WO2011035549A1 - Method for managing citizen information - Google Patents
Method for managing citizen information Download PDFInfo
- Publication number
- WO2011035549A1 WO2011035549A1 PCT/CN2010/001473 CN2010001473W WO2011035549A1 WO 2011035549 A1 WO2011035549 A1 WO 2011035549A1 CN 2010001473 W CN2010001473 W CN 2010001473W WO 2011035549 A1 WO2011035549 A1 WO 2011035549A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- card
- citizen
- mailbox
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
Definitions
- Adopt WAN technology communication technology
- W E B technology communication technology
- large database management technology
- the data encryption system is not unbreakable, because all encryption algorithms are public, and once the attacker obtains the key, the ciphertext data can be decrypted and the corresponding plaintext value is directly obtained.
- There are many ways to obtain a key The most straightforward method is to seek a key management vulnerability. The method of obtaining a key through cryptanalysis is something that can be done by personal strength. If the key of the digital anti-counterfeiting system is cracked or stolen, an IC card is also built in the fake ID card, and the real identity information identical to the visual reading information is input or the input is only the real information of the other identity information of the photo, so that it can be The ordinary ID card reader reads and displays, ie the ID card "clone".
- Mobile or Unicom users can query for 5 yuan. When the information is consistent, you can also view the photos with the password in the SMS. On the surface, this kind of query satisfies the verification requirements for ID cards.
- the fake ID card is used to make a fake ID card, it is obviously not enough to judge the authenticity of the ID card by simply relating the name to the identity card number.
- the inquiry method can not only verify the authenticity of the ID card, but also put a layer on the fake ID card. Big camouflage. Furthermore, the logical chain relationship of the ID card number, name and photo information allows any person to easily inquire without distinction, and obviously lacks caution. It is difficult to ensure that some of the bad-hearted people illegally use it. After all, the Resident Identity Card Act also imposes strict restrictions on the police's inspection of citizenship ID cards. The ideal situation is: Through institutional arrangements and technical design, it is possible to distinguish between “legitimate” and “unfair” requirements for checking the authenticity of a particular citizen's identity card, and to block “unfair” checking requirements from the information checking process. For “justified” check requirements, it should be completely public and free.
- the exchange and full use of citizen information is inseparable from the participation of the unit.
- the information exchange and full use of the unit involve a wider range of issues, and the relationship is more complicated and the problems to be solved are more.
- the system constructed by the invention patent is based on the identity card and account management system of the public security department, and is intended to facilitate the implementation of the patent.
- the unit information problem involved is solved or should be solved by the system framework, and it can be solved. If it cannot be solved, it will be simplified or avoided. This is also why the invention patent mainly solves the problem of citizen information needs, and also involves the information inquiry, inspection, display and information exchange and identity verification of the unit.
- the patent of the invention is still based on "a citizen information management system method". Name, not the reason for using a larger concept.
- the object of the present invention is to propose a comprehensive solution to the above problems by means of a computer network system, so as to realize the identity verification of a citizen or a unit, the citizen or unit information including its identity information can be queried, identifiable, and displayable.
- a close examination of the aforementioned problems to be solved reveals that citizens or units (hereinafter collectively referred to as subjects) are both the producers of information and the recipients and users of information.
- the information environment in which each subject is located is composed of various information systems of different levels and sizes.
- Various types of information systems (which can be understood as various database systems of various departments, industries, and units) generate or change information related to the subject or related to the subject every day.
- the information related to the subject in various information systems and the information generated by the subject itself are collectively referred to as subject information, and the collection of all subject information constitutes the subject information resource.
- subject information forms a many-to-many information exchange relationship with each other with the subject information resource as the object.
- the technical solution realized by the invention is based on the existing public security organ citizenship ID card and household registration management information system, and establishes a national citizen information management platform (hereinafter referred to as "citizen information platform"), including citizen information management system and information service. System and email system.
- the Citizen Information Management System manages ID card related business and e-mail distribution.
- the information service system has management functions such as integration, classification, indexing, statistics, etc. of citizens or unit information, and application services such as query, inspection, display, identity verification, and retrieval for providing citizen or unit information.
- the e-mail system provides e-mail, online communication, social surveys, announcements, and advertisements through e-mail websites.
- the Citizen Information Management System assigns each citizen a legal e-mail that is free to use from birth for a lifetime, and its e-mail address is used to send and receive e-mails.
- E-mail account number is set as the citizen ID number, can not be changed
- its e-mail login account refers to the e-mail account dedicated to open e-mail, the same below
- the account can be changed .
- a "distribution base" for citizens' personal information citizen e-mail integrates various systems including banks, social security, medical care, housing, transportation, water and electricity, etc., which are distributed outside the citizen information platform through the link service provided by the information service system.
- the various personal information resources about itself are presented in the form of various personal information documents (substantially links of various types of personal information), and citizens can carry out various types of personal information documents for them. Review or external display operations.
- the Citizen Information Management System also sets up free use of legal e-mails for all types of units to facilitate information exchange between various units, between citizens and between units and citizens.
- the mailbox sending and receiving account and email login account of the unit are initially set to the national unified organization code number. After the unit mailbox is opened, the email receiving and sending account number is always fixed, and the email login account can be changed.
- the legal e-mail address of the unit is essentially the same as that of the citizen e-mail.
- the integration unit is dispersed in the identity, bank, housing, and transportation.
- Various types of unit information resources in various external systems, such as hydropower, and various unit information documents are collectively referred to as user information).
- the form of the document, the same below is presented in the mailbox, and the unit can view or display the various information of its own.
- the e-mail system has a graphic seal associated with the content of the e-mail, and a letter stamped with a graphic seal, any change in its content causes a significant change in the seal graphic.
- the second-generation ID card layout has been improved, two ID card verification codes have been added, and some ID card information displays have been re-arranged.
- the ID card is loaded into an ID card information protection sleeve, so that it can be pressed.
- Basic ", "normal” and “complete” three levels of ID card information display.
- the ID card IC card reader has also been improved accordingly.
- the readers are divided into three basic ID card functions: "basic", "normal” and "complete”.
- the ic card contained in the ID card stores the ID card information in three areas according to the above three read permissions to suit its needs in three levels.
- the ID card also stores the ID card serial number and ID card.
- the password and the fingerprint information of the two human hands, and the information of the ID card network verification times performed by the ID card reader and the reader are respectively stored according to the type of the reader, wherein the home address, the ID card password and the two human hand fingerprint information can pass
- the information of the ID card network verification times performed by the ID card reader and the file stored separately according to the type of the reader is refreshed as the number of network verification times increases, and other identity information cannot be modified.
- the ID card IC card also reserves information storage space, which can expand the work permit, driver's license, bus card, medical card, social security card, bank card and other applications, so that one card can be used.
- Each citizen or unit can directly apply for the digital certificate U shield (the digital certificate containing the basic information of citizens or unit identity) from the citizen information platform management institution to apply for various types of identity verification in the citizen information platform.
- the constructed citizen information platform can realize the following twelve functions: (1) Information exchange function, that is, mail, or real-time two-way, multi-directional communication or visual communication between units, citizens, and units and citizens through the network. (2) Information inquiry function, that is, the unit or citizen can query the information about himself in other information systems in his own email address in the citizen information platform; (3) information display function, that is, unit or citizen By invoking and displaying other information about the identity, credit, assets, etc.
- the authentication function that is, the identity network verification of the information service system in the citizen information platform or the ID card network verification based on the ID card reader, can directly verify the authenticity or verify the authenticity of the identity card and whether the holder is an identity
- the owner of the card (5) business operations function, unit or citizen in their own email address, The information service system links with the external system to handle related business operations, such as realizing fund transfer for the business operation of the fund account; (6) Information statistics functions, such as the number and composition of various units or citizens at different times and places Statistics of other indicators; (7)
- the online survey function can make a special survey to all respondents one-to-many, and change the limitations of traditionally only sample surveys; (8) Find functions, through the citizen information platform, all All types of e-mail addresses named after the name of the unit and the name of the citizen can be found in the legal e-mail address book published on the platform;
- the function of publishing advertisements can fully utilize the advantages of the unit and natural person resources unique to the citizen information platform, and set up advertising and publishing areas according to the administrative regional level or community type;
- Information publishing function that is, various social management institutions can The information platform of the e-mail system in the platform can be used to publish information to specific or non-specific objects.
- the Citizen Information Platform can provide a variety of information publishing services; (11) Real-time dynamic monitoring function, under the authority of the law, through the background of the citizen information platform The system can monitor the movement trajectory of specific citizens, thus providing convenience for public security organs to arrest suspects; (12) Decision-making auxiliary function, citizen information platform uses advanced data fusion, data warehouse, data mining and other technologies, for citizens or units of information resources The system's data information is deeply analyzed and mined to provide support for national macro and micro management decisions. On the basis of the above functions, we can develop various network platform services, such as e-commerce services, news reports and video services for film and television works, with the unique advantages of national units and all citizens.
- the citizen information management system, the information service system, and the e-mail system included in the citizen information management platform adopt a centralized structure and a unified management method.
- the citizen information management system has the functions of mining, categorizing, analyzing, processing, and summarizing surveys, statistics, and related data information, and providing auxiliary management support for national macro or micro decision-making.
- the citizen information management system builds a citizenship information database based on the citizen's ID card and household registration information system of the public security organ.
- the unit identity information database can be amplified, and the citizen ID card information, the fingerprint information of the human hands and fingers, and the household registration information can be stored.
- the time is appropriate, the basic identity information of various units is also stored, and the identity verification information of the citizen or the unit is recorded.
- the information service system links information about citizens or units in various systems based on citizen and unit information data, establishes various index databases of citizens or unit information, provides information retrieval, identity verification, and information on citizens or units through an e-mail system. Query, inspection, display services.
- the e-mail system provides citizen or unit mailbox service and mailbox address book through the e-mail website. Service and online communication information services.
- security measures such as internet firewall, access rights and passwords should be established between the citizen information platform and other types of external information systems. Advanced encryption and decryption methods are used to prevent leaks during data transmission.
- the real identity information is easy to obtain, and the criminals often use the real identity information to make a fake identity card.
- the invention patent envisages distinguishing the ID card information into basic identity information and relatively confidential identity information. With the help of the e-mail website, in general, only the basic identity information needs to be displayed, so that the purpose of verifying the real identity can be satisfied.
- the relatively confidential identity information such as the ID card verification code and the home address is supplemented. For units that are necessary and have the right to examine relatively confidential identity information, they should have strict rules for preventing confidentiality of the confidentiality system for identity information. In this way, it is more difficult for criminals to obtain a complete real identity information, thus preventing identity fraud at the source. To this end, it is necessary to improve the design of the existing ID card layout.
- ID card verification code information add the word "resident ID card” above the photo ID position, and name, gender, date of birth, nationality, ID card number, issuing authority, date of issue and expiration date, etc.
- the items are printed on the front of the ID card, and the home address and two ID card verification code information are printed on the opposite side of the ID card.
- the home address and the two ID card verification code information are masked by special tapes that can be matched with the ID card (can be repeatedly uncovered and shaded).
- the back of the special tape can be printed with the position information of the masked information, so that the three identityes When the information is unnecessary, it will not be displayed or copied. If you do not use special tape to cover, you can also insert the ID card into an ID card protection cover for the same purpose.
- the ID card information cover is a transparent ID card security bag made of transparent plastic material with anti-wear, anti-fouling, waterproof and fireproof functions. There are three positions on the surface of the protective cover facing the ID card verification code and home address.
- the opaque tape can be repeatedly peeled off and covered so that the three pieces of identity information are not displayed or copied when they are unnecessary. When the three pieces of identity information need to be displayed or copied, the ID card does not need to be extracted from the protective cover.
- the opaque tape on the surface of the protective cover is peeled off; the opaque tape on the surface of the protective cover is printed with a text indication of the position of the masked information.
- the ID card information can be displayed in three levels of information: “complete”, “normal” and “basic”.
- “Complete” information refers to the display of the explicit information of the ID card other than the second group ID card verification code.
- the "normal” information refers to the ID information displayed in addition to the ID card verification code information, "basic” information, Display ID information other than ID card verification code and home address.
- the date and validity period of the issuance of the identity card on the front of the ID card is expressed in 7-digit code, immediately after the name of the issuing authority; the year, month and day are represented by two digits in total, and another digit indicates the period of use; 9 The following years are indicated directly by numbers.
- the capital letter X indicates 10 years, Y indicates 20 years, and Z indicates long-term.
- the ID card verification code has two groups, each group of 9 digits, 8 digits of verification code plus one verification code, which is automatically generated by the citizen information management system each time a new ID card is issued or replaced.
- the first set of ID card verification codes can be used for identity network verification of the information service system and ID card network verification based on the ID card reader.
- the second set of ID card verification codes is only used for identity network verification of the information service system.
- the method for generating the ID card verification code is to generate the 16-digit number by the asymmetric encryption algorithm by the ID number and the random number generated when the card is issued, and the first 8 digits are subjected to the check operation to obtain a check code to be added to the 8-digit number.
- the latter 8 digits are subjected to a check operation to obtain a check digit added to the 8 digits to form a 9 digit second digit ID card verification code.
- the usual identity network verification such as online game real name verification, ticket real name verification, only use the first set of verification codes; in the financial, customs, airport and other application systems, the second set of verification codes is needed for identity network verification. Since the second group of verification codes is used less frequently, and the ID card reader cannot be displayed, the degree of confidentiality will be higher than the first group of verification codes, thereby achieving the classification and confidentiality effect of the ID card verification code.
- ID card IC card can store identity information and extended application information within 10 or less.
- the fingerprint information in the identity information includes two commonly used hand fingerprint data, which can be replaced with other hand fingerprint data when requested by the citizen information platform management organization if necessary.
- the home address and ID card information in the identity information can also be modified by applying to the Citizen Information Platform Authority.
- the ID card IC card can read one of the three levels of ID card information according to different authorizations and can only be read by the Citizen Information Platform Management Organization according to the three types of authorized ID card readers.
- the extended application information can be installed. Read by the corresponding application system management authority authorization module.
- the ID card IC card reader has also been improved accordingly.
- the readers are classified according to "basic”, “normal” and “complete”.
- ID card IC card reading permissions are divided into three types: “basic”, “normal” and “complete”. Each reader can only display one of the three ID information levels for different industries and different occasions.
- the identity information collection needs the "complete” type displays the ID information in addition to the second group ID card verification code, and the "normal” type displays the ID card ex-visual information in addition to the ID card verification code information, the "basic” type. Displaying the ID information in addition to the ID card verification code and home address; In addition to the three levels of ID card information, the ID card IC card can not be displayed by the ID card reader.
- the permission is read, and the third area stores the contents of the "complete" information of the ID card except for the "normal” information of the ID card, which can be read by the "complete” permission.
- the ID card reader has built-in multiple encryption and authorization module interfaces, and can install the ID card reading and writing authorization module, so that the ID card reader can read and write the ID card information according to one of the three levels.
- the ID card reading and writing authorization module is issued by the public security department.
- the authorization module of the extended application system can also be installed, so that the identity card can be extended to be applied to other business systems, and the authorization module of the extended application system is authorized by the corresponding management department of other business systems to be issued by the public security department.
- the verification steps for the authenticity of the ID card are:
- the ID card can be read and displayed, it can indicate that the information read from the ID card IC card has passed the verification of the ID card information authorization module in the reader/writer; (2) The reader displays the information and the corresponding identity. Whether the appearance information of the certificate is consistent. That is to check the consistency in the identity card, to prevent malicious "replacement" behavior on the ID card. "Change core" is the most difficult to identify an ID card fraud, that is, the surface information of the ID card is true or only the photo is fake, and the IC card contained in the ID card uses another real person's real ID IC card. Or its copy card replacement.
- the method for verifying the legality of ID card readers in the offline state is as follows: (1) The eye-to-eye comparison of the ID card surface image, the reader display photo and the real person; 2) Whether the ID card password input to the reader/writer can be verified by the password of the ID card IC card; (3) Whether the human body fingerprint information input to the reader/writer is matched with the human body fingerprint information in the ID card IC card.
- the above three verification functions of the ID card reader for the legality of the holder are independent of each other and can be used alone or in combination.
- the information service system sets up ID card network verification times counters for three types of ID card readers, and the number of verifications of the corresponding type is increased by 1 each time after ID card reader verification by one type of ID card reader/writer.
- the IC card also stores the current value of the ID card network verification times based on each type of ID card reader, and the ID card network verification method by the ID card reader is: any type of ID card reader.
- the information contained in the ID card IC card is read, including the ID card information displayed by the reader/writer, the human body fingerprint information, and the current value of the verification number counter sent to the information service system for authenticity verification of the ID card, and the information is the same as the comparison content.
- the corresponding type counter of the service system is incremented by 1 and the value of the same type of network verification number in the ID card IC card is refreshed.
- the network verification method for ID card holder legality by ID card reader is (1) the ID card password input to the reader/writer is sent to the information service system for ID card password verification; (2) Input to read and write The human body fingerprint information is sent to the information service system to perform human body fingerprint information matching.
- the human hand fingerprint information may be any one of the ten fingers or all ten fingers.
- the difference between the ID card network verification by the ID card reader and the ID card verification by the offline ID card reader based on the Citizen Information Platform system is that the former can find the counterfeit in time by setting up the ID card network verification counter.
- the cloning or theft of a citizen ID card IC card thereby fundamentally eliminating the forgery, cloning or misappropriation of the citizen ID card. If the ID card is lost or the ID card is copied, you only need to go to the Citizen Information Platform Management Agency to report the ID card loss and receive a new ID card. The original ID card cannot be verified by the ID card network, so you cannot continue to use it.
- the counterfeiter cannot know that the ID card cannot be verified by the network. . Even in the most extreme cases, the counterfeiter has all the identity information such as identity information, ID card password, ID card network verification number, etc. The true and false ID cards are exactly the same at a certain time and cannot be distinguished. Then the true and false ID cards are in them. After a network verification, after changing the ID card network verification times information, the other one must not be verified by the network.
- the result is that, or the real ID card can always be verified through the network, and the fake ID card has not been verified by the network, or the fake ID card has passed the network verification, and the real ID card is legal if the network verification fails.
- the certificate holder will promptly report the loss and report the use of the fake ID card in the shortest time.
- the ID card password verification may be required, and the human body fingerprint information verification is required.
- the application scope of human fingerprint information in the ID card IC card should be strictly regulated by administrative regulations or administrative regulations.
- the ID card password verification should be mainly used. It can cooperate with the identification and verification of human fingerprint information, and can never use human fingerprint information verification separately. This is mainly due to the consideration of personal fingerprint information confidentiality and personal safety.
- the newly activated ID card should be the initial identity information of the ID card (including the name, ID chip IC card chip serial number, ID card number, ID card verification code, current value ID card network verification number) at the same time in the citizen information platform. And the ID card is saved in the IC card, and the identity information called ID card is initialized before it can be officially used. If you want to enable the ID card password and the two hand fingerprint information comparison functions in the ID card, you should manage it through the citizen information platform. The two functions of the application for the application and review can be opened separately or simultaneously.
- the modification of the ID card password should be carried out through the ID card reader of the networked information service system.
- the operation steps are as follows: (1) verify the old password; (2) set the new password, the new password is input to the reader and the same test, read and write
- the device applies for password modification to the citizen information platform through the information service system. After the password is successfully modified, the reader writes the new password into the ID card.
- the ID card password is written and the information service system password is saved at one end, and one end is invalid.
- the ID card will not be verified online.
- the license holder should To the public security organs at the county level or above (or the citizen information platform management agency), to handle the identity information initialization business of the identity card, the ID card can be used frequently by JH.
- the unit identity network verification can be performed. The method is as follows: Use the unit digital certificate U shield, and input the "unit full name or unit mailbox receiving and sending account + unit digital certificate U shield password", that is, the unit can be completed. Authentication.
- the second is to enter "name or ID number + ID card verification code 2" and "ID card password”
- the third is to use the citizen digital certificate U Shield, enter "name or ID number +. citizen digital certificate ⁇ ⁇ password”, that can complete the citizenship network verification; in the banking, telecommunications and other application systems can be embedded in the identity verification interface of the information service system for identity network verification After the verification is passed, the application system can obtain citizenship information suitable for the application system according to rules such as administrative regulations, administrative regulations or authorization of the owner of the personal information.
- the type of citizenship information obtained by the application system from the citizen information platform may be one of three levels of identity card information, or may be comprehensive information including work permits, driver's licenses, professional titles, academic qualifications, household registration information, etc., suitable for application.
- the system needs and is subject to the consent of the owner of the personal information or the authorization of administrative regulations and administrative regulations. Therefore, each application system can use personal information in a standardized and reasonable manner, so that personal information is not abused or illegally used. It is convenient to carry out real-name system of various businesses, such as real-name mobile phone system, real-name system of online games, and real-name system of ticket.
- the identity verification service is embedded in various business systems to achieve close cooperation with various business systems.
- the entire verification process is completed automatically when the business is handled. No manual intervention is required, and the business processes and habits of each system are not changed. , can greatly improve the efficiency of business processes of various systems.
- the above methods for inquiring and verifying identity information are legally authorized to display or on the basis of the citizen's own authorization, thus ensuring the legitimacy, necessity and legitimacy of identity information inquiry in terms of system and technology. It overcomes the shortcomings in the society based on the "National Citizenship Information System” database, which makes the ID card information easy to check, charge inquiry, and excessive inquiry through the network or mobile phone.
- the method of inspection also covers the identification of basic identity information and the identification of special identity information (such as driver's licenses, various professional licenses, qualifications, credits, etc.).
- special identity information such as driver's licenses, various professional licenses, qualifications, credits, etc.
- the banking system adopts the above-mentioned ID card network inspection method for the account opening, report loss and access review, and sends the notification message of the processed business to the citizen's mobile phone and e-mail, and notifies the mailbox user at the first time. It can eliminate the use of other people's ID cards to open or report losses and fraudulent deposits, thus avoiding all kinds of fraud activities related to this. Open or report lost accounts and other businesses to carry out such network ID check, the mailbox users can know the use of their ID cards in the first time, whether they are fraudulently used by others, and if they find an abnormality, they will report the case immediately, which can effectively prevent the identity. The occurrence of various illegal activities caused by fraudulent use.
- This ID card network verification method will completely deny the financial institutions such as banks
- the card can only be used as an excuse to review the authenticity of the authenticity of the certificate, which can ensure the deposit and withdrawal of the depositor and the loss of the report.
- the application of the ID card network inspection method in the banking system ensures the implementation of the real name system of the bank account. , to ensure that the bank account funds are all traceable, and will not be invisible because of the account name.
- the information service system connects various external systems that provide unit or personal information, including information resource systems and business application systems, and establishes various information item index or classification index databases for various units or personal information for unit or personal identity information retrieval. And statistical services; providing unit or individual identity verification through the citizen information management system; providing unit or personal information classification query, classification inspection, and classification display service through the email system; through the application system for the information service demand side (including this The platform's email system) provides an information service embedded module to provide the aforementioned information services. For example, in the banking application system, the identity verification module is embedded, and the identity network verification is performed, and the business for bank account opening and account cancellation is carried out.
- the e-mail system provides a separate network storage space for the mailbox users.
- the user can set up a hierarchical directory to store various documents (hereinafter referred to as user documents) set by the user; the user documents or user information documents in the mailbox can be provided as needed
- the user establishes a password autonomously, and the user document and the user information document can establish a related link.
- the user information document can be opened through an associated link built on the user document, and the associated user document can be opened through the associated link on the user information document. In this way, the mailbox user can put the summary of the content of the user information document, edit, and the like into the user document for reference.
- the e-mail user can determine the required user information document to display the document, number it, and set the display password; when the mailbox user needs to display the user information document, in the unit or personal information display interface in the e-mail system, first You can view or display the unit or personal information (including identity information) by performing identity network verification on the organization or citizen, and then entering "document number, display password".
- the method can be completed by using a computer to access the Internet or a mobile phone.
- content such as personal identification information needs to be displayed, the citizen can implement the email without opening the email, and the other information of the mailbox can be avoided.
- an individual who forgot to bring an ID card he can prove his true identity by this method. This has greatly facilitated the accommodation of tourist hotels.
- the user information document can be selected, and after checking the identity, the user information document link with the set time is provided to the unit in the mailbox system through the e-mail system. Or the target mailbox of the personal information requester, the user information document link can also be forwarded to the designated other target mailbox.
- the authorization to send a citizen's ID card information to the court through the citizen information platform provides conditions for the court to receive complaints online and file a case online. This method of authorizing the inspection unit or personal information provided by the Citizen Information Platform as a third party can prevent cyber fraud to the greatest extent.
- An online information exchange system is embedded in the e-mail address, except for the general chat system, which can be used for one-on-one private chat or application.
- Friends group chat it is characterized by the opening of units, communities and chat rooms set up by industry, and there are special person management according to the administrative level. All the people who participate in the chat room have real names and are added to each other as mailboxes. You can authorize your personal information (check the box in the optional box of a user information document) to let the other party view their own information (including their own identity information) in the chat system.
- E-mails sent and received in the e-mail system can be specified as "online reading” and "download reading”.
- the sender of the e-mail can specify that the e-mail to be sent is one of the two forms.
- the recipient can receive the message as "download and read” when receiving. Designated as one of the two forms; "Read Online” messages can only be read through the email system's dedicated email management software, and cannot be downloaded for reading; messages designated as "download and read” can be managed by dedicated email Software or general email management software is downloaded to local storage and reading. In this way, for some mails with high confidentiality requirements, by selecting the "online reading" mode, the risk of mail leakage can be better prevented.
- Each e-mail is provided with various letter templates for writing various types of application letters.
- e-mails with legal documents they should conform to the written requirements of laws and regulations, that is, they can tangibly express the contents, and It can be retrieved at any time; it can accurately represent the content that was originally generated, sent or received; it can reliably guarantee that the content remains intact and unchanged from the time of final formation, but the letter can exist during forwarding, storage and display. Formal changes such as changes in the attributes of the letter; any changes in the content and form of the letter can be found.
- e-mails of a legal document nature are transmitted in cipher text during the process of sending and receiving.
- the letters received by the receiving party are consistent with the content, layout and paper type generated by the sender, and the e-mail can be stamped with the content of the letter.
- the associated graphic seal which is pre-stored in the e-mail system, any changes in the content of the letter will directly lead to significant changes in the stamp pattern; the received letter contains the text, logo and receipt of the citizen information platform.
- the e-mail will be automatically saved after being sent successfully, and can be downloaded or displayed, printed, saved letter content, layout and paper type and the citizen information platform on it.
- the text, logo, and the email address of the receiving and sending party and the time when the letter is sent cannot be changed. Otherwise, the stamp pattern will be changed significantly.
- E-mail E-mails can be classified and archived as needed.
- the E-type mailboxes are owned by the administrative departments of the state organs or the Citizen Information Platform. They cannot receive e-mails from other websites, and only receive this e-mail.
- the mail sent by the mailbox in the mailbox system to the sender's mail marked as "blacklist" by the special mailbox will directly enter the trash in the mailbox, and will be automatically cleared after the set period, and a prompt will be sent back.
- the party’s mail is placed in the trash can.
- the Class A mailbox has all the target mailboxes to the administrative area or authorized area of the jurisdiction - the function of sending letters or SMS messages to one or one-to-many, beyond the administrative area or authorization of its jurisdiction.
- the regional target mailbox can only send letters or SMS messages one-on-one.
- the target mailbox is unconditionally received, and will automatically return a receipt of "letter received”; the B-type mailbox is owned by a unit or citizen other than the class A mailbox user.
- Class B mailbox receiving mail status can be divided into six types: “receive all information” -, “receive system information”, “receive small group sending information”, “receive non-group sending information”, "receive friend information”;”receive all information””It means receiving all mails from outside the system and within the system.
- “Receiving information in the system” means receiving only all the mails in the system, including mass mailings.
- "Receiving small group sending information” means receiving only the mail in the system.
- B-type mailbox users can send or send mobile phone short messages to the mailbox users in the system through the e-mail system, but they are restricted by the receiving status of the target e-mail.
- the receiving status of the target e-mail is "receive all information", “receive system information”
- the mailbox user can receive a single or group mobile phone short message of the mailbox user in the system; when the receiving status is "receive small group sending information", the mailbox user can receive the mobile phone short message sent by the mailbox user in the system, and the specified number is excluded.
- the above non-friend group sends a text message; when the receiving status is "receive non-broadcast information", the mailbox user can receive the mobile phone short message of the mailbox user in the system, but does not receive the non-friend group mobile phone short message; when the receiving status is "received” When the friend information is ", only the mobile phone text message of the friend mailbox user in the system is received, including the group's mobile phone text message.
- the first opening of the citizen's e-mail address should be handled through the application and review of the citizen information platform.
- the citizen e-mail account includes the e-mail login account and the e-mail account.
- the two types of e-mail accounts are initially set to the citizen ID number.
- the email receiving and sending account is always fixed as the citizen ID number, and the email login account (mainly composed of English letters, numbers, and Chinese characters) can be changed by the email user application; once the email login account is successfully changed, the original email login account is changed. That is to say, if you lose your utility, you can only use the newly established email login account and password to log in to the mailbox. As such, each citizen's email address is relatively confidential.
- the first opening of the e-mail address of the unit should be processed through the application and review of the Citizen Information Platform.
- the e-mail account of the unit includes the e-mail login account and the e-mail account.
- the initial number is set to the national unified organization code number.
- the email receiving and dispatching account is always fixed to the organization code number, and the email login account (mainly composed of English letters, numbers, and Chinese characters) can be changed by the application of the user's mailbox. After the email login account is successfully changed, the original The email login account is invalid. You can only use the newly created email login account and password to log in to the email address.
- the e-mail system can set a unique "legal representative mailbox" representing the unit under each unit's e-mail directory, which is the full name of the unit.
- the department can set up multiple levels of departmental mailboxes. A certain number of post mailboxes can be set up according to the needs; the e-mails of all levels of the unit can be applied to the management agency of the e-mail system to be named by the unit with the corresponding name of the department.
- the legal e-mail and department e-mail are both a tool for external communication and a public platform for information exchange within the unit; the supervisor can mobilize, the department or post mailbox is unchanged, and the work information in the mailbox is permanently saved, and the department or position is stored in the department. Historical archives online.
- the e-mail address book service provided by the e-mail system publicizes the e-mail address of the unit or citizen in the form of name or name on the e-mail website of the Citizen Information Platform, that is, each e-mail address is the real name or name of the e-mail user.
- the sequence of enterprises, individual industrial and commercial households, institutions, social organizations (including legal persons or unincorporated organizations) shall be arranged according to the administrative regions of the central, provincial (including municipalities, autonomous regions, and the following), cities, counties, and townships (towns);
- the citizen's e-mail address book collects the legal e-mails of all citizens according to the law, according to the administrative area where the citizen's household registration is located, that is, the administrative area of the province, city, county, township (town), street or administrative village to which the citizenship is located.
- Orchestration for part not willing to citizens who publish too specific places of residence may apply to the citizen information platform management agency to arrange e-mail address records according to their surnames at the county or city level.
- citizens may choose one of two arrangements, the default is the first arrangement;
- Citizen's e-mail address book can also be arranged according to the unit.
- Each unit can apply to the e-mail system to combine the legal e-mail address of the new and old employees of the unit under the same unit e-mail communication directory.
- the employee's e-mail address can be externally
- the display may also be limited to the display of employees of the unit, hidden from the outside, and the display mode shall be determined by the employees of the unit; if the citizen moves to a different administrative area, or transfers the work to a new unit, the legal e-mail address will follow the new household registration place.
- the new unit is arranged in the new e-mail communication directory, but the e-mail still exists in the original communication directory list and can receive the mail normally, but the words "has been moved" or "transferred" are marked.
- the mailbox in the mailbox directory is the same as the receiving and sending account, still pointing The only e-mail address;
- E-mail system provides e-mail public address book arranged by industry, professional and other classification methods for the unit, and provides e-mail public address book for citizens according to industry, profession, professional title and other classification methods, each unit Or citizens can submit their application to join a certain category of mailbox address book by submitting relevant supporting documents, which is designed to facilitate the exchange of information between units and people in the same category.
- each unit or citizen can conveniently find the e-mail address of the relevant administrative agency in an administrative area, which brings great convenience for the unit or citizen to handle relevant administrative affairs.
- online fraud you can make a complaint or report by simply finding the e-mail address of the public security organ or industrial and commercial organization in the administrative area.
- you need to pay taxes you only need to log in to the tax hall through the website link of the tax authorities in the administrative area. This makes the virtual network world and the real world realize the real connection, realizing the virtual world.
- the unit or citizen e-mail address may be attached to the introductory information of the e-mail user, but the content shall be approved by the public information platform management organization, and the unit e-mail address may be linked to the external website of the unit.
- the Citizen Information Platform has a mobile phone SMS notification function with a "bind" number for the mailbox, which is used to publish announcements or Real-time email login and ID network verification information, the unit or citizen can choose to open all or part of the SMS notification service.
- the e-mail system can authenticate the identity network through the authentication service embedding module from the information service system.
- the unit or citizen mailbox user who authenticates the identity network can restore the initial mailbox login account or retrieve the current mailbox login account, email password recovery or The reset operation allows the user to enable or disable the function in the mailbox; the unit or citizen can apply to the management agency of the citizen information platform, restore the initial email login account or retrieve the current email login account according to certain procedures. , mailbox password recovery or reset business.
- the operation log and the ID verification log are set in the citizen information platform.
- the operation log includes the login record of the mailbox and the operation record of the user information in the mailbox.
- the login record includes the total number of login mailboxes and the IP address and login time of the login computer.
- the mobile phone number is recorded, and the user can check the operation log to find the abnormal login mailbox in time, and the operation record of the user information in the mailbox, including the modification of the mailbox password, the inquiry, the inspection and the display of the user information;
- the ID verification log includes The number of ID card verifications corresponding to the three ID card readers and the IP address and login time of the registered computer. By checking the ID card verification log, the e-mail user can find out whether the ID card has been stolen or "cloned" by others; Operational logs and ID verification logs enable tracking of the "action trajectory" of a particular citizen.
- the Citizen Information Platform has a special account for the statutory authority to view logs (operation log and ID verification log) and citizenship information. Only statutory bodies (usually public security organs or procuratorates above the provincial level) pass the system procedures for specific posts. The written authorization of the member can be opened, and the scope of the legal authority of different types and levels is open to the law.
- the beneficial effects of the invention can easily and quickly query, inspect, display, verify the identity card and exchange information of the citizen or unit information realized, prevent the disclosure of identity information, and eliminate the goal of forging identity cards to see social and economic benefits. It is very huge.
- the economic and social benefits are enormous.
- FIG. 1 is a schematic diagram of the structure of the citizen information management platform.
- the citizen information management system manages the identity information of citizens (units).
- the information service system provides an authentication service.
- E-mail system (including e-mail website) Provides mailbox management and online communication.
- Business management systems at all levels mainly manage the issuance of ID cards and the distribution of e-mail addresses.
- An application system refers to various application systems that use an authentication service.
- the network terminal refers to various terminals that can be logged into the mailbox website.
- Figure 2 is a schematic diagram showing the structure of the main view of the ID card protection cover. Including the cover sheet plastic material part 1, the cover sheet tongue waterproof tape part 2, the protective sleeve insertion port 3, the protective cover front 4. Among them, the cover tongue plastic material part 1 with the cover sheet tongue waterproof tape part 2 can completely seal the protective cover, so that it has waterproof function.
- the protective cover insertion port 3 is an ID card insertion port.
- Figure 3 is a structural diagram of the sealed state of the rear view of the ID card cover. Including the reverse side of the protective cover 5, home address masking tape 6, ID card verification code 1 masking tape 7, ID card verification code 2 masking tape 8. Among them, the reverse side of the protective cover 5 is a part of the cover card that can transparently display the identity card information. Home address masking tape 6, indicating the location of the home address. ID card verification code 1 masking tape 7 and ID card verification code 2 masking tape 8 indicates the display position of the ID card verification code. Three pieces of tape can be uncovered and covered separately.
- Figure 4 is a schematic diagram of the use status of the ID card cover.
- the front information of the ID card is displayed and can be copied.
- Figure 5 is a schematic diagram of the use status of the ID card cover. The reverse side of the ID card is displayed and can be copied.
- Figure 6 is a schematic diagram of the use state of the rear view of the ID card cover. The information on the ID card opposite to the ID card verification code and the home address was blocked by three tapes.
- Figure 7 is the structure of the ID card reader. It includes a radio frequency unit, a display unit, a storage unit, a keyboard unit, a fingerprint unit, a security unit, a communication unit, and a control unit.
- RF unit The wireless information exchange with the IC card contained in the ID card is realized by RF.
- Storage unit A storage font for reading character dot matrix information when a display unit displays characters.
- Keyboard unit You can enter a value or password.
- Fingerprint unit - can collect human fingerprints and can be used for human hand fingerprint comparison.
- Security unit Various authorization cards can be installed.
- Communication unit Used to connect to a computer.
- Control unit Manage other units, mainly to read identity information, authenticate offline, and connect to network authentication through a computer.
- the Citizen Information Platform Management Organization integrates the original citizen ID card and household registration information management organization of the public security organ, and is managed hierarchically by the central, provincial, municipal, county, and community.
- the management agencies at or above the county level apply the corresponding business management system to manage the issuance of ID cards.
- Community organizations can apply community-level business management systems, empower community workers to manage various group chat rooms, and conduct business or social management services such as announcements, advertisements, and social surveys in IP days.
- the phenomenon of personal information being sold, sold and leaked is very serious in the country, which has aroused widespread concern of the Chinese people, but has never found a cure.
- the existing channels for protecting personal information are mainly legal protection and self-discipline protection, and lack of preventive (or technical) protection.
- the invention fills the blank of preventive protection by reforming the three display methods of the new design of the ID card and the ID card reader.
- the “Resident Identity Card Law” should be amended, especially the ID card information and layout design and ID card IC card information should be adjusted as shown in the present invention. It is necessary to legislate through the citizenship Information Protection Law as soon as possible to regulate the registration, inspection and use of citizenship information. It is stipulated in the legislation that all places and occasions that require registration, registration, and certification with a personal name should register their real name and ID number.
- the construction and promotion of the citizen information management platform and its e-mail website are divided into four stages: The first stage is based on the existing public security organ's citizen ID card and household registration information system, and establishes a citizen information management platform and its e-mail website. Establish a citizen information management system and provide e-mail service; In the second stage, build an information service system to carry out citizenship verification services; and in the third stage, use e-mail system to conduct information services such as access, inspection and display of citizen information; In the stage, improve the citizen information management system, gradually stop the operation of the original public security organ's citizen ID card and household registration information system. In the fifth stage, improve the functions of various parts of the citizen information management platform, including establishing legal e-mails of various units, and realizing the unit.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Educational Administration (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
—种公民信息管理方法 一. 技术领域: - Citizen information management methods I. Technical areas:
采用广域网技术、 通信技术、 W E B 技术、 大型数据库管理技术。 Adopt WAN technology, communication technology, W E B technology, and large database management technology.
二' 技术背景: Two' technical background:
世界已步入信息化时代, 我国各行政部门和众多的企事业单位在信息化浪潮下都已经发 展有自己的一套独立的网站和数据库系统。 公民个人的身份信息和金融、 房产、 保险、 财税、 交通、 医疗卫生、 水电费用等等信息, 往往分散在各个相互独立的部门或单位的业务系统数 据库之中。 公民对于关涉自己的个人信息有查询和向他人展示的需求, 也有对他人的个人信 息査验的需求。 国家机关、 企业单位、 事业单位、 社会团体等法人或非法人组织 (以下统称为 单位), 也同样存在关涉自身的信息存放在其他部门或单位之中的情况, 同样存在对自身信息 的査询和向其他单位或个人展示的需求, 对其他单位或个人信息査验的需求。 单位之间、 单 位与公民之间、 公民之间存在大量的信息交流需求。 这些需求的充分实现, 将会极大地促进 社会的发展、 经济的繁荣。 目前的状况是, 由于这些关涉公民或单位的信息互相分割存在, 并无关联, 查询、 査验、 展示受到严重制约, 效率低下。 而由于沟通渠道不通畅, 信息交流 也受到严重制约。 例如: 想与多年未见的同学联系却因遗失其联系方式而不能, 想咨询专家 问题却没找到他留下的名片而只好作罢; 法院或行政机关的法律文书因找不到被告或行政相 对人只好 "公告"送达, 公告而 "不达"是经常有的情况, 对于大多数受 "公告" 的单位或 公民来说显然很不公平; 国家机关、社会公共单位与公民之间仍然以纸质信函邮政通信为主, 不仅花费过多邮资且存在迟延、 误送、 漏送现象造成不必要的损失。 The world has entered the information age. All administrative departments and numerous enterprises and institutions in China have developed their own independent websites and database systems under the wave of informationization. Citizens' personal identity information and information on finance, real estate, insurance, finance and taxation, transportation, health care, water and electricity costs, etc., are often scattered in the business system databases of separate departments or units. Citizens have the need to inquire about and present to others about their personal information, as well as the need to examine other people's personal information. State organs, enterprises, institutions, social organizations and other legal persons or unincorporated organizations (hereinafter collectively referred to as units) also have information about their own information stored in other departments or units, as well as inquiries about their own information. And the need to show other units or individuals, the need to check other units or personal information. There is a large amount of information exchange between units, between units and citizens, and between citizens. The full realization of these demands will greatly promote social development and economic prosperity. The current situation is that, because these information about citizens or units are separated from each other, there is no correlation, and inquiries, inspections, and displays are severely constrained and inefficient. As communication channels are not smooth, information exchange is also severely constrained. For example: I want to contact a classmate who I haven't seen for many years, but I can't because I lost my contact information. I want to consult an expert question but I don't find the business card he left. I have to give up. The legal documents of the court or administrative agency can't find the defendant or the administrative relative. People have to "announce" to serve, announcements and "not up" are often the case, and it is obviously unfair to most units or citizens who are "announced"; between state organs, social public units and citizens The paper letter is mainly based on postal communication, which not only costs too much postage, but also causes unnecessary losses due to delay, misfeeding and missing.
随着电子商务的蓬勃发展, 网络安全性问题日益突出,其中最为重要的是身份识别问题。 由于网络身份的虚拟化导致的欺诈可谓层出不穷, 防不胜防。 单位和公民均存在身份验证问 题。 单位作为一个社会活动主体, 己有工商部门和主管部门公开其身份信息, 他人要想验明 其真实身份相对容易。 但单位如果想网上办理业务, 需要自己主动向其他公民、 单位或其他 系统验明其单位身份, 在现有的信息体系之下, 局限很大。 With the rapid development of e-commerce, network security issues have become increasingly prominent, the most important of which is the identification problem. Fraud due to the virtualization of network identities can be described as endless. There are authentication issues for both the unit and the citizen. As a main body of social activities, the unit has its own business sector and competent authorities to disclose its identity information, and it is relatively easy for others to verify their true identity. However, if the unit wants to conduct business online, it needs to take the initiative to identify its identity to other citizens, units or other systems. Under the existing information system, the limitations are very large.
公民的身份验证, 一直是一个重大社会难题, 其中的关键是居民身份证造假一直未能得 到彻底解决。 虽然截止 2008年底全国已经基本换发具有更高科技含量的、 防伪性能更优的 第二代身份证, 但身份证造假始终没有停止。 第二代身份证防伪性能更优的关键技术是身份 证内含 IC卡,其内存储的身份信息都是经过数据加密的, 只有专门的身份证阅读器才能读取 IC卡内含信息, 因而身份证的真伪只需通过身份证阅读器就可验出。 多起银行信用卡诈骗案 件显示, 身份证造假出现了新动向: 先盗取、 盗买或骗取某公民身份信息, 然后制造一个与 该公民身份证证载信息完全一样或仅是像片更换的假身份证。更有甚者, 将真身份证的 IC卡 置换或复制到假身份证中, 假身份证表面信息与 IC卡可读信息一致, 仅是人像更换。这类身 份证造假的欺骗性很大, 只要身份验证过程的某一个环节没到位, 例如没有严格按验证规程 操作 (制度形同虚设现象十分常见) 或没有仔细核对像片, 就会被蒙骗。 从长远的视角看, 数据加密系统也并非牢不可破, 因为所有的加密算法是公开的, 攻击者一旦获得了密钥, 就 能解密密文数据而直接获得对应的明文值。 获取密钥的方法有很多, 最直接的方法是寻求密 钥管理的漏洞, 而通过密码分析获取密钥的方法是凭个人力量也能做到的事情。 如果数字防 伪系统的密钥被破解或窃取,假身份证内也内置一个 IC卡, 输入与视读信息完全相同的真实 身份信息或者输入仅是像片不同其他身份信息真实的信息, 从而能够被普通的身份证阅读器 读取和显示, 即进行身份证 "克隆" 。 如此 "克隆"的身份证, 视读、 机读基本不能识别。 而对于个人像片也完全相同的 "克隆" 的身份证, 以目前的技术即使通过网络査询也不能发 现假身份证的异常。如果不法分子骗取真身份证进行身份证 IC卡复制制作假冒身份证,或直 接盗取他人的真实身份证冒充使用的话, 机读或网络査询将全部失效。 这时唯一能够把关的 是对像片与真人脸形的肉眼辨别符合度。 可是由于一张身份证使用期限可以是二十年甚至更 长, 拍摄年代较早的像片仅用肉眼辨别与真人的符合度, 受到辨别人的工作精神状态、 责任 性、 辨别能力和被辨别人的衣着打扮等影响, 正确率很不稳定。 换句话说, 被骗风险客观存 在。 尤其是在其他身份信息都核对相符甚至网络核验信息相符的情况下, 肉眼往往也会 "自 然而然"认为像片没有问题。 所以, 一旦出现这种高科技身份证造假, 安全隐患巨大。 Citizenship verification has always been a major social problem. The key point is that the identity card fraud has not been completely resolved. Although the country has basically replaced the second-generation ID card with higher technology content and better anti-counterfeiting performance by the end of 2008, the ID card fraud has not stopped. The key technology for better anti-counterfeiting performance of the second-generation ID card is that the ID card contains the IC card, and the identity information stored therein is encrypted by data. Only the special ID card reader can read the information contained in the IC card. The authenticity of the ID card can be checked only by the ID card reader. Many bank credit card fraud cases show that there has been a new trend in identity card fraud: first stealing, stealing or defrauding a citizenship information, and then creating a The citizen ID card contains the same information or is just a fake ID card replacement. What's more, the IC card of the real ID card is replaced or copied into the fake ID card. The surface information of the fake ID card is consistent with the readable information of the IC card, and only the portrait is replaced. This kind of identity card fraud is very deceptive. As long as a certain part of the authentication process is not in place, for example, if the verification procedure is not strictly followed (the system is very common), or if the photo is not carefully checked, it will be deceived. From a long-term perspective, the data encryption system is not unbreakable, because all encryption algorithms are public, and once the attacker obtains the key, the ciphertext data can be decrypted and the corresponding plaintext value is directly obtained. There are many ways to obtain a key. The most straightforward method is to seek a key management vulnerability. The method of obtaining a key through cryptanalysis is something that can be done by personal strength. If the key of the digital anti-counterfeiting system is cracked or stolen, an IC card is also built in the fake ID card, and the real identity information identical to the visual reading information is input or the input is only the real information of the other identity information of the photo, so that it can be The ordinary ID card reader reads and displays, ie the ID card "clone". Such "clone" ID card, video reading, machine reading is basically not recognized. For the "clone" ID card, which is identical to the personal photo, the current technology can not find the abnormality of the fake ID card even if it is queried through the Internet. If the criminals defraud the real ID card to copy the ID card, make a fake ID card, or directly steal someone's real ID card to use it, the machine-readable or network inquiry will be invalid. At this time, the only thing that can be checked is the conformity of the image to the human face. However, since an ID card can be used for 20 years or even longer, the earlier photographs are only visually distinguished from the real person by the naked eye, and are judged by others' work mentality, responsibility, discriminating ability, and being identified. The influence of people's clothing and dressing, the accuracy rate is very unstable. In other words, the risk of being cheated exists objectively. Especially in the case that other identity information is checked and even the network verification information is consistent, the naked eye often "naturally" thinks that the film has no problem. Therefore, once this high-tech ID card fraud occurs, the security risks are huge.
公安部于 2006年底组建完成的 "全国公民身份证号码査询服务中心" , 可查询公民的 姓名和身份证号码是否一致,进而验证身份证的真伪。移动或联通用户花 5元钱就可以查询, 信息一致时, 用短信中的密码还可以査看照片。表面上这种查询满足了对身份证的验证需求。 但如果采用上述的真身份证信息制作假身份证, 仅靠对姓名与身份证号码关联性判断身份证 真伪, 显然是不够的。 而如果真身份证上的像片拍摄年代久远从而与持假证人实际像貌难辨 真假的情况下, 这种查询方法不仅不能核验身份证真伪, 反而给假身份证披上一层更大的伪 装。 再者, 将身份证号码、姓名和照片的信息逻辑连锁关系让任意的人不加区分地轻易查询, 显然也缺乏慎重, 难保其中有一些居心不良者对之非法利用。 毕竟, 《居民身份证法》 还对 警察査验公民身份证的情形作出了严格的限制。 理想的状况是: 通过制度安排和技术设计, 能够对查核特定公民身份证真伪要求区分 "正当"与 "非正当"需求, 将 "非正当"査核需 求阻挡在信息査核流程之外。 而对于 "正当"査核需求应该完全公益和免费。 The "National Citizen ID Card Number Service Center", which was established by the Ministry of Public Security at the end of 2006, can check whether the citizen's name and ID card number are consistent, and then verify the authenticity of the ID card. Mobile or Unicom users can query for 5 yuan. When the information is consistent, you can also view the photos with the password in the SMS. On the surface, this kind of query satisfies the verification requirements for ID cards. However, if the fake ID card is used to make a fake ID card, it is obviously not enough to judge the authenticity of the ID card by simply relating the name to the identity card number. If the photo on the real ID card is so long that it is difficult to distinguish between the fake and the false witnesses, the inquiry method can not only verify the authenticity of the ID card, but also put a layer on the fake ID card. Big camouflage. Furthermore, the logical chain relationship of the ID card number, name and photo information allows any person to easily inquire without distinction, and obviously lacks caution. It is difficult to ensure that some of the bad-hearted people illegally use it. After all, the Resident Identity Card Act also imposes strict restrictions on the police's inspection of citizenship ID cards. The ideal situation is: Through institutional arrangements and technical design, it is possible to distinguish between “legitimate” and “unfair” requirements for checking the authenticity of a particular citizen's identity card, and to block “unfair” checking requirements from the information checking process. For "justified" check requirements, it should be completely public and free.
从上述公民身份证造假情况看, 阻遏身份证造假, 预防公民身份信息外泄是一个重要方 面。 现行的第二代身份证信息标示结构存在两大问题: 一是在需要复印身份证的时候必须两 面复印, 浪费资源。 二是身份证被复印后, 个人的全部身份信息完全暴露, 给不法分子盗用 个人信息资料以图不轨提供了便利。 真实身份信息容易获取, 与身份证上的信息完全暴露没 有任何遮蔽和不区分场合需要随意要求和随意同意复印身份证有密切关系。 Judging from the fraudulent situation of the above-mentioned citizen ID card, it is an important aspect to block the fraud of identity cards and prevent the leakage of citizenship information. There are two major problems with the current second-generation ID card information structure: First, two copies are required when copying an ID card. Copying, wasting resources. Second, after the identity card was copied, all the personal identity information was completely exposed, which provided convenience for the criminals to steal personal information. The real identity information is easy to obtain, and it is closely related to the fact that the information on the ID card is completely exposed without any obscuration or distinction.
针对以上问题, 以现有的广域网技术、 计算机技术、 通信技术、 数据库管理技术等, 提 出一个信息网络化整体解决方案, 已经不存在技术障碍。 这样的信息网络化整体解决方案的 提出、 实施和运行, 必将取得巨大的经济效益和社会效益。 In view of the above problems, the existing WAN technology, computer technology, communication technology, database management technology, etc., to propose an integrated solution for information networking, there is no technical obstacle. The proposal, implementation and operation of such an information networked overall solution will surely achieve huge economic and social benefits.
公民信息的交流和充分利用离不开单位的参与, 单位信息交流和充分利用牵涉面更广, 存在关系更复杂、 待处理问题更多。 本发明专利所构建的系统是建立在公安部门的身份证和 户口管理系统基础之上的, 旨在便于本专利的实施推广。 涉及到的单位信息问题, 属于本系 统框架能够解决或应该解决的, 就解决之, 不能解决的, 就简化之, 或回避之。 这也是为什 么本发明专利虽然主要解决公民信息需求问题, 也涉及单位的信息查询、 査验、 展示和信息 交流及身份验证问题, 但本发明专利仍是以 "一种公民信息管理系统方法"冠名, 而不是釆 用更大概念的原因。 The exchange and full use of citizen information is inseparable from the participation of the unit. The information exchange and full use of the unit involve a wider range of issues, and the relationship is more complicated and the problems to be solved are more. The system constructed by the invention patent is based on the identity card and account management system of the public security department, and is intended to facilitate the implementation of the patent. The unit information problem involved is solved or should be solved by the system framework, and it can be solved. If it cannot be solved, it will be simplified or avoided. This is also why the invention patent mainly solves the problem of citizen information needs, and also involves the information inquiry, inspection, display and information exchange and identity verification of the unit. However, the patent of the invention is still based on "a citizen information management system method". Name, not the reason for using a larger concept.
三. 发明内容 III. SUMMARY OF THE INVENTION
(一) 本发明技术方案的整体构思 (1) The overall concept of the technical solution of the present invention
针对以上情况, 本发明的目的就是要对以上问题借助计算机网络系统提出一个综合解决 方案, 以实现公民或单位的身份验证、 公民或单位信息包括其身份信息可査询、 可查验、 可 展示, 公民或单位信息通信和使用的真实、方便和快捷, 提高公民或单位信息资源利用效率。 In view of the above situation, the object of the present invention is to propose a comprehensive solution to the above problems by means of a computer network system, so as to realize the identity verification of a citizen or a unit, the citizen or unit information including its identity information can be queried, identifiable, and displayable. The real, convenient and fast information communication and use of citizens or units, and improve the efficiency of the use of information resources by citizens or units.
仔细考察前述待解决的问题, 可以发现公民或单位 (以下统称为主体) 都是既是信息的 发生者, 又是信息的接收者和利用者。 每个主体所处的信息环境是由层次和规模互不相同的 各类信息系统构成的。 各类信息系统 (可以理解为各部门、 各行业、 各单位的各类数据库系 统) 每天都在产生或变更与主体相关或不相关的信息。 各类信息系统中与主体相关的信息和 主体自身产生的信息统称为主体信息, 所有的主体信息的集合构成主体信息资源。 每个主体 以主体信息资源为客体彼此之间形成多对多对的信息交流关系。 A close examination of the aforementioned problems to be solved reveals that citizens or units (hereinafter collectively referred to as subjects) are both the producers of information and the recipients and users of information. The information environment in which each subject is located is composed of various information systems of different levels and sizes. Various types of information systems (which can be understood as various database systems of various departments, industries, and units) generate or change information related to the subject or related to the subject every day. The information related to the subject in various information systems and the information generated by the subject itself are collectively referred to as subject information, and the collection of all subject information constitutes the subject information resource. Each subject forms a many-to-many information exchange relationship with each other with the subject information resource as the object.
本发明实现的技术方案是以现有的公安机关公民身份证和户籍管理信息系统为基础, 建 立全国性的公民信息管理平台 (下称 "公民信息平台" ) , 包括公民信息管理系统、 信息服 务系统和电子邮箱系统。 公民信息管理系统管理身份证相关业务和电子邮箱分配。 信息服务 系统具备公民或单位信息的整合、 分类、 索引、 统计等管理功能和提供公民或单位信息的查 询、 查验、 展示、 身份验证、 检索等应用服务。 电子邮箱系统通过电子邮箱网站提供电子邮 箱、 在线交流、 社会调査、 发布公告、 发布广告等服务。 公民信息管理系统给每个公民分配 一个从出生即拥有的终身免费使用的法定电子邮箱, 其邮箱收发帐号 (指专用于收发邮件的 邮箱帐号, 下同) 设定为公民身份证号码, 不可变更, 其邮箱登录帐号 (指专用于打开电子 邮箱的邮箱帐号, 下同) 初始设定为公民身份证号码, 但该帐号可以进行变更。 公民电子邮 箱作为公民个人信息的 "集散基地", 通过信息服务系统提供的链接服务, 整合每个公民分 散在公民信息平台以外的包括银行、 社保、 医疗、 住房、 交通、 水电等的各类系统 (下称外 系统) 中关于其自身的各类个人信息资源, 以各类个人信息文档 (实质为各类个人信息的链 接) 的形式在邮箱中呈现, 公民可以对其各类个人信息文档进行查阅或对外展示操作。 公民 信息管理系统也给各类单位设立免费使用的法定电子邮箱, 以方便各类单位之间、 公民之间 和单位与公民之间的信息交流。 单位的邮箱收发帐号和邮箱登录帐号初始均设定为全国统一 的组织机构代码的号码, 单位邮箱开通之后, 邮箱收发帐号始终固定不变, 而邮箱登录帐号 可以变更。单位法定电子邮箱, 本质上与公民电子邮箱无异,也可以成为单位自身信息的 "集 散基地" , 其也可以通过信息服务系统提供的链接服务, 整合单位分散在包括身份、 银行、 住房、交通、水电等各类外系统中关于其自身的各类单位信息资源, 以各类单位信息文档(实 质为各类单位信息的链接, 单位信息文档和前述公民邮箱中的个人信息文档统称为用户信息 文档, 下同) 的形式在邮箱中呈现, 单位对其各类自身信息可以进行査阅或对外展示操作。 电子邮箱系统中具有与电子信件内容关联的图形印章, 盖上图形印章的信件, 其内容的任何 改动会引起印章图形的显著变化。 对第二代身份证版面设计进行了改进, 增添了二个身份证 验证码并对部分身份证信息显示重新进行了编排, 将身份证装入一种身份证信息保护套中, 从而能按 "基本"、 "普通"和 "完整"三种级别的身份证信息显示。 对身份证 IC卡读写器 亦作了相应改进, 针对三种级别的身份证信息, 将读写器按照 "基本" 、 "普通"和 "完整" 三种身份证 IC卡读取权限区分为三种类型, 并且每一种类型均增加了身份证验证码、 身份证 密码和身份证网络验证次数信息比对以及人体指纹识别功能。身份证内含的 ic卡将身份证信 息按照前述的三种读取权限分区域存放以适应其按三种级别显示的需要, 此外, 身份证 ic卡 还存储了身份证芯片序列号、 身份证密码和二个人体手指紋信息, 并且按读写器类型分别存 储了基于身份证读写器所进行的身份证网络验证次数信息, 其中家庭住址、 身份证密码和二 个人体手指纹信息可以通过法定授权修改, 按读写器类型分别存储的基于身份证读写器所进 行的身份证网络验证次数信息随着网络验证次数的增加而刷新, 其它身份信息不能修改。 身 份证 IC卡还预留有信息存贮空间, 可扩展工作证、 驾驶证、 公交卡、 医疗卡、 社保卡、 银行 卡等应用, 从而可以实现一卡多用。 每个公民或单位都可以直接从公民信息平台管理机构通 过一定的手续办理其数字证书 U盾 (即内含公民或单位身份基本信息的数字证书)应用于公 民信息平台中的各类身份验证。 所构建的公民信息平台能够实现以下十二项功能: (1 ) 信息交流功能, 即单位之间、 公民之间和单位与公民之间通过网络进行邮件或实时的双向、 多向通信或可视通话; (2 )信 息査询功能, 即单位或公民都能在公民信息平台中自己的电子邮箱里查询存在于其它信息系 统中的关于自己的信息; (3)信息展示功能, 即单位或公民通过调用和显示与自身相独立的 其它信息系统中的关于自身的身份、 信用、 资产等信息给其它单位或公民, 以实现对自己的 真实身份、 信用、 资产等信息作第三方证明; (4) 身份验证功能, 即公民信息平台中的信息 服务系统的身份网络验证或者基于身份证读写器的身份证网络验证, 可以直接验证真实身份 或验证身份证的真伪和持证人是否是身份证所有者本人; (5)业务操作功能, 单位或公民在 自己的电子邮箱中, 径由信息服务系统与外部系统的链接, 办理相关的业务操作, 例如对资 金帐户的业务操作实现资金转帐等; (6)信息统计功能, 如对各类单位或公民在不同时间、 地点的数量、 构成等指标的统计; (7) 网上调查功能, 可以一对多地向所有调査对象作专题 调査, 一改传统上只能抽样调查的局限; (8)査找功能, 通过公民信息平台, 所有以单位名 称和公民名字命名的各类电子邮箱都可以在平台上公布的法定电子邮箱通讯录中搜索找到;The technical solution realized by the invention is based on the existing public security organ citizenship ID card and household registration management information system, and establishes a national citizen information management platform (hereinafter referred to as "citizen information platform"), including citizen information management system and information service. System and email system. The Citizen Information Management System manages ID card related business and e-mail distribution. The information service system has management functions such as integration, classification, indexing, statistics, etc. of citizens or unit information, and application services such as query, inspection, display, identity verification, and retrieval for providing citizen or unit information. The e-mail system provides e-mail, online communication, social surveys, announcements, and advertisements through e-mail websites. The Citizen Information Management System assigns each citizen a legal e-mail that is free to use from birth for a lifetime, and its e-mail address is used to send and receive e-mails. E-mail account number, the same as below) is set as the citizen ID number, can not be changed, its e-mail login account (refers to the e-mail account dedicated to open e-mail, the same below) is initially set to the citizen ID number, but the account can be changed . As a "distribution base" for citizens' personal information, citizen e-mail integrates various systems including banks, social security, medical care, housing, transportation, water and electricity, etc., which are distributed outside the citizen information platform through the link service provided by the information service system. (hereinafter referred to as the external system) The various personal information resources about itself are presented in the form of various personal information documents (substantially links of various types of personal information), and citizens can carry out various types of personal information documents for them. Review or external display operations. The Citizen Information Management System also sets up free use of legal e-mails for all types of units to facilitate information exchange between various units, between citizens and between units and citizens. The mailbox sending and receiving account and email login account of the unit are initially set to the national unified organization code number. After the unit mailbox is opened, the email receiving and sending account number is always fixed, and the email login account can be changed. The legal e-mail address of the unit is essentially the same as that of the citizen e-mail. It can also become the "distribution base" of the unit's own information. It can also provide the link service provided by the information service system. The integration unit is dispersed in the identity, bank, housing, and transportation. Various types of unit information resources in various external systems, such as hydropower, and various unit information documents (substantially links to various types of unit information, unit information documents and personal information documents in the aforementioned citizen mailboxes are collectively referred to as user information). The form of the document, the same below) is presented in the mailbox, and the unit can view or display the various information of its own. The e-mail system has a graphic seal associated with the content of the e-mail, and a letter stamped with a graphic seal, any change in its content causes a significant change in the seal graphic. The second-generation ID card layout has been improved, two ID card verification codes have been added, and some ID card information displays have been re-arranged. The ID card is loaded into an ID card information protection sleeve, so that it can be pressed. Basic ", "normal" and "complete" three levels of ID card information display. The ID card IC card reader has also been improved accordingly. For the three levels of ID card information, the readers are divided into three basic ID card functions: "basic", "normal" and "complete". There are three types, and each type has an ID card verification code, an ID card password, an ID card network verification number information comparison, and a human body fingerprint recognition function. The ic card contained in the ID card stores the ID card information in three areas according to the above three read permissions to suit its needs in three levels. In addition, the ID card also stores the ID card serial number and ID card. The password and the fingerprint information of the two human hands, and the information of the ID card network verification times performed by the ID card reader and the reader are respectively stored according to the type of the reader, wherein the home address, the ID card password and the two human hand fingerprint information can pass According to the statutory authorization modification, the information of the ID card network verification times performed by the ID card reader and the file stored separately according to the type of the reader is refreshed as the number of network verification times increases, and other identity information cannot be modified. The ID card IC card also reserves information storage space, which can expand the work permit, driver's license, bus card, medical card, social security card, bank card and other applications, so that one card can be used. Each citizen or unit can directly apply for the digital certificate U shield (the digital certificate containing the basic information of citizens or unit identity) from the citizen information platform management institution to apply for various types of identity verification in the citizen information platform. The constructed citizen information platform can realize the following twelve functions: (1) Information exchange function, that is, mail, or real-time two-way, multi-directional communication or visual communication between units, citizens, and units and citizens through the network. (2) Information inquiry function, that is, the unit or citizen can query the information about himself in other information systems in his own email address in the citizen information platform; (3) information display function, that is, unit or citizen By invoking and displaying other information about the identity, credit, assets, etc. of other information systems independent of itself to other units or citizens, to achieve third-party certification of their true identity, credit, assets and other information; The authentication function, that is, the identity network verification of the information service system in the citizen information platform or the ID card network verification based on the ID card reader, can directly verify the authenticity or verify the authenticity of the identity card and whether the holder is an identity The owner of the card; (5) business operations function, unit or citizen in their own email address, The information service system links with the external system to handle related business operations, such as realizing fund transfer for the business operation of the fund account; (6) Information statistics functions, such as the number and composition of various units or citizens at different times and places Statistics of other indicators; (7) The online survey function can make a special survey to all respondents one-to-many, and change the limitations of traditionally only sample surveys; (8) Find functions, through the citizen information platform, all All types of e-mail addresses named after the name of the unit and the name of the citizen can be found in the legal e-mail address book published on the platform;
(9)发布广告功能, 即可以充分利用公民信息平台独有的单位和自然人资源优势, 按行政区 域层级或社群类型设立广告发布区域 ; (10)信息发布功能, 即各类社会管理机构可以借助 平台中的电子邮箱系统信息发布区向特定或非特定对象发布信息, 公民信息平台可以提供多 种信息发布服务; (11 ) 实时动态监测功能, 在法律授权之下, 通过公民信息平台的后台系 统, 可以监测特定公民的行动轨迹, 从而为公安机关抓捕嫌疑犯提供方便; (12) 决策辅助 功能, 公民信息平台利用先进的数据融合、 数据仓库、 数据挖掘等技术, 对公民或单位信息 资源系统的数据信息进行深层次分析和挖掘, 为国家宏观和微观管理决策提供辅助支持。 在 以上功能的基础上, 可以利用得天独厚的全国单位和全体公民资源优势开发各种网络平台服 务, 比如电子商务服务、 新闻报道及影视作品视频服务等。 (9) The function of publishing advertisements can fully utilize the advantages of the unit and natural person resources unique to the citizen information platform, and set up advertising and publishing areas according to the administrative regional level or community type; (10) Information publishing function, that is, various social management institutions can The information platform of the e-mail system in the platform can be used to publish information to specific or non-specific objects. The Citizen Information Platform can provide a variety of information publishing services; (11) Real-time dynamic monitoring function, under the authority of the law, through the background of the citizen information platform The system can monitor the movement trajectory of specific citizens, thus providing convenience for public security organs to arrest suspects; (12) Decision-making auxiliary function, citizen information platform uses advanced data fusion, data warehouse, data mining and other technologies, for citizens or units of information resources The system's data information is deeply analyzed and mined to provide support for national macro and micro management decisions. On the basis of the above functions, we can develop various network platform services, such as e-commerce services, news reports and video services for film and television works, with the unique advantages of national units and all citizens.
公民信息管理平台包含的公民信息管理系统、 信息服务系统、 电子邮箱系统采取集中架 构、 统一管理方式。 公民信息管理系统具有调査、 统计和有关数据信息的挖掘、 归类、 分析、 处理、 汇总等功能, 为国家宏观或微观决策提供辅助管理支持。 公民信息管理系统以公安机 关的公民身份证和户籍信息系统为基础构建公民身份信息数据库, 时机适当的时候可以扩增 单位身份信息数据库, 存储公民身份证信息、 人体双手十指的指纹信息、 户籍信息, 时机适 当的时候还存储有各类单位的基本身份信息, 记录公民或单位的身份验证信息。 信息服务系 统以公民和单位信息数据为基础链接各类系统中关涉公民或单位的信息, 建立公民或单位信 息的各类索引数据库, 提供信息检索、 身份验证和通过电子邮箱系统对公民或单位信息的査 询、 査验、 展示的服务。 电子邮箱系统通过邮箱网站提供公民或单位邮箱服务、 邮箱通讯录 服务和在线交流信息服务。为确保公民信息平台和其它外信息系统的数据独立、保密和安全, 公民信息平台与其它各类外信息系统之间应设立网间防火墙、 访问权限和口令等安全措施, 网间信息传输均应采用先进的加密解密的方法, 防止数据传输过程中的泄密。 The citizen information management system, the information service system, and the e-mail system included in the citizen information management platform adopt a centralized structure and a unified management method. The citizen information management system has the functions of mining, categorizing, analyzing, processing, and summarizing surveys, statistics, and related data information, and providing auxiliary management support for national macro or micro decision-making. The citizen information management system builds a citizenship information database based on the citizen's ID card and household registration information system of the public security organ. When appropriate, the unit identity information database can be amplified, and the citizen ID card information, the fingerprint information of the human hands and fingers, and the household registration information can be stored. When the time is appropriate, the basic identity information of various units is also stored, and the identity verification information of the citizen or the unit is recorded. The information service system links information about citizens or units in various systems based on citizen and unit information data, establishes various index databases of citizens or unit information, provides information retrieval, identity verification, and information on citizens or units through an e-mail system. Query, inspection, display services. The e-mail system provides citizen or unit mailbox service and mailbox address book through the e-mail website. Service and online communication information services. In order to ensure the data independence, confidentiality and security of the citizen information platform and other external information systems, security measures such as internet firewall, access rights and passwords should be established between the citizen information platform and other types of external information systems. Advanced encryption and decryption methods are used to prevent leaks during data transmission.
(二) 身份证及其内含 IC卡的改进设计 (2) Improved design of ID card and its included IC card
针对真实身份信息容易获取, 不法分子往往利用真实身份信息制作假冒身份证的现像, 本发明专利设想将身份证证载信息区分为基本的身份信息和相对保密的身份信息。 借助电子 邮箱网站, 一般情况下只需要展示基本的身份信息, 就能满足査验真实身份的目的, 特殊情 况下才补充查验诸如身份证验证码、 家庭地址等相对保密的身份信息。 对于有必要并且有权 査验相对保密的身份信息的单位,其应当对于身份信息的保密制度具有预防泄密的严格规定。 如此, 不法分子要获得一个完整的真实身份信息的难度大大提高, 从而在源头上防堵了身份 证造假。 为此, 有必要对现有的身份证版面进行改进设计。 The real identity information is easy to obtain, and the criminals often use the real identity information to make a fake identity card. The invention patent envisages distinguishing the ID card information into basic identity information and relatively confidential identity information. With the help of the e-mail website, in general, only the basic identity information needs to be displayed, so that the purpose of verifying the real identity can be satisfied. In special cases, the relatively confidential identity information such as the ID card verification code and the home address is supplemented. For units that are necessary and have the right to examine relatively confidential identity information, they should have strict rules for preventing confidentiality of the confidentiality system for identity information. In this way, it is more difficult for criminals to obtain a complete real identity information, thus preventing identity fraud at the source. To this end, it is necessary to improve the design of the existing ID card layout.
在现有的第二代居民身份证基础上 (身份证的长宽尺寸、 外形、 图案、 纹理、 字体、 字 形及大小、 材质和 IC卡的封装方法不变) , 身份证中增加了二个身份证验证码信息, 在身份 证的像片位置上方增加 "居民身份证"五字, 并且将姓名、 性别、 出生年月日、 民族、 身份 证号码、 签发机关、 发证日期和有效期限等项目均印在身份证正面, 将家庭住址、 二个身份 证验证码信息印在身份证反面。 家庭住址和二个身份证验证码信息采用外观纹理图案与身份 证吻合的特殊胶布遮蔽 (可反复揭开、 遮蔽) , 该特殊胶布背面可以印上被遮蔽信息位置指 示文字, 使得这三项身份信息不必要时就不显示也不能被复印。 如果不采用特殊胶布遮蔽, 也可以将身份证插入一种身份证信息保护套中, 达到同样目的。 该身份证信息保护套, 系采 用透明塑料材质制成的具有防磨损、 防污、 防水、 防火功能的透明身份证安全插袋, 在保护 套表面正对身份证验证码和家庭住址的位置有三条不透明胶带, 可以反复揭、 蔽, 使得这三 项身份信息不必要时就不显示也不能复印, 而当需要显示或复印这三项身份信息时, 身份证 无需从保护套中抽取出来, 只需将保护套表面上的不透明胶带揭开即可; 保护套表面上的不 透明胶带背面上印有被遮蔽信息位置的文字指示。 Based on the existing second-generation ID card (the length, width, shape, pattern, texture, font, font and size of the ID card, material and IC card packaging method remain unchanged), two ID cards have been added. ID card verification code information, add the word "resident ID card" above the photo ID position, and name, gender, date of birth, nationality, ID card number, issuing authority, date of issue and expiration date, etc. The items are printed on the front of the ID card, and the home address and two ID card verification code information are printed on the opposite side of the ID card. The home address and the two ID card verification code information are masked by special tapes that can be matched with the ID card (can be repeatedly uncovered and shaded). The back of the special tape can be printed with the position information of the masked information, so that the three identityes When the information is unnecessary, it will not be displayed or copied. If you do not use special tape to cover, you can also insert the ID card into an ID card protection cover for the same purpose. The ID card information cover is a transparent ID card security bag made of transparent plastic material with anti-wear, anti-fouling, waterproof and fireproof functions. There are three positions on the surface of the protective cover facing the ID card verification code and home address. The opaque tape can be repeatedly peeled off and covered so that the three pieces of identity information are not displayed or copied when they are unnecessary. When the three pieces of identity information need to be displayed or copied, the ID card does not need to be extracted from the protective cover. The opaque tape on the surface of the protective cover is peeled off; the opaque tape on the surface of the protective cover is printed with a text indication of the position of the masked information.
通过以上身份证版面新设计, 可以将身份证信息按照 "完整" 、 "普通"和 "基本"三 种信息级别显示。 "完整"信息, 指显示除第二组身份证验证码以外的身份证外显信息, "普 通"信息, 指显示除身份证验证码信息以外的身份证外显信息, "基本"信息, 指显示除身 份证验证码和家庭住址以外的身份证外显信息。 Through the above new design of the ID card layout, the ID card information can be displayed in three levels of information: "complete", "normal" and "basic". "Complete" information refers to the display of the explicit information of the ID card other than the second group ID card verification code. The "normal" information refers to the ID information displayed in addition to the ID card verification code information, "basic" information, Display ID information other than ID card verification code and home address.
身份证正面所载的发证日期和有效期限以 7位数字编码方式表示, 紧邻在签发机关名称 后面显示; 年月日均以二位数共计六位数字表示, 另有一位数字表示使用期限; 9 以下年限 直接以数字表示, 大写字母 X表示 10年, Y表示 20年, Z表示长期。 所述的身份证验证码共有两组, 每组 9位数字, 8位验证码外加一位校验码, 系在每次 发放或更换新的身份证时由公民信息管理系统自动产生。 第一组身份证验证码可以用于信息 服务系统的身份网络验证和基于身份证读写器的身份证网络验证, 第二组身份证验证码只用 于信息服务系统的身份网络验证。 身份证验证码产生的方法是, 将身份证号码和发卡时产生 的随机数经过不对称加密算法生成 16 位数字, 取前 8位数字经过校验运算得到一位校验码 加到 8位数字后形成 9位的第一组身份证验证码, 取后 8位数字经过校验运算得到一位校验 码加到 8位数字后形成 9位的第二组身份证验证码。 通常的身份网络验证, 例如网络游戏实 名验证、 车票实名验证, 只需使用第一组验证码; 在金融、 海关、 机场等应用系统才需要使 用第二组验证码进行身份网络验证。 由于第二组验证码使用次数少, 加上身份证读写器不能 显示, 保密程度会高于第一组验证码, 从而达到了身份证验证码分级保密效果。 The date and validity period of the issuance of the identity card on the front of the ID card is expressed in 7-digit code, immediately after the name of the issuing authority; the year, month and day are represented by two digits in total, and another digit indicates the period of use; 9 The following years are indicated directly by numbers. The capital letter X indicates 10 years, Y indicates 20 years, and Z indicates long-term. The ID card verification code has two groups, each group of 9 digits, 8 digits of verification code plus one verification code, which is automatically generated by the citizen information management system each time a new ID card is issued or replaced. The first set of ID card verification codes can be used for identity network verification of the information service system and ID card network verification based on the ID card reader. The second set of ID card verification codes is only used for identity network verification of the information service system. The method for generating the ID card verification code is to generate the 16-digit number by the asymmetric encryption algorithm by the ID number and the random number generated when the card is issued, and the first 8 digits are subjected to the check operation to obtain a check code to be added to the 8-digit number. After the formation of the first group of ID card verification code of 9 digits, the latter 8 digits are subjected to a check operation to obtain a check digit added to the 8 digits to form a 9 digit second digit ID card verification code. The usual identity network verification, such as online game real name verification, ticket real name verification, only use the first set of verification codes; in the financial, customs, airport and other application systems, the second set of verification codes is needed for identity network verification. Since the second group of verification codes is used less frequently, and the ID card reader cannot be displayed, the degree of confidentiality will be higher than the first group of verification codes, thereby achieving the classification and confidentiality effect of the ID card verification code.
身份证 IC卡可以存储身份信息和 10个以内的扩展应用信息。 身份信息中的手指纹信息 包括两个常用的手指纹数据, 必要时经向公民信息平台管理机构申请可以更换为其它手指紋 数据。 身份信息中的家庭住址和身份证密码信息亦可以经向公民信息平台管理机构申请而修 改。身份证 IC卡中可以根据不同授权读出三种级别之一的身份证信息且只能由公民信息平台 管理机构按三种类型授权的身份证读写器读取, 扩展应用信息可以由装有相应应用系统管理 机构授权模块的读卡器读取。 ID card IC card can store identity information and extended application information within 10 or less. The fingerprint information in the identity information includes two commonly used hand fingerprint data, which can be replaced with other hand fingerprint data when requested by the citizen information platform management organization if necessary. The home address and ID card information in the identity information can also be modified by applying to the Citizen Information Platform Authority. The ID card IC card can read one of the three levels of ID card information according to different authorizations and can only be read by the Citizen Information Platform Management Organization according to the three types of authorized ID card readers. The extended application information can be installed. Read by the corresponding application system management authority authorization module.
(三) 身份证的真伪验证和持证人的合法性验证 (3) Verification of the authenticity of the identity card and verification of the legality of the holder
与身份证版面新设计相适应, 对身份证 IC卡读写器亦作了相应改进, 针对三种级别的身 份证信息, 将读写器按照 "基本"、 "普通"和 "完整"三种身份证 IC卡读取权限区分为 "基 本" 、 "普通"和 "完整"三种类型, 每种读写器只能够对三种身份证信息级别之一显示, 以应用于不同行业、 不同场合的身份信息采集需要, "完整"类型显示除第二组身份证验证 码以外的身份证外显信息, "普通"类型显示除身份证验证码信息以外的身份证外显信息, "基本"类型显示除身份证验证码和家庭住址以外的身份证外显信息; 身份证 IC卡中除了三 种级别身份证信息以外, 其所含有的其它信息不能被身份证读写器显示。 In line with the new design of the ID card layout, the ID card IC card reader has also been improved accordingly. For the three levels of ID card information, the readers are classified according to "basic", "normal" and "complete". ID card IC card reading permissions are divided into three types: "basic", "normal" and "complete". Each reader can only display one of the three ID information levels for different industries and different occasions. The identity information collection needs, the "complete" type displays the ID information in addition to the second group ID card verification code, and the "normal" type displays the ID card ex-visual information in addition to the ID card verification code information, the "basic" type. Displaying the ID information in addition to the ID card verification code and home address; In addition to the three levels of ID card information, the ID card IC card can not be displayed by the ID card reader.
与身份证 IC卡中身份证信息的 "基本" 、 "普通"和 "完整"三种显示级别相适应, 在 身份证 IC卡中设定 "基本" 、 "普通"和 "完整"三种 IC卡读取权限, 将除了身份证验证 码 2以外的身份证外显信息在身份证 IC卡中存放在三个具有不同权限的区域,第一个区域存 放身份证 "基本"信息, 可以被 "基本" 、 "普通"和 "完整"三种权限读取, 第二个区域 存放身份证 "普通"信息中除了身份证 "基本"信息以外的内容, 可以被 "普通"和 "完整" 二种权限读取, 第三个区域存放身份证 "完整"信息中除了身份证 "普通"信息以外的内容, 可以被 "完整"一种权限读取。 身份证读写器内置多个加密授权模块接口, 可以安装身份证读写授权模块, 使身份证读 写器按照三种级别之一读写身份证信息, 身份证读写授权模块由公安部门发放; 也可以安装 扩展应用系统的授权模块, 使身份证可被扩展应用于其它业务系统, 扩展应用系统的授权模 块由其它业务系统相应的管理部门经公安部门授权发放。 In accordance with the "basic", "normal" and "complete" display levels of the ID card in the ID card, three ICs of "Basic", "Normal" and "Complete" are set in the ID card. Card reading permission, in addition to the ID card verification code 2, the ID information is stored in the ID card IC card in three areas with different permissions, the first area to store the ID card "basic" information, can be " The basic ", "normal" and "complete" permissions are read. The second area stores the contents of the "normal" information in the "normal" information except for the "basic" information of the ID card. It can be "normal" and "complete". The permission is read, and the third area stores the contents of the "complete" information of the ID card except for the "normal" information of the ID card, which can be read by the "complete" permission. The ID card reader has built-in multiple encryption and authorization module interfaces, and can install the ID card reading and writing authorization module, so that the ID card reader can read and write the ID card information according to one of the three levels. The ID card reading and writing authorization module is issued by the public security department. The authorization module of the extended application system can also be installed, so that the identity card can be extended to be applied to other business systems, and the authorization module of the extended application system is authorized by the corresponding management department of other business systems to be issued by the public security department.
身份证读写器在脱机状态下 (指未与信息服务系统连接) 对身份证真伪的验证步骤为: When the ID card reader is offline (refer to not connected to the information service system), the verification steps for the authenticity of the ID card are:
( 1 ) 该身份证能否被阅读显示, 能则表明从身份证 IC卡读出的信息通过了读写器中身份证 信息授权模块的验证; (2)读写器显示信息和对应的身份证外观信息是否一致。 即检验身份 证表里一致性, 防范对身份证恶意 "换芯"行为。 "换芯"是最难识别的一种身份证造假, 即身份证表面信息是真的或仅是像片为假,而身份证内含的 IC卡却用另一自然人的真身份证 IC卡或其复制卡置换。 (1) Whether the ID card can be read and displayed, it can indicate that the information read from the ID card IC card has passed the verification of the ID card information authorization module in the reader/writer; (2) The reader displays the information and the corresponding identity. Whether the appearance information of the certificate is consistent. That is to check the consistency in the identity card, to prevent malicious "replacement" behavior on the ID card. "Change core" is the most difficult to identify an ID card fraud, that is, the surface information of the ID card is true or only the photo is fake, and the IC card contained in the ID card uses another real person's real ID IC card. Or its copy card replacement.
身份证读写器在脱机状态下对于身份证持证人的合法性验证方法有: (1 ) 肉眼比对身份 证表面像片、读写器显示像片及真人三者的符合度; (2)输入到读写器的身份证密码能否通 过身份证 IC卡的密码验证; (3 )输入到读写器的人体指纹信息是否与身份证 IC卡中人体指 纹信息匹配。 身份证读卡器对持证人合法性所具有的以上三个验证功能是相互独立的, 可以 单独应用, 也可配合使用。 The method for verifying the legality of ID card readers in the offline state is as follows: (1) The eye-to-eye comparison of the ID card surface image, the reader display photo and the real person; 2) Whether the ID card password input to the reader/writer can be verified by the password of the ID card IC card; (3) Whether the human body fingerprint information input to the reader/writer is matched with the human body fingerprint information in the ID card IC card. The above three verification functions of the ID card reader for the legality of the holder are independent of each other and can be used alone or in combination.
信息服务系统对于三种类型的身份证读写器分别设立身份证网络验证次数计数器, 每次 通过一种类型的身份证读写器进行身份证网络验证后相应类型的验证次数加 1, 身份证 IC卡 中也分别存储基于各类型的身份证读写器所作的身份证网络验证次数的当前数值, 通过身份 证读写器的身份证网络验证方法是:任一种类型的身份证读写器读取身份证 IC卡内含信息包 括读写器显示的身份证信息、 人体指纹信息和验证次数计数器的当前数值发送到信息服务系 统进行身份证真伪的网络比对, 比对内容相同则信息服务系统的相应类型计数器加 1并刷新 身份证 IC卡中同一类型的网络验证次数的数值。 The information service system sets up ID card network verification times counters for three types of ID card readers, and the number of verifications of the corresponding type is increased by 1 each time after ID card reader verification by one type of ID card reader/writer. The IC card also stores the current value of the ID card network verification times based on each type of ID card reader, and the ID card network verification method by the ID card reader is: any type of ID card reader The information contained in the ID card IC card is read, including the ID card information displayed by the reader/writer, the human body fingerprint information, and the current value of the verification number counter sent to the information service system for authenticity verification of the ID card, and the information is the same as the comparison content. The corresponding type counter of the service system is incremented by 1 and the value of the same type of network verification number in the ID card IC card is refreshed.
对于身份证 IC卡重复读写的寿命问题, 通过在 IC卡中预留分散存储空间解决。 For the life of the ID card IC card repeated reading and writing, by distributing the scattered storage space in the IC card.
通过身份证读写器对身份证持有人合法性的网络验证方法是(1 )输入到读写器的身份证 密码发送到信息服务系统, 进行身份证密码验证; (2)输入到读写器的人体指纹信息发送到 信息服务系统, 进行人体指纹信息匹配。 人体手指纹信息可以是十指中的任何一指或全部十 指。 The network verification method for ID card holder legality by ID card reader is (1) the ID card password input to the reader/writer is sent to the information service system for ID card password verification; (2) Input to read and write The human body fingerprint information is sent to the information service system to perform human body fingerprint information matching. The human hand fingerprint information may be any one of the ten fingers or all ten fingers.
基于公民信息平台系统所作的通过身份证读写器的身份证网络验证与通过脱机的身份证 读写器进行的身份证验证的不同在于, 前者通过设立身份证网络验证次数计数器可以及时发 现伪造、 克隆或盗用公民身份证 IC卡的情况, 从而在根本上杜绝公民身份证 IC卡的伪造、 克隆或盗用。 如果身份证丢失被冒用或身份证 IC卡被复制,只需到公民信息平台管理机构办理身份证 挂失, 领取新的身份证, 原来的身份证即不能通过身份证网络验证, 因而不能继续使用; 如 果他人利用真实身份信息假冒或复制了一个身份证及其内含的 IC卡,但由于身份证网络验证 次数信息存贮于信息服务系统中, 造假者无法知晓使得该身份证不能通过网络验证。 即使在 最极端情况下, 仿冒者掌握了身份信息、 身份证密码、 身份证网络验证次数等全部身份信息, 真假身份证在某一个时点完全一样, 不能区分, 那么真假身份证在其中一个通过网络验证, 改变了身份证网络验证次数信息后, 另一个就必然不能通过网络验证。 所导致的结果是, 或 者真身份证一直能够正常通过网络验证, 而假冒身份证一直不能通过网络验证, 或者假冒身 份证通过了网络验证, 而真身份证在网络验证没有通过的情况下, 合法持证人会迅速报警挂 失, 从而在最短时间内制止假冒身份证的使用。 虽然掌握个人身份信息相对容易 (在身份证 中增加身份证验证码后, 对验证码的掌握也非易事了) , 但要想掌握身份证网络验证次数信 息几乎是不可能的事情, 使得上述身份证 IC卡防伪技术十分安全。 The difference between the ID card network verification by the ID card reader and the ID card verification by the offline ID card reader based on the Citizen Information Platform system is that the former can find the counterfeit in time by setting up the ID card network verification counter. The cloning or theft of a citizen ID card IC card, thereby fundamentally eliminating the forgery, cloning or misappropriation of the citizen ID card. If the ID card is lost or the ID card is copied, you only need to go to the Citizen Information Platform Management Agency to report the ID card loss and receive a new ID card. The original ID card cannot be verified by the ID card network, so you cannot continue to use it. If someone else uses the real identity information to fake or copy an ID card and its included IC card, but because the ID card network verification times information is stored in the information service system, the counterfeiter cannot know that the ID card cannot be verified by the network. . Even in the most extreme cases, the counterfeiter has all the identity information such as identity information, ID card password, ID card network verification number, etc. The true and false ID cards are exactly the same at a certain time and cannot be distinguished. Then the true and false ID cards are in them. After a network verification, after changing the ID card network verification times information, the other one must not be verified by the network. The result is that, or the real ID card can always be verified through the network, and the fake ID card has not been verified by the network, or the fake ID card has passed the network verification, and the real ID card is legal if the network verification fails. The certificate holder will promptly report the loss and report the use of the fake ID card in the shortest time. Although it is relatively easy to grasp personally identifiable information (after the ID card verification code is added to the ID card, it is not easy to master the verification code), but it is almost impossible to grasp the ID card network verification times information, which makes the above ID card IC card anti-counterfeiting technology is very safe.
至于对身份证持证人合法性的检验, 在安全要求高的场合, 可以即要求身份证密码验证, 又要求进行人体指紋信息验证。应当特别注意的是身份证 IC卡中的人体指紋信息应用范围应 当通过行政法规或行政规章予以严格规定, 对于诸如银行现金提款、 汇款等重要事项的业务 操作, 应主要采用身份证密码验证, 可以配合采用人体指纹信息识别验证, 绝不可以单独使 用人体指紋信息验证, 这主要是出于对个人指纹信息保密需要和人身安全的考虑。 As for the verification of the legality of the ID card holder, in the case of high security requirements, the ID card password verification may be required, and the human body fingerprint information verification is required. It should be noted that the application scope of human fingerprint information in the ID card IC card should be strictly regulated by administrative regulations or administrative regulations. For business operations such as bank cash withdrawals and remittances, the ID card password verification should be mainly used. It can cooperate with the identification and verification of human fingerprint information, and can never use human fingerprint information verification separately. This is mainly due to the consideration of personal fingerprint information confidentiality and personal safety.
(四) 身份网络验证 (4) Identity network verification
新启用的身份证, 应将身份证初始身份信息 (包括姓名、 身份证 IC卡所含芯片序列号、 身份证号码、 身份证验证码、 当前数值的身份证网络验证次数) 同时在公民信息平台和身份 证的 IC卡中保存, 称为身份证之身份信息初始化, 才能正式使用; 如果想在身份证中启用身 份证密码、 两个手指纹信息比对功能, 应通过向公民信息平台的管理机构办理申请、 审核的 启用手续, 这两功能才能单独或同时开通。 The newly activated ID card should be the initial identity information of the ID card (including the name, ID chip IC card chip serial number, ID card number, ID card verification code, current value ID card network verification number) at the same time in the citizen information platform. And the ID card is saved in the IC card, and the identity information called ID card is initialized before it can be officially used. If you want to enable the ID card password and the two hand fingerprint information comparison functions in the ID card, you should manage it through the citizen information platform. The two functions of the application for the application and review can be opened separately or simultaneously.
身份证密码的修改应该通过联网信息服务系统的身份证读写器进行, 操作步骤为: (1 ) 验证旧密码; (2)设置新密码, 新密码二次输入读写器检验相同, 读写器通过信息服务系统 向公民信息平台申请密码修改, 密码修改成功后, 读写器将新密码写入身份证 IC卡中。 The modification of the ID card password should be carried out through the ID card reader of the networked information service system. The operation steps are as follows: (1) verify the old password; (2) set the new password, the new password is input to the reader and the same test, read and write The device applies for password modification to the citizen information platform through the information service system. After the password is successfully modified, the reader writes the new password into the ID card.
如果修改身份证密码时突然发生断电等意外情况, 导致身份证密码写入和信息服务系统 密码保存一端有效、 一端失效, 该身份证将不能通过网上验证, 在此情况下, 持证人应到县 级以上的公安机关 (或公民信息平台管理机构) , 办理身份证之身份信息初始化业务, 身份 证才能 JH常使用。 通过信息服务系统的身份核验界面, 可以进行单位身份网络验证, 其方法是: 使用单位 数字证书 U盾, 输入 "单位全称或单位邮箱收发帐号 +单位数字证书 U盾密码", 即能完成 单位的身份验证。 If the accidental situation such as power failure suddenly occurs when the ID card password is changed, the ID card password is written and the information service system password is saved at one end, and one end is invalid. The ID card will not be verified online. In this case, the license holder should To the public security organs at the county level or above (or the citizen information platform management agency), to handle the identity information initialization business of the identity card, the ID card can be used frequently by JH. Through the identity verification interface of the information service system, the unit identity network verification can be performed. The method is as follows: Use the unit digital certificate U shield, and input the "unit full name or unit mailbox receiving and sending account + unit digital certificate U shield password", that is, the unit can be completed. Authentication.
通过信息服务系统的身份核验界面, 可以进行公民身份网络验证的方法有三, 一是输入 Through the identity verification interface of the information service system, there are three ways to perform citizenship network verification. One is input.
"姓名或身份证号码 +身份证验证码 1 " 和 "身份证密码", 二是输入 "姓名或身份证号码 +身份证验证码 2" 和 "身份证密码", 三是使用公民数字证书 U盾, 输入 "姓名或身份证 号码 +.公民数字证书 ϋ盾密码", 即能完成公民身份网络验证; 在银行、 电信等其它应用系统 中可以嵌入信息服务系统的身份核验界面, 进行身份网络验证, 验证通过后, 应用系统可以 取得按照行政法规、 行政规章或个人信息所有人授权等规则预设的适于该应用系统需要的公 民身份信息。 "Name or ID number + ID card verification code 1" and "ID card password", the second is to enter "name or ID number + ID card verification code 2" and "ID card password", the third is to use the citizen digital certificate U Shield, enter "name or ID number +. citizen digital certificate ϋ 密码 password", that can complete the citizenship network verification; in the banking, telecommunications and other application systems can be embedded in the identity verification interface of the information service system for identity network verification After the verification is passed, the application system can obtain citizenship information suitable for the application system according to rules such as administrative regulations, administrative regulations or authorization of the owner of the personal information.
应用系统从公民信息平台所取得的公民身份信息类型, 可以是三种级别的身份证信息之 一, 也可以是包括工作证、 驾驶证、 职称、 学历、 户籍信息等的综合信息, 以适于应用系统 的需要并经得个人信息所有权人同意或有行政法规、 行政规章的授权为原则。 从而使得各应 用系统能够规范而合理地利用个人信息, 不至于有个人信息被滥用、 非法使用之虞。 便于开 展各类业务的身份实名制, 如手机实名制、 网络游戏实名制、 车票实名制。 The type of citizenship information obtained by the application system from the citizen information platform may be one of three levels of identity card information, or may be comprehensive information including work permits, driver's licenses, professional titles, academic qualifications, household registration information, etc., suitable for application. The system needs and is subject to the consent of the owner of the personal information or the authorization of administrative regulations and administrative regulations. Therefore, each application system can use personal information in a standardized and reasonable manner, so that personal information is not abused or illegally used. It is convenient to carry out real-name system of various businesses, such as real-name mobile phone system, real-name system of online games, and real-name system of ticket.
将身份验证服务嵌入到各类业务系统中, 实现与各类业务系统的紧稱合, 整个核査过程 在办理业务时自动完成, 不需要人工干预, 也不会改变各系统的业务流程和习惯, 能大大提 高各系统业务流程的效率。 The identity verification service is embedded in various business systems to achieve close cooperation with various business systems. The entire verification process is completed automatically when the business is handled. No manual intervention is required, and the business processes and habits of each system are not changed. , can greatly improve the efficiency of business processes of various systems.
以上的身份信息査询和验证方法,由于是依法授权显示或在公民自己授权基础上进行的, 从而在制度上和技术上确保了身份信息査询的正当性、 必要性和合法性。 它克服了社会上出 现的建立在 "全国公民身份信息系统"数据库基础上的通过网络或手机方式对身份证信息轻 易可査、 收费查询、 过度査询的弊端。 该査验方法并且涵盖了基本身份信息的查验和特殊身 份信息 (比如驾驶证、 各类职业执业证、 学历、 信用等) 的查验。 从而彻底解决了基本身份 的证明和特殊身份的证明问题, 即解决了 "持证人是谁"和 "是什么人"的问题。 这为诚信 社会的 "采信"提供了技术支持。 The above methods for inquiring and verifying identity information are legally authorized to display or on the basis of the citizen's own authorization, thus ensuring the legitimacy, necessity and legitimacy of identity information inquiry in terms of system and technology. It overcomes the shortcomings in the society based on the "National Citizenship Information System" database, which makes the ID card information easy to check, charge inquiry, and excessive inquiry through the network or mobile phone. The method of inspection also covers the identification of basic identity information and the identification of special identity information (such as driver's licenses, various professional licenses, qualifications, credits, etc.). Thus, the proof of the basic identity and the proof of the special identity are completely solved, that is, the problem of "who is the holder" and "who is" is solved. This provides technical support for the “acceptance” of the honest society.
银行系统采用上述身份证网络查验方法用于帐户开立、 挂失和存取的审査, 并将所办理 业务的通知短信发送到该公民的手机和电子邮箱中, 在第一时间通知邮箱用户, 可以杜绝冒 用他人身份证开立或挂失帐户及冒领存款的现象发生, 从而避免与此相关的各类诈骗活动。 开立或挂失帐户及其他业务进行这种网络身份证査验, 邮箱用户能够在第一时间知道自己身 份证使用情况, 有无被他人冒用, 一旦发现异常, 会立即报案, 可以有效阻止身份证被冒用 引起的各类非法活动的发生。 这种身份证网络验证方法将彻底否定银行等金融机构对 "身份 证只负形式审査、 不负鉴别真伪责任"之借口, 能够确保储户存取款和挂失的安全可靠。 身 份证网络査验方法在银行业务系统中的应用, 确保了银行帐户实名制的实施, 保证了银行帐 户资金往来全部可追踪, 不会因为某帐户虚名使得前往资金没于无形。 The banking system adopts the above-mentioned ID card network inspection method for the account opening, report loss and access review, and sends the notification message of the processed business to the citizen's mobile phone and e-mail, and notifies the mailbox user at the first time. It can eliminate the use of other people's ID cards to open or report losses and fraudulent deposits, thus avoiding all kinds of fraud activities related to this. Open or report lost accounts and other businesses to carry out such network ID check, the mailbox users can know the use of their ID cards in the first time, whether they are fraudulently used by others, and if they find an abnormality, they will report the case immediately, which can effectively prevent the identity. The occurrence of various illegal activities caused by fraudulent use. This ID card network verification method will completely deny the financial institutions such as banks The card can only be used as an excuse to review the authenticity of the authenticity of the certificate, which can ensure the deposit and withdrawal of the depositor and the loss of the report. The application of the ID card network inspection method in the banking system ensures the implementation of the real name system of the bank account. , to ensure that the bank account funds are all traceable, and will not be invisible because of the account name.
(五) 信息服务系统 (v) Information service system
信息服务系统联接提供单位或个人信息的各类外系统, 包括信息资源系统和业务应用系 统, 针对各种单位或个人信息建立各种信息项目索引或分类索引数据库, 用于单位或个人身 份信息检索和统计的服务; 通过公民信息管理系统提供单位或个人的身份验证; 通过电子邮 箱系统提供单位或个人信息分类査询、 分类查验、 分类展示服务; 通过为信息服务需求方的 应用系统 (包括本平台的电子邮箱系统) 提供信息服务嵌入模块来提供前述的信息服务。 比 如在银行应用系统中, 嵌入身份验证模块, 进行身份网络验证, 用于银行开户、 销户等业务 的开展。 The information service system connects various external systems that provide unit or personal information, including information resource systems and business application systems, and establishes various information item index or classification index databases for various units or personal information for unit or personal identity information retrieval. And statistical services; providing unit or individual identity verification through the citizen information management system; providing unit or personal information classification query, classification inspection, and classification display service through the email system; through the application system for the information service demand side (including this The platform's email system) provides an information service embedded module to provide the aforementioned information services. For example, in the banking application system, the identity verification module is embedded, and the identity network verification is performed, and the business for bank account opening and account cancellation is carried out.
(六) 电子邮箱系统 (6) E-mail system
电子邮箱系统为邮箱用户提供了独立的网络存储空间, 用户可以自设分层目录, 存储用 户自设的各种文档 (下称用户文档) ; 邮箱内的用户文档或用户信息文档可以根据需要由用 户自主设立密码, 用户文档与用户信息文档可以建立关眹链接, 通过建在用户文档上的关联 链接, 可以打开用户信息文档, 通过用户信息文档上的关联链接, 可以打开关联的用户文档。 如此, 邮箱用户对于用户信息文档内容可以摘要、 编辑等整理成果放置在用户文档中备査。 The e-mail system provides a separate network storage space for the mailbox users. The user can set up a hierarchical directory to store various documents (hereinafter referred to as user documents) set by the user; the user documents or user information documents in the mailbox can be provided as needed The user establishes a password autonomously, and the user document and the user information document can establish a related link. The user information document can be opened through an associated link built on the user document, and the associated user document can be opened through the associated link on the user information document. In this way, the mailbox user can put the summary of the content of the user information document, edit, and the like into the user document for reference.
电子邮箱用户可以对所需的用户信息文档确定为展示文档,进行编号, 并设置展示密码; 邮箱用户在需要展示该用户信息文档时, 在电子邮箱系统中的单位或个人信息展示界面中, 首先对单位或公民进行身份网络验证, 然后再输入 "文档编号、 展示密码" , 就可以查看或 展示单位或个人信息 (包括身份信息) 。 该方法通过电脑上网或手机上网即能完成, 当需要 展示个人身份信息等内容时, 公民不必打开电子邮箱就能实现, 可以避免邮箱其它信息外露。 在个人忘带身份证的情况下, 能够通过此方法证明自己的真实身份。 这对旅游者旅馆住宿带 来了极大方便。 The e-mail user can determine the required user information document to display the document, number it, and set the display password; when the mailbox user needs to display the user information document, in the unit or personal information display interface in the e-mail system, first You can view or display the unit or personal information (including identity information) by performing identity network verification on the organization or citizen, and then entering "document number, display password". The method can be completed by using a computer to access the Internet or a mobile phone. When content such as personal identification information needs to be displayed, the citizen can implement the email without opening the email, and the other information of the mailbox can be avoided. In the case of an individual who forgot to bring an ID card, he can prove his true identity by this method. This has greatly facilitated the accommodation of tourist hotels.
电子邮箱系统中, 单位或公民登录邮箱后, 可以选取所需的用户信息文档, 经身份验证 后査阅或通过电子邮箱系统将设定时效的该用户信息文档链接提供给本邮箱系统内的单位或 个人信息需求方的目标邮箱, 该用户信息文档链接还可以转发给指定的其它目标邮箱。 比如 经授权通过公民信息平台将某公民的身份证信息发送到法院, 就为法院网上接收诉状、 网上 立案提供了条件。 这一通过授权由公民信息平台作为第三方提供的査验单位或个人信息的方 法可以最大程度预防网络欺诈。 In the e-mail system, after the unit or citizen logs in to the mailbox, the user information document can be selected, and after checking the identity, the user information document link with the set time is provided to the unit in the mailbox system through the e-mail system. Or the target mailbox of the personal information requester, the user information document link can also be forwarded to the designated other target mailbox. For example, the authorization to send a citizen's ID card information to the court through the citizen information platform provides conditions for the court to receive complaints online and file a case online. This method of authorizing the inspection unit or personal information provided by the Citizen Information Platform as a third party can prevent cyber fraud to the greatest extent.
电子邮箱内嵌有在线信息交流系统, 除了一般聊天系统均有的可以一对一私聊或申请好 友群聊外, 其特征是常年开设了单位、 社区和按行业分类设置的聊天室, 照行政级别设有 专人管理, 参与聊天室的人全部真名实姓, 互相 "加为好友"的邮箱用户可以将自己的个人 信息授权(在某一用户信息文档的备选框中打勾即可)在聊天系统中让对方査看自身信息(包 括自身的身份信息) 。 An online information exchange system is embedded in the e-mail address, except for the general chat system, which can be used for one-on-one private chat or application. Friends group chat, it is characterized by the opening of units, communities and chat rooms set up by industry, and there are special person management according to the administrative level. All the people who participate in the chat room have real names and are added to each other as mailboxes. You can authorize your personal information (check the box in the optional box of a user information document) to let the other party view their own information (including their own identity information) in the chat system.
电子邮箱系统中收发的邮件可指定为 "在线阅读"和 "下载阅读"形式, 邮件发送方可 指定发送的邮件为该两种形式之一, 接收方可将接收时为 "下载阅读" 的邮件指定为该两种 形式之一; "在线阅读"的邮件只能通过电子邮箱系统的专用电子邮件管理软件进行阅读, 不能下载阅读; 被指定为 "下载阅读"形式的邮件可被专用电子邮件管理软件或通用电子邮 件管理软件下载到本地存储和阅读。 如此, 对于一些保密性要求高的邮件, 通过选择 "在线 阅读"模式, 可以较好地防范邮件泄密的风险。 E-mails sent and received in the e-mail system can be specified as "online reading" and "download reading". The sender of the e-mail can specify that the e-mail to be sent is one of the two forms. The recipient can receive the message as "download and read" when receiving. Designated as one of the two forms; "Read Online" messages can only be read through the email system's dedicated email management software, and cannot be downloaded for reading; messages designated as "download and read" can be managed by dedicated email Software or general email management software is downloaded to local storage and reading. In this way, for some mails with high confidentiality requirements, by selecting the "online reading" mode, the risk of mail leakage can be better prevented.
每一电子邮箱设置有各种信件模板, 供各种类型的应用文信函写作需要, 对于具有法律 文书性质的电子信件, 应当符合法律、 法规要求的书面形式, 即能够有形地表现所载内容, 并可以随时调取查用; 能够准确表现原来生成、 发送或者接收的内容; 能够可靠地保证自最 终形成时起, 内容保持完整、 未被更改, 但信件在转发、 储存和显示过程中可以存在一些形 式变化如信件属性的变化; 信件内容和形式上的任何改动均能够被发现。 具体来说, 法律文 书性质的电子信件在收发过程中以密文形式传送, 接收信件方看到的信件与发送方生成的信 件内容、 版式和纸张类型一致, 电子信件上可以加盖与信件内容相关联的图形印章, 该图形 印章预先存放在电子邮箱系统之中, 信件内容的任何改动将会直接导致所盖印章图形显著变 化; 接收到的信件中有公民信息平台的文字、 标识和收、 发信方的邮箱收发帐号及信件发送 的时间和接收时间; 电子信件发送成功后会自动保存, 可下载另存或显示、 打印, 所保存的 信件内容、 版式和纸张类型以及其上的公民信息平台的文字、 标识和收、 发信方的邮箱收发 帐号及信件发送的时间等均不可更改, 否则将会直接导致所盖印章图形显著变化。 电子邮箱 可以对于收到的电子信件根据需要进行分类归档。 Each e-mail is provided with various letter templates for writing various types of application letters. For e-mails with legal documents, they should conform to the written requirements of laws and regulations, that is, they can tangibly express the contents, and It can be retrieved at any time; it can accurately represent the content that was originally generated, sent or received; it can reliably guarantee that the content remains intact and unchanged from the time of final formation, but the letter can exist during forwarding, storage and display. Formal changes such as changes in the attributes of the letter; any changes in the content and form of the letter can be found. Specifically, e-mails of a legal document nature are transmitted in cipher text during the process of sending and receiving. The letters received by the receiving party are consistent with the content, layout and paper type generated by the sender, and the e-mail can be stamped with the content of the letter. The associated graphic seal, which is pre-stored in the e-mail system, any changes in the content of the letter will directly lead to significant changes in the stamp pattern; the received letter contains the text, logo and receipt of the citizen information platform. The sending and receiving account number of the sending party and the sending time and receiving time of the mail; The e-mail will be automatically saved after being sent successfully, and can be downloaded or displayed, printed, saved letter content, layout and paper type and the citizen information platform on it. The text, logo, and the email address of the receiving and sending party and the time when the letter is sent cannot be changed. Otherwise, the stamp pattern will be changed significantly. E-mail E-mails can be classified and archived as needed.
在电子邮箱系统中, 设立了 A和 B两类电子邮箱, A类邮箱为国家机关单位或公民信息 平台各层级的管理部门拥有, 其不能接收其他网站上的邮箱发来的邮件, 只接收本邮箱系统 内的邮箱向其发送的邮件, 对于被特殊邮箱标记为 "黑名单"的发送方邮件, 将直接进入邮 箱中的垃圾箱, 在设定的期限后被自动清除, 并返回一个提示发送方该邮件被放到垃圾箱的 回执, A类邮箱具备向所辖行政区域或授权区域的所有目标邮箱 -对一或一对多发送信件或 手机短信的功能, 超出其所辖行政区域或授权区域范围的目标邮箱只能一对一发送信件或手 机短信, 目标邮箱均无条件接收, 并会自动返回一个 "信件己接收"的回执; B类邮箱为 A 类邮箱用户以外的单位或公民所拥有。 B 类邮箱接收邮件状态可以分为六种: "接收全部信息 "―、 "接收系统内信息" 、 "接 收小群发信息" 、 "接收非群发信息" 、 "接收好友信息" ; "接收全部信息"是指能够接 收来自系统外和系统内的所有邮件, "接收系统内信息"是指只接收本系统内的所有邮件, 包括群发邮件, "接收小群发信息"是指只接收系统内邮件, 排除超过指定个数以上的非好 友群发邮件, "接收非群发信息" 是指只接收系统内邮件, 不接收非好友的群发邮件, "接 收好友信息"是指只接收系统内好友邮件, 包括好友的群发邮件。 In the e-mail system, two types of E-mails, A and B, have been set up. The E-type mailboxes are owned by the administrative departments of the state organs or the Citizen Information Platform. They cannot receive e-mails from other websites, and only receive this e-mail. The mail sent by the mailbox in the mailbox system to the sender's mail marked as "blacklist" by the special mailbox will directly enter the trash in the mailbox, and will be automatically cleared after the set period, and a prompt will be sent back. The party’s mail is placed in the trash can. The Class A mailbox has all the target mailboxes to the administrative area or authorized area of the jurisdiction - the function of sending letters or SMS messages to one or one-to-many, beyond the administrative area or authorization of its jurisdiction. The regional target mailbox can only send letters or SMS messages one-on-one. The target mailbox is unconditionally received, and will automatically return a receipt of "letter received"; the B-type mailbox is owned by a unit or citizen other than the class A mailbox user. . Class B mailbox receiving mail status can be divided into six types: "receive all information" -, "receive system information", "receive small group sending information", "receive non-group sending information", "receive friend information";"receive all information""It means receiving all mails from outside the system and within the system. "Receiving information in the system" means receiving only all the mails in the system, including mass mailings. "Receiving small group sending information" means receiving only the mail in the system. Exclude more than a specified number of non-friend group mailings, "Receive non-mass mail information" means receiving only in-system mail, not receiving non-friends group mail, "receiving friend information" means receiving only friends in the system, including friends Mass mailings.
B类邮箱用户可以通过电子邮箱系统向本系统内邮箱用户单发或群发手机短信, 但是受 到目标邮箱接收状态的限制, 当目标邮箱的接收状态为 "接收全部信息" 、 "接收系统内信 息"时, 该邮箱用户可接收系统内邮箱用户单发或群发手机短信; 当其接收状态为 "接收小 群发信息" 时, 该邮箱用户可接收系统内邮箱用户发送的手机短信, 排除超过指定个数以上 的非好友群发短信; 当其接收状态为 "接收非群发信息"时, 该邮箱用户可接收系统内邮箱 用户的手机短信, 但不接收非好友的群发手机短信; 当其接收状态为 "接收好友信息"时, 只接收系统内好友邮箱用户的手机短信, 包括好友的群发手机短信。 B-type mailbox users can send or send mobile phone short messages to the mailbox users in the system through the e-mail system, but they are restricted by the receiving status of the target e-mail. When the receiving status of the target e-mail is "receive all information", "receive system information" The mailbox user can receive a single or group mobile phone short message of the mailbox user in the system; when the receiving status is "receive small group sending information", the mailbox user can receive the mobile phone short message sent by the mailbox user in the system, and the specified number is excluded. The above non-friend group sends a text message; when the receiving status is "receive non-broadcast information", the mailbox user can receive the mobile phone short message of the mailbox user in the system, but does not receive the non-friend group mobile phone short message; when the receiving status is "received" When the friend information is ", only the mobile phone text message of the friend mailbox user in the system is received, including the group's mobile phone text message.
公民电子邮箱的首次开通应该通过向公民信息平台的管理部门办理申请、 审核的启用手 续, 公民电子邮箱帐号包括邮箱登录帐号和邮箱收发帐号, 两类邮箱帐号初始均设定为公民 身份证号码,邮箱开通之后, 邮箱收发帐号始终固定为公民身份证号码,而邮箱登录帐号(主 要由英文字母、 数字、 中文汉字组成) 可以经邮箱用户申请而变更; 邮箱登录帐号一经变更 成功, 原邮箱登录帐号即失去效用, 只能使用最新设立的邮箱登录帐号和密码登录邮箱。 如 此, 每个公民的电子邮箱处于相对保密状态。 The first opening of the citizen's e-mail address should be handled through the application and review of the citizen information platform. The citizen e-mail account includes the e-mail login account and the e-mail account. The two types of e-mail accounts are initially set to the citizen ID number. After the mailbox is opened, the email receiving and sending account is always fixed as the citizen ID number, and the email login account (mainly composed of English letters, numbers, and Chinese characters) can be changed by the email user application; once the email login account is successfully changed, the original email login account is changed. That is to say, if you lose your utility, you can only use the newly established email login account and password to log in to the mailbox. As such, each citizen's email address is relatively confidential.
单位电子邮箱的首次开通应该通过向公民信息平台的管理部门办理申请、 审核的启用手 续, 单位电子邮箱帐号包括邮箱登录帐号和邮箱收发帐号, 初始均设定为全国统一的组织机 构代码的号码, 单位邮箱开通之后, 邮箱收发帐号始终固定为组织机构代码的号码, 而邮箱 登录帐号 (主要由英文字母、 数字、 中文汉字组成) 可以经单位邮箱用户申请而变更; 邮箱 登录帐号一经变更成功, 原邮箱登录帐号即失去效用, 只能使用最新设立的邮箱登录帐号和 密码登录邮箱。 The first opening of the e-mail address of the unit should be processed through the application and review of the Citizen Information Platform. The e-mail account of the unit includes the e-mail login account and the e-mail account. The initial number is set to the national unified organization code number. After the unit mailbox is opened, the email receiving and dispatching account is always fixed to the organization code number, and the email login account (mainly composed of English letters, numbers, and Chinese characters) can be changed by the application of the user's mailbox. After the email login account is successfully changed, the original The email login account is invalid. You can only use the newly created email login account and password to log in to the email address.
电子邮箱系统可以在每一单位电子邮箱目录之下设定唯一的一个代表该单位的 "法定代 表邮箱" , 冠以单位全称, 经该单位申请可以设立多个级别的部门邮箱, 每一级部门可以根 据需要设立一定数量的岗位邮箱; 单位的各级部门邮箱都可以经向电子邮箱系统的管理机构 申请由单位自主冠以该部门相应的名称。单位法定电子邮箱和部门邮箱既是对外交流的工具, 亦是单位内部信息交流的公共平台; 主管人员可以调动, 部门或职位邮箱不变, 邮箱内的工 作信息永久保存, 成为该部门或职位存放在网上的历史档案。 电子邮箱系统提供的电子邮箱通讯录服务, 将单位或公民的邮箱收发帐号以名称或姓名 形式公开在公民信息平台的电子邮箱网站上, 即每个电子邮箱都冠以邮箱用户真实名称或姓 名, 与对应的邮箱收发帐号 "绑定" , 使得电子邮箱通讯目录直接以单位名称或公民姓名排 列显示, 形成全国公共电子邮箱通讯录; 单位的电子邮箱按照国家机关、 企业单位 (包括法 人、 非法人企业、 个体工商户) 、 事业单位、 社会组织 (包括法人或非法人组织) 的序列, 按所属中央、 省 (包括直辖市、 自治区, 下同) 、 市、 县、 乡 (镇) 行政区域排列; 公民电 子邮箱通讯录, 依法汇集了全体公民的法定电子邮箱, 按照公民户籍所在的行政区域编排, 即按公民户籍所在地所属的省、 市、 县、 乡 (镇) 、 街道或行政村的行政区域编排, 对于部 分不愿意对外公布过于具体的住所地的公民, 经向公民信息平台管理机构申请可以县或市为 单位按照姓氏编排电子邮箱通讯录, 公民可以自主选择两种编排方式之一, 默认为第一种编 排方式; 公民的电子邮箱通讯录还可以按照单位编排, 每一单位经向电子邮箱系统申请可将 本单位新老职工的法定电子邮箱组合在同一单位电子邮箱通讯目录之下, 职工的电子邮箱既 可以对外展示, 也可以只限于向本单位职工展示, 对外隐匿, 由单位职工自主决定显示模式; 如果公民搬迁到不同的行政区域, 或调动工作到新的单位, 其法定电子邮箱将按照新的户籍 地或新的单位安排在新的电子邮箱通讯目录中, 但是该邮箱在原通讯目录列表中仍然存在并 能正常接收邮件, 只是标上 "已经搬迁"或 "巳经调动" 的说明字样, 其位于不同邮箱目录 中的该邮箱收发账号相同, 仍指向唯一的电子邮箱地址; 电子邮箱系统对于单位提供按行业、 专业等分类方法排列的电子邮箱公共通讯录, 对于公民提供按行业、 专业、 职称等分类方法 排列的电子邮箱公共通讯录, 每个单位或公民可以通过提交相关的证明文件向公民信息平台 管理机构提出申请加入某一类别的邮箱通讯录中, 旨在方便同类别单位和人群的信息交流。 The e-mail system can set a unique "legal representative mailbox" representing the unit under each unit's e-mail directory, which is the full name of the unit. After the application, the department can set up multiple levels of departmental mailboxes. A certain number of post mailboxes can be set up according to the needs; the e-mails of all levels of the unit can be applied to the management agency of the e-mail system to be named by the unit with the corresponding name of the department. The legal e-mail and department e-mail are both a tool for external communication and a public platform for information exchange within the unit; the supervisor can mobilize, the department or post mailbox is unchanged, and the work information in the mailbox is permanently saved, and the department or position is stored in the department. Historical archives online. The e-mail address book service provided by the e-mail system publicizes the e-mail address of the unit or citizen in the form of name or name on the e-mail website of the Citizen Information Platform, that is, each e-mail address is the real name or name of the e-mail user. "Binding" with the corresponding mailbox receiving and dispatching account, so that the e-mail communication directory is directly displayed by unit name or citizen name, forming a national public e-mail address book; the unit's e-mail address is in accordance with state organs and enterprise units (including legal persons and unincorporated persons) The sequence of enterprises, individual industrial and commercial households, institutions, social organizations (including legal persons or unincorporated organizations) shall be arranged according to the administrative regions of the central, provincial (including municipalities, autonomous regions, and the following), cities, counties, and townships (towns); The citizen's e-mail address book collects the legal e-mails of all citizens according to the law, according to the administrative area where the citizen's household registration is located, that is, the administrative area of the province, city, county, township (town), street or administrative village to which the citizenship is located. Orchestration, for part not willing to Citizens who publish too specific places of residence may apply to the citizen information platform management agency to arrange e-mail address records according to their surnames at the county or city level. Citizens may choose one of two arrangements, the default is the first arrangement; Citizen's e-mail address book can also be arranged according to the unit. Each unit can apply to the e-mail system to combine the legal e-mail address of the new and old employees of the unit under the same unit e-mail communication directory. The employee's e-mail address can be externally The display may also be limited to the display of employees of the unit, hidden from the outside, and the display mode shall be determined by the employees of the unit; if the citizen moves to a different administrative area, or transfers the work to a new unit, the legal e-mail address will follow the new household registration place. Or the new unit is arranged in the new e-mail communication directory, but the e-mail still exists in the original communication directory list and can receive the mail normally, but the words "has been moved" or "transferred" are marked. The mailbox in the mailbox directory is the same as the receiving and sending account, still pointing The only e-mail address; E-mail system provides e-mail public address book arranged by industry, professional and other classification methods for the unit, and provides e-mail public address book for citizens according to industry, profession, professional title and other classification methods, each unit Or citizens can submit their application to join a certain category of mailbox address book by submitting relevant supporting documents, which is designed to facilitate the exchange of information between units and people in the same category.
在以上的电子邮箱公共通讯录排列方法中, 每一单位或公民都可以方便地在某行政区域 内找到有关行政机关的邮箱, 这为单位或公民办理有关行政事务带来了极大方便。 例如当出 现网上诈骗时, 只要找到该行政区域的公安机关或工商机关电子邮箱, 即可以进行投诉或举 报。需要交税时, 只需通过该行政区域的税务机关电子邮箱外显的网站链接而登录税务大厅, 这使得虚拟的网络世界与现实世界实现了真正意义的对接, 实现了虚拟世界的现实化。 In the above e-mail public address book arrangement method, each unit or citizen can conveniently find the e-mail address of the relevant administrative agency in an administrative area, which brings great convenience for the unit or citizen to handle relevant administrative affairs. For example, when online fraud occurs, you can make a complaint or report by simply finding the e-mail address of the public security organ or industrial and commercial organization in the administrative area. When you need to pay taxes, you only need to log in to the tax hall through the website link of the tax authorities in the administrative area. This makes the virtual network world and the real world realize the real connection, realizing the virtual world.
所述的单位或公民电子邮箱都可以经申请附上邮箱用户的介绍信息, 但其内容应通过公 民信息平台管理机构审核通过, 对于单位电子邮箱还 ¾1以经申请链接该单位的对外网站。 The unit or citizen e-mail address may be attached to the introductory information of the e-mail user, but the content shall be approved by the public information platform management organization, and the unit e-mail address may be linked to the external website of the unit.
单位或公民电子邮箱的幵启方法有二: 一是通过在电子邮箱系统界面中输入邮箱登录帐 号加邮箱登录密码验证后开启邮箱, 二是使用单位或个人数字 U盾, 通过输入 "邮箱登录帐 号 +数字 U盾密码"验证后开启邮箱。 There are two methods for opening a unit or citizen e-mail: First, open the e-mail by entering the e-mail login system and adding the e-mail login password to the e-mail system interface. The second is to use the unit or personal digital U-Shield. + Digital U Shield Password "Open the mailbox after verification.
公民信息平台设立有与邮箱 "绑定"号码的手机短信通知功能, 用于系统发布公告或者 实时发送邮箱登录和身份证网络验证信息, 单位或公民可以自主选择开通全部或部分的短信 通知服务。 The Citizen Information Platform has a mobile phone SMS notification function with a "bind" number for the mailbox, which is used to publish announcements or Real-time email login and ID network verification information, the unit or citizen can choose to open all or part of the SMS notification service.
每一邮箱在被一台电脑通过密码登录打开且没有关闭之前, 任何其他电脑都不能通过密 码打开该邮箱, 如果发生一台电脑试图通过密码打开一个已经打开的邮箱, 若密码输入正确, 系统会提示 "有人正在使用该邮箱" , 并且这一信息立刻会发送到幵通了手机短信服务的邮 箱用户的手机中以示警。 Before each mailbox is opened by a computer and opened without password, no other computer can open the mailbox by password. If a computer tries to open an open mailbox with a password, if the password is entered correctly, the system will The prompt "Someone is using the mailbox", and this information will be sent to the phone of the mailbox user who has passed the SMS service to alert.
电子邮箱系统可以通过来自信息服务系统的身份验证服务嵌入模块进行身份网络验证, 身份网络验证通过的单位或公民邮箱用户可以进行恢复初始的邮箱登录帐号或取回当前邮箱 登录帐号、 邮箱密码恢复或重设的操作, 用户在邮箱中可以开启或停用该功能; 单位或公民 都可以通过向公民信息平台的管理机构申请、 按照一定的手续办理恢复初始的邮箱登录帐号 或取回当前邮箱登录帐号、 邮箱密码恢复或重设的业务。 The e-mail system can authenticate the identity network through the authentication service embedding module from the information service system. The unit or citizen mailbox user who authenticates the identity network can restore the initial mailbox login account or retrieve the current mailbox login account, email password recovery or The reset operation allows the user to enable or disable the function in the mailbox; the unit or citizen can apply to the management agency of the citizen information platform, restore the initial email login account or retrieve the current email login account according to certain procedures. , mailbox password recovery or reset business.
(七) 操作日志和身份证验证曰志 (7) Operation log and ID card verification
公民信息平台中设立操作日志和身份证验证日志, 操作日志包含邮箱登录记录和邮箱内 有关用户信息操作记录, 登录记录包含登录邮箱的总次数和登录电脑 IP地址和登录时间, 如 果手机上网登录, 则记录手机号码, 邮箱用户可以通过查看操作日志及时发现非正常登录邮 箱, 邮箱内有关用户信息操作记录, 包含邮箱密码修改、 用户信息的查询、 査验和展示等操 作; 身份证验证日志包含与三种身份证读写器相对应的身份证验证次数和验证所登录电脑 IP 地址和登录时间, 邮箱用户通过査看身份证验证日志, 能够及时发现身份证有无被他人盗用 或 "克隆" ; 操作日志和身份证验证日志能够实现对特定公民的 "行动轨迹"的追踪。 The operation log and the ID verification log are set in the citizen information platform. The operation log includes the login record of the mailbox and the operation record of the user information in the mailbox. The login record includes the total number of login mailboxes and the IP address and login time of the login computer. The mobile phone number is recorded, and the user can check the operation log to find the abnormal login mailbox in time, and the operation record of the user information in the mailbox, including the modification of the mailbox password, the inquiry, the inspection and the display of the user information; the ID verification log includes The number of ID card verifications corresponding to the three ID card readers and the IP address and login time of the registered computer. By checking the ID card verification log, the e-mail user can find out whether the ID card has been stolen or "cloned" by others; Operational logs and ID verification logs enable tracking of the "action trajectory" of a particular citizen.
公民信息平台中为法定机关设立有査看日志 (操作日志和身份证验证日志) 和公民身份 信息的特殊帐户, 只有法定机关 (通常是省级以上公安机关或检察机关)通过对特定岗位系 统程序员的书面授权才能开启, 并且不同类型和级别的法定机关有权开启的范围依法规定。 The Citizen Information Platform has a special account for the statutory authority to view logs (operation log and ID verification log) and citizenship information. Only statutory bodies (usually public security organs or procuratorates above the provincial level) pass the system procedures for specific posts. The written authorization of the member can be opened, and the scope of the legal authority of different types and levels is open to the law.
本发明的有益效果, 单就所实现的公民或单位信息方便快捷地査询、 査验、 展示、 身份 证验证和信息交流, 预防身份信息泄密, 杜绝伪造身份证目标来看社会效益和经济效益己是 十分巨大。通过实现前述的邮箱网站 12大功能, 整合已有系统, 构筑了公民和单位信息共享 与交流平台, 实际上是构筑了国家信息建设的基础工程。 为加速信息化建设和各项业务创新 提供网络环境支持。 对全社会的信息交流和信息共享、 社会诚信建设、 人口管理、 社会治安 及各行各业的信息化建设和消除信息资源重复建设等方面都具有强大的推动作用, 经济效益 和社会效益巨大。 The beneficial effects of the invention can easily and quickly query, inspect, display, verify the identity card and exchange information of the citizen or unit information realized, prevent the disclosure of identity information, and eliminate the goal of forging identity cards to see social and economic benefits. It is very huge. By implementing the above-mentioned 12 major functions of the mailbox website, integrating existing systems, and building a platform for information sharing and exchange between citizens and units, it is actually a basic project for building national information. Provide network environment support to accelerate information construction and various business innovations. It has a strong impetus to the information exchange and information sharing, social integrity construction, population management, social security, information construction of all walks of life and the elimination of redundant construction of information resources. The economic and social benefits are enormous.
四. 附图说明 图 1, 是公民信息管理平台结构示意图。 公民信息管理系统管理公民 (单位) 的身份信 息。 信息服务系统提供身份验证服务。 电子邮箱系统 (含邮箱网站) 提供邮箱管理、 在线交 流。 各级业务管理系统主要管理身份证发放和电子邮箱的分配。 应用系统指使用身份验证服 务的各种应用系统。 网络终端指可登录邮箱网站各类终端。 BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a schematic diagram of the structure of the citizen information management platform. The citizen information management system manages the identity information of citizens (units). The information service system provides an authentication service. E-mail system (including e-mail website) Provides mailbox management and online communication. Business management systems at all levels mainly manage the issuance of ID cards and the distribution of e-mail addresses. An application system refers to various application systems that use an authentication service. The network terminal refers to various terminals that can be logged into the mailbox website.
图 2, 是身份证保护套主视图未封口状态结构示意图。包括封页舌塑料材质部分 1, 封页 舌防水胶纸部分 2, 保护套插入口 3, 保护套正面 4。 其中, 封页舌塑料材质部分 1配合封页 舌防水胶纸部分 2能够将保护套完全密封, 使其具备防水功能。 保护套插入口 3是身份证插 入口。 保护套正面 4.完全透明, 身份证正面图可以完全显示和复印。 Figure 2 is a schematic diagram showing the structure of the main view of the ID card protection cover. Including the cover sheet plastic material part 1, the cover sheet tongue waterproof tape part 2, the protective sleeve insertion port 3, the protective cover front 4. Among them, the cover tongue plastic material part 1 with the cover sheet tongue waterproof tape part 2 can completely seal the protective cover, so that it has waterproof function. The protective cover insertion port 3 is an ID card insertion port. The front of the case 4. Fully transparent, the front view of the ID card can be fully displayed and copied.
图 3, 是身份证保护套后视图已封口状态的结构示意图。包括保护套反面 5, 家庭住址遮 蔽胶带 6, 身份证验证码 1遮蔽胶带 7, 身份证验证码 2遮蔽胶带 8。 其中, 保护套反面 5, 是遮蔽胶带以外的能够透明显示身份证信息部分。 家庭住址遮蔽胶带 6, 指示了家庭住址显 示位置。 身份证验证码 1之遮蔽胶带 7和身份证验证码 2之遮蔽胶带 8指示了身份证验证码 的显示位置。 三条胶带可以分别揭、 蔽。 Figure 3 is a structural diagram of the sealed state of the rear view of the ID card cover. Including the reverse side of the protective cover 5, home address masking tape 6, ID card verification code 1 masking tape 7, ID card verification code 2 masking tape 8. Among them, the reverse side of the protective cover 5 is a part of the cover card that can transparently display the identity card information. Home address masking tape 6, indicating the location of the home address. ID card verification code 1 masking tape 7 and ID card verification code 2 masking tape 8 indicates the display position of the ID card verification code. Three pieces of tape can be uncovered and covered separately.
图 4, 是身份证保护套使用状态示意图。 身份证正面信息全部显示, 并可以复印。 Figure 4 is a schematic diagram of the use status of the ID card cover. The front information of the ID card is displayed and can be copied.
图 5, 是身份证保护套使用状态之 1示意图。 身份证反面信息全部显示, 并可以复印。 图 6, 是身份证保护套后视图使用状态之 2示意图。 身份证反面有关身份证验证码和家 庭住址的信息被三条胶带遮蔽状况。 Figure 5 is a schematic diagram of the use status of the ID card cover. The reverse side of the ID card is displayed and can be copied. Figure 6 is a schematic diagram of the use state of the rear view of the ID card cover. The information on the ID card opposite to the ID card verification code and the home address was blocked by three tapes.
图 7, 是身份证读写器的结构图。 包括射频单元、 显示单元、 存储单元、 键盘单元、 指 纹单元、 安全单元、 通信单元、 控制单元。 Figure 7, is the structure of the ID card reader. It includes a radio frequency unit, a display unit, a storage unit, a keyboard unit, a fingerprint unit, a security unit, a communication unit, and a control unit.
射频单元: 通过 RF方式实现与身份证内含 IC卡的无线信息交换。 RF unit: The wireless information exchange with the IC card contained in the ID card is realized by RF.
显不单兀: 采用彩色 LCD, 可显示身份证信息和其它信息。 Not only 兀: Use color LCD to display ID information and other information.
存储单元: 存储字库,用于在显示单元显示字符时的读取字符点阵信息。 Storage unit: A storage font for reading character dot matrix information when a display unit displays characters.
键盘单元: 可输入数值或密码。 Keyboard unit: You can enter a value or password.
指纹单元- 可采集人体指紋、 可进行人体手指紋比对。 Fingerprint unit - can collect human fingerprints and can be used for human hand fingerprint comparison.
安全单元: 可安装各种授权卡。 Security unit: Various authorization cards can be installed.
通信单元: 用于连接电脑。 Communication unit: Used to connect to a computer.
控制单元: 管理其它单元, 主要实现身份信息的读取、 身份脱机验证和通过电脑连接网 络网络身份验证。 Control unit: Manage other units, mainly to read identity information, authenticate offline, and connect to network authentication through a computer.
五. 具体实施方式 V. Specific implementation methods
公民信息平台管理机构融合公安机关原公民身份证和户籍信息管理组织机构, 按中央、 省、 市、 县、 社区分层管理。 县以上的管理机构应用相对应的业务管理系统管理身份证发放、 维护、 身份证读卡器、 授权模块发放和电子邮箱分配。 社区组织可以应用社区级别的业务管 理系统, 授权社区工作人员管理各类群聊天室, 可在 IP天室进行发布通知、 广告和进行社会 调査等商务或社会管理服务。 The Citizen Information Platform Management Organization integrates the original citizen ID card and household registration information management organization of the public security organ, and is managed hierarchically by the central, provincial, municipal, county, and community. The management agencies at or above the county level apply the corresponding business management system to manage the issuance of ID cards. Maintenance, ID card reader, authorization module issuance and email distribution. Community organizations can apply community-level business management systems, empower community workers to manage various group chat rooms, and conduct business or social management services such as announcements, advertisements, and social surveys in IP days.
个人信息被出卖、 出售和泄露的现象在全国非常严重, 引起了国人的广泛关注, 却一直 没有找到根治的办法。保护个人信息的现有渠道主要是法律保护和自律保护,缺乏预防性(或 者说是技术性) 的保护。 本发明通过对身份证版面新设计、 身份证读写器三种显示方法的改 革填补了预防性保护的空白。 在立法上应对《居民身份证法》进行修改, 尤其是身份证载信 息和版面设计及身份证 IC卡内含信息应作出如本发明的调整。要尽快立法通过《公民信息保 护法》 , 规范公民身份信息的登记、 査验和使用。 从立法上规定凡是需要用个人名字登记、 注册、 办证的地方和场合, 都应该登记实名和身份证号码。 The phenomenon of personal information being sold, sold and leaked is very serious in the country, which has aroused widespread concern of the Chinese people, but has never found a cure. The existing channels for protecting personal information are mainly legal protection and self-discipline protection, and lack of preventive (or technical) protection. The invention fills the blank of preventive protection by reforming the three display methods of the new design of the ID card and the ID card reader. In the legislation, the “Resident Identity Card Law” should be amended, especially the ID card information and layout design and ID card IC card information should be adjusted as shown in the present invention. It is necessary to legislate through the Citizenship Information Protection Law as soon as possible to regulate the registration, inspection and use of citizenship information. It is stipulated in the legislation that all places and occasions that require registration, registration, and certification with a personal name should register their real name and ID number.
公民信息管理平台及其邮箱网站的建设和推广, 分为四个阶段: 第一阶段以现有的公安 机关的公民身份证和户籍信息系统为依托, 建立公民信息管理平台及其电子邮箱网站, 建立 公民信息管理系统, 提供电子邮箱服务; 第二阶段, 构建信息服务系统, 开展公民身份验证 服务; 第三阶段, 借助电子邮箱系统开展公民信息的查阅、 査验、 展示等信息服务; 第四阶 段, 完善公民信息管理系统, 逐步停止原公安机关的公民身份证和户籍信息系统的运作, 第 五阶段, 完善公民信息管理平台的各部分功能, 包括建立各类单位的法定电子邮箱, 实现单 位之间、 公民之间和单位与公民之间的信息交流。 以上每一阶段, 都从地方县、 市开始试点, 逐步推广到全国。 通过行政手段的强力推介与基于公民信息平台邮箱网站得天独厚的广泛受 众群体优势的市场化运作相结合, 公民信息管理平台能够实现成功运营。 The construction and promotion of the citizen information management platform and its e-mail website are divided into four stages: The first stage is based on the existing public security organ's citizen ID card and household registration information system, and establishes a citizen information management platform and its e-mail website. Establish a citizen information management system and provide e-mail service; In the second stage, build an information service system to carry out citizenship verification services; and in the third stage, use e-mail system to conduct information services such as access, inspection and display of citizen information; In the stage, improve the citizen information management system, gradually stop the operation of the original public security organ's citizen ID card and household registration information system. In the fifth stage, improve the functions of various parts of the citizen information management platform, including establishing legal e-mails of various units, and realizing the unit. Information exchange between, between citizens and between units and citizens. At each stage, the pilots were started from local counties and cities, and gradually extended to the whole country. Through the strong promotion of administrative means and the market-oriented operation based on the unique advantages of the citizen information platform e-mail website, the citizen information management platform can achieve successful operation.
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2010297872A AU2010297872A1 (en) | 2009-09-25 | 2010-09-24 | Method for managing citizen information |
| CN201080037501.7A CN102667832B (en) | 2009-09-25 | 2010-09-24 | A Citizen Information Management Method |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN200910153010 | 2009-09-25 | ||
| CN200910153010.8 | 2009-09-25 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2011035549A1 true WO2011035549A1 (en) | 2011-03-31 |
Family
ID=43795330
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2010/001473 Ceased WO2011035549A1 (en) | 2009-09-25 | 2010-09-24 | Method for managing citizen information |
Country Status (3)
| Country | Link |
|---|---|
| CN (5) | CN104408485B (en) |
| AU (1) | AU2010297872A1 (en) |
| WO (1) | WO2011035549A1 (en) |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8060555B2 (en) | 2005-08-17 | 2011-11-15 | Canada Post Corporation | Electronic content management systems and methods |
| CN103281385A (en) * | 2013-05-31 | 2013-09-04 | 重庆大学 | Method suitable for distributed type multi-level flattening information management system |
| CN104915236A (en) * | 2015-06-23 | 2015-09-16 | 迪安杰科技无锡有限公司 | Embedded biometric authentication platform processing system |
| CN105913216A (en) * | 2016-03-31 | 2016-08-31 | 中铁程科技有限责任公司 | Railway passenger ticket public security processing system |
| CN106453363A (en) * | 2016-10-27 | 2017-02-22 | 郑州中软高科信息技术有限公司 | Network coding and decoding system based on bus technology for plurality of 2nd-generation ID cards |
| CN107423987A (en) * | 2017-09-26 | 2017-12-01 | 深圳福鸽科技有限公司 | A kind of local type Express Logistics real-name authentication system and authentication method |
| CN110825814A (en) * | 2019-11-20 | 2020-02-21 | 陈学凡 | Method for creating citizen identity block chain based on national population basic information |
| TWI696364B (en) * | 2015-03-20 | 2020-06-11 | 香港商阿里巴巴集團服務有限公司 | Method, device, client, server and system for private chat in group chat |
| CN112766897A (en) * | 2021-01-14 | 2021-05-07 | 台州市公安局 | Drug addict management method based on big data comprehensive information technology application |
| US11070505B2 (en) | 2018-06-29 | 2021-07-20 | Beijing Bytedance Network Technology Co., Ltd. | Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium |
| CN118692615A (en) * | 2024-07-02 | 2024-09-24 | 湖北省疾病预防控制中心(湖北省预防医学科学院) | A vaccination evaluation information system based on QR code |
Families Citing this family (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102332000A (en) * | 2011-07-22 | 2012-01-25 | 深圳市财富万方信息技术有限公司 | Individual socialized service system and implementation method thereof |
| CN103425948A (en) * | 2012-05-18 | 2013-12-04 | 无锡指网生物识别科技有限公司 | Integrated machine with integration of 2nd-generation ID card reading device and fingerprint collection function |
| CN103632109B (en) * | 2013-11-07 | 2016-08-03 | 汪风珍 | Identity card secret protection and loss report system |
| CN103903211A (en) * | 2014-03-31 | 2014-07-02 | 合肥晶奇电子科技有限公司 | Resident income combined checking method based on chain type correlation |
| CN103996035A (en) * | 2014-04-09 | 2014-08-20 | 娲石水泥集团武汉万世科技有限公司 | Passenger security check identity certification product |
| CN103973709B (en) * | 2014-05-27 | 2017-03-22 | 天津七一二通信广播股份有限公司 | Method for realizing comparison verification of identity card by utilizing police cluster network |
| CN103973714B (en) * | 2014-05-29 | 2017-10-13 | 华翔腾数码科技有限公司 | Email account generation method and system |
| CN104867091A (en) * | 2015-05-25 | 2015-08-26 | 江苏物联网研究发展中心 | Citizen mail box system |
| CN104951928B (en) * | 2015-06-30 | 2019-01-22 | 梅卓军 | System and method for electronic license information interaction |
| CN106027479B (en) * | 2016-01-21 | 2019-04-05 | 李明 | A kind of method for dynamically processing and system of authentication ids information process request |
| CN106230866A (en) * | 2016-09-29 | 2016-12-14 | 广州鹤互联网科技有限公司 | A kind of electronic endorsement method for managing security and system |
| CN106910149A (en) * | 2017-01-22 | 2017-06-30 | 胡雄焱 | Replacement number generation system and the generation method of a kind of citizen ID certificate number |
| CN107481165A (en) * | 2017-07-03 | 2017-12-15 | 浙江建林电子电气股份有限公司 | A kind of intelligent notification apparatus and application method |
| CN108234297B (en) * | 2018-01-19 | 2021-02-12 | 论客科技(广州)有限公司 | Method, system and device for limiting mail system to use real name to send |
| WO2019196027A1 (en) * | 2018-04-11 | 2019-10-17 | 于志 | System and method for authenticating resident identity card number based on cn39 codes |
| CN109145891B (en) * | 2018-06-27 | 2022-08-02 | 上海携程商务有限公司 | Client, method for identifying identity card by client and system for identifying identity card |
| CN109191655A (en) * | 2018-10-18 | 2019-01-11 | 杭州博采网络科技股份有限公司 | A kind of number of shaking system based on public security verifying user information |
| CN110247927B (en) * | 2019-06-28 | 2021-12-03 | 北京金山云网络技术有限公司 | Method and device for managing authority of cloud computing resources |
| CN111784296A (en) * | 2020-07-01 | 2020-10-16 | 山东爱城市网信息技术有限公司 | Government affair material management tool and business handling method thereof |
| CN112183137B (en) * | 2020-09-25 | 2021-12-07 | 天津理工大学 | Dynamic configuration interface system of second-generation identity card reader |
| CN112163072B (en) * | 2020-09-30 | 2024-05-24 | 北京金堤征信服务有限公司 | Data processing method and device based on multiple data sources |
| CN117453629B (en) * | 2023-12-22 | 2024-03-08 | 厦门无链之链科技有限公司 | Personal mobile blockchain data archive management system based on U shield |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1818971A (en) * | 2006-03-10 | 2006-08-16 | 湖南省公民信息管理局 | Identity information checking method and checker with secondary-generation identity card combination |
| CN101474924A (en) * | 2009-01-20 | 2009-07-08 | 庄秀宝 | Intelligent IC identification card |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1162791C (en) * | 1999-03-06 | 2004-08-18 | 李玉彬 | Digital identity card rechecking and nationwide networking management method |
| US6847969B1 (en) * | 1999-05-03 | 2005-01-25 | Streetspace, Inc. | Method and system for providing personalized online services and advertisements in public spaces |
| CN1329993A (en) * | 2001-08-17 | 2002-01-09 | 王冬云 | Readable/writable antiforge residential identity card |
| CN1430176A (en) * | 2001-12-31 | 2003-07-16 | 郑向昆 | Manufacturing method of magnetic identification card with finger print |
| CN1818917A (en) * | 2005-11-30 | 2006-08-16 | 杨红光 | Fingerprint identity card, its system and trading method thereof |
| CN101136909B (en) * | 2006-10-09 | 2011-07-06 | 北京国政通科技有限公司 | Method and system for checking user real identification using communication network |
| CN101123505A (en) * | 2007-08-06 | 2008-02-13 | 张伟民 | Network contraction secure service system |
| CN201281860Y (en) * | 2008-10-24 | 2009-07-29 | 长春鸿达光电子与生物统计识别技术有限公司 | Fingerprint identification verification IC card reader-writer |
-
2010
- 2010-09-24 CN CN201410602189.1A patent/CN104408485B/en not_active Expired - Fee Related
- 2010-09-24 WO PCT/CN2010/001473 patent/WO2011035549A1/en not_active Ceased
- 2010-09-24 CN CN201010297589.8A patent/CN102033901B/en not_active Expired - Fee Related
- 2010-09-24 CN CN201080037501.7A patent/CN102667832B/en not_active Expired - Fee Related
- 2010-09-24 CN CN201511032369.1A patent/CN105678512A/en active Pending
- 2010-09-24 AU AU2010297872A patent/AU2010297872A1/en not_active Abandoned
- 2010-09-24 CN CN201410602257.4A patent/CN104408486B/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1818971A (en) * | 2006-03-10 | 2006-08-16 | 湖南省公民信息管理局 | Identity information checking method and checker with secondary-generation identity card combination |
| CN101474924A (en) * | 2009-01-20 | 2009-07-08 | 庄秀宝 | Intelligent IC identification card |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8595292B2 (en) | 2005-08-17 | 2013-11-26 | Canada Post Corporation | Electronic content management systems and methods |
| US8060555B2 (en) | 2005-08-17 | 2011-11-15 | Canada Post Corporation | Electronic content management systems and methods |
| CN103281385A (en) * | 2013-05-31 | 2013-09-04 | 重庆大学 | Method suitable for distributed type multi-level flattening information management system |
| TWI696364B (en) * | 2015-03-20 | 2020-06-11 | 香港商阿里巴巴集團服務有限公司 | Method, device, client, server and system for private chat in group chat |
| CN104915236A (en) * | 2015-06-23 | 2015-09-16 | 迪安杰科技无锡有限公司 | Embedded biometric authentication platform processing system |
| CN105913216A (en) * | 2016-03-31 | 2016-08-31 | 中铁程科技有限责任公司 | Railway passenger ticket public security processing system |
| CN106453363A (en) * | 2016-10-27 | 2017-02-22 | 郑州中软高科信息技术有限公司 | Network coding and decoding system based on bus technology for plurality of 2nd-generation ID cards |
| CN107423987A (en) * | 2017-09-26 | 2017-12-01 | 深圳福鸽科技有限公司 | A kind of local type Express Logistics real-name authentication system and authentication method |
| US11070505B2 (en) | 2018-06-29 | 2021-07-20 | Beijing Bytedance Network Technology Co., Ltd. | Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium |
| US11582181B2 (en) | 2018-06-29 | 2023-02-14 | Beijing Bytedance Network Technology Co., Ltd. | Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium |
| CN110825814A (en) * | 2019-11-20 | 2020-02-21 | 陈学凡 | Method for creating citizen identity block chain based on national population basic information |
| CN112766897A (en) * | 2021-01-14 | 2021-05-07 | 台州市公安局 | Drug addict management method based on big data comprehensive information technology application |
| CN118692615A (en) * | 2024-07-02 | 2024-09-24 | 湖北省疾病预防控制中心(湖北省预防医学科学院) | A vaccination evaluation information system based on QR code |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104408485A (en) | 2015-03-11 |
| CN104408486A (en) | 2015-03-11 |
| CN102667832A (en) | 2012-09-12 |
| CN105678512A (en) | 2016-06-15 |
| AU2010297872A1 (en) | 2012-06-21 |
| CN102033901B (en) | 2014-12-10 |
| CN102667832B (en) | 2016-01-20 |
| CN102033901A (en) | 2011-04-27 |
| CN104408486B (en) | 2020-01-21 |
| CN104408485B (en) | 2018-09-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104408486B (en) | Identity card reader-writer | |
| US11049349B2 (en) | Computerized voting system | |
| Grabosky et al. | Electronic theft: Unlawful acquisition in cyberspace | |
| Winn | Open Systems, Free Markets, and Regulation of Internet Commerce | |
| US20070265947A1 (en) | Generating event messages corresponding to event indicators | |
| CA3038506A1 (en) | Computerized voting system | |
| Biegelman | Identity theft handbook: Detection, prevention, and security | |
| Sliusar et al. | Blockchain technology application for electronic voting systems | |
| Lips | Rethinking citizen–government relationships in the age of digital identity: Insights from research | |
| US20070265946A1 (en) | Aggregating event indicators | |
| Thomas | Is Malaysia's MyKad the'One Card to Rule Them All'? The Urgent Need to Develop a Proper Legal Framework for the Protection of Personal Information in Malaysia | |
| Kee et al. | Security issues on identity card in Malaysia | |
| Richards | The Utah digital signature act as model legislation: A critical analysis | |
| Basu et al. | E-commerce and the law: a review of India's Information Technology Act, 2000 | |
| US20070265945A1 (en) | Communicating event messages corresponding to event indicators | |
| Rambarran | I Accept, But Do They:... The Need for Electronic Signature Legislation on Mainland China | |
| Thomson | Critical issues in identity management-challenges for Homeland Security | |
| Larson | Cast your ballot. com: Fulfill your Civic Duty over the Internet | |
| CN111222105A (en) | A method for issuing network mapping certificate | |
| Wang et al. | How to Balance Efficiency and Privacy of Identity Card System: A Comparison between China and Japan | |
| Pattison | Legal implications of doing business on the Internet | |
| 佐藤信行 et al. | Personal Authentication and Law in Japan: Policy Confusion Surrounding the Introduction of the My Number Insurance Card | |
| JP2001216395A (en) | Authentication system using possessed paper money and application of the system | |
| Susilawati et al. | Implementation of Electronic Transactions of Notary's Deeds in Improving Legal Certainty and Data Security | |
| Shi et al. | The Right to Personal Data Portability: Practices and Prospects |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201080037501.7 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10818243 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2010297872 Country of ref document: AU |
|
| ENP | Entry into the national phase |
Ref document number: 2010297872 Country of ref document: AU Date of ref document: 20100924 Kind code of ref document: A |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10818243 Country of ref document: EP Kind code of ref document: A1 |