December 12, the world's first large-scale conference to explore the industry Internet, 2014 CVW. The industry Internet conference was held in Beijing and was synchronized through the big screen of New York Times Square. The conference was made by the Asia Letter Group, the cloud base and the Chuang-Zhuang economic and Technological Development zone jointly hosted more than 5,000 global it and traditional industry leaders and elites who are concerned about the development of Internet and traditional industries, and explored the evolution of "Internet access to traditional industries", "traditional industry internet" and the technological model and business innovation of industrial Internet.
In the afternoon of the Industrial Internet Conference "network security @ Internet" Theme Forum, the Ministry of Public Security three Wang Zhipeng brought "network electronic identity card Eid development and application" keynote speech. "In terms of the standard system, the network format specification is set by three, Eid's architecture and related interface GB, line superscript, set up by the end of last year by the three-led working group, the relevant standards have been embryonic, for the promotion of Eid-related industries and the entire Eid ecological circle maintenance, played a very important role.
Wang Zhipeng: Various cyber frauds threaten the country's information security, mentioning various privacy exposures, and 2011 of years of Korean companies being hacked. 2013 20 million Open room records were exposed, 2014 Ctrip user credit card records were leaked. Large-scale e-government construction can not really achieve convenience, the benefit. Look at our country now in the network practices, we currently need to use some online Internet applications, users need to show their identity information, need to fill in the ID card sometimes photos, such as offline identification and online identification, one way to lead to the user's information exposure. South Korea now plans to rebuild its offline ID system, as their online identities are poorly managed, which has led to the exposure of national citizens ' information and a direct impact on the real world. Let's take a look at the EU's approach, where the EU has developed a strategy for the development of information and communication technologies in 2005, in which the membership is determined by the Member States of the European Union, each country's security sector, leading the implementation of their respective Eid, but must comply with EU requirements and implement EU certification. The European Union already has 18 countries that have issued Eid, including Austria and Britain.
The main work of the three-way Eid is to study the landing means of our country's network generation management. As in the present society, Eid is the basic measure of virtual management, is the extension of the real social management mechanism to the network space, realizes a unified management. So what exactly is the Eid? Chinese Full name Network identity electronic identification, used for online personal identity of electronic information files. Its authority is embodied in the authoritative Department of Public Security, which realizes the authenticity and validity of the citizenship, and the one by one corresponding characteristics. The Eid itself does not contain the user's personal information, and the user does not expose his or her information when using the Eid. Eid also has uniqueness, no one holds multiple Eid cards, if the Eid card loss and theft can be reported. Eid the development of the country's strong support, Mushu has come to three to guide. Three undertook the topic of network management, 2013 passed the approval of the state Password Bureau. Eid requires identity audit, the user must adopt the way of face sign, and do a real identity audit. 8 million have been issued and 10 million are planned for the year. Eid's platform, currently has 500,000 Eid per hour and business processing capacity.
In the standard system, the network format specification has been developed by three. Eid's architecture and related interface GB, line superscript, set up by the end of last year by the three-led working group, the relevant standards have been embryonic, for the promotion of Eid-related industries and the entire Eid ecological circle maintenance, played a very important role. This is an identity management framework based on Eid, which basically conforms to the identity management model. When a user registers and issues Eid cards with his identity card, the issuer is a bank. As the issuing agency of Eid, it is necessary to check with the public security organization, and only the identification of the user can issue Eid card. Users use Eid cards, do not need to provide their own identity information to third-party applications, but need to work with the identity service agencies IDP to implement such a process, online applications do not need to solicit the user's real information. Eid environment can be used in the desktop environment, E-commerce, e-government, social networks and mobile Internet applications, the main features include real-name authentication, which includes the use of Eid network registration applications, without the need for third-party applications to provide their own true information.
When your account is stolen, it can be recovered by Eid. Do not need the original traditional input username, direct brush Eid card for landing, security payment is to refer to the Eid card, the realization of landing and payment of a card completed. To introduce the application of Eid pilot, this is Sina Weibo's real name certification, this is the mobile phone app, the user can enjoy personalized service through the Eid, this is through the Tencent online games, E-government, this is the response to let the data more errands, so that the masses less errands, this is based on privacy protection of the logistics platform, The user may brush the Eid card to carry on the sign, the user does not need to divulge own real information. This is the application of Eid in China postal mail, Eid is just an infrastructure, the entire network management is an ecological circle, we need from the technical, legal aspects to promote the development and improvement of the biosphere.
(Responsible editor: Mengyishan)