The technological flood of rebirth

Chapter 420: Trusted computing

Views:

In fact, network security is not just about firewalls and network virus prevention. There are actually many ways to strengthen network security, but they are not available yet, so Zhao Yi did not do it himself.

For example, establishing trusted computing technology involves various trusted protocols, trusted hardware, etc. Compared with the current Internet technology, the security is much higher.

If combined with the current intelligent network security system owned by Jindun Technology Company, the security level will be significantly improved, and it is basically guaranteed to be as solid as gold.

It’s just that the establishment of this system requires the cooperation of many links, because trustworthy computing requires that every link must be trustworthy to ensure that the final result is trustworthy.

The basic idea of trusted computing is to first build a root of trust in the computer system. The credibility of the root of trust is jointly guaranteed by physical security, technical security and management security.

Then establish a chain of trust, starting from the root of trust, to the software and hardware platform, to the operating system, and then to the application, with one level of measurement and certification, and one level of trust.

Extending this trust to the entire computer system to ensure the trustworthiness of the entire computer system is very different from the current network model.

And why Zhao Yi didn't directly develop this network model at the beginning? It's because this network model has low freedom and poor dissemination, which is not conducive to the early development of the Internet.

Moreover, the cost of this trustworthy technology is relatively high and is not suitable for ordinary people to use. It is more suitable for large enterprises or large systems.

For example, the State Grid, as a large system as a whole, has great necessity to adopt this trustworthy computing network security model, and it has enough ability to bear the high cost.

As for individuals or small businesses, it is unnecessary to bear such costs. Even if network security brings certain threats, it is not enough to offset the costs they bear.

As a company determined to be the best network security service provider in the world, Golden Shield Technology must conduct research on these technologies and work with its brother companies to formulate complete standards.

Just thinking about the current number of employees of Jindun Technology Company, which is only a few hundred people, it is probably beyond the capabilities to carry out such a big plan, at least it will be difficult to achieve any results in the short term.

In the end, Zhao Yi could only say to Pan Jianjun: "You should recruit as many senior technical personnel as possible. Such a number of people can only maintain the current business, and it may not even be enough.

Originally, I was thinking of asking you to start establishing a trustworthy computing technology research project team, but looking at this situation, I guess it’s too much. "

In fact, the concept of trustworthy computing technology has been related to the concept since the 1960s, but there is no clear definition until now. Everyone just has a vague idea and feels that it must be done.

As for how to do it, no one is very clear at present, and this kind of trusted computing technology can only be used by large enterprises. Small enterprises don’t have to think about it, and no one will pay attention to you.

Because this system is destined not to be able to be done by one company, it must be done with the cooperation of other key companies.

Although Jindun Technology Company is still relatively small and its business is very single, its brother companies are large in size and have mastered key computer-related fields, and can cooperate with them to formulate a feasible standard.

And together, they are capable of building a complete trusted computing network. After all, whether it is the system level or the application level, Fanxing Software Company and Building Block Software Company have considerable strength, and even occupy an absolute leadership position.

As for the underlying construction, it is within the business scope of Hengtong Communications Company, Huawei Technology Company, Tianxing Semiconductor Company and Qingtian Semiconductor Company.

As for other terminal products in the network, Polaris can also provide relevant product support, or add these trusted computing-related protocols and technologies to their existing products.

Moreover, because Jindun Technology Company has an intelligent network security system, it does not even need to use the above-mentioned methods to achieve trustworthy purposes. It only needs to embed intelligent network security system identification code snippets in each link to meet the needs.

This is easier than distributing a root of trust, and the technical difficulty of implementation is much lower. It is not only applicable to local area networks, but can even be implemented on the public Internet.

In fact, the role of trusted computing in the current Internet stage is not particularly obvious, but its application in the Internet of Things has more advantages.

As the president of Golden Shield Technology Company, Pan Jianjun certainly understands the concept of trusted computing, but there is no precise standard yet, so he only has a vague concept in his mind.

Seeing that Zhao Yi had no intention of going into details, Pan Jianjun, who came from a technical background, how could he easily let go of this opportunity? He quickly said: "Although we do not have the conditions yet, I am still very interested in this concept.

So I would like to trouble Mr. Zhao to tell me about the idea of trustworthy computing technology. If the conditions are met, we can start relevant research immediately and avoid many detours.

Even if it is not possible to start research and development at present, you can still do some preliminary conceptual research and theoretical construction to save more time for future implementation. "

Zhao Yi did not intend to talk about this now. After all, the Internet has just developed, and it is too early to talk about it. But since Pan Jianjun is not ashamed to ask, he is embarrassed not to say it. After all, the company belongs to him.

So he said: "Okay, then I will talk about my research in this area and combine it with the technical advantages of your current intelligent network security system to build a trustworthy computing network model that is unique to you."

Hearing what Zhao Yi said, Pan Jianjun immediately took a small notebook from his desk, then picked up his pen and waited for Zhao Yi's next words.

Seeing what he was doing, Zhao Yi also smiled and said, "You want me to explain it in detail, so seriously."

"Isn't this a rare opportunity? It is very difficult to meet you, not to mention the technical explanation. We must cherish this opportunity. I am not afraid of your details." Pan Jianjun said.

So Zhao Yi started from the traditional concept of trusted computing. This lecture lasted an entire afternoon, and it was just a concept and did not involve specific technologies.

When the lanterns first came on, Zhao Yi stopped his narration, while Pan Jianjun almost filled up his notebook with notes. Seeing Zhao Yi stop, he quickly shook his sore wrist.

Then looking at the scene outside the window, I realized that the whole afternoon had passed like this, and Zhao Yi only explained the conceptual part, which shows the complexity of this technical system.

But although Pan Jianjun's wrist was sore, he was indeed in high spirits, because the more he thought about it, the more subtle it became. How could this not be attractive to him with a technical background

"Okay, it's been an afternoon, I guess your hands won't be able to hold the chopsticks anymore, I'll just explain the rest tomorrow," Zhao Yi said.

So the two of them ended the lecture and went out to the cafeteria to eat. As for their accommodation, they were still prepared to spend the night here and were unwilling to go anywhere else.

Although there are only a few hundred people in the company, Jindun Technology Company still built some dormitories when it was building here. The main purpose is to provide rest for employees who work late or are on duty.

After returning from dinner, Pan Jianjun sent Zhao Yi to the rest room and left. When Zhao Yi entered the room, he saw that it looked like an ordinary express hotel in his previous life. Although it was a bit shabby, it could not be said to be shabby. It should be. All are available.

After dealing with this for a night, Zhao got up early and went out to the cafeteria to have breakfast. He saw Pan Jianjun already waiting here, so the two of them had breakfast together.

After breakfast, the two of them hid in the office. This time Pan Jianjun learned his lesson and no longer took notes with a pen. Instead, he prepared to use a laptop to take notes, which was faster and easier.

This time, Zhao Yi plans to explain the establishment of a trustworthy computing system, the application scenarios of trustworthy computing, and the establishment of his own trustworthy computing system in combination with intelligent network security systems.

In this way, another day was spent here. Fortunately, in the evening, he finally explained all the knowledge he wanted to explain this time, and even added many algorithms he designed himself.

If Golden Shield Technology really relies on these technologies to develop trusted computing, the difficulty will be greatly reduced because it has already solved all the key and difficult problems for them.

As for the technical details inside, I will not describe them here. Interested readers can check the relevant information online, which should be more detailed than what the author describes.

Zhao Yi combined with the advantageous technology currently owned by Jindun Technology Company and proposed a trusted computing system that is different from the traditional trustworthy computing system, because the cost of the traditional trusted computing system is too high and the difficulty is too great.

For example, regarding computer hardware, it is necessary to go through various hardware links to establish a trusted root and trustworthy reports, which requires close cooperation from a third party, and the difficulty can be imagined, let alone other links.

However, if combined with an intelligent network security system, these tasks can be omitted. Only a piece of intelligent code snippet provided by Golden Shield Technology Company can automatically generate a trusted root from these things.

There is no need to make changes at the hardware level, and there is no need to rely on third parties for support, so the difficulty is naturally greatly reduced.

Even further, by making changes in the current intelligent network security system and collecting hardware information according to a specific algorithm, an unbreakable root of trust can be generated, which will be even less difficult.

Since the core code of the intelligent network security system is encrypted, Zhao Yi specially provided a set of algorithms and asked Golden Shield Technology Company to write an external module based on this set of algorithms and embed it into their client program.

Of course, just like this, it is necessary to ensure that all computer systems maintain network connectivity with the backend of the intelligent network security system, that is, they have the characteristics of central authorization.

But more network systems, especially more sensitive internal network systems, do not want to be connected to external computer networks all the time.

Therefore, Golden Shield Technology Company also needs to provide a decentralized and intensive trusted computing system, which requires ensuring that all devices within this network system are installed with trustworthy modules.

This trustworthy module can be software or special hardware. In short, the network equipment installed with this trustworthy module will automatically generate a trustworthy association and jointly undertake the establishment of a trustworthy computing network.

In fact, both of these models need to be developed by Golden Shield Technology Company in the future. The centralized trusted computing network can be used in the field of public network security, especially with their intelligent network security clients, which makes it easier to do this.

The decentralized trusted computing network can be used by large enterprises, government departments and sensitive units with high security requirements.

Of course, the application scenarios are not limited to these. When the time comes, Jindun Technology Company can customize the requirements according to the actual application environment. I believe they can do these things well themselves.

After eating dinner here, Zhao Yi did not plan to rest here. Instead, he drove directly to Polaris Game Company, intending to take a look at the situation here and rest here for a night.

At last year's annual meeting of Polaris Game Company, Zhao Yi decided to separate Polaris Game Studio, turning the studio into a relatively independent game company, and moving its headquarters from Shenzhen to Jiujiang.

The reason for making such considerations is mainly because Polaris Game Studio already has strong profitability and does not need to rely on Polaris Company to survive.

By becoming independent, they may be able to exert their autonomy and independence more quickly, develop faster, and be more adaptable to changes in the market environment.

Of course, the relocation of the headquarters to Jiujiang is based on the fact that except for Hengchen Technology Company and Jindun Technology Company, which have a certain degree of profitability in the industries currently arranged here, several other companies are in the stage of burning money.

Zhao Yi's main purpose of arranging these industries here is to build Jiujiang into the capital of the Internet. However, with the current profitability of these Internet companies, the feedback effect on the city is limited, especially in terms of taxation. .

So we simply moved the headquarters of the highly profitable Polaris Game Company here. First, in addition to the fact that console games still have a certain market size in the future, the online game market will expand rapidly.

This characteristic is more consistent with his positioning of Jiujiang. In terms of the Internet, there is a lot of room for cooperation with Internet companies, and the aggregation effect is obvious.

Second, their strong revenue capabilities can allow the Jiujiang government to obtain more tax revenue, improve urban construction, and build more supporting facilities to attract other Internet start-ups to relocate here.

The person who received Zhao Yi was Manager Li, whom he had met before. Now that Polaris Games is independent, he has become President Li. His real name is Li Shanhe.

Although Polaris Game Company is independent, it is not a first-tier company under Zhao Yi. Polaris Company still controls all the shares and is considered a wholly-owned subsidiary.

Since it has only been more than half a year since the decision was made to move the company's headquarters here, the headquarters here has not yet been fully constructed, so we can only borrow someone else's space for office work.

So what Zhao Yi sees now is that the conditions are much worse than those at the Polaris headquarters, at least on the surface.

"You should get used to coming here. The conditions are a little bad, but it will be much better after the headquarters is built." Zhao Yi said to Li Shanhe.

"Although the conditions are worse than before, we have seen conditions even worse than this, so employees don't have much resistance. Moreover, the new headquarters is beautifully designed and the difficulties are temporary," Li Shanhe said.

After hearing this, Zhao Yi nodded. Although the domestic conditions in the past few years have been countless times better than before, these people have been accustomed to living a hard life since childhood and are not so pretentious.

And indeed, as he said, the new headquarters of Polaris Game Company is designed to be very grand, and it can be said that no expense was spared. Not only is the venue huge, but the design is also very sci-fi.

Both Zhao Yi and his companies are keen on building such a tall headquarters. This not only shows their strength to the outside world, but also allows employees to have a higher sense of pride and belonging. It has a huge impact on uniting people's hearts. role.

Moreover, although investing in these fixed assets costs a lot of money, it is nothing compared to the future appreciation value.

Although Zhao Yi is desperately trying to expand our food security space and reduce domestic pressure on land red lines, with the development of the economy, the appreciation of this kind of real estate fixed investment is also a certainty.

Zhao Yi did not mean to curb the rise in real estate prices, but hoped to make real estate prices match residents' income, just as a living tool, not a financial tool.

Originally, Zhao Yi planned to come here and find a place to rest for a night. He will do the specific things tomorrow. Regardless of looking at the light coming from the windows of the office building, and it is not sporadic, it shows that there are still many employees working overtime.

"Do you often work overtime? How late do you usually work overtime?" Zhao Yi asked.

“In our software industry, overtime is basically the norm, especially when we enter the critical period and the closing period, overtime is even more normal.

However, we also know that long-term overtime work can cause serious physical damage to employees, and may also affect employees' daily lives. Therefore, we stipulate that overtime work can be up to 9 p.m., and employees will be forced to leave work later than that. "Li Shanhe replied.

Although what he said is true, especially in the game software industry, working overtime is commonplace. On the one hand, it is due to deadlines and on the other hand, it is caused by insufficient human resources.

As for hiring two people to do the work of four people and paying three people's wages, this practice is expressly prohibited in Zhao Yi's companies. I believe Polaris Game Company will not do this.

Then it is most likely caused by insufficient human resources. As for the deadlines, they only come in bursts, rather than working overtime all the time.

Therefore, if we want to solve the problem of employees in the software industry working overtime, we need to solve the problem by improving their efficiency, otherwise this situation will not be well alleviated.

Although the game industry is also a technical job, it is more about creativity. If this is done for a long time, creativity will definitely be suppressed and future development prospects will be seriously affected.

Now most of their ideas are provided by Zhao Yi. After these ideas are used up, they must find a way to solve the problem themselves, so it is particularly important to give full play to the initiative of employees.

Rather than being like this, just as a pure technician, as a screw on the job, which is essentially different from the employees on the production line.

And if this is the case for Polaris Game Company, then there is a high probability that other software companies will be in the same situation, so improving efficiency is particularly important. (End of chapter)