Huawei Will Sell Its 5G Know-How

Huawei's chief executive has proposed selling its current 5G know-how to a Western firm as a way to address security concerns voiced by the US and others about its business. 

Ren Zhengfei (pictured) said the buyer would be free to "change the software code" according to the BBC. That would allow any flaws or supposed backdoors to be addressed without Huawei's involvement. 

The US and Australia have banned their networks from using Huawei's equipment. The UK is still weighing a decision.
Huawei has repeatedly denied claims that it would help the Chinese government spy on or disrupt other countries' telecoms systems, and says it is a private enterprise owned by its workers. 

Huawei’s claim that it is 99% owned by its staff is not reassuring, as they are in fact owned by the trade union committee of Huawei.  Since all trade unions in China are under the All-China Federation of Trade Unions, which is under the supervision of the Communist Party

One expert, who has doubted Huawei’s independence, said the idea of it helping another country's business to compete represented an "extraordinary offer".

"Perhaps the explanation is that Huawei recognises that it is unlikely to be able to bypass the efforts the Trump administration is putting into minimising its scope to operate in North America, Western Europe and Australasia," said Prof Steve Tsang from the University of London.

Seeking Balance 
Huawei's founder Ren Zhengfei made the proposal in interviews with the Economist and the New York Times.
It would include ongoing access to the firm's existing 5G patents, licences, code, technical blueprints and production engineering knowledge. 

According to the New york Times, Huawei is open to sharing our 5G technologies and techniques with US companies, so that they can build up its own 5G industry, creating a more a balanced situation between China, the US and Europe. A spokesman for Huawei has confirmed the quotes are accurate and the idea represents a "genuine proposal".

At present, Europe's Nokia and Ericsson are the main alternatives to Huawei when it comes to networks selecting what 5G cell tower base stations and other equipment to install. South Korea's Samsung and China's ZTE are other alternatives. 

But while American firms including Cisco, Dell EMC and Hewlett Packard Enterprise have developed 5G-related technologies, the US lacks an infrastructure-equipment specialist of its own.

Beyond the licensing fee, Huawei could benefit because it might convince Washington to drop restrictions that currently prevent it buying US-linked technologies for its own use. One consequence of this is that Huawei faces having to launch an Android smartphone later this month that will not offer Google apps. 

A deal would also help ensure Huawei gets its 5G technologies widely adopted.
For instance, 5G supports two different coding techniques for data transmission to help tackle interference. Huawei has developed a technique called "polar codes", which it says will give 5G devices longer battery life than an alternative favoured by many Western firms called "low density parity check". If polar codes are widely adopted, Huawei will earn more patent fees from device-makers that support them.

Intelligence law
Some commentataors have suggested Ren's proposal is doomed to fail. "Huawei misunderstands the underlying problem," Hosuk Lee-Makiyama, from the European Centre for International Political Economy, told the BBC.

"The issue is not the trustworthiness of Huawei as a vendor but the legal obligations that the Chinese government imposes on it.....China's National Intelligence Law requires Chinese businesses and citizens to surrender any data or 'communication tools' they may have access to, under strict punitive sanctions.....Any equipment or software that Huawei licenses to an US entity would still fall under this obligation, and there is no way that the licensing entity or the intelligence agencies could scrutinise millions of lines of code for potential backdoors."

Even if Huawei's offer is ultimately rejected, he explained, it demonstrates that the company is willing to go to remarkable lengths to try and win the trust of its critics.

BBC:         New York Times:

You Might Also Read:

Who’s Afraid Of Huawei?:

5G Needs A New Generation Of Security:

 

« Old Magecart Domains Come Back To Life
Organised Social Media Manipulation »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Prodera Group

Prodera Group

Prodera Group is a specialist technology consulting partner trusted to help navigate the complex and dynamic lifecycle of change and transformation.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.