The so-called "safe" mobile phone can be the Red Sea breakthrough

Source: Internet
Author: User
Keywords Security whether the so-called
Tags business cloud platform company configuration consumer consumer market cost customer
Absrtact: Fu Chaowei entrepreneur, in the mobile phone market at the most competitive moment into this field. June 2014, Fu Chaowei founded Vargo Technology (Shanghai) Co., Ltd. (hereinafter called Vargo Technology). Last year, the Chinese market smartphone shipments fell

Quasi "Fu Chaowei" entrepreneur, in the mobile phone market at the most competitive moment into this field.

June 2014, Fu Chaowei founded Vargo Technology (Shanghai) Co., Ltd. (hereinafter called "Vargo Technology").

Last year, China's market smartphone shipments fell 8.2% Year-on-year, according to industry experts estimate, the industry chain has accumulated about 200 million mobile phone inventory, mobile phone manufacturers face the pressure to clear inventory.

Fu Chaowei did not heed the advice of friends, but put on the accumulation of ten years of entrepreneurial resources. He saw an opportunity--the security of the mobile market.

Making mobile phone: human nature becomes the threshold

"I am a person who is more curious about new things and business opportunities," he said. Fu Chaowei told reporters.

2000, Fu Chaowei from Jilin to Shanghai Development, began nearly 15 years of entrepreneurship. He first engaged in the retail industry, in 2002 he entered the Internet industry, created a group buying website and the Irene Technology company.

Vargo is a business team with executives from retail companies and internet companies. Its technical team mainly comes from the Irene Technology and technology team Fu Chaowei previously founded. At the same time, Fu Chaowei has recruited a few geeks, such as a 14-year-old who began to develop an Android system, to remember the location of each feature code, and a unique insight into server attack and defense of "hackers."

Fu Chaowei Opportunity is the demand of the market for safe mobile phones. The main functions of the security phone include: anti-loss, eavesdropping. If the phone is lost, not only can reveal photos, contacts and internet habits, but also may reveal their frequent location information, causing personal security problems, because the smartphone is bound to different social networks or banking systems, the loss of mobile phones may reveal the user name, password, resulting in funds and other hidden dangers. In a sense, the loss of wallet is not scary, the future is terrible loss of mobile phones.

"Two years ago, the Murdoch incident and the Snowden incident, we found that the communications between enterprises and enterprises have security risks and needs." "he said. In Rupert Murdoch's News of the World eavesdropping incident, the party is through the long-term interception of relevant dignitaries to obtain information.

"There are many people in the mobile market that show that the market is mature. I suddenly saw an ' unpopular ', for many enterprises, the market is too small, uninteresting; for many to get the money of the backward enterprises, they also disdain to do this market, their dream is to make apples, millet, to this piece to rush. Human nature has become a threshold. Fu Chaowei told reporters.

Nearly billion of the enterprise market, although not compared with the personal consumer market, but for a start-up mobile phone companies, there is enough space to play. The market is not only the mobile phone market in the blue sea market, the single cell phone sales in the market margin than the individual consumer market has more space.

According to the data provided by Vargo technology, up to now, the first safe cell phone ivargo1 has accumulated 140,000 orders, including in Hong Kong and Indonesia market access to 40,000 orders, this year is expected to be in the enterprise market to achieve a cumulative 300,000 ivargo1 orders.

"Every few years, the mobile phone industry will have a shuffle, but these with the company's visibility and strong financial strength, but from the customer's precipitation rate." It is easy to attract users, with money, but it is hard to leave users. "Fu Chaowei said.

It is based on this consideration, he set the development strategy: "300,000 of enterprises and business users, because the business-to-business user mobile phone and the company system operation depth compatibility, I can hold 80%,ivargo2 one out will get more than 200,000 end-user attention." And these more than 200,000 people's radiation function, may expand to million, this time our market existence feeling and the application circle formed, own platform's software started exerting force, the software end effect can pull again 5 million customer. ”

Internet phone mode in order to encirclements users at the expense of profits, frequent price wars. However, the innovation cost exceeds the infringement lawsuit cost's intellectual property environment, the low profit environment cost control impulse, and further reduces the handset manufacturer research and development investment power.

For domestic mobile phones, hardware configuration and even manufacturing processes can be done with the iphone flush, but in the design of the imagination, software development level and the strength of the ecosystem are still quite a gap. Increasing the added value of hardware products looks like a must.

There are also some domestic handset manufacturers try to reap profits through the layout of high-end, but in this piece open the situation is not easy--once known as the price will not be less than 2500 yuan hammer phone had a sharp drop of 1000 yuan, into 2000 yuan within the range.

After entering the personal consumer market, Vargo technology will also face the test of market environment.

Do product: See Configuration optimization

Each founder has a dream about the product. "Do the hardware I do but Huawei, than the price I am not more than millet, so can only take another way." If in a nutshell, I do is based on security, to do data interaction of the mobile phone. Fu Chaowei to reporters to define Ivargo.

How to secure a secure phone? The current popular practices are multiple systems, hardware security, software security and other methods.

For example, the cool Burton security mobile phone is a dual system and hardware isolation mode. When the mobile phone calls, you can switch to the function machine system, only the basis of the phone to send SMS function, in the transmission and China Telecom cooperation with its safety network. Hardware isolation is the separation of user-important personal and general information.

Vargo Mobile phone's practice is: the handset binds a ivargoid, automatically connects to the cloud platform, if the handset loses, the user may also use the ID to log on the cloud platform, erases the handset data, obtains the mobile phone new data (for instance the correspondence record and the location information), and may send the various information to own

According to its technical data, IVARGO1 has the ability to prevent loss and theft of mobile phones, and it has embedded security programs in the underlying program of the Qualcomm chip platform, even if the phone system is brushed and will not be erased. Another feature of it is that, in addition to providing IVARGO1 mobile phones to enterprises and enterprises, but also to provide server solutions, in mobile phones, base stations, servers between the construction of a closed security system closed loop, while the server can be entrusted to the customer custody.

At the same time, Vargo technology team for different industries and enterprises to provide supporting operations management software functions. For example, the Express Company may acquire a set of mobile phone system and the carrier of express vehicles, through the mobile phone management staff attendance, distribution, route and other functions, so as to optimize management.

On the hardware, Fu Chaowei wants to use the best technology, his attention point details to the mobile phone corner radian once difference. In software, Fu Chaowei hope to cut into the security market as an opportunity to use the current time to cultivate technology and the formation of the industrial chain. In his view, the mobile phone will become the interactive center of intelligent hardware, but also the access to functional software.

"What we envision is that after the platform is grounded, it's hard to replace it when it comes in." "Fu Chaowei said.

Fu Chaowei also said that in the year 9, October into the personal consumer market, Vargo technology of the next generation of mobile phones will be integrated such as "second-pass technology", "same-screen technology" and other new technologies, to achieve two Ivargo mobile phones instantaneous transmission 1GB file capabilities, to the surrounding Ivargo users to share their own screen

"In the future, we will be divided into two product lines, a business customer, not just to do the phone, but to do office systems." On the C market, we have accumulated some ' science fiction ' technology, but also the hardware to the extreme. "Fu Chaowei said.

In the mobile phone industry chain, hardware design and supply chain management have been highly programmed. There are thousands of spare parts invisible inside the handset, the handset brand merchant can entrust the hardware solution provider to provide the whole solution, and through the solution provider through the component supply chain and the factory manufacture link. If the mobile phone brand is not satisfied with the solution or the accessory, it can propose its own plan and parts substitute, and realize the production capacity and good quality control through the benefit and risk sharing agreement with the scheme merchant.

In this sense, to do a mobile phone's hardware base has been reduced, coupled with the hardware price has been transparent, to achieve the highest hardware performance and manufacturing process through investment funds can be basically solved, the rest of the work is the configuration optimization and hardware and software adaptation. The whole gap of hardware configuration and manufacturing technology of different handset products is no longer significant, and the growth of hardware fast iteration and high cost performance is already in the bottleneck.

"The iphone's configuration may not be as high as the domestic handset, but they are far more sophisticated than we imagined, and Apple can make this kind of hardware configuration feel like it is a strength." "Fu Chaowei said.

In technology-driven change, mobile phones have evolved from simple communication tools to mobile Internet terminals, integrating entertainment and social functions, gradually intervening in people's lives and work, and evolving into a card-free payment tool. In the future, mobile phones may also play a pivotal role in smart home life, controlling other smart homes or their content.

As such, the security of mobile phones is becoming more and more important. This requires the continued innovation enthusiasm of handset manufacturers, other features of the excavation also has considerable imagination.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.