Intelligent CIO LATAM Issue 06 | Page 70

THE PETAL MAPS SYSTEM CREATES A RANDOM IDENTIFICATION IN EACH SESSION SO THAT THE INFORMATION CAN NEVER BE RELATED TO A SINGLE PROFILE .
INTELLIGENT BRANDS // Mobile Technology

Huawei offers increased privacy and security with Petal Maps

Petal Maps manages the user ’ s browsing data without compromising their information and their security .

The digital age has concerned people with a general concern about the use of personal information that devices and applications store . Privacy seems invaded and security increasingly fragile with massive attacks on the network . This is why Huawei provides greater security to users through their devices and applications , as evidenced by the location and mobility app Petal Maps .

Information deconstruction for greater security
One of the safest digital data protection strategies in the digital world is randomness and fragmentation . This means separating the different information data into pieces and generating a reading system for them that allows the search function to be carried out . In this way , the main problem of other systems and apps that have constant data collection is avoided : user profiling . data and points of interest are masked to prevent someone who accesses this data from knowing a real or precise position .
Full data control
Many apps save user information on servers to facilitate management and to do so , the permissions they need are just the basic ones for installing the app when people open and accept everything without seeing what they share . Huawei seeks to offer greater control and privacy of this data , that is why it has a special section in the user settings that allows you to activate or deactivate the type of information that is being shared with the application . In this way , only the data that the user authorizes can be managed and stored on the servers .
Likewise , Huawei adds a second layer of security in Petal Maps that encrypts information from end to end . This can be assimilated as a secret language that can only be spoken by the server and the device . To see this secret language , the person must have the key that translates it . Therefore , even if a hacker could break into a server and steal the data , they would have no way of reading it since they would need the specific keys of each user . p

THE PETAL MAPS SYSTEM CREATES A RANDOM IDENTIFICATION IN EACH SESSION SO THAT THE INFORMATION CAN NEVER BE RELATED TO A SINGLE PROFILE .

This profiling occurs because the vast majority of these apps store the information to facilitate the search when it is repetitive . For example , when we put the same address to go to work , or when we visit someone very often , those movement points are saved . If someone gets to access this data , they can see our profiles and know where we are constantly moving .
The Petal Maps system creates a random identification in each session so that the information can never be related to a single profile . Likewise , the data is very limited and scattered so that someone who can access it can ’ t conclude something about a specific user . And , to help user safety , navigation
70 INTELLIGENTCIO LATAM www . intelligentcio . com