yi)
For more exciting content, follow Titanium Media WeChat (ID: taimeiti), or download the Titanium Media App
media coverage
Sohu Pin Play Sohu Titanium Media
Related events
- Lenovo GIC Global Security Lab Reveals Secrets, Innovative Technology Strengthens “Home Security” 2022-06-17
- Fourth Paradigm and Lenovo reached a strategic cooperation2020-06-08
- Fourth Paradigm completed the C+ round of financing, with a post-investment valuation of about $ 2 billion2020-04-02
- Lenovo and Baidu cooperate to push smart tablet, support Baidu Xiaodu mode2019-01-08
- Fourth Paradigm completed over 1 billion C round of financing, with a valuation of about 1.2 billion US dollars2018-12-19
This article is reprinted from: https://readhub.cn/topic/8gUOmw2MC50
This site is for inclusion only, and the copyright belongs to the original author.