Looking back at 2010 from a distant perspective, many exciting events happened in this year. To a certain extent, it can be said that it was a critical year for foreign investment to flow into the mainland and connect the past and the future.
The aftermath of the financial crisis is fading away, and a brand new, unprecedentedly brilliant mobile Internet economy is about to arrive...
“…Remember, all details of the program installation package should be backed up separately, including any information that scans the user’s hard drive and infiltrates the user’s privacy.
All other issues that may go beyond normal product and basic operational functions are highlighted.
You must take this as a warning and never try to do anything malicious on your smartphone's Qingyun App Store. It is okay to collect information within the normal legal framework, but it is absolutely not okay to cross the line.
We must shoulder our due social responsibilities and resolutely say no to excessive collection and theft of user privacy information.”
In the office of the chairman of Qingyun Group, Li Zehua and Ye Feng talked about a software security issue, "Qingyun Mobile Security Manager still has many more functions to add.
For example, based on the identification function of the second call jump of the telecommunications base station, it can prevent criminals from exploiting loopholes and tampering with IP addresses to deceive people. Can this be done? "
Ye Feng was stunned, "Boss Li, this seems to be beyond the scope of our company's business, but of course you must do it.
In theory, it is possible, but in reality it is difficult. First of all, it is not easy to get the cooperation of the three major operators. Secondly, the current network attack methods are diverse, and it is technically difficult to achieve comprehensive protection..."
There are a lot of things to say, but the core is: it is impossible. It may be technically possible, but it is obviously beyond the business boundaries of a private company, and the functional departments will not agree to open the backend to Qingyun.
At the same time, he was very curious. Although his boss usually attached great importance to technical research and development, and gave money and people when needed, he rarely asked about specific technical details. What happened today?
Li Zehua didn't care. He said "oh" and continued, "Then let's temporarily build an early warning system. Once sensitive information such as stranger transfers, winning deposits, etc. is triggered, a warning will be issued immediately.
In particular, we should give children, the elderly and other people with behavioral disorders who are unable to actively distinguish a chance for double protection.
In the next stage, the group will use Qingyun Financial Services Company and Micropayment as the main body, apply for cooperation with mainstream financial institutions across the country, and set up special accounts for ordinary people other than industrial and commercial operators.
Under this marked protected account name, any transfer/payment through micropayment will be protected, except for the current merchant payment delay of 24 hours.
Your technical department should think about whether there are other technical preventive measures..."
He said that this was not a sudden idea, but that he suddenly received a special call from an organization during his spare time at work, telling him that he had won the prize.
Don't get me wrong, it's not the mysterious organization or special agency that everyone imagines, but a thing that everyone wants to kill and is hated by hundreds of millions of people but nothing can be done about it.
In later generations, it has a unified name: electric frying (sensitive word, metaphor).
Li Zehua was speechless. The information he currently used publicly, including his mobile phone card and all publicly registered personal information on the Internet, were another set of clean identities provided by the Six Gates of Magic City.
In short, the identity under his name "really" exists. He is currently clocking in at the administrative department of Qingyun Group and collecting his salary. He usually lives and works in Shanghai with this identity.
Occasionally, you can buy some discounted items on Pinxixi, or have a cup of coffee after eating. In short, as long as you don’t send people to conduct on-site investigations, you can analyze their behavioral tracks through public data.
He is just a lonely and depressed person who just graduated from college and has almost no social life and no family.
People like this are always targeted by people with ulterior motives, and they try their best to empty the pitiful property under their name. This is something that only uncles can tolerate, but aunts cannot.
The moment Li Zehua received the call, he was completely stunned. Was he being tricked?
On the surface, he cooperated with the other party's request, but at the final stage of transferring the funds, he said that he did not have 8,000 yuan in his account and needed to find friends to raise money, and would contact the other party again after he had stabilized the agreement.
He immediately asked Ye Feng to lead a team to come over and check the computer and mobile phone that he used outside of working hours. After checking, they found many loopholes.
There are simply too many problems. Almost all products have the problem of excessive collection of personal information, but it is still unknown at which stage the leakage occurs.
Fortunately, the group's dedicated work computers, mobile phones, and downloaded products have all been professionally tested by the technical department and there are no security risks, otherwise a lot of business secrets would have been leaked.
Ye Feng couldn't figure out his boss's true intentions for a moment, but he nodded and agreed. Optimizing products and providing technical security are within their job responsibilities.
“Also, check the mobile phone number and the specific address of the QQ number. It doesn’t matter whether you can find the person or not. The main thing is to analyze what means he used and whether it can be prevented in time with technology.
Old Ye, don’t underestimate this matter. It is directly related to the implementation of the group’s ecological industrial chain strategy.
Currently, the Big Data Center is testing fingerprint identity and is preparing to establish a verification system of one person, one card, and one machine, using one account to connect all related products of the group.
If there is a large-scale user data leak, how will the outside world view the company and how can users continue to trust the company? "
Li Zehua had no interest in wasting time with the scammer, so after handing over his phone and computer, he asked them to keep it strictly confidential. He didn't want the rumor that he was electrocuted to spread everywhere.
Of course, this is not entirely for himself, but to prevent more people from being deceived and at the same time actively promote the group's business, making Qingyun Group the core security business card of the Internet.
The one-number strategy that the Big Data Center is promoting is to serve this purpose. Simply put, it means using one account to log in to all the group's products, including food delivery, express delivery, taxi-hailing, payment services, etc.
In the early stage, it covered the group's internal products, and then covered all mobile Internet products, becoming the mainstream software authentication and login method.
Through the One Number Strategy, Qingyun Group will establish an ecological chain that users cannot easily get rid of. Just like the binding based on mobile phone numbers in the past, you can change it if you want to, but it is very troublesome.
If an ordinary person changes his mobile phone number or even changes a mobile phone after ten years, he must go through continuous verification on different commonly used software before he can continue to use it. One Number will refine the process.
Just verifying once on this platform is equivalent to passing verification on all products that cooperate with Qingyun Group and provide corresponding authorization.
The most important thing is that Qingyun Big Data Center can verify in real time through the background whether it is the user himself who is operating the communication equipment, and prevent criminals from using No.1 Tong to actively commit evil.
By the way, we can also establish a complete set of user behavior models, develop business projects more specifically, and conduct accurate industry investment prospect assessments.
The information gap determines the profit margin. We master the data on the normal life and spiritual needs of the vast majority of people, provide matching business services, and push them to customers in need through various forms such as advertising.
Solving needs is only the initial stage of commercial application of big data models.
The ultimate stage is to then establish a corresponding information cocoon, push specific short videos and news information to subtly influence users, and try to actively change user needs.
That is, creating demand, constantly conveying potential desire signals to consumers, and through artificial empowerment, making consumers actively buy out of nothing, is the real art of turning stone into gold.
Li Zehua does not want to take the initiative to do evil, but this is the general trend and the embodiment of the collective will of all groups that control resources. If Qingyun Group does not want to fall behind in this competition, it must follow.
Rather than letting this economic nuclear weapon fall into the hands of others, it would be better for him to grab it in advance. At least he will not deliberately stir up some disgusting existence to humiliate the IQ of all Chinese people.
As for being abroad, I’m sorry. Qingyun’s love is only for fellow countrymen, not our kind. Who cares about life and death?
In this life, if there is a slight possibility, he intends to teach the whole world a lesson: Walmart shopping bags are still too conservative, and nearly 20 million "diet dieters" in South Korea are still too few.
At least 5000 million is enough. Every place affected by the squid tentacles should actively learn from Lao Mo and Mou Ting and take out the last bit of resources in the madness.
The squid only cares about killing and not burying, and continues to harvest the world, so he secretly adds fuel to the fire in the back to make everyone have more fun and more exciting...
Technological advances will not only greatly facilitate consumers, but will also be able to more effectively protect consumer privacy, as Qingyun Group's Big Data Center will also enable a full set of electronic virtual identity authentication systems.
In simple terms, it is to borrow the virtual dial-up display system used by takeout couriers to call consumers in the future and upgrade it to a new Internet security information system.
This system is currently under construction and still has a long way to go before it is completed. The ultimate goal is to virtualize all of consumers' basic personal information on the Internet.
Specific functions include a personal identity authentication system. In the future, when registering third-party software through Yihaotong, real and verifiable information will no longer be provided to the software service provider, but a set of random codes.
This set of codes is randomly generated, and only in the Qingyun Big Data Center can the matching QR code identity, contact information, specific residential address and other confidential information be found.
Normally, if businesses want to find consumers accurately, they can only contact them through virtual numbers randomly generated by the system, and subsequent real addresses will also be blocked.
Chichume has already started testing this system on a small scale, and Hummingbird will follow later.
For example, for a takeout order, the province, city, district and county information involved will be covered by the code and will no longer be displayed. The street name, specific building and unit number will still be used in the early stage.
Once the technology matures, it will be covered with virtual codes, including phone numbers. All of this is inseparable from the construction of Qingyun's ecological industrial chain. For example, if a deliveryman gets a takeaway order with only a virtual address and phone number, how can he deliver it?
It’s simple. Based on the employee’s company ID, the corresponding specific address has been matched in the background, and then the route is automatically generated by entering the navigation map.
It can even plan delivery routes reasonably based on the distance of multiple orders.
The most prominent landmark buildings in the surrounding area will provide real-life references to facilitate delivery personnel to accurately locate the product.
You can also transfer the order or perform other operations by scanning the paper QR code of the order. After the order is completed, the QR code will automatically become invalid.
With current technology, only one code can be assigned to each location. The future direction of technological development will inevitably be to randomly generate addresses, and the information can only be viewed through the app background during the validity period of the order.
Once an order is completed normally (no complaints within two hours of delivery), the merchant and the delivery person will not be able to find the consumer through the app delivery traces except through personal memory.
This will fundamentally prevent certain people within the group from taking risks for huge profits and providing user information to external criminals.
Eventually, all data will be automatically uploaded to the QingCloud Big Data Center. Management below the head office will not have the right to view top-secret information and they can only access data fed back by the Big Data Center.
Analyze whether there are any abnormalities in the business behavior in a specific location, whether it is necessary to increase or decrease the number of delivery personnel, and take various response measures, etc.
This is the charm of the big data center. It can enable any product under Qingyun Group to participate in the entire ecological chain and complement each other's advantages.
If competitors want to enter any single industry, they will face competition from the entire Qingyun ecosystem.
It can also use technical means to timely summarize real-time business activities occurring across the country and provide the most accurate feedback and processing.
Subsequent information includes all personal Internet traces such as express parcels, logistics transportation, hotel reservations, air tickets and railway passenger transport, online shopping data, browsing data, recharge and consumption.
They will all be summarized in encrypted form in one place. This place must be an inland city with relatively remote transportation, far away from prosperous urban clusters, and everyone who can access the core information will have access to it.
All will be subject to the strictest monitoring to ensure that they have no chance to leak the user information in their hands.
Of course, the backstage reserved for local functional departments will still exist, but Qingyun Group will raise the threshold in disguise.
A formal investigation without the unit’s permission?
Sorry, these are all randomly generated codes. If you want to see the real information, please get an official letter of cooperation with the official seal. Otherwise, no one can view it at will through the background.
In the previous life, there was a judicial docking center under the Tengda big data database. There is no reason why Qingyun Group cannot follow suit and create a similar confidentiality system.
Of course, this system is very complicated and requires unreserved cooperation from multiple software app service providers with extremely high market share, and the operating cost is very high.
Coincidentally, Qingyun Group has this business coverage foundation, and most importantly, they have a common controlling shareholder, which allows all its subsidiaries to participate in the construction of the big data plan.
In the future, countless business information will be aggregated in the big data center, and the parts with commercial value will be screened out to point out the direction for the group's future business expansion.
The external basis for achieving all this is a virtual number operating system cooperation reached with the three major operators, that is, the temporary number dialed will be matched with a real number through the system.
Qingyun Group, which is responsible for operating this system, concealed the real data and only provided virtual numbers and virtual information to Internet service providers, keeping the core data in its own hands.
Of course, it is very simple to bypass this system. Any app service provider can refuse QingCloud to provide underlying services, but it also means that it will lose the convenient services provided by this system.
It is not forced and is purely voluntary. Qingyun App Store will actively eliminate those manufacturers who refuse to cooperate and provide risk warnings for services that bypass the App Store for downloading.
This is the inherent advantage of mastering mobile phone hardware. Does Tenda have a large enough user base?
Later generations wanted to use Tenda App Store to force mobile phone manufacturers, but they were hung up and beaten black and blue in the end, and had to pay tolls to the manufacturers in exchange for the release of their software.
The same is the reason why Li Zehua is trying his best to make Roewe successful. Panda/Honor share the Qingyun software application store, while Roewe uses another set of software with only a different name.
If there is an endless commercial competition in the future, he will definitely use this trump card. Publicly refusing to download updates is giving others a handle, but it is absolutely okay to create some trouble every time an update is reviewed.
The scale of human and material resources required for this entire system is staggering, but when Li Zehua proposed it to the decision-making committee, no one objected.
The most worrying thing is the regulatory risks at the policy level.
As long as it can be successfully developed and put into operation, it means that in the mobile Internet era dominated by smartphones, Qingyun Group will have secured a position as an industry giant in advance.
The economic value contained is immeasurable!
To a certain extent, Qingyun will become the irreplaceable hydropower foundation of the commercial society.
The source of all this sounds ridiculous, at least that's what Li Zehua himself thinks, and it's also the most reasonable explanation when responding to inquiries from higher-ups.
"Everything is done to protect the normal and legitimate rights and interests of consumers and to prevent them from being deceived, suffering property damage, or even personal safety accidents due to the leakage of personal information.
After the virtual network identity is randomly generated, its main Internet consumption behaviors occur in the environments of takeout, express delivery, online shopping, spiritual entertainment needs and QR code-based payment scenarios.
This information is exactly the core content that criminals use for electric bombing.
Qingyun has the responsibility and obligation to avoid risks at the source through technical means. The group will work hand in hand with Internet companies to jointly fulfill the responsibility of ensuring Internet information security..."
As for privately using the advantages of big data to complete business layout, isn't this a natural thing to do?
In this process, a very small number of Internet competitors who were unwilling to fulfill their responsibilities and obligations were actively eliminated by consumers. What does that have to do with Qingyun Group?
As for large and powerful companies, of course they will share user resources, but only within the business scope of the large companies. As for the part that it cannot cover, sorry, it will not be given to us.
As for small companies that want to come in and get a piece of the pie, that’s fine, but they have to show their strength first to prove they are qualified.
……
"It has been two months since Tenda launched QQ Bodyguard. After 360 urgently worked overtime during the New Year, it has been in contact with Tenda, but unfortunately, its efforts are doomed to be in vain because Tenda wants to dominate the market instead of sharing.
This business textbook-level competition in the history of the Internet, involving the largest user base and the most intense means, is bound to begin.
In this life, I will add some extra fuel to Tengda's fire and make the competition even more intense."
Li Zehua turned the gold pen in his hand, smiled but said nothing, and then looked at the data of the Hong Kong Investment Fund, "It will be less than a week before Google completely withdraws from the mainland market.
It was announced on the 23rd or 24th in the previous life. With its withdrawal, Qiandu Search's market share will reach an unprecedented 90% or more.
But it's also a good thing. With the help of this huge profit of more than ten times, the funding shortage needed for all business layouts this year can be basically alleviated.
Unfortunately, Zhang Chaoyang of Sohu is only willing to cooperate and is unwilling to give up the controlling stake in Sogou, so we have to settle for the second best option and cooperate to complete the business layout first."
In the end, he thought regretfully that he was not big enough to get involved in Google China's equity. Otherwise, through a full acquisition, he might be able to perfectly inherit Google's market share.
After the negotiations, the people from Google asked an unavoidable question: after the cooperation, Google can provide technical support, but where should the backend server be located for operation?
There is no solution. If Google wants to, it doesn't have to withdraw.
Just like last October, Li Zehua sent people to contact the parent company of Lianxiang Group, trying to take over 29% of Lianxiang Group's shares. Even if he offered a sky-high price, they refused to sell.
Of course, after the Panjiang Group took over, it was not so easy to transfer these shares to the team headed by Liu Aiguo by simply transferring them from one hand to the other, as in the previous life.
As long as there are obvious violations, he will take action without hesitation.
One of the goals is to warn Liu Sen in Hong Kong to come back obediently. The ultimate goal is to make some people lose everything and live in fear for the rest of their lives. (End of this chapter)