On November 8th, the word "big data" first appeared in 1980 when the famous futurist Toffler wrote "The Third Wave" in his book, "If the host computer of IBM has opened up the informationization. The big screen of the revolution, then 'big data' is the third wave of Chinese music." Thirty years later, McKinsey, a world-renowned consulting firm, released the â€œBig Data: The Next Frontier of Innovation, Competition, and Productivityâ€ research report, confirming the status of Big Data's "Colorful Movement" and first proposed that "the era of big data has arrived." Since then, big data has begun to become a global â€œnet redâ€. The United States, China, the United Kingdom, and Japan have all proposed to invest in this â€œnet redâ€, and the wave of big data development has been detonated. Challenges under thriving development From initial submission to initial detonation, in a short time, big data not only swept the world, but also swept all industries at an alarming rate. The data shows that by 2015, the big data market will have a compound annual growth rate of 40% to US$16.9 billion. IDC predicts that this year, the big data market is expected to increase to US$32.4 billion in the financial services industry, healthcare industry, manufacturing, and Big data in other industry areas show great potential. With the continuous development of the application of big data and the continuous development of technology, various forms of data circulation frequency, frequency, and data volume of data circulation are continuously expanding and expanding. At the same time, it also brings many related problems. Talking about the issue, we must first analyze the status quo of the development of the big data market. At yesterdayâ€™s â€œBig Data Development Promotion Committee Annual Meeting,â€ Liu Han, an engineer at the China Institute of Information and Communications, pointed out that the current situation of big data has two aspects: â€œOne is more compliant, whether it is data resources or data applications, they have data, but they may be in a state where data freezes cannot flow when some rules and regulations are not clear. Therefore, some companies prefer not to Data conversion does not want to touch some compliance bottom lines." On the other hand, it is the existence of data black market. For example, some people obtain carrier data through the data black market, which is a serious disruption to the data circulation market. "And the data black market situation makes users seriously lack trust in some products and services," said Liu Han. Purging the circulation environment is imperative In response to these problems, the China Institute of Information and Communication Technology conducted a review of the data circulation standards and data service capabilities. The review wanted to thoroughly analyze the products and services participating in the evaluation, make the information transparent, and highlight the use of corporate data. Sexual advantage. At the same time, on this basis, a trust mechanism for enterprises, enterprises, users, and companies with investors should be established to purify the circulation environment. The evaluation starts with the standard as an alliance standard, which has several advantages. First, the alliance standard is different from the industry or national standards, the threshold for entry is relatively high, and the alliance standard is more conducive to the participation of enterprises. In addition, the alliance standard is not a mandatory standard. Its purpose is to promote the development of the industry. Judging from the current standard setting, ICT has established three types of standards for data services. After completing the standard, how do you judge the company's implementation of standards or landing indicators for products and services? ICT has formulated some related test plans in this regard. This test plan is a customized solution under the guidance of standards. It aims at the different products and services of companies participating in the test and the test plans for specific products through document review, practical operation and development by ICT. The test tool, for log review, authorizes certification by organizing expert review. Among these, there are two types of criteria for setting standards for testing. The first category is based on three legal grounds, including the Criminal Law Amendment (IX), the Cyber â€‹â€‹Security Law, and the Personal Information Protection Guide. It is also a red line that can't be touched while doing the evaluation and the actual application in the enterprise. Liu Han said that since it is necessary to go deep into some industries, it is bound to abide by industry regulations. The data of telecommunication operators currently has a lot of personal data. They must strictly abide by the regulations of the 24th order of the Ministry of Industry and Information in the process of data use, and must not sell or Illegally provide personal information to others. â€œThe two scenes of the standards that ICT Institute had done before, one is in the credit information industry, strictly abide by the People's Bank of China's credit management regulations in the collection of personal information, user consent, user right to know the provisions, but also in financial risk control The standard test under the non-bank payment scenario is also a strict compliance with the non-bank payment institutions and online payment service management methods. In the user agreement, it clearly indicates that there is a major interest relationship with user information. This is our two basis. â€ The standard can be divided into four major parts. The first part is safety management. The safety management responsibility system is divided into data security management department, data security support department, data operation department, data needs and use department, and external partners. . The second part is the use of data. According to the data usage of different business application scenarios, the overall evaluation principle of ICT Institute requires that the data collection and use does not exceed a reasonable range. The third part of the standard is the authorization mechanism. It is actually a means by which product and service manufacturers can interact with customers when facing customers. The fourth content of the standard is aimed at the needs of enterprises, and specifically lists the enterprise service capabilities. It currently includes business capabilities, real-time, concurrency, and scalability, as well as enterprise redundancy and qualifications, patents, and soft, pre-sales services. Service capabilities. Talking about the follow-up work plan, Liu Han introduced that the next work plan of the ICT Institute has four points. The first is the orientation change. Afterwards, based on the self-certification of the company's ability, the company passed the standards and technical measures of the ICT Institute and asked him to test it. The ability to prove. Second, continue to improve the formulation of the standard system for different scenarios. At the same time, it also hopes to expand the scale of testing, which will result in healthy competition among the entire industry. Third, relying on the platform of the Digital Promotion Association, the Data Center Alliance, and the China Institute of Information and Communication Technology to organize more relevant activities, publish research results, and promote the connection and exchange of enterprises. The fourth aspect is to improve the data flow mechanism and improve the data circulation environment.