数据安全

Search documents
AI智能体接管手机引隐私担忧,多份安全标准划出红线
Nan Fang Du Shi Bao· 2025-06-17 03:37
和技术层面的短板相比,视觉方案更具争议之处在于其隐私风险:智能体调用的无障碍权限,是安卓手 机系统内一项非常敏感的权限。一位互联网合规人士称,无障碍权限开启后,可以读取屏幕文本内容, 监视和记录用户的所有操作,其中有可能包括用户输入的敏感信息。因此,安卓官网规定,无障碍权限 必须由用户在设备设置中明确打开后才能启动。(详见:当AI接管你的手机屏幕,如何规避"黑镜"式预 言?) 一位接近监管侧的人士透露,工信部门已表示要严格管控手机的无障碍权限使用。 团体标准划红线 6月13日,广东省标准化协会发布团体标准《智能体任务执行安全要求》(下称《智能体安全要 求》),为智能体开发和运营主体提供了明确的行为准则。团体标准不具有普遍性的强制约束力,由本 团体成员约定采用或者按照本团体的规定供社会自愿采用。 AI智能体赛道方兴未艾之际,近期发布的多份团体标准警惕称,部分智能体存在滥用手机系统底层敏 感权限的嫌疑,智能体开发运营商需应对背后的数据安全和隐私保护隐患。 AI接管屏幕引担忧 根据南都此前的报道,在手机终端上,智能体为了打开第三方App,执行用户给出的指令,通常采取调 用应用程序编程接口(API)或视觉识别来模拟用 ...
北京专项整治应用程序违规收集个人信息
Xin Jing Bao· 2025-06-16 02:12
"我们点击进入这个医院的应用程序,在没有任何授权的情况下,后台已经收集了用户的个人信息,比 如安卓ID、应用列表、外部存储文件等,这属于典型的违规行为。"日前,北京市互联网信息办公室网 络安全协调处孟翔边演示边向记者介绍。 针对移动互联网应用程序在使用过程中侵害用户个人信息权益等问题,近期,北京市互联网信息办公室 联合市场监管、公安、政数、通管,以及教育、住建、交通、商务、文旅、卫健、体育等行业主管部 门,聚焦11个民生消费领域应用程序,开展数据安全和个人信息保护专项整治,包含智慧停车、线上点 餐、运动健身、酒店住宿、线上诊疗、少儿培训、房产中介、租借充电宝、生活服务(洗衣、理发)、 电影购票、网上加油等,覆盖北京市各类经营主体(服务商)5万余家。 检测人员随机抽取了197款应用程序进行远程技术检测,发现并督导整改问题388个。其中,未公开收集 使用规则、未征得用户同意收集个人信息、传输通道认证授权机制不完善、未提供账号注销功能等问题 较为集中。 演示 通过小程序获取个人信息 未经用户同意收集个人信息,是北京市互联网信息办公室在近期数据安全和个人信息保护专项整治中, 检测发现的较为突出的问题。 成效 发现并督 ...
人民日报:系好数据“安全带”
news flash· 2025-06-15 23:55
AI诈骗以假乱真、钓鱼软件窃取个人信息、过度索取用户权限……数字经济蓬勃发展,数据安全问题 引人关注。在日前举行的2025中国数谷.西湖论剑大会上,专家围绕数据要素价值释放、人工智能创新 突破、数字时代安全共生等主题展开研讨。中国计算机学会原理事长梅宏认为,当前,我国数字化转型 还处于起步阶段,要从构建高效数据体系、完善数据要素流通交易、强化技术支撑等方面,构建以数据 为中心的组织体系和运行模式。杭州宇树科技有限公司副总经理王启舟表示,人形机器人发展要接收大 量来自物理世界的环境信息,要在安全性基础上建立新的规范,尽快让数据实现可用。(人民日报) ...
系好数据“安全带”(专家观点)
Ren Min Ri Bao· 2025-06-15 21:44
Group 1 - The rapid development of the digital economy has raised significant concerns regarding data security, including issues such as AI fraud, phishing software, and excessive user permission requests [1] - Experts at the 2025 China Digital Valley·West Lake Forum discussed themes such as the release of data element value, breakthroughs in artificial intelligence innovation, and the symbiosis of security in the digital age [1] - The former president of the China Computer Society, Mei Hong, emphasized that China's digital transformation is still in its early stages and highlighted the need to build an efficient data system, improve data element circulation and trading, and strengthen technical support [1] Group 2 - New technologies such as brain-computer interfaces and embodied intelligence present new security challenges, with experts noting the need for a balance between accuracy and safety in brainwave decoding algorithms [2] - The development of humanoid robots requires the reception of vast amounts of environmental information, necessitating the establishment of new safety norms to make data usable [2] - The chairman of Anheng Information, Fan Yuan, stated that real-time regulation through data classification, access control, desensitization protection, and risk warning is essential for transitioning security protection from static to dynamic, ensuring comprehensive security throughout the data lifecycle [2]
2025年中国数据安全行业研究:政策驱动、技术革新与市场爆发下的新机遇与挑战
Sou Hu Cai Jing· 2025-06-13 10:10
Core Viewpoint - China is accelerating the construction of a data security industry system through policy guidance, technological innovation, and market demand, with the industry poised for historic development opportunities by 2025 as the market scale surpasses 100 billion yuan [1] Group 1: Policy Framework - The policy framework for China's data security industry has developed a "top-level design + special policies + local practices" structure, elevating data security to a national strategic level [4] - The "Guiding Opinions on Promoting the Development of the Data Security Industry" aims for the industry scale to exceed 150 billion yuan by 2025, establishing five provincial-level key laboratories and addressing seven major tasks [4] - Local governments, such as Chongqing and Zhejiang, are pioneering data governance innovations, with Chongqing implementing a "data lifecycle security responsibility" mechanism and Wenzhou building a data element circulation safety ecosystem [4] Group 2: Technological Innovation - Technological evolution is the core driving force for the development of the data security industry, with privacy computing technology expected to account for 45% of the data circulation market by 2025 [5] - Key technologies like federated learning, multi-party secure computation (MPC), and trusted execution environments (TEE) are creating a complementary landscape, enabling "data available but invisible" scenarios in finance and healthcare [5] - AI integration is transforming security paradigms, with AI-based threat detection systems analyzing PB-level network traffic and reducing false positive rates to below 0.5% [5] Group 3: Market Demand - The data security market demand is surging due to policy drivers and digital economy growth, with the market scale expected to reach 120 billion yuan by 2025, particularly in finance, government, and telecommunications [6] - The financial sector is investing over 30% of its IT budget in security due to cross-border data transmission compliance requirements, while the government focuses on secure data sharing [6] - Data security is shifting from a "cost center" to a "value creator," with pilot projects in various sectors demonstrating market-oriented data element allocation [6] Group 4: Challenges and Responses - The data security industry faces challenges such as performance bottlenecks in privacy computing and the need for improved data asset rights and dynamic risk assessment mechanisms [7] - The industry is accelerating standardization and ecological collaboration, with national efforts to enhance the data security standard system and enterprises forming partnerships for resource integration [7] - New collaborative models between data exchanges and security service providers are emerging, creating standardized service systems encompassing quality assessment and security certification [7] Group 5: Future Outlook - By 2030, China's data security industry is expected to exceed 500 billion yuan, forming a technologically advanced and ecologically complete industry system [8] - Data security will become a cornerstone for high-quality digital economic development as foundational systems for data rights, pricing, and trading are established [8] - Companies need to focus on three trends: deepening technological integration, upgrading scenario-based services for SMEs, and accelerating global layout to enhance competitiveness [8]
*ST天喻(300205) - 武汉天喻信息产业股份有限公司投资者关系活动记录表
2025-06-12 13:40
Group 1: Financial Performance and Challenges - The company's revenue decreased significantly in Q1 2025, prompting efforts to stabilize existing business and cultivate new growth points to reverse operational difficulties [1][3][4] - The company is facing major operational risks due to tight funding, with issues including bad debts from clients and litigation resulting from improper guarantees [2][5][6] - As of now, the company has not received the 20 million yuan from a settlement agreement, impacting cash flow [4][18] Group 2: Legal and Compliance Issues - The company is actively addressing ongoing lawsuits and arbitration cases, with some still pending judgment [2][14][18] - The company has completed internal control rectifications in 2024 and is under continuous monitoring throughout 2025 [1][2] - The company is seeking to remove itself from the SDN list and has engaged legal professionals to assist in this process [15][18] Group 3: Shareholder and Governance Matters - Wuhan Guanggu has become the largest shareholder, holding less than 15% of shares, with no current plans for increasing its stake [3][18] - The company is in the process of appointing new board members, with two candidates nominated for election at the upcoming shareholders' meeting [18] - The actual controller of the company has not changed, and there are no plans for a change in control [6][18] Group 4: Future Outlook and Strategic Initiatives - The company is exploring various asset monetization avenues to maximize asset value and is considering mergers and acquisitions of quality technology assets [5][7][18] - The company is focused on stabilizing its current business operations while seeking new growth opportunities to improve its financial situation [1][3][18] - The company is monitoring the progress of its subsidiary, Kunpeng Payment, regarding its potential IPO, which remains uncertain [12][18]
白宫屋顶安装星链系统,外界认为这会引发安全威胁
财富FORTUNE· 2025-06-12 13:03
图片来源:Photo by Win McNamee/Getty Images 据报道,埃隆·马斯克的政府效率部团队不顾政府安全专家的反对,在白宫屋顶安装了星链卫星互联网 系统。 据《华盛顿邮报》报道,白宫通信专家对该卫星互联网系统的安装提出了国家安全方面的担忧。 据报道,当时安装工作还引发了政府效率部员工与特勤局之间的对峙。 马斯克政府效率部团队的员工于今年二月在艾森豪威尔行政办公大楼屋顶安装了星链终端,且未事先告 知白宫通信团队。 安全隐患 有三位消息人士告诉《华盛顿邮报》,该设备支持通过星链访问互联网,但缺乏标准的追踪或身份验证 安全措施,这可能导致白宫面临数据泄露或黑客攻击的风险。 与其他政府Wi-Fi系统不同,"星链访客"Wi-Fi仅需密码即可连接,无需通常的用户名或双因素认证。报 道称,星链提供的网络连接可能允许设备绕过安全措施、规避监控并传输无法追踪的数据。 在马斯克离任并与唐纳德·特朗普公开决裂之后,尚不清楚白宫是否仍安装有星链终端,但据报道该卫 星互联网系统也已在其他政府机构使用。 白宫代表未立即回应《财富》杂志的置评请求。 然而,特勤局发言人安东尼·古列尔米对《华盛顿邮报》表示:"我们知晓政 ...
联想首度披露:与火山引擎联合打造"可信混合计算方案"
Ge Long Hui· 2025-06-12 01:22
Group 1 - Lenovo and ByteDance have launched a "trusted hybrid computing solution" that sets a new benchmark for data security and privacy protection in the AI era, utilizing Volcano Engine's AI confidential computing core technology [1][2] - The solution is based on three core technologies: Trusted Execution Environment (TEE), trusted transmission, and end-cloud mutual trust, creating a security system that is safe both online and offline [1][2] - The rapid development of large model technology and the emergence of DeepSeek have accelerated the growth of AI in China, posing significant challenges to data security and personal privacy protection [1] Group 2 - The collaboration between Lenovo and ByteDance enhances the security capabilities of the Tianxi personal superintelligence by extending security from the terminal to the cloud, marking a milestone in building a secure and reliable hybrid AI architecture [2] - The Chinese security large model market is expected to experience explosive growth in the next three years, and Lenovo's trusted hybrid computing solution is strategically positioned to capitalize on this trend [2] - The partnership combines Lenovo's leading hardware capabilities with ByteDance's expertise in AI confidential computing and large model training, creating a comprehensive "end-edge-cloud-network-intelligence" solution [2] Group 3 - The Ministry of Industry and Information Technology has emphasized the promotion of large models in the manufacturing sector, aligning with Lenovo's trusted hybrid computing solution [3] - The solution has demonstrated a 40% increase in digital transformation efficiency for companies like Geely Automobile and Tongwei Co., Ltd. through mixed cloud solutions [3] - The collaboration between Lenovo and Volcano Engine aims to provide a replicable security development model for the global AI industry, facilitating China's competitive edge in the global AI landscape [3]
AI可能泄露可能个人信息?人工智能时代如何筑牢安全防线
Yang Shi Xin Wen· 2025-06-11 10:50
输入一段你想要的问题,生成式人工智能就可以根据你的需求从海量的数据中检索分析生成你想要的文字、图像甚至视频,在方便快捷的同时,其潜在的个 人信息泄露风险也引发担忧。 如何在生成式人工智能时代筑牢个人信息安全防线?在这两天举行的2025年中国网络文明大会各分论坛上,与会嘉宾围绕这一焦点议题展开深入探讨。 中国科学技术大学网络空间安全学院执行院长 俞能海:生成式人工智能技术,说到底它是基于数据的。现在的问题是我们的数据本身,现在各种大模型它 都是要有数据、语料进来,这些语料从个人信息保护角度,哪些语料给、哪些语料不给,源头数据怎么管控,尤其在个人信息保护中间起的作用非常大。 与此同时,基于强大的数据搜集和逻辑能力,人工智能可以综合公开数据、个人数据,结合行为分析挖掘出更深层的数据。 中国科学技术大学网络空间安全学院执行院长 俞能海:信息化给我们带来非常好的一面,但确确实实也给我们留下了新的问题。你只要用了系统,一定会 留痕,自己很多的信息,可能是敏感信息,你自己认为已经把它去掉了,但是通过整合、信息关联,可能在输出的点,它会就被泄露出来。 针对深度伪造技术 发展主动防御技术 如何在保护数据安全和推动人工智能发展中 ...
出海有多难?87%出海失败案例都存在这9大问题
梧桐树下V· 2025-06-09 15:40
Core Viewpoint - By 2025, going overseas has become a "must-answer question" for most domestic companies, as overseas markets are significantly larger than domestic ones. However, the risks and difficulties associated with going overseas are greater than many anticipate due to trade wars, tariff barriers, and anti-globalization impacts. To enhance the success rate of overseas expansion, the "China Enterprises Going Overseas Guide" has been developed to outline common pitfalls and key considerations for companies [1]. Summary by Sections Section 1: Overview of the Guide - The "China Enterprises Going Overseas Guide" consists of 332 pages and 155,000 words, covering nine chapters that comprehensively address practical aspects of overseas expansion, including overseas layout, regulatory requirements, equity structure, approval processes, transaction documents, compliance risks, tax considerations, and regional country analysis [3]. Section 2: Equity Structure - Constructing a reasonable overseas equity structure is a critical step for successful expansion. The second chapter provides three structural diagrams to illustrate how companies should establish their overseas equity structure and the factors to consider. For instance, a case study shows how a company's natural person shareholders set up BVI, Cayman, and Hong Kong companies to transform the domestic operating entity into a wholly foreign-owned enterprise [10]. Section 3: Approval Processes - The third chapter focuses on the approval processes involved in overseas investment and financing. Companies must apply for record-keeping or approval from the National Development and Reform Commission and the Ministry of Commerce, obtaining necessary certificates before completing foreign exchange registration at banks [14][16]. Section 4: Transaction Structure - The fifth chapter discusses transaction structure arrangements and key agreements, such as investment agreements and letters of intent, along with critical clause settings within these agreements [22][24]. Section 5: Compliance Management - Compliance management is essential for companies going overseas. The seventh chapter outlines the current compliance landscape and necessary compliance guidelines, suggesting a six-step approach to build a compliance management framework that integrates compliance into business processes [26][29]. Section 6: Popular Destinations - The ninth chapter shares methods for gathering country information and outlines the basic conditions, import/export structures, important international agreements, legal systems, and foreign investment policies of five popular countries. For example, the UAE, as the second-largest economy in the Middle East, has energy products accounting for 40% of its exports, while machinery and electronics dominate imports at 35% [31].