Technologies and Regulations Shape a Trusted Digital Future
Predictions
Directions for Exploration
ICT enables digital trust
Snapshot from the future: Intelligent agents with digital identities and trusted identifiers
The explosive development of large language models (LLMs) has increased AI penetration in all sectors. This has led to various AI-based intelligent agents emerging in both the digital and physical worlds, in turn increasing productivity, facilitating creativity, and turbocharging economic development. Digital identities build trust between people and intelligent agents so that they can engage and collaborate in new ways.
Snapshot from the future: AI security to ensure trustworthiness in the digital life
AI systems are increasingly integral to various sectors, and so when they are attacked, the impact can be huge. In the future, AI systems will increasingly need to support AIGC provenance and verification. Meanwhile, stringent technical requirements must be put in place to ensure the security of AI systems and models, as well as the trustworthiness of AI input and output data. This can help mitigate the risk of AI system misuse and safeguard the value generated by AI.
Snapshot from the future: Digital watermarking to support information provenance
In the digital world, data will be the most important asset, positioning it at greater risk of theft and misappropriation. The unprecedented capabilities provided by AIGC and similar technologies, like natural language processing and image generation, are revolutionizing the industry. If the data assets or generated data is illegally embezzled or misused, the potential harm to individuals and companies will be huge. Digital watermarking–based provenance technology is an effective method for addressing this problem.
Snapshot from the future: PEC technologies that improve computing security
PEC technologies are data security technologies used to protect and enhance privacy and security during the collection, storage, search, and analysis of private information. PEC supports efficient, high-quality services by protecting personal data from abuse, while allowing effective use of the data. This allows us to realize the data's full business, scientific, and social value.
Snapshot from the future: Quantum security that ensures trustworthiness in the digital life
Quantum computing is maturing at a tremendous pace, and is expected to be capable of breaking traditional security algorithms by 2030. Therefore, we have no choice but to transition to PQC and quantum key distribution (QKD), which are resistant to quantum computing attacks.
Rules redefine digital trust
Snapshot from the future: Unified rules that enhance data protection and mitigate data monopoly
Digital trust involves many organizations and stakeholders. Notably, in the realm of personal information protection, the EU has enacted the General Data Protection Regulation (GDPR), while other countries and regions have subsequently adopted similar laws, such as China's Personal Information Protection Law. Combating data monopoly is the only way to prevent large platforms from illegally obtaining, abusing, and trading personal privacy data. This will bolster digital security, ensure fair competition, and foster a robust digital credit ecosystem.
Snapshot from the future: Impartial standards that drive healthy ICT industry development
Governments and industry organizations must establish unified cyber security standards that are technology-neutral and equally applicable to all enterprises and all ICT products. These standards will ensure that ICT products can be independently and comprehensively verified and evaluated. As a result, organizations will be able to select products that meet their specific security requirements based on the verification and evaluation results, and foster healthy development within the ICT industry.
Snapshot from the future: A cyber security and privacy assurance system that boosts digital trust
One of Huawei's key strategies is to build and implement an end-to-end global cyber security and privacy assurance system. In compliance with applicable laws and regulations in countries where we operate and international standards, we are continuing to invest in an effective, sustainable, and reliable cyber security and privacy assurance system that addresses the requirements of both regulators and customers, as well as industry best practices. Further still, we actively engage with governments, customers, and industry partners to address cyber security and privacy challenges.