news

Wang Jigang, Vice President of ZTE: Data assetization requires clear product pricing and the establishment of a trading system mechanism

2024-08-27

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

Guiyang.com Jiaxiu NewsOn August 27, the "Digital Government" exchange event of the 2024 Big Data Expo was held at the Guiyang International Ecological Conference Center. Wang Jigang, vice president of ZTE Corporation, said at the meeting that data is a carrier with a life cycle. From the most original right confirmation to the corresponding data collection, aggregation, storage, analysis, and then entering the table, pricing, trading, generating corresponding data products, to the final data destruction, there are corresponding requirements for infrastructure. For example, in the process of original data confirmation and authorization, blockchain or hierarchical data division and governance are required. For another example, in the process of data collection, in order to ensure confidentiality and security, data security verification is required. In the process of data assetization, technical means such as trusted space, privacy computing, and cost accounting are needed to establish a more clear product pricing and trading system mechanism. In the product circulation stage, we may adopt multi-party secure computing, federated learning, data space and other methods to provide corresponding security guarantees. Therefore, data from the original stage - data resources - data assets - data products is actually an important balance between liquidity and security.
The inclusion of data assets in the table is also of great concern to everyone. Wang Jigang said that it also has requirements for data infrastructure. From raw data to data resources and data assets, there is a corresponding process for the entire transaction, and many systems and policies are involved in the process. The inclusion of data assets in the table also puts forward many specific requirements for data infrastructure. Based on these requirements and its definition, we have defined an overall architecture including "front store, middle factory, and back warehouse", hoping that this architecture can open up the corresponding path of government public data in the process of opening up.
Wang Jigang said that in order to ensure the effective circulation of data, we have also proposed a platform for the trusted circulation of data, which is also the basic architecture for the trusted circulation of data proposed by ZTE based on its own technical accumulation and market demand. This architecture includes the platform side and the edge side. By implementing trusted governance of data on the edge side, as well as grading and asset maps, it can be combined with the circulation responsibilities and mechanisms on the platform side to effectively ensure that data can be quickly entered into tables and circulated, and that data can be effectively circulated in a reliable environment.
ZTE has also piloted this architecture in some governments, and carried out specialized and new assessment work in Shenzhen, Guangdong. By deploying front-end machines and architectures in commissions and bureaus, the model and circulation technology system can be effectively replicated in the data assets of the front-end commissions and bureaus to ensure that the data of each commission and bureau can be coordinated and circulated and its value can be realized without leaving the house. In the process of helping Hunan Province build a data hub, from the collection of raw data to the high-quality supply of data, to the external empowerment of data products, corresponding overall solutions are provided. In addition, ZTE also conducts a lot of pre-committed compliance governance work on government data. Through data classification and grading and security protection, it can help government data circulate in different ways during the retention process. The data security level ranges from level one to level five, which also provides different solutions for data security, protection strategies, and sharing strategies.
Reporter Wang Dongwei
Report/Feedback