您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [华为]:Xinghe AI Park Comprehensive Security Technology White Paper - 发现报告

Xinghe AI Park Comprehensive Security Technology White Paper

信息技术 2026-04-20 - 华为 光影
报告封面

Contents Contents........................................................................................................................................ii1Background..................................................................................................................................42Full-Scope Security Campus.........................................................................................................72.1Asset Security.......................................................................................................................................................82.1.1Asset Inventory Management............................................................................................................................82.1.1.1Asset Management Based on IoT Cards...........................................................................................................82.1.1.2Asset Management Based on Containers.......................................................................................................102.1.2Asset Identification...........................................................................................................................................122.1.3Asset Onboarding Threat Detection..................................................................................................................132.1.3.1Anti-Spoofing.................................................................................................................................................142.1.3.2Unauthorized Access Prevention....................................................................................................................142.1.3.3Attack Defense...............................................................................................................................................152.2Connectivity Security...........................................................................................................................................172.2.1Anti-Eavesdropping on Wireless Links...............................................................................................................172.2.2Anti-Cracking on Wired Links.............................................................................................................................182.2.3Future-oriented PQC.........................................................................................................................................192.3Spatial Security....................................................................................................................................................212.3.1Human Presence Detection...............................................................................................................................212.3.1.1Application Scenario: Intrusion Prevention....................................................................................................212.4Privacy Security....................................................................................................................................................233Key Technologies.......................................................................................................................253.1Asset Security......................................................................................................................................................253.1.1Asset Inventory Management Technologies......................................................................................................253.1.1.1RFID................................................................................................................................................................253.1.1.2Container.......................................................................................................................................................263.1.2Asset Identification Technologies......................................................................................................................273.1.3Asset Onboarding Behavior Anomaly Identification..........................................................................................373.1.3.1Anti-spoofing..................................................................................................................................................373.1.3.2Unauthorized Access Prevention....................................................................................................................383.1.3.3Attack Defense...............................................................................................................................................433.2Connectivity Security...........................................................................................................................................46 3.2.1Wi-Fi Shield for Wireless Link Security.................................................