Method for managing citizen information
- kind of citizen's approaches to IM one, technical fields:
Using wan technology, the communication technology, W E B technologies, large database administrative skill.
Two ' technical backgrounds:
In world's stepped into information epoch, each administrative department of China and numerous enterprises and institutions have all developed a set of independent website for having oneself and Database Systems under IT wave.The identity information of individual citizens is with finance, house property, insurance, property tax, traffic, health care, charges for water and electricity use etc. information, among the operation system database for being often dispersed in each separate department or unit.Citizen also has the demand tested other people personal information Check for concerning the demand that the personal information of oneself has inquiry and shown to other people.The legal persons such as government offices, business unit, public institution, public organization or juridical-person tissue (being hereinafter referred to as unit), similarly there is a situation where that concerning the information of itself is stored among other departments or unit, equally exist and the Check of self information is ask and to other unit or the demand of personal displaying, the demand tested other unit or personal information Check.Between unit, between unit and citizen, there is substantial amounts of information interchange demand between citizen.The abundant realization of these demands, it will be greatly promoted the developing of society, economic prosperity.Current situation is, because these information for concerning citizen or unit split mutually presence, and onrelevant, and inquiry, Check test, shows and is seriously restricted, inefficiency.And because communicative channel is obstructed, information interchange is also seriously restricted.For example:Want with the classmate that has no for many years contact but because lose its contact method can not, think that consultant expert's problem does not find the business card that he leaves but and have to droped;The legal documents of law court or administration because can not find defendant or administrative counterpart have to " bulletin " be sent to, bulletin and " not up to " is situation about often having, for it is most of by the unit of " bulletin " or citizen for it is obvious very unfair;Between government offices, social public unit and citizen still based on papery letter postal & communications, not only overspending postage and exist delay, misdeliver, leaking and send phenomenon to cause unnecessary loss.
With flourishing for ecommerce, Network Security Issues become increasingly conspicuous, wherein most importantly identification problem.It is hard to guard against because fraud is to emerge in an endless stream caused by the virtualization of network identity.There are Authentication Questions in unit and citizen.Unit is as a social activities main body, and oneself has the administration for industry and commerce and authorities to disclose its identity information, other people want identify its true identity it is relatively easy.But unit is if it is desired to web handling business is, it is necessary to which oneself actively identifies its unit identity to other citizens, unit or other systems, and under existing information systems, limitation is very big.
The authentication of citizen, is always a great social problem, and key therein is that resident identification card fraud fails to be solved always.Although with the more high-tech content, second generation identity card that anti-counterfeiting performance is more excellent has been changed in the cut-off end of the year 2008 whole nation substantially, identity card is faked not to be stopped all the time.The more excellent key technology of second generation identity card anti-counterfeiting performance is that identity card includes IC-card, the identity information of its memory storage is all by data encryption, only special identity card reader could read IC-card and include information, thus the true and false of identity card need to can only be tested out by identity card reader.A lot of bank card swindle cases show that identity card is faked and occurs in that new trend:First steal, steal and buy or defraud of certain citizenship information, then manufacture one with
Citizen ID certificate card information carrying breath is just the same or is only the false identity card that photo is changed.What is more, and the IC-card of true identity card is replaced or copied in false identity card, false identity card surface information is consistent with IC-card readable information, is only that portrait is changed.The duplicity that this kind of identity card is faked is very big, as long as some link of authentication process itself does not have in place, such as without strictly by checking guidelines(The system phenomenon that performs practically no function is very common)Or photo is not checked carefully, it will be deceived.In terms of long-range visual angle, data encryption system is also not unbreakable, because all AESs are disclosed, attacker once obtains key, and corresponding plaintext value is directly obtained with regard to that can decrypt ciphertext data.Obtaining the method for key has a lot, and most straightforward approach is to seek the leak of key management, and the method for obtaining key by cryptanalysis is the thing that can also accomplish with personal strength.If the key of digital anti-counterfeiting system is cracked or stolen, also a built-in IC-card in false identity card, input with regarding the reading identical true identity information of information or to input only be the different real information of other identity informations of photo, so as to be read and shown by common identity card reader, that is, carry out identity card " clone ".Such identity card of " clone ", depending on reading, machine-readable can not be recognized substantially.And for the identity card of personal photo also identical " clone ", even if the exception of false identity card can not be found by being ask with current technology by network Check.If criminal gains true identity card by cheating and carries out IC card of ID card and replicate to make personation identity card, or directly steals if other people real identity card pretends to be use, machine-readable or network Check is ask whole failures.At this moment what can uniquely be checked on is to distinguish degree of conformity to photo and the naked eyes of true man's shape of face.Can be due to that an identity card useful life can be 20 years even longer, shooting the age, photo is only with the naked eye distinguished and the degree of conformity of true man earlier, by the influence such as work ethos state, accountability, resolving ability and dressing of identified people for distinguishing people, accuracy is very unstable.In other words, it is cheated risk objective reality.Especially the even network that is consistent all is checked in other identity informations to veritify in the case that information is consistent, visually will also tend to " naturally " and think that photo has no problem.So, faked once there is this high-tech identity card, potential safety hazard is huge.
" national citizen ID certificate number Check askes service centre " completed will be set up in the end of the year 2006 in the Ministry of Public Security, and whether the name that can inquire about citizen is consistent with ID card No., and then verifies the true and false of identity card.Mobile or UNICOM user spends 5 yuans just to inquire about, and when information is consistent, photo can be seen with Check with the password in short message.This inquiry meets the checking demand to identity card on surface.But if making false identity card using above-mentioned true ID card information, only by judging the identity card true and false to name and ID card No. relevance, it is clear that be inadequate.And if photo on true identity card shoot it is of the remote past so as to which it is difficult to distinguish the true from the false with holding the actual looking of pretended witness in the case of, this querying method can not only veritify the identity card true and false, and identity card of granting the leave on the contrary drapes over one's shoulders the bigger camouflage of last layer.Furthermore, allow arbitrary people to inquire about easily without distinction the infologic linkage relationship of ID card No., name and photo, it is clear that also to lack prudent, be difficult to ensure some of which person of harhoring evil intentions to illegal utilization.After all,《Residential identity demonstration》Strict limitation also has been made to the police Check situations for testing citizen ID certificate.Preferably situation is:By systems and Technology design, it can require to distinguish " proper " and " improper " demand to checking the specific citizen ID certificate true and false, " improper " Check core demands are blocked in outside information Check core flows.And should public good and free completely for " proper " Check cores demand.
In terms of above-mentioned citizen ID certificate fraud situation, identity card fraud is checked, prevention citizenship information leakage is an importance.There are two large problems in existing second generation identity card information indicating structure:One is necessary two when needing to duplicate identity card
Face is duplicated, waste of resource.Two be that after identity card is duplicated, personal whole identity informations are completely exposed, and usurps personal information data to scheme agaainst the law provide convenience to criminal.True identity information is easily obtained, with the information on identity card be completely exposed without it is any masking and do not differentiate between occasion need arbitrarily require and arbitrarily agree to duplicating identity card have substantial connection.
For problem above, with existing wan technology, computer technology, the communication technology, database management technology etc., an information networking total solution is proposed, in the absence of technology barrier.Proposition, implementation and the operation of such information networking total solution, will obtain huge economic benefit and social benefit.
The exchange of citizen's information and the participation for making full use of too busy to get away unit, unit information exchange and make full use of concern wider, there is that relation is more complicated, pending problem is more.System constructed by patent of the present invention is built upon on the identity card of public security department and registered permanent residence management system basis, it is intended to be easy to the practice and extension of this patent.The unit information problem that is related to, belong to the system framework and can solve the problem that or should solve, just solve it, it is impossible to solution, just simplification, or avoids it.Although this is also why patent of the present invention mainly solves the problems, such as citizen's information requirement, the information inquiry of unit, Check is directed to test, show and information interchange and Authentication Questions, but patent of the present invention is still with a kind of " Citizen information management system method " using names, rather than the reason for using more major concept.
The three, content of the invention
(one)The general idea of technical solution of the present invention
For case above, present invention aim to propose a comprehensive solution by computer network system to problem above, with realize authentication, citizen or the unit information of citizen or unit include its identity information can Check ask, can check, can show, citizen or unit information communication and true, convenient and quick, raising citizen or the unit information level of resources utilization used.
The problem of carefully investigating foregoing to be solved, it can be found that citizen or unit(Hereafter referred to collectively as main body)All be both information hair survivor, be the recipient and user of information again.Information environment residing for each main body is made up of level and the mutually different various information system of scale.Various information system(It can be understood as all departments, every profession and trade, the types of databases system of constituent parts)All producing or changing related to main body or incoherent information daily.The information that the information related to main body and main body itself are produced in various information system is referred to as main information, and the set of all main informations constitutes main information resource.Each main body is using main information resource as the information interchange relation that multi-to-multi pair is formed between object.
The technical scheme that the present invention is realized is based on existing public security organ's citizen ID certificate and residence management information system, to set up nationwide citizen's information management platform(Call in the following text " citizen's information platform "), including Citizen information management system, information service system and mail box system.Citizen information management system manages identity card related service and E-mail address distribution.Information service system possesses the management functions such as integration, classification, index, the statistics of citizen or unit information and provides the application services such as inquiry, examination, displaying, authentication, the retrieval of citizen or unit information.Mail box system provides the services such as E-mail address, online exchange, society tune Check, issue bulletin, releasing advertisements by E-mail address website.Citizen information management system distributes a lifelong legal E-mail address freely used possessed from birth, its mailbox transmitting-receiving account number to each citizen(Finger is exclusively used in receiving and dispatching mail
Mailbox account number, similarly hereinafter)It is set as citizen ID certificate number, can not changes, its mailbox logs in account number(Refer to the mailbox account number for being exclusively used in opening E-mail address, similarly hereinafter)Citizen ID certificate number is initially set, but account can be changed.Citizen E-mail address as individual citizens information " collecting and distributing base ", the chaining service provided by information service system, integrating each citizen and being dispersed in beyond citizen's information platform includes the sorts of systems of bank, social security, medical treatment, house, traffic, water power etc.(Call external system in the following text)In on all kinds of personal information resources of its own, with all kinds of personal information documents(The link of substantially all kinds of personal information)Form presented in mailbox, citizen its all kinds of personal information document can be consulted or externally displaying operation.Citizen information management system also sets up the legal E-mail address freely used to all kinds of units, to facilitate between all kinds of units, the information interchange between citizen between unit and citizen.The mailbox transmitting-receiving account number and mailbox of unit log in the number that account number is initially set as the unified organization mechanism code in the whole nation, after unit mailbox is opened, and mailbox transmitting-receiving account number immobilizes all the time, and mailbox logs in account number and can changed.The legal E-mail address of unit, substantially it is as good as with citizen E-mail address, " the collecting and distributing base " of unit self information can also be turned into, its chaining service that can also be provided by information service system, unit is integrated to be dispersed in including all kinds of unit information resources in all kinds of external systems such as identity, bank, house, traffic, water power on its own, with all kinds of unit information documents(Personal information document in the link of substantially all kinds of unit informations, unit information document and foregoing citizen's mailbox is referred to as user profile document, similarly hereinafter)Form presented in mailbox, unit its all kinds of self information can be carried out Check read or externally displaying operation.There is the figure seal with electronic mail relevance in mail box system, the mail of figure seal is covered, any change of its content can cause the significant changes of seal graphics.Second generation identity card layout is improved; add two ID card verification codes and layout has been re-started to part identity card presentation of information; identity card is fitted into a kind of identity card information protective cover, shown so as to the ID card information by " basic ", " common " and " complete " three kinds of ranks.Corresponding improvement has also been made to IC card of ID card read write line, for the ID card information of three kinds of ranks, read write line is read into authority according to " basic ", " common " and " complete " three kinds of IC card of ID card and divides into three types, and each type adds ID card verification code, identity card password and identity card network verification number information and compared and somatic fingerprint identification function.The need for ID card information is read the storage of authority subregions according to foregoing three kinds and shown by three kinds of ranks with to adapt to it by the ic cards that identity card is included, in addition, identity card ic cards also stored for identity card chip serial number, identity card password and two human finger Pattern information, and the identity card network verification number information that identity-based card read write line is carried out is stored respectively by read write line type, wherein home address, identity card password and two human body fingerprint informations can be authorized a change by legal, the identity card network verification number information that the identity-based card read write line stored respectively by read write line type is carried out refreshes with the increase of network verification number of times, other identity informations can not be changed.IC card of ID card is also reserved with information memory space, and expansible employee's card, driver's license, mass transit card, medical card, social security card, bank card etc. is applied, so as to realize one card for multiple uses.Each citizen or unit directly can pass through certain its digital certificate U-shield that check-ins from citizen's information platform management organization(Include the digital certificate of citizen or unit identity essential information)Applied to all kinds of authentications in citizen's information platform.
Constructed citizen's information platform can realize following ten binomials function:(1) mail or two-way, intercommunication in real time or video call are carried out by network between unit and citizen between communication function, i.e. unit, between citizen;(2) information Check askes function, i.e. unit or citizen can inquiry be present in the information on oneself in other information systemses in the E-mail address of oneself in citizen's information platform;(3) information displaying function, i.e. unit or citizen by call and show in the other information systemses mutually independent with itself on the information such as itself identity, credit, assets give other units or citizen, the information such as oneself true identity, credit, assets are proved as third party with realizing;(4) identification verification function, the identity network checking of information service system i.e. in citizen's information platform or identity-based demonstrate,prove the identity card network verification of read write line, and whether the true and false and holder that can directly verify true identity or checking identity card are the identity card owners;(5) business operation function, unit or citizen are in the E-mail address of oneself, and footpath is linked by information service system and external system, the business operation of correlation are handled, such as realizing funds transfer to the business operation of capital account;(6) Information Statistics function, such as to all kinds of units or citizen in the quantity in different time, place, the statistics of composition index;(7) investigation on the net function, can be made special topic to all tune Check objects and adjusted Check with one-to-many, change traditionally can only sample investigation limitation;(8) Check looks for function, by citizen's information platform, searches for and finds in the legal E-mail address address list that all kinds of E-mail addresses with organization and citizen's naming can be announced on platform;
(9) releasing advertisements function, you can to make full use of the exclusive unit of citizen's information platform and natural person's resources advantage, ad distribution region is set up by administrative region level or community type;(10) information issuing function, i.e., all kinds of social administrative authorities can be by the mail box system information advertisement in platform to specific or nonspecific object publishing information, and citizen's information platform can provide much information issuing service;(11) real-time dynamic monitoring function, under statutory authority, by the background system of citizen's information platform, can monitor the movement track of specific citizen, so that arresting suspect for public security organ provides convenient;(12) decision assistant function, citizen's information platform utilizes the technologies such as advanced data fusion, data warehouse, data mining, profound analysis and excavation are carried out to the data message of citizen or unit information resource system, are that National Macroscopic and micromanagement decision-making provide auxiliary and supported.On the basis of function above, it is possible to use advantageous nationwide units and citizenry resources advantage develops various network platform services, such as E-business service, news report and films and television programs Video service etc..
Citizen information management system that citizen's information management platform is included, information service system, mail box system take centralized architecture, unified management mode.Citizen information management system, which has, to be adjusted Check, statistics and the excavation about data message, the function such as sorts out, analyzes, handling, collecting, and is that National Macroscopic or microcosmic decision-making provide Added Management support.Citizen information management system builds citizenship information database based on the citizen ID certificate of public security organ and household register information system, opportunity can expand unit identity information database when appropriate, store finger print information, household register information that citizen ID certificate information, human body both hands ten refer to, the authentication information of the basic identity information for all kinds of units that are also stored with when opportunity is appropriate, record citizen or unit.Information service system links the information for concerning citizen or unit in sorts of systems based on citizen and unit information data, all kinds of index data bases of citizen or unit information are set up there is provided information retrieval, authentication and by mail box system to citizen or the Check of unit information is ask, Check is tested, shown service.Mail box system provides citizen or unit mailbox service, mailbox address book by mailbox website
Service and online exchange information service.To ensure Dynamic data exchange, secrecy and the safety of citizen's information platform and other external information systems, the safety measure such as fire wall, access rights and password between netting should be set up between citizen's information platform and other all kinds of external information systems, the method that information transfer all should use advanced encrypting and decrypting between net, prevents divulging a secret in data transmission procedure.
(two)Identity card and its Curve guide impeller for including IC-card
Easily obtained for true identity information, criminal often makes the existing picture for palming off identity card using true identity information, patent of the present invention, which is contemplated, divides into identity card card information carrying breath basic identity information and the relative identity information maintained secrecy.By E-mail address website, generally only need to show basic identity information, the purpose of true identity is tested with regard to Check can be met, the identity information that in particular cases just supplement examination ID card verification code, home address etc. maintain secrecy relatively.The unit of the identity information of relative secrecy is tested for the Check that is necessary and has the right, it there should be the strict regulations that prevention is divulged a secret for the security system of identity information.In this way, the difficulty that criminal will obtain a complete true identity information is greatly improved, so that the anti-blocking identity card fraud on source.For this reason, it is necessary to be improved design to the existing identity card space of a whole page.
On the basis of existing No.2 residence card(The method for packing of length and width size, profile, pattern, texture, font, font and the size of identity card, material and IC-card is constant)Two ID card verification code information are added in identity card, increase " resident identification card " five word above the photo position of identity card, and the projects such as name, sex, birthdate, nationality, ID card No., issuing authority, data of issue and period of validity are imprinted on identity card front, home address, two ID card verification code information are imprinted on identity card reverse side.The special adhesive plaster that home address and two ID card verification code information are coincide using outward appearance textured pattern and identity card covers(It can repeatedly open, cover), the special adhesive plaster back side can stamp shielded information position indication character so that this three identity informations just do not show and can not duplicated when unnecessary.If not using special adhesive plaster to cover, identity card can also be inserted in a kind of identity card information protective cover, reach same purpose.The identity card information protective cover; system has anti-wear, antifouling, waterproof, the safe slash pocket of transparent identity card of fire-proof function using what transparent plastics material was made; just there are three opaque adhesive tapes to the position of ID card verification code and home address on protective case surface; it can repeatedly take off, cover; so that this three identity informations just do not show and can not duplicated when unnecessary; and when needing to show or duplicate this three identity informations; identity card need to only open the opaque adhesive tape on protective case surface without being extracted from protective case;The word that shielded information position is printed on the opaque adhesive tape back side on protective case surface is indicated.
Newly designed, ID card information can be shown according to " complete ", " common " and " basic " three kinds of levels of information by the above identity card space of a whole page." complete " information, finger display display information outside the identity card in addition to second group of ID card verification code, " common " information, finger display display information outside the identity card in addition to ID card verification code information, " basic " information, refers to display information outside the identity card shown in addition to ID card verification code and home address.
The contained data of issue in identity card front and period of validity are represented in 7 position digital coding modes, are adjacent to behind issuing authority's title and are shown;Days, daily amounting to six bit digitals with two digits represented separately have one-bit digital to represent useful life;Directly numerically, capital X is represented 10 years less than 9 time limits, and Y represents that Z represents long-term 20 years.
Described ID card verification code has two groups, and every group of 9 bit digitals, 8 identifying codes additional bit check code is automatically generated when tying up to the identity card provided or more renewed every time by Citizen information management system.First group of ID card verification code can be used for the identity network checking of information service system and identity-based demonstrate,proves the identity card network verification of read write line, and second group of ID card verification code is served only for the identity network checking of information service system.ID card verification code produce method be, the random number produced during by ID card No. and hair fastener generates 16 bit digitals by asymmetrical encryption algorithm, the first group of ID card verification code for taking preceding 8 bit digital to obtain being formed 9 after bit check code is added to 8 bit digitals by verification computing, the second group of ID card verification code for taking rear 8 bit digital to obtain being formed 9 after bit check code is added to 8 bit digitals by verification computing.Common identity network checking, such as online game real name verification, ticket real name verification only need to use first group of identifying code;Second group of identifying code is just needed to use to carry out identity network checking in application systems such as finance, customs, airports.Because second group of identifying code access times is few, adding identity card read write line can not show, privacy degrees can be higher than first group of identifying code, so as to reach ID card verification code hierarchical security effect.
IC card of ID card can store the expanded application information within identity information and 10.Fingerprint information in identity information includes two conventional hand finger print datas, and warp-wise citizen information platform management organization application if necessary can be replaced by other hands and refer to Pattern data.Home address and identity card encrypted message in identity information can also the application of warp-wise citizen's information platform management organization and change.The ID card information of one of three kinds of ranks can be read in IC card of ID card according to different mandates and can only be read by citizen's information platform management organization by the identity card read write line of three types mandate, expanded application information can be read by the card reader equipped with respective application system management authorization module.
(three)The authenticity verification of identity card and the legitimate verification of holder
Newly design is adapted with the identity card space of a whole page, corresponding improvement has also been made to IC card of ID card read write line, for the ID card information of three kinds of ranks, by read write line according to " basic ", " common " and " complete " three kinds of IC card of ID card read authority and divided into " basic ", " common " and " complete " three types, every kind of read write line is merely able to show one of three kinds of ID card information ranks, with applied to different industries, the identity information acquisition of different occasions needs, " complete " type shows display information outside identity card in addition to second group of ID card verification code, " common " type show except ID card verification code information in addition to identity card outside display information, " basic " type show except ID card verification code and home address in addition to identity card outside display information;In IC card of ID card in addition to three kinds of rank ID card informations, the other information contained by it can not be shown by identity card read write line.
With " basic " of ID card information in IC card of ID card, " common " and " complete " three kinds of display levels are adapted, " basic " is set in IC card of ID card, " common " and " complete " three kinds of IC-cards read authority, display information outside identity card in addition to ID card verification code 2 is stored in three regions with different rights in IC card of ID card, first region storing ID card " basic " information, can be by " basic ", " common " and " complete " three kinds of authorities are read, content in Two Areas storing ID card " common " information in addition to identity card " basic " information, it can be read by " common " and " complete " two kinds of authorities, content in 3rd region storing ID card " complete " information in addition to identity card " common " information, it can be read by a kind of " complete " authority.
Multiple encryption authorization module interfaces built in identity card read write line, can install identity card read-write authorization module, identity card read write line is read and write ID card information according to one of three kinds of ranks, and identity card read-write authorization module is provided by public security department;The authorization module of expanded application system can also be installed, identity card is expanded applied to other operation systems, the authorization module of expanded application system is authorized by the corresponding administrative department of other operation systems through public security department to be provided.
Identity card read write line is in offline state(Finger is not connected with information service system)It is to the verification step of the identity card true and false:
(1) identity card can by read show, can then show from IC card of ID card read information passed through read write line in ID card information authorization module checking;(2) whether read write line display information is consistent with corresponding identity card appearance information.Identity card property the same outside and inside is examined, is taken precautions against to identity card malice " changing core " behavior." changing core " is that a kind of most indiscernible identity card is faked, i.e., identity card surface information is genuine or is only that photo is false, and the IC-card that identity card is included is replaced with the true IC card of ID card of another natural person or its copy card.
Identity card read write line has for the legality identification method of identity card holder in offline state:(1) naked eyes compare identity card surface photo, read write line and show photo and the degree of conformity of true man three;(2) can the identity card password that be input to read write line by the password authentification of IC card of ID card;(3) be input to read write line somatic fingerprint information whether with somatic fingerprint information matches in IC card of ID card.Card reader of ID card is separate to the three above authentication function that holder legitimacy has, and can be used alone, and can also be used cooperatively.
Information service system sets up identity card network verification number counter respectively for the identity card read write line of three types, the checking number of times for carrying out respective type after identity card network verification by a type of identity card read write line every time adds 1, also the current value for the identity card network verification number of times made based on all types of identity card read write lines is stored in IC card of ID card respectively, is by the identity card network verification method of identity card read write line:The current value that the identity card read write line reading identity card IC-card of any type includes ID card information, somatic fingerprint information and checking number counter that information is shown including read write line is sent to the network comparison that information service system carries out the identity card true and false, and comparison content is identical, and the respective type counter of information service system adds 1 and refreshes the numerical value of same type of network verification number of times in IC card of ID card.
For the life problems of IC card of ID card repetitive read-write, solved by reserving scattered memory space in IC-card.
It is to the network verification method of identity card holder's legitimacy by identity card read write line(1) the identity card password for being input to read write line is sent to information service system, carries out identity card password authentification;(2) the somatic fingerprint information for being input to read write line is sent to information service system, carries out somatic fingerprint information matches.Human finger line information can be any finger or whole ten fingers in ten fingers.
The difference for the ID card verification that the identity card network verification by identity card read write line made based on citizen's information platform system is carried out with the identity card read write line by off line is, the former can have found to forge, clone or usurp the situation of citizen ID certificate IC-card in time by setting up identity card network verification number counter, so as to fundamentally preventing the forgery of citizen ID certificate IC-card, clone or usurp.
Falsely used or IC card of ID card is replicated if identity card is lost, only need to arrive citizen's information platform management organization and handle identity card and report the loss, get new identity card, original identity card is can not be by identity card network verification, thus can not be continuing with;If other people are palmed off using true identity information or replicate an identity card and its IC-card included, but because identity card network verification number information is stored in information service system, fake producer can not know to cause the identity card from by network verification.Under most extreme case, counterfeiter has grasped whole identity informations such as identity information, identity card password, identity card network verification number of times, true and false identity card is just the same in some time point, it cannot distinguish between, so true and false identity card passes through network verification for one wherein, change after identity card network verification number information, another just can not necessarily pass through network verification.Caused result is, or true identity card always can be normal through network verification, and palm off identity card always can not be by network verification, or personation identity card has passed through network verification, and true identity card in network verification in the case of, lawful bearer can rapidly alarm and report the loss, so as to prevent the use of personation identity card within the shortest time.Although it is relatively easy to grasp personally identifiable information(Increase in identity card after ID card verification code, grasp nor easy thing to identifying code), but want grasp identity card network verification number information be nearly impossible thing so that above-mentioned IC card of ID card anti-counterfeiting technology is fool proof.
As for the inspection to identity card holder legitimacy, in the high occasion of safety requirements, identity card password authentification can be required, require to refer to Pattern Information Authentications into pedestrian's body again.It should be particularly noted that the Ren Ti Zhi Pattern Information applications scopes in IC card of ID card should give strict regulations by administrative regulation or administrative rule, for the business operation of the material particulars such as cash in bank drawing, remittance, identity card password authentification should mainly be used, it can coordinate using the identification checking of somatic fingerprint information, Ren Ti Zhi Pattern Information Authentications are never can be used alone, this is mainly due to the consideration of maintained secrecy to personal finger print information needs and personal safety.
(four)Identity network is verified
The identity card newly enabled, should be by the initial identity information of identity card(Include the identity card network verification number of times of chip serial number, ID card No., ID card verification code, current value contained by name, IC card of ID card)Preserve, referred to as the identity information initialization of identity card, could be formally used in the IC-card of citizen's information platform and identity card simultaneously;If it is desired to enable identity card password, two fingerprint information comparison functions in identity card, application, examination & verification should be handled by the management organization to citizen's information platform and enables formality, this two function could be individually or simultaneously open-minded.
The modification of identity card password should be carried out by the identity card read write line of networked information service system, and operating procedure is:(1) Old Password is verified;(2) new password is set, and the secondary input read write line of new password examines identical, and read write line is changed by information service system to citizen's information platform application password, after password is successfully modified, and read write line writes new password in IC card of ID card.
If the fortuitous events such as power-off occur suddenly when changing identity card password, cause identity card password write-in and information service system password preserve one end effectively, one end failure, the identity card will not pass through line verification, in the case, and holder should arrive public security organ above county level(Or citizen's information platform management organization), the identity information initialization business of identity card is handled, identity card ability JH is often used.
Interface is veritified by the identity of information service system, unit identity network checking can be carried out, its method is:Using unit digital certificate U-shield, input " unit full name or unit mailbox transmitting-receiving account number+unit digital certificate U-shield password " can complete the authentication of unit.
Interface is veritified by the identity of information service system, can carry out the method for citizenship network verification has three, and one is input
" name or ID card No.+ID card verification code 1 " and " identity card password ", two be input " name or ID card No.+ID card verification code 2 " and " identity card password ", three be to use citizen's digital certificate U-shield, input " name or ID card No.+citizen's digital certificate shields password ", citizenship network verification can be completed;Interface can be veritified with the identity of embedding information service system in the other application system such as bank, telecommunications, carry out identity network checking, after being verified, application system can be obtained according to the default citizenship information needed suitable for the application system of the rules such as administrative regulation, administrative rule or personal information owner mandate.
Citizenship information type acquired by application system from citizen's information platform, it can be one of ID card information of three kinds of ranks, can also include the integrated information of employee's card, driver's license, academic title, educational background, household register information etc., the need for being suitable for application system and through personal information owner agree to or have administrative regulation, administrative rule mandate be principle.So that each application system can specification and reasonably utilize personal information, be unlikely to there is personal information to be abused, illegally using anxiety.It is easy to carry out the identity real name system of all kinds of business, such as mobile phone identification policy, online game system of real name, ticket system of real name.
Authentication service is embedded into all kinds of operation systems, realize and closed with all kinds of operation system Jin Said, whole core Check processes are automatically performed in transacting business, manual intervention is not needed, also the operation flow and custom of each system will not be changed, the efficiency of each system business process can be greatly improved.
Identity information Check above is ask and verification method, due to authorizing display in accordance with the law or being carried out in citizen oneself authorization, so as to ensure that legitimacy, necessity and the legitimacy of identity information Check inquiries in system and in technology.It overcome the foundation occurred in society in " NCIIS " Basis of Database by network or mobile phone mode to ID card information easily can Check, Charge and query, excessive Check ask the drawbacks of.The Check proved recipes method and cover the examination of basic identity information and special identity information(Such as driver's license, all kinds of professional operation cards, educational background, credit etc.)Examination.So as to thoroughly solve the problems, such as the proof of basic identity and the proof of special identity, that is, the problem of solving " whom holder is " and " whom is ".This provides technical support for " accepting and believing " of sincerity society.
Banking system is used for the careful Check that account opens, reports the loss and accessed using above-mentioned identity card network checking method, and the notifying messages of institute's transacting business are sent in the mobile phone and E-mail address of the citizen, mailbox user is notified in the very first time, the phenomenon generation demonstrate,proved and open or report the loss account and false claiming deposit that claims the identity of others fraudulently can be prevented, so as to avoid all kinds of frauds related to this.Open or report the loss account and other business carry out this network identification card Check and tested, mailbox user can know oneself identity card service condition in the very first time, whether there is and falsely used by other people, once note abnormalities, it can immediately report a case to the security authorities, can effectively prevent the generation of identity card all kinds of unlawful activities caused by falsely using.This identity card network verification method will negate thoroughly bank and other financial mechanism to " identity
A card negative shape formula examines Check, does not bear and discern the false from the genuine responsibility " excuse, it can be ensured that depositor's withdrawal and report the loss it is safe and reliable.Application of the identity card network Check proved recipe methods in banking system, it is ensured that the implementation of bank account system of real name, it is ensured that bank account treasury trade is all traceable, will not to go to fund not in invisible because of certain account's undeserved reputation.
(five)Information service system
Information service system connection provides all kinds of external systems of unit or personal information, including information resource system and business application system, wide range of information projects index or classified index database are set up for various units or personal information, for unit or personally identifiable information retrieval and the service of statistics;The authentication of unit or individual are provided by Citizen information management system;Unit is provided by mail box system or personal information classification Check is ask, classification is checked, classification shows service;Pass through the application system for information service party in request(Mail box system including this platform)Information service insertion module is provided to provide foregoing information service.Such as in bank application system, embedded authentication module carries out identity network checking, for opening a bank account, the development of the business such as cancellation.
(six)Mail box system
Mail box system provides independent network storage space for mailbox user, and user can set gradation directory, the various documents that storage user sets certainly certainly(Call customer documentation in the following text);Customer documentation or user profile document in mailbox can independently set up password by user as needed, customer documentation can set up pass Zhen with user profile document and link, pass through the association link building on customer documentation, user profile document can be opened, by the association link on user's information document, the customer documentation of association can be opened.In this way, mailbox user can make a summary for user profile document content, edit etc. and arranging achievement and be placed in customer documentation standby Check.
E-mail address user can be defined as showing document to required user profile document, be numbered, and set displaying password;Mailbox user is when needing to show the user profile document, in unit or personal information displaying interface in mail box system, identity network checking is carried out to unit or citizen first, then input again " document code, displaying password ", it is possible to check or show unit or personal information(Including identity information).This method can be completed by online computing or surfing Internet with cell phone, and when needing the contents such as displaying personally identifiable information, citizen need not open E-mail address and can be achieved with, and mailbox other information can be avoided exposed.In the case where individual leaves behind identity card, the true identity of oneself can be proved by the method.This brings great convenience to traveller's hotel ccommodation.
In mail box system, unit or citizen are logged in after mailbox, required user profile document can be chosen, Check reads or the user profile document links for setting timeliness is supplied into the unit in this mailbox system or the target mailbox of personal information party in request by mail box system after authentication, and the user profile document links can also be transmitted to the other target mailbox specified.It is such as authorized that the ID card information of certain citizen is sent to by law court by citizen's information platform, just pleadings is received on the net, is put on record on the net there is provided condition for law court.The Check verification certificates position or the method for personal information that this is provided by authorizing by citizen's information platform as third party can at utmost prevent network fraud.
E-mail address is embedded with online information AC system, except what general chat system had with one-to-one private chat or can apply
Outside friendly group chat, it is characterized in that having opened up unit, community and the chatroom set by trade classification throughout the year, personal management is provided with according to administrative grade, the whole real names of people of chatroom are participated in, the mailbox user of mutual " adding as a friend " can be by the personal information mandate of oneself(Ticked in the alternative frame of a certain user profile document)Other side Check is allowed to see self information in chat system(Identity information including itself).
The mail received and dispatched in mail box system can be designed to " online reading " and " downloading " form, e-mail sending may specify that the mail of transmission is one of two kinds of forms, and mail when receiving for " downloading " can be appointed as one of two kinds of forms by recipient;The mail of " online reading " can only be read by the special electronic e-mail management software of mail box system, it is impossible to be downloaded;The mail for being designated as " downloading " form can be by special electronic e-mail management software or the locally downloading storage of common email management software and reading.In this way, for the high mail of some confidentiality requirements, by selecting " online reading " pattern, can preferably take precautions against the risk that mail is divulged a secret.
Each E-mail address is provided with various mail templates, being write for various types of practical writing letters needs, and for the electronic mail with legal documents property, should meet law, laws and regulations requirement in writing form, it can visibly show contained content, it is possible to transfer look into use at any time;The content for original generation can accurately be showed, sending or receiving;Reliably it can ensure from ultimately forming, content keeps complete, is not modified, but mail may have some forms change such as the change of mail attribute during forwarding, storage and display;Communications content and formal any change can be found.Specifically, the electronic mail of legal documents property is transmitted during transmitting-receiving with ciphertext form, receive the mail seen mail side consistent with the communications content that sender generates, format and paper type, the figure seal associated with communications content can be capped on electronic mail, the figure seal is stored among mail box system in advance, any change of communications content will directly result in lid seal graphics significant changes;There are time and reception time that the mailbox transmitting-receiving account number and mail of word, mark and the sending and receiving letter side of citizen's information platform are sent in the mail received;Electronic mail can be automatically saved after sending successfully, it can download and separately deposit or show, print, time that word, mark and the mailbox of sending and receiving letter side transmitting-receiving account number and the mail of the communications content, format and the paper type that are preserved and citizen's information platform thereon are sent etc. can not be changed, otherwise will directly result in lid seal graphics significant changes.E-mail address can carry out Put on file as needed for the electronic mail received.
In mail box system, it set up A and the electron-like mailboxes of B two, A classes mailbox possesses for the administrative department of government offices' unit or each level of citizen's information platform, it can not receive the mail that the mailbox on other websites is sent, only receive the mail that the mailbox in this mailbox system is sent to, sender's mail for being labeled as " blacklist " by special email box, the dustbin that will be directed into mailbox, it is automatically cleared after the time limit of setting, and return to a receipt for pointing out sender's mail to be placed to dustbin, A class mailboxes possess all target mailbox to administrative administrative region or authorized region-to the one or one-to-many function of sending mail or SMS, target mailbox beyond its administrative administrative region or authorized region scope one-to-one can only send mail or SMS, target mailbox is unconditionally received, and the receipt of meeting auto-returned one " mail is own to be received ";B classes mailbox is possessed by the unit beyond A class mailbox users or citizen.
B classes mailbox, which receives mail state, can be divided into six kinds:" receive full detail "-, " information in reception system ", " receiving small sending bulk message ", " receiving non-sending bulk message ", " receiving friend information ";" receiving full detail " is to refer to receive all mails outside system and in system, " information in reception system " refers to only receive all mails in the system, including group mail, " receiving small sending bulk message " refers to mail in a reception system, exclude the non-good friend's group mail for exceeding and specifying more than number, " receiving non-sending bulk message " refers to mail in a reception system, the group mail of non-good friend is not received, " receiving friend information " refers to good friend's mail in a reception system, includes the group mail of good friend.
B classes mailbox user can by mail box system into the system mailbox user single-shot or group sending cellphone short message, but limited by target mailbox reception state, when the reception state of target mailbox is " receiving full detail ", " information in reception system ", mailbox user single-shot or group sending cellphone short message in the mailbox user acceptable system;When its reception state is " receiving small sending bulk message ", the SMS that mailbox user is sent in the mailbox user acceptable system excludes the non-good friend's bulk SMS for exceeding and specifying more than number;When its reception state is " receiving non-sending bulk message ", the SMS of mailbox user in the mailbox user acceptable system, but the group sending cellphone short message of non-good friend is not received;When its reception state is " receiving friend information ", the SMS of good friend's mailbox user, includes the group sending cellphone short message of good friend in a reception system.
The opening first of citizen E-mail address be handled application, examination & verification by the administrative department to citizen's information platform and enable formality, citizen E-mail address account number includes mailbox and logs in account number and mailbox transmitting-receiving account number, two class mailbox account numbers are initially set as citizen ID certificate number, after mailbox is opened, mailbox transmitting-receiving account number is fixed as citizen ID certificate number all the time, and mailbox logs in account number(Mainly it is made up of English alphabet, numeral, Chinese character)It can be changed through mailbox user application;Mailbox logs in account number once changing successfully, and it is to lose effectiveness that former mailbox, which logs in account number, and the newest mailbox set up can only be used to log in account number and password login mailbox.In this way, the E-mail address of each citizen is in relative confidential state.
The opening first of per-unit electronics mailbox be handled application, examination & verification by the administrative department to citizen's information platform and enable formality, per-unit electronics mailbox account number includes mailbox and logs in account number and mailbox transmitting-receiving account number, the number of the initial organization mechanism code for being set as that the whole nation is unified, after unit mailbox is opened, mailbox transmitting-receiving account number is fixed as the number of organization mechanism code all the time, and mailbox logs in account number(Mainly it is made up of English alphabet, numeral, Chinese character)It can apply through unit mailbox user and change;Mailbox logs in account number once changing successfully, and it is to lose effectiveness that former mailbox, which logs in account number, and the newest mailbox set up can only be used to log in account number and password login mailbox.
Mail box system can set unique one " the authorised representative's mailbox " for representing the unit under per unit E-mail address catalogue, titled with unit full name, department's mailbox of multiple ranks can be set up through the unit application, a number of post mailbox can be set up as needed per primary department;Department's mailboxes at different levels of unit can warp-wise mail box system management organization's application it is autonomous titled with the corresponding title of the department by unit.The legal E-mail address of unit and department's mailbox are both the instrument of foreign exchanges, are also the common platforms of internal institution information interchange;Person in charge can transfer, and department or position mailbox are constant, and the job information persistence in mailbox is stored in online historical archives as the department or position.
The E-mail address Directory service that mail box system is provided, the mailbox transmitting-receiving account number of unit or citizen are disclosed on the E-mail address website of citizen's information platform with title or name form, i.e. each E-mail address is titled with mailbox user real name or name, with corresponding mailbox transmitting-receiving account number " binding ", so that communication catalogue in E-mail address is directly shown with organization or the arrangement of citizen's name, national common electronic mailbox address book is formed;The E-mail address of unit is according to government offices, business unit(Including legal person, non-legal person enterprise, self-employed entrepreneur), public institution, social organization(Including legal person or juridical-person tissue)Sequence, by it is affiliated center, save(Including municipality directly under the Central Government, autonomous region, similarly hereinafter), city, county, township(Town)Administrative region is arranged;Citizen E-mail address address list, summarizes the legal E-mail address of citizenry in accordance with the law, according to the administrative region layout where civil domicile, i.e., province, city, county, township as belonging to civil domicile location(Town), street or administrative village administrative region layout, it is unwilling externally to announce the citizen on excessively specific residence ground for part, the application of warp-wise citizen's information platform management organization can be in units of county or city according to surname layout E-mail address address list, citizen can independently select one of two kinds of arranged modes, be defaulted as the first arranged mode;The E-mail address address list of citizen can also be according to unit layout, the application of per unit warp-wise mail box system can communicate the legal E-mail address combination of our unit the old and new worker under catalogue in same per-unit electronics mailbox, the E-mail address of worker both can externally be shown, it can also be only limited to show to our unit worker, externally concealment, display pattern is independently determined by employee;If different administrative regions is arrived in citizen's resettlement, or change work is to new unit, its legal E-mail address by according to new household register or new unit be arranged in new E-mail address communication catalogue in, but the mailbox still has in original communication directory listing and can normally receive mail, simply put on the explanation printed words of " resettlement " or " the sixth of the twelve Earthly Branches is through transferring ", its mailbox transmitting-receiving account being located in different mailbox catalogues is identical, still points to unique E-mail address;Mail box system provides the public address list in E-mail address by the arrangement of the sorting techniques such as industry, specialty for unit, the public address list in E-mail address by the arrangement of the sorting techniques such as industry, specialty, academic title is provided for citizen, each unit or citizen can be by submitting related documentary evidence to file an application to add in the mailbox address book of a certain classification to citizen's information platform management organization, it is intended to facilitate generic unit and the information interchange of crowd.
In the public address list aligning method in E-mail address more than, per unit or citizen can easily find the mailbox about administration in certain administrative region, and this is that unit or citizen handle relevant administrative affair and brought great convenience.For example when there is swindle on the net, as long as finding the public security organ of the administrative region or industrial and commercial machine-operated E-mail address, you can be complained or be reported.When needing payment of duty, only tax hall need to be logged in by the web site url shown outside the tax authority E-mail address of the administrative region, this causes virtual network world to realize docking for real meaning with real world, realizes the realization of virtual world.
Described unit or citizen E-mail address can enclose the recommended information of mailbox user through application, but its content should be passed through by the examination & verification of citizen's information platform management organization, for per-unit electronics mailbox also 1 with the external website through the application link unit.
The Jian of unit or citizen E-mail address, which opens method, two:One is that mailbox is opened after mailbox login account number plus mailbox login password authentication by being inputted in mail box system interface, and two be to use unit or individual digital U-shield, by opening mailbox after input " mailbox logs in account number+numeral U-shield password " checking.
Citizen's information platform set up with the SMS informing function of mailbox " binding " number, announced for system issue or
Send mailbox in real time to log in and identity card network authentication information, unit or citizen can independently select to open all or part of SMS notification service.
Each mailbox is before being crossed password login opening by a computer expert and being not turned off, any other computer can not all open the mailbox by password, attempt to open a mailbox having already turned on by password in the event of a computer, if Password Input is correct, system can point out " someone uses the mailbox ", and this information can be sent in the mobile phone for the mailbox user that Jian has led to Mobile Phone Short Message Service to warn at once.
Mail box system can be embedded in module by the authentication service from information service system and carry out identity network checking, the unit or citizen's mailbox user that identity network is verified can recover initial mailbox and log in account number or fetch current mailbox login account number, mailbox password recovery or the operation reseted, and user can open or disable the function in mailbox;Unit or citizen can log in account number or fetch current mailbox by applying to the management organization of citizen's information platform, according to certain initial mailbox of recovery that check-ins logs in account number, mailbox password recovery or the business reseted.
(seven)Operation Log and ID card verification say will
Operation Log and ID card verification daily record are set up in citizen's information platform, Operation Log includes relevant user information operation note in mailbox login record and mailbox, login record is comprising the total degree for logging in mailbox and logs in computer IP address and login time, if surfing Internet with cell phone is logged in, then record phone number, mailbox user can be by checking that Operation Log finds improper login mailbox in time, relevant user information operation note in mailbox, the operation such as tests and shows comprising mailbox password modification, the inquiry of user profile, Check;ID card verification daily record logs in computer IP addresses and login time comprising the ID card verification number of times corresponding with three kinds of identity card read write lines and checking, mailbox user sees ID card verification daily record by Check, can find identity card whether there is in time and be usurped or " clone " by other people;Operation Log and ID card verification daily record can realize the tracking to " movement track " of specific citizen.
It is that legal office sets up Check and sees daily record in citizen's information platform(Operation Log and ID card verification daily record)With the special account of citizenship information, only legal office(Public security organ or procuratorial organ typically above the provincial level)Could be opened by the written authorization to specific post system programmer, and different type and rank legal office have the right open scope provide in accordance with the law.
Beneficial effects of the present invention, conveniently and efficiently Check is ask, Check is tested, shown for single citizen just realized or unit information, ID card verification and information interchange, prevention identity information divulge a secret, prevent forged identity card target from the point of view of Social benefit and economic benefit oneself be very huge.The mailbox website 12 big function foregoing by realizing, integrates existed system, has constructed citizen and unit information is shared and intercommunion platform, actually constructed the foundation engineering of national information construction.Supported to accelerate informatization and every business innovation to provide network environment.Information interchange and information sharing to the whole society, social Credit Construction, population management, the informatization of social security and all trades and professions and eliminate in terms of information resources repeated construction all there is powerful impetus, economic benefit and social benefit are huge.
Four, are illustrated
Fig. 1, is citizen's information management platform structural representation.Citizen information management system manages citizen(Unit)Identity information.Information service system provides authentication service.Mail box system(Website containing mailbox)Mailbox management, online exchange are provided.Business management systems at different levels mainly manage identity card granting and the distribution of E-mail address.Application system refers to the various application systems using authentication service.The network terminal, which refers to, can log in each Terminal Type in mailbox website.
Fig. 2, is that identity card protective case front view does not seal status architecture schematic diagram.Including cover page tongue plastic material part 1, cover page tongue waterproof gummed paper part 2, protective case insert port 3, protective case front 4.Wherein, cover page tongue plastic material part 1 coordinates cover page tongue waterproof gummed paper part 2 that protective case can be fully sealed, and it is possessed water-proof function.Protective case insert port 3 is identity card insert port.Protective case front 4. is fully transparent, and identity card front elevation can show and duplicate completely.
Fig. 3, is the structural representation that identity card protective case rearview has sealed state.Including protective case reverse side 5, home address masking tape 6, ID card verification 1 masking tape 7 of code, ID card verification 2 masking tapes 8 of code.Wherein, protective case reverse side 5, be beyond masking tape being capable of Transparence Display ID card information part.Home address masking tape 6, indicates home address display location.The masking tape 7 of ID card verification code 1 and the masking tape 8 of ID card verification code 2 indicate the display location of ID card verification code.Three adhesive tape can respectively be taken off, cover.
Fig. 4, is identity card protective case use state schematic diagram.Identity card positive information is all shown, it is possible to duplicated.
Fig. 5, is 1 schematic diagram of identity card protective case use state.Identity card reverse side information is all shown, it is possible to duplicated.Fig. 6, is 2 schematic diagrames of identity card protective case rearview use state.Identity card reverse side by three adhesive tapes covers situations about the information of ID card verification code and home address.
Fig. 7, is the structure chart of identity card read write line.Including radio frequency unit, display unit, memory cell, keyboard unit, fingerprint unit, safe unit, communication unit, control unit.
Radio frequency unit:Realize that the wireless messages for including IC-card with identity card are exchanged by RF modes.
It is aobvious not single towering:Using color LCD, ID card information and other information can be shown.
Memory cell:Character library is stored, for the reading character pattern information when display unit shows character.
Keyboard unit:Numerical value or password can be inputted.
Fingerprint unit-Ren Ti Zhi Pattern can be gathered, human body Shou Zhi Pattern comparisons can be carried out.
Safe unit:Various authorization cards can be installed.
Communication unit:For connecting computer.
Control unit:Other units are managed, the reading of identity information, identity certified offline is mainly realized and network of network authentication is connected by computer.
Five, embodiments
The former citizen ID certificate of fusion public security organ of citizen's information platform management organization and household register information management organization, are managed by center, province, city, county, hierarchical community.More than county management organization using corresponding business management system management identity card granting,
Maintenance, card reader of ID card, authorization module granting and E-mail address distribution.Community organization can apply the other business management system of community-level, authorize community workers to manage all kinds of group chat rooms, can be made an announcement IP days rooms, the commercial affairs such as Check or social management service are adjusted in advertisement and progress society.
The phenomenon that personal information is betrayed, sells and revealed is very serious in the whole nation, causes the extensive concern of compatriots, but never finds the method for radical cure.The existing channel of protection personal information is mainly legal protection and self-discipline protection, lacks preventative(It is technical in other words)Protection.The present invention is by newly designing the identity card space of a whole page, the blank of preventive protection has been filled up in the reform of three kinds of display methods of identity card read write line.Tackled in legislation《Residential identity demonstration》Modify, especially identity card information carrying breath and layout and IC card of ID card include information and should made such as the adjustment of the present invention.To make laws and pass through as early as possible《Citizen's information protection method》, the registration of specification citizenship information, Check are tested and used.The personal name registration of every needs, registration, the place of certificates handling and occasion are provided from legislation, real name and ID card No. should be all registered.
Citizen's information management platform and its construction and popularization of mailbox website, are divided into four-stage:First stage, using the citizen ID certificate of existing public security organ and household register information system to rely on, sets up citizen's information management platform and its E-mail address website, setting up Citizen information management system, there is provided E-mail address service;Second stage, builds information service system, carries out the citizenship service for checking credentials;Phase III, carry out the access of citizen's information, Check by mail box system and test, the information service such as show;Fourth stage, improve Citizen information management system, the citizen ID certificate of phased out former public security organ and the running of household register information system, 5th stage, improve the functions of citizen's information management platform, legal E-mail address including setting up all kinds of units, is realized between unit, the information interchange between citizen between unit and citizen.Each of the above stage, the pilot all since local county, city is progressively generalized to the whole nation.It is combined by the strength promotion of administration means with the market operation based on the advantageous extensive audience advantage in citizen's information platform mailbox website, citizen's information management platform can realize successful operation.