 Okay, this is a session for our Secure Edge Infrastructure for Contact List Payment System. So you know, we have an important customer from China Union Pay, which is a very financial giant in China financing industry, so we are very honored to present this title. Since most audiences will be Chinese, so our content will be delivered mostly by Chinese, but our slides are covered by English, so if you have any question, we can explain some detail with English. So without any further, we can switch to our topic. So, we will start with the introduction of China Union's introduction. Hello, I am the leader of China Union. Today, I would like to introduce some of the research and planning ideas that we are working on. First of all, I would like to talk about some of the value of cash for cash. First of all, what is our core focus on cash? It is the risk. In fact, cash itself is in control of the risk. We can also put a loan on it. We only need to control the risk of a certain risk, except for the loss rate. We can basically profit from it. This is the concept. So, why can BNG calculation prevent our risk? There are two points. First, BNG calculation is based on the BNG calculation. The data collected by BNG is the first-hand data. It can get the information from the long-term perspective. After the accurate calculation process, we can control the long-term difference and ensure that this transaction is合規. For example, as you can see, the pose machine that we launched before is actually made for this purpose. Why do we need to remove the pose machine now? We can also see that they are also pushing the human face payment center on WeChat R. It is actually to understand the long-term information. Because the long-term information is different from the long-term information. The loss rate of the long-term information is different. Because we have a procedure fee. If we can make sure that the long-term business is合規 and accurate, then my loss rate is accurate. This way, I can try to make the loss rate lower and pay attention to the whole business. Currently, because some technologies are not合規, including the online payment, there are actually a lot of things that can be set up or set up separately. So this is a problem. The second thing is that the importance of BNG is privacy. Especially the characteristics of some life and death, including the human face and the camera. In fact, when we are doing the human face and the camera, we will find that I am not saying that the human face and the camera are sent to the back end to deal with the problem. But have you ever thought that the person in the back and your half face are also in this picture and are also sent to the back end to deal with it? Then why is the person in the back sent this picture to the back end? So in the United States, some cities are actually forbidden to do these human face and human face business. So BNG is a website that requires that all these information processes must be done on the BNG side, on the scene. Ensuring that the privacy is protected. In this case, it should also be said that this is a safe direction in the future. So this is what we do on the BNG side. But age computing, when you are doing it, it must be very popular now. I went to look at some of the new things in the market today. Basically, a lot of people are talking about BNG. But I want to take a look. If you look at some information from the foundation, there are actually two categories on the BNG side. There are two categories. The first category is, I think it's the MEC of the operating company. Now, the operating company, including the MEC, they do all these cases. I want to talk about this scene. The operating company, they put their own, or the small chicken house, the chicken station, open it, and do some corresponding BNG side services. This is a scene. The second one is actually what we do in the future. Later, I will talk about why we do it in the future, but not the first one. The second one is actually in the business side, in the family side, there are actually some other connected devices. It also has some BNG side that can only be required. So we will do this thing. So we divide it into the BNG side of the business and family side, and the BNG side of the business side. So there is a comparison here. This is our own research comparison. In fact, the BNG side of the operating company, actually, as you can see, it is actually a relatively real side, it is a production transaction side, it is even further away. It can only do some support. The second one, the BNG side of the operating company, actually, the resource is its, it is the BNG side of the business side. So there is no the third one that can operate the resource, the interviewer. In China, there are only three operating companies in the market. Of course, the market is already big enough, the market can be called big enough. However, we may be the most general business or some business users who want to enter, it should be more difficult. But in the company and family, there is a recording machine, there are some public machines, these things are possible to enter. So we should still have the interest to do some things like that. However, maybe, but it's not that we, like the financial enterprise, it doesn't have to do the transformation on the operating company. Let me give you an example. In fact, the operating company is working with the operating company, Zhong Yidong, Zhong Liantong, Zhong Dianxing, there are still more. We are also working on the financial enterprise. What will we do with the transformation? Because now, after the MEC production, its strategic BBO, it is actually a差不多 structure. So what can it do? It makes it original, its information opening is much more convenient than the original. So, in this case, we can put the corresponding directly on top of a container. Then we can read the information of the corresponding machine war. What can it do? For example, the current human face payment, for example, is more than 5,000, there are tests, more than 5,000, after the sample, the accuracy of its calculation is poor, the contrast is poor. So, because, if we do the human face payment, I am at the middle side, right? At this time, when I get the number of mobile phones on the side of the machine war, it has a standard information. So, there are hundreds of people searching for the human face in the range of hundreds of people. So, in this case, actually, the value of MEC is very high. But, in the end, the MEC can open the data. Actually, it has something to do with data opening. But, if MEC has any value for traditional business, I think our research is recognized by this value. So, what I said is the first thing. The front is one of our, because the back is all in English. Because, I am thinking of some old people. So, actually, this time, what I want to talk about is the core, including what you see in the market, is our original shape. We call it a scene of the financial charging of BNG. So, in this scene, we have a few features. I want to talk about it. The first thing is, we are here. You may see the direction of the usual payment. Now, we use 2-way or bank card, or now we have a perfect card. So, what are we doing now? In fact, one of the features is that the VN in the charging of the car, we are going to do the VN Identify Number. If you buy a car, you will have a feeling that when you buy a car, you will have your own brand of brand. This brand can show what kind of car you are, what kind of market you are in. So, it is the only brand in the world. If you are in China, I know that if you are in China, you will have this kind of information. If you go to see it, in this situation, we use this VN to identify the car information. Then, the VN information is bound in your APB and your bank card. Now, you may have a bank card or a bank card in your bank account. The bank card is very similar. After the bank card, when I charge the gun, after I have the VN, I will automatically complete the payment of the rear wheel. Because at this time, I already have the order information. But in this process, the problem is that how do we identify the VN? The traditional charging gun is actually a three-color gun. The three-color gun doesn't actually have a computer power. So, in this case, after reading a bunch of data, it needs to be processed. So, one way is to identify the VN in the cloud. After identifying the VN in the cloud, what will happen? In the rear wheel, I can easily send the VN and the payment. This will cause a big difference to the scene. Or, there is a situation of trading with a cat. So, we will definitely put a box like the VN in here, called the VN-3 network. It's similar to doing this. For example, to analyze the VN. So, at this time, the VN side will have such a computing demand to do this. And then, in the process of computing, what will we do? So, what will we add here? We will add a data communication that seems to be very simple. In fact, the charger, the charger itself also has 10 to 50 charging stations. It has a remote control management demand for electricity. So, it also needs to be installed. So, the hardware box that we made can be understood as a driver in this process and can be managed by charging stations. This is our feature. And then, the third thing is that in order to do the management of security, we ourselves will have to use the hardware in this network. When this network is automated, it will test whether the operation system is changed. The second thing is that it will go directly to the backstage and verify that the device is in this place. This is the information. The third thing is that we are dealing with a process that is similar to the payment transfer process. This is of course our payment process. Finally, when we do the design of the network with Intel and other partners, why do we need it? Because this is a communication network that the charging application needs. There are 5G, 4G, etc. The main network is the solution of the air-conditioner. Now through the public requirement for the solution of the chip the cost of the But later on, I will talk about the fact that in terms of this wireless charging method, you can actually do a lot of real-time work, including advertising. Under such a price, let's talk about our scene. Sorry, let's talk about our scene. In this scene, there are actually three layers. The first layer is a car, charging unit, and a driver to do this thing. The second layer is our core, which is to control the network of BNG. It is actually controlled by us. Personally, no matter if we do open-side cloud resources, or we do BNG resources in the future, the first thing to be done is to control what we are managing. So what we are managing is the gateway to the network of BNG. At the same time, there are some services on the back of it. Some services are related to our Internet payment platform. The second layer is to provide information about the vehicle and your bank card, including the car's information. The second layer is to provide information about the charging system of the BNG. The third layer is the charging application platform. The charging application platform is mainly to generate some order information. So these three layers are mainly to do this thing. So what is the key in this? The key is that we handle it ourselves. In fact, in the future, what will be the network of charging? It will be a pose machine of the BNG of the Internet. As I mentioned earlier, the biggest concept of the BNG is the pose machine. In fact, this is the principle of our work. So in this process, it will definitely have some special features. The main feature is that it has six points. First of all, this network must be a multi-signature connection. Since it is the Internet of the Internet, it needs to support some charging devices. For example, it is a charging device for the BNG of the Internet. So this may be what we will do later. Similarly, if we buy a charging device like this, we will automatically add some apps to it. For example, the management of the charging device. What else do you know? You can see that this kind of power network is actually under the street lights now. There are a network under the street lights. It is used to control the street lights, including some cameras on the street. So these street lights will also have such public services. Second, it is a payment function. It is like the POSC function in the POSG. How does it handle business? Third, it is the Internet of the Internet. For example, in the first generation network, there will be 4G, Wi-Fi, including PLC. PLC may be in the second generation. You may not know about PLC. It is a power cable. Through the power cable, it can transmit data like a power cable. Fourth, it is the security service function. There are some financial security levels here. We have mentioned it before. We also have a financial security chip. It is a self-proclaimed product. This chip is mainly made of plus and minus. It includes all kinds of devices in China, including international encrypted devices. It is also a multi-purpose chip. It can provide, for example, banks and other power industries. They want to make plus and minus, so we can provide them. Finally, it is the position and time service. According to the bank's request, although it has a request for all POSC, it is to send the transaction to the main currency to the location information. So, in this case, we have a GPS network. There is also a time service. Of course, this GPS service also needs to be designed to communicate with the local service. Because after our actual test, it may not be able to reach the GPS with a default, so we still need to communicate with the local service. Fortunately, their cost is limited. Generally speaking, PLC 50,000 is a business fee, and it is not limited. This is what we have actually communicated. Finally, the last requirement is to connect to the site, especially the BNG network. I want to say that such hardware has a feature. For example, the heat and humidity of the heat control are all required. It is different from what we have put in the machine room. So, in the hardware design process, we have considered the selection of the industrial machine designed by the hardware company. For example, the vehicle regulations and so on. These are all required. So, in this case, it is limited. The next layer is its two layers. In its hardware, there are probably some hardware chips. In the last layer, there are some corresponding software storage services. Let me emphasize some of the work that we have done in the security warehouse here. The main task is data security. First, data security is a sensitive and sensitive encrypted function. For example, the vehicle's VN is not possible to appear on the public network when it is online. So, in this case, we will probably add VN information. For example, we will also add some special commercial information to the vehicle. Second, it is the hardware security. For example, the hardware security will not allow it to run the security that we do not verify. So, there will be some positive and negative functions to do such a thing. So, the hardware security is to verify the signature. Third, it is the network security. The network security is because the equipment is on the public network. So, on the public network, there are some things that it will do. So, we will limit it's application, limit its network to visit some login address, including which address can be downloaded, which address can be sent, these things will be provided in the operating system. Finally, the hardware security is to do some operating systems such as anti-tank and anti-tank systems, such as Intel's SGX technology. It is actually a piece of Intel's X86 chip. It is a machine-made and it has to work in a reliable and reliable environment. This reliable and reliable environment can't be used or can't be cut. The application procedure can't be done by itself. For example, in the first environment, I want to show that the technology will be done by TTE. Secondly, we have been working with China in the blockchain BSM service. In this way, we will also use the SDK service in the corresponding mid-range devices, so that SDK can write our blockchain service so that the corresponding transaction information can't be used. Finally, I have already mentioned the blockchain service. This is the management structure of the entire blockchain service network. What we are managing is the blockchain service network. You can understand that we are managing our own investment devices. The traditional investment device is a device that is connected to the blockchain through the blockchain network to manage the different transformation structures. These transformation structures connect the three-color devices including the charging device and the next stage. We may use the charging device because it is connected to the blockchain. There will be a application platform and management platform. There will be a service advertising platform. These platforms will use the 5G network to manage the data storage or storage devices. We use the charging device to manage the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the data and the The first thing is that the Internet management platform is really like the Internet management platform. In fact, there are not many open source options on the Internet platform. There are some commercial products, but we have also compared them. Commercial products may not really know the characteristics of our industry. Especially, we will customize the security management system. So the second thing is that the open source option is like the Stanley X. At least if there is a successful architecture, we can optimize the security management system. So we are also very willing to do this exploration. The second thing is why we choose to do it. Because the current community has more Chinese teams. Actually, the main Chinese people are here today. So there are some communities, because I have been open source for many years. I feel that many times I have to return to open source to do some things. But maybe our communication is a very big obstacle. So in this part, I think it may be a contribution to the community and it may be more convenient for us to do Stanley X. Including Haitao, their team is also very active. Cindy, they are all very active. So I feel that it is more important. And then we see that in a few months, we will make the original shape. We also made this original shape in the exhibition hall. Including we also made our own simulation car. Now this simulation car, in fact, we will have a real car and a real car in this year. So overall, I feel that this is what we do. The third thing is to see if it can save money. You don't have to develop it. I personally think that many software companies don't need to rebuild the wheels. So what you can use is very good. So if you do it yourself, I think the workload is very large. So this is not necessary. So this is the idea of us and Zhou Yidong. Because we still have Zhou Yidong in this project. The main thing is to consider some 4G 5G chips that are used to support Zhou Yidong. So we will do this together. So above all, this is part of my report. Later, Haitao will talk about Stanley X. What kind of assistance do we have? Thank you, Li Jingyang. Thank you very much. Thank you. Thank you very much. Thank you very much. Thank you very much. I would like to share with you some of the experiences and lessons in this exploration process. I would like to ask you if you have participated in the Stanley X session before. I will summarize it a little bit. This is a software stack. It is an infrastructure as a service structure. For the current situation, we can summarize a few things that we have to pay attention to. First, you can see that it is a container service based on our Kubernetes. So it is actually an OBS stack over Kubernetes. So this design is actually a very important division. It decided that we are actually using Cloud Analytics. In other words, there are many better resources in the future. In fact, we are easier to bring to our system. We can see behind us why Cloud Analytics is able to do very good Scalable Service Deployment. Second, you can see that infrastructure actually has a lot of existing security components and models. This is called deployment ready. In other words, these things you don't even need to develop or set up. It is built-in in our system. Third, we have some security differences. Just now, Li Yun mentioned that hardware vendors into a specific feature like security boot, TPM jami, and our T1 environment, SGX. For now, we are all hoping to open these hardware capabilities to our application industry. So this is why we have Scalable Service Deployment in Scalable Service Deployment. Here, we have a Scalable Service Deployment community. We will have a lot of security features. Just now, Li Yun mentioned that it has a lot of data and privacy and some requirements for infrastructure itself. These requirements are already ready in our community. Whether it is in terms of source mode or community mode, it is very convenient to get these security features. Because we all know that if we want to do a security service to develop something, it is very high. In this community, you can get these features. If you want to do some hardware in the next step, some of our partner partners will be able to improve your security in the next step. So this is also our feature. How does our Open Community develop? As we just saw in the video, in the first scene, we made a prototype. This prototype is actually a work load configuration for our Scalable Service Deployment. In this example, we chose two work loads. One work load is the payment. The work load is very high for security requirements. It is related to the information of your vehicle. In terms of advertising, it is not a security work load. So we need to have a separate way to make these two work loads be able to be included in our programming system. This is one of the advantages of our Scalable Service Deployment. Of course, there are some special features in it. As Li Jun mentioned, the charging is very similar to the one we usually use to draw the number of vehicles or to look at the face in a different way. This requires some device management features. Because each device is actually a source point. We can also show it in the later part. The last point is that it is very convenient to deploy. So this is why after we had a design of the vehicle, because many of our items are deployed ready. Especially the Scalable Service Deployment 2.0, which is a new feature that we have been using for a long time. As an open infrastructure, we are going to make a new usage so that the deployment and development can be very fast. So we can quickly make the needs of these vehicles that we mentioned in the session. So we need to be fast to verify the reliability of the whole system. If we are going to add some features in some models, for example, we are going to use Overstack's machine to do this. But the problem with it is that the deployment of this VM is very heavy. As we know, there will be a CASA integration in the 3DX 3.0. So we can do it with CASA as the basis. We can do it in a better light level. Here we can also introduce some of the cases that we have used in 3DX. For example, we have a camera that will shoot our vehicles. In this scene, because of the charging, we don't need to use the car stand anymore. In this car stand, as we know that the engine and the oil tank don't have a system. In other words, if there is a truck that drives the engine, the car will be wasted. In other words, if you don't have a truck or a truck that has been recognized, it won't be able to drive. There will be a lock. The lock is also a 5.0 device. It will judge your vehicle. If it is not allowed, it will lock the lock. This is actually one of the improvements in the 3DX. For example, we have done a step-by-step with AMADA or Hamchat. This is like an app. It can directly combine with our company's payment. In this case, in 3DX, we have made some big data with Spark. We also made it a step-by-step for Hamchat. For example, we can make the most advanced tests by sending it to the cloud. They can push the protection to the place where we use it. At this time, we need to push the data analysis functions to our edge. If we use the Spark of 3DX, we can quickly make the idea of a half-year-old case. With these two images, we can understand why we will make a wish at the end. We will make a step-by-step for open infrastructure in security perspective. Or simply, we will have a security stack. If we look at the frame, the left side of the frame is the traditional war. The bottom is hardware, firmware, API, OS, and operating procedures. For us, security is pervasive. So its design needs a system to meet it. So we will have a security development life cycle. But this is not enough. We still hope that the development of security is magical. So on the right side, we will present the security for a few days. We will use the security software or hardware part. We will use MEP to build it. For example, we have SGX or VM to do acceleration. We will have a security boot. We will have a serious encrypted storage. We will have crypto hardware acceleration. We will have hardware security. These are all our MEPs. For the top frame, we will use three vertical segments. One is the camera which is the traditional DSS security. The retail and the payment will have their own security. So we will have a vertical stack in the whole stack. When you have a similar application, you can start from what you need. When you are in a hurry, you should consider whether the security components need to be strengthened. This way, you can increase the time to market. Including the entire TCU. So we think SGX provides community customer and co-engineering. In this way, we can reduce the difficulty for everyone. It becomes a community effort. So SGX and INLN have four open principles. For us, this is the open source. The whole stack is open. For some specific industries, they have a strong demand for the open source. The design is open design. As you can see, the design of different segments is open to the whole community. We welcome everyone to put some design related to security in our blueprint. The whole community is open to the development. Finally, we can see an open community. SGX provides two to three MEPs. So if you have similar demand, you can do a quick design. Finally, I hope you can go to SGX and thank everyone. Thank you. I want to ask a question from Mr. Lijun. The question about the charging of the MEP, I think it usually deals with some applications of time-sensitive. For example, charging, I think it doesn't seem to have much time. When charging, it can put it in the data center and you can take it out. The charging device doesn't need so much data. Because charging is a long process. So I want to ask what kind of consideration you have for charging. I think it's like this. When you are teaching in a classroom, the MEP is to solve the time-sensitive business. But I want to say that apart from the application scene of the industry, I have not seen much time-sensitive business. I also want to talk about it. So the question you asked is about the data of the charging device. Every charging device is a screen. Why do I think it's a screen? Because the place I'm standing is a data center. Why can't I give it a release advertisement? What I haven't done yet is that I put a screen in every LiPo store. If I put a plate, I will give it 800 yuan. The store is also used in LiPo. So what's the problem that I've solved? I really want to release an advertisement. It's a place where people interact, right? So I release an advertisement. The solution of the charging device is that I keep releasing it constantly. So what I want to solve is that because there is a low battery life, every charging device has a screen to release it. The cost of this charging device is very high. I don't know what you mean. So what I want to solve is that I connect the screen through the computer and through the network. The screen is just a screen. All the calculations can be released in the same way. We haven't decided what is the value of the management platform. Let's talk about the price and the physical price. This is the real advantage of the Internet. Because if you don't want to release the CPU in every device, it doesn't make sense, right? So this is the goal of the cloud computing that will reduce cost and reduce cost. But at the beginning, this is the direction. So this is the same as the cloud computing network. Because if the cloud computing network doesn't solve any problems, if every device is connected to a 4G network, then every device has a 4G module, right? If every device has a 4G module, let's say there is a hardware chip problem, I want to know that once I use the cloud device, I open every module. This means that every device has the so-called operating fee, account fee, what do you mean? Then it's a hot spot. So this is the operating fee itself. So in fact, in fact, our solution is not to describe it as a time sensitive business. It's actually to reduce the cost of the industrial implementation of its operating costs and construction costs. In this process, the purpose of my ads is to increase the value. Actually, I'm not doing this for the first time. In fact, I have a lot of money, or bank money, because it's a post-sale device, right? After I can sell this platform to the audience, or I make my own ads, I can share my previous construction costs so that the entire business can form a good circulation. So I don't know if this is my time sensitive business. The solution of the network of BNG or the solution of BNG is to solve the future of the construction cost of BNG. In addition, we can't understand the PLC network. This is the best made in China and Huawei. Basically, a large number of traditional devices of BNG are made by Huawei and H4C, including Europe. Why do I say this? Think about it. If these networks connect to the network of BNG and the future of BNG, we can see a lot of things. So this is the real network of BNG that must be updated in the domestic family. If we talk about the real economy, this is the real economy. Because it has this box, it has a lot of functions. I need a public management platform to manage these functions. This is Starlinx. Starlinx is a free management platform and this is the real overall management platform and the overall development logic of the whole system. Why do you want to see this? Because I have these business that need to manage the complexity of management. I want to talk about my point of view. Thank you. I don't know how much time left. We have one last question. Li Jun just said that your Gateway feels like a box, right? I want to ask Haitao if there is enough light to put in this box. For example, you need a lot of nodes or if there is enough light to support the application in the future. For example, if there is real industrialization or if you have a Gateway how many charging stations can you support to send this message? Okay. Thank you, Professor Li. I think this question is very good. It is also the next step because what we are doing now is indeed a problem because StarlinkX, although after 2.0, we can actually cover MEC application and IoT application. But in IoT's field it will discover the memory footprint of the whole system and the density of the solution of its unit. So we will add a few important features to describe its memory footprint. The second one is that we will use some like Kata Container to store the entire VM or Container footprint to reduce it. In addition, we will also consider that we will use some because we just mentioned StarlinkX is a management system. So we can actually make the management part as thin as possible and light as possible. So this is what we are doing with StarlinkX when we discovered that StarlinkX is going to be the next step. So we will work on these aspects in the next system. I will make up for it. This question is actually about the cost-effectiveness. There are two reasons. The demand is that in the future, it may not be a box to solve all the problems. For example, for example, the configuration of the power supply is very important. Because it is very important to reduce the cost-effectiveness of charging and security. The second one is that it may be a box to solve the cost-effectiveness. After solving the cost-effectiveness, it may need a video broadcast. It indeed needs a high-tech combination of X86. Because StarlinkX has many but actually there are different needs of various hardware. So this is what I want to talk about. The second one is that besides solving the cost-effectiveness, there may also be some clouds that can be used to solve the cost-effectiveness. Some of the functions can be used to solve the cost-effectiveness. We don't think about solving the cost-effectiveness. I don't think that it is actually a cloud-based combination. So some of the remote management operations may still be left to cloud-based operations. But for example, for example, some software logic of advertising may be used to manage these functions. I think that I don't know what to answer. But I think it is two ways to solve this problem. Okay, that's all for today. Thank you for your time.