WO2011035549A1 - 一种公民信息管理方法 - Google Patents
一种公民信息管理方法 Download PDFInfo
- Publication number
- WO2011035549A1 WO2011035549A1 PCT/CN2010/001473 CN2010001473W WO2011035549A1 WO 2011035549 A1 WO2011035549 A1 WO 2011035549A1 CN 2010001473 W CN2010001473 W CN 2010001473W WO 2011035549 A1 WO2011035549 A1 WO 2011035549A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- card
- citizen
- mailbox
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 90
- 210000000056 organ Anatomy 0.000 claims abstract description 20
- 230000010354 integration Effects 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 176
- 238000013475 authorization Methods 0.000 claims description 29
- 230000006854 communication Effects 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 21
- 238000007689 inspection Methods 0.000 claims description 16
- 230000008520 organization Effects 0.000 claims description 14
- 230000001681 protective effect Effects 0.000 claims description 14
- 238000013461 design Methods 0.000 claims description 8
- 238000012552 review Methods 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 7
- 230000004048 modification Effects 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 7
- 239000000463 material Substances 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims description 4
- 239000010813 municipal solid waste Substances 0.000 claims description 4
- 229920003023 plastic Polymers 0.000 claims description 4
- 238000011084 recovery Methods 0.000 claims description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 4
- 230000007774 longterm Effects 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 230000002159 abnormal effect Effects 0.000 claims description 2
- 230000003373 anti-fouling effect Effects 0.000 claims description 2
- 238000012423 maintenance Methods 0.000 claims description 2
- 238000004806 packaging method and process Methods 0.000 claims description 2
- 238000012360 testing method Methods 0.000 claims description 2
- 230000004913 activation Effects 0.000 claims 1
- 230000001747 exhibiting effect Effects 0.000 claims 1
- 238000011835 investigation Methods 0.000 abstract 1
- 238000007726 management method Methods 0.000 description 51
- 238000005516 engineering process Methods 0.000 description 14
- 230000008901 benefit Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000000873 masking effect Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 238000010276 construction Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 230000002441 reversible effect Effects 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000010367 cloning Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000003449 preventive effect Effects 0.000 description 2
- 238000012797 qualification Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000004308 accommodation Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000007176 multidirectional communication Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000002407 reforming Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000029305 taxis Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
Definitions
- Adopt WAN technology communication technology
- W E B technology communication technology
- large database management technology
- the data encryption system is not unbreakable, because all encryption algorithms are public, and once the attacker obtains the key, the ciphertext data can be decrypted and the corresponding plaintext value is directly obtained.
- There are many ways to obtain a key The most straightforward method is to seek a key management vulnerability. The method of obtaining a key through cryptanalysis is something that can be done by personal strength. If the key of the digital anti-counterfeiting system is cracked or stolen, an IC card is also built in the fake ID card, and the real identity information identical to the visual reading information is input or the input is only the real information of the other identity information of the photo, so that it can be The ordinary ID card reader reads and displays, ie the ID card "clone".
- Mobile or Unicom users can query for 5 yuan. When the information is consistent, you can also view the photos with the password in the SMS. On the surface, this kind of query satisfies the verification requirements for ID cards.
- the fake ID card is used to make a fake ID card, it is obviously not enough to judge the authenticity of the ID card by simply relating the name to the identity card number.
- the inquiry method can not only verify the authenticity of the ID card, but also put a layer on the fake ID card. Big camouflage. Furthermore, the logical chain relationship of the ID card number, name and photo information allows any person to easily inquire without distinction, and obviously lacks caution. It is difficult to ensure that some of the bad-hearted people illegally use it. After all, the Resident Identity Card Act also imposes strict restrictions on the police's inspection of citizenship ID cards. The ideal situation is: Through institutional arrangements and technical design, it is possible to distinguish between “legitimate” and “unfair” requirements for checking the authenticity of a particular citizen's identity card, and to block “unfair” checking requirements from the information checking process. For “justified” check requirements, it should be completely public and free.
- the exchange and full use of citizen information is inseparable from the participation of the unit.
- the information exchange and full use of the unit involve a wider range of issues, and the relationship is more complicated and the problems to be solved are more.
- the system constructed by the invention patent is based on the identity card and account management system of the public security department, and is intended to facilitate the implementation of the patent.
- the unit information problem involved is solved or should be solved by the system framework, and it can be solved. If it cannot be solved, it will be simplified or avoided. This is also why the invention patent mainly solves the problem of citizen information needs, and also involves the information inquiry, inspection, display and information exchange and identity verification of the unit.
- the patent of the invention is still based on "a citizen information management system method". Name, not the reason for using a larger concept.
- the object of the present invention is to propose a comprehensive solution to the above problems by means of a computer network system, so as to realize the identity verification of a citizen or a unit, the citizen or unit information including its identity information can be queried, identifiable, and displayable.
- a close examination of the aforementioned problems to be solved reveals that citizens or units (hereinafter collectively referred to as subjects) are both the producers of information and the recipients and users of information.
- the information environment in which each subject is located is composed of various information systems of different levels and sizes.
- Various types of information systems (which can be understood as various database systems of various departments, industries, and units) generate or change information related to the subject or related to the subject every day.
- the information related to the subject in various information systems and the information generated by the subject itself are collectively referred to as subject information, and the collection of all subject information constitutes the subject information resource.
- subject information forms a many-to-many information exchange relationship with each other with the subject information resource as the object.
- the technical solution realized by the invention is based on the existing public security organ citizenship ID card and household registration management information system, and establishes a national citizen information management platform (hereinafter referred to as "citizen information platform"), including citizen information management system and information service. System and email system.
- the Citizen Information Management System manages ID card related business and e-mail distribution.
- the information service system has management functions such as integration, classification, indexing, statistics, etc. of citizens or unit information, and application services such as query, inspection, display, identity verification, and retrieval for providing citizen or unit information.
- the e-mail system provides e-mail, online communication, social surveys, announcements, and advertisements through e-mail websites.
- the Citizen Information Management System assigns each citizen a legal e-mail that is free to use from birth for a lifetime, and its e-mail address is used to send and receive e-mails.
- E-mail account number is set as the citizen ID number, can not be changed
- its e-mail login account refers to the e-mail account dedicated to open e-mail, the same below
- the account can be changed .
- a "distribution base" for citizens' personal information citizen e-mail integrates various systems including banks, social security, medical care, housing, transportation, water and electricity, etc., which are distributed outside the citizen information platform through the link service provided by the information service system.
- the various personal information resources about itself are presented in the form of various personal information documents (substantially links of various types of personal information), and citizens can carry out various types of personal information documents for them. Review or external display operations.
- the Citizen Information Management System also sets up free use of legal e-mails for all types of units to facilitate information exchange between various units, between citizens and between units and citizens.
- the mailbox sending and receiving account and email login account of the unit are initially set to the national unified organization code number. After the unit mailbox is opened, the email receiving and sending account number is always fixed, and the email login account can be changed.
- the legal e-mail address of the unit is essentially the same as that of the citizen e-mail.
- the integration unit is dispersed in the identity, bank, housing, and transportation.
- Various types of unit information resources in various external systems, such as hydropower, and various unit information documents are collectively referred to as user information).
- the form of the document, the same below is presented in the mailbox, and the unit can view or display the various information of its own.
- the e-mail system has a graphic seal associated with the content of the e-mail, and a letter stamped with a graphic seal, any change in its content causes a significant change in the seal graphic.
- the second-generation ID card layout has been improved, two ID card verification codes have been added, and some ID card information displays have been re-arranged.
- the ID card is loaded into an ID card information protection sleeve, so that it can be pressed.
- Basic ", "normal” and “complete” three levels of ID card information display.
- the ID card IC card reader has also been improved accordingly.
- the readers are divided into three basic ID card functions: "basic", "normal” and "complete”.
- the ic card contained in the ID card stores the ID card information in three areas according to the above three read permissions to suit its needs in three levels.
- the ID card also stores the ID card serial number and ID card.
- the password and the fingerprint information of the two human hands, and the information of the ID card network verification times performed by the ID card reader and the reader are respectively stored according to the type of the reader, wherein the home address, the ID card password and the two human hand fingerprint information can pass
- the information of the ID card network verification times performed by the ID card reader and the file stored separately according to the type of the reader is refreshed as the number of network verification times increases, and other identity information cannot be modified.
- the ID card IC card also reserves information storage space, which can expand the work permit, driver's license, bus card, medical card, social security card, bank card and other applications, so that one card can be used.
- Each citizen or unit can directly apply for the digital certificate U shield (the digital certificate containing the basic information of citizens or unit identity) from the citizen information platform management institution to apply for various types of identity verification in the citizen information platform.
- the constructed citizen information platform can realize the following twelve functions: (1) Information exchange function, that is, mail, or real-time two-way, multi-directional communication or visual communication between units, citizens, and units and citizens through the network. (2) Information inquiry function, that is, the unit or citizen can query the information about himself in other information systems in his own email address in the citizen information platform; (3) information display function, that is, unit or citizen By invoking and displaying other information about the identity, credit, assets, etc.
- the authentication function that is, the identity network verification of the information service system in the citizen information platform or the ID card network verification based on the ID card reader, can directly verify the authenticity or verify the authenticity of the identity card and whether the holder is an identity
- the owner of the card (5) business operations function, unit or citizen in their own email address, The information service system links with the external system to handle related business operations, such as realizing fund transfer for the business operation of the fund account; (6) Information statistics functions, such as the number and composition of various units or citizens at different times and places Statistics of other indicators; (7)
- the online survey function can make a special survey to all respondents one-to-many, and change the limitations of traditionally only sample surveys; (8) Find functions, through the citizen information platform, all All types of e-mail addresses named after the name of the unit and the name of the citizen can be found in the legal e-mail address book published on the platform;
- the function of publishing advertisements can fully utilize the advantages of the unit and natural person resources unique to the citizen information platform, and set up advertising and publishing areas according to the administrative regional level or community type;
- Information publishing function that is, various social management institutions can The information platform of the e-mail system in the platform can be used to publish information to specific or non-specific objects.
- the Citizen Information Platform can provide a variety of information publishing services; (11) Real-time dynamic monitoring function, under the authority of the law, through the background of the citizen information platform The system can monitor the movement trajectory of specific citizens, thus providing convenience for public security organs to arrest suspects; (12) Decision-making auxiliary function, citizen information platform uses advanced data fusion, data warehouse, data mining and other technologies, for citizens or units of information resources The system's data information is deeply analyzed and mined to provide support for national macro and micro management decisions. On the basis of the above functions, we can develop various network platform services, such as e-commerce services, news reports and video services for film and television works, with the unique advantages of national units and all citizens.
- the citizen information management system, the information service system, and the e-mail system included in the citizen information management platform adopt a centralized structure and a unified management method.
- the citizen information management system has the functions of mining, categorizing, analyzing, processing, and summarizing surveys, statistics, and related data information, and providing auxiliary management support for national macro or micro decision-making.
- the citizen information management system builds a citizenship information database based on the citizen's ID card and household registration information system of the public security organ.
- the unit identity information database can be amplified, and the citizen ID card information, the fingerprint information of the human hands and fingers, and the household registration information can be stored.
- the time is appropriate, the basic identity information of various units is also stored, and the identity verification information of the citizen or the unit is recorded.
- the information service system links information about citizens or units in various systems based on citizen and unit information data, establishes various index databases of citizens or unit information, provides information retrieval, identity verification, and information on citizens or units through an e-mail system. Query, inspection, display services.
- the e-mail system provides citizen or unit mailbox service and mailbox address book through the e-mail website. Service and online communication information services.
- security measures such as internet firewall, access rights and passwords should be established between the citizen information platform and other types of external information systems. Advanced encryption and decryption methods are used to prevent leaks during data transmission.
- the real identity information is easy to obtain, and the criminals often use the real identity information to make a fake identity card.
- the invention patent envisages distinguishing the ID card information into basic identity information and relatively confidential identity information. With the help of the e-mail website, in general, only the basic identity information needs to be displayed, so that the purpose of verifying the real identity can be satisfied.
- the relatively confidential identity information such as the ID card verification code and the home address is supplemented. For units that are necessary and have the right to examine relatively confidential identity information, they should have strict rules for preventing confidentiality of the confidentiality system for identity information. In this way, it is more difficult for criminals to obtain a complete real identity information, thus preventing identity fraud at the source. To this end, it is necessary to improve the design of the existing ID card layout.
- ID card verification code information add the word "resident ID card” above the photo ID position, and name, gender, date of birth, nationality, ID card number, issuing authority, date of issue and expiration date, etc.
- the items are printed on the front of the ID card, and the home address and two ID card verification code information are printed on the opposite side of the ID card.
- the home address and the two ID card verification code information are masked by special tapes that can be matched with the ID card (can be repeatedly uncovered and shaded).
- the back of the special tape can be printed with the position information of the masked information, so that the three identityes When the information is unnecessary, it will not be displayed or copied. If you do not use special tape to cover, you can also insert the ID card into an ID card protection cover for the same purpose.
- the ID card information cover is a transparent ID card security bag made of transparent plastic material with anti-wear, anti-fouling, waterproof and fireproof functions. There are three positions on the surface of the protective cover facing the ID card verification code and home address.
- the opaque tape can be repeatedly peeled off and covered so that the three pieces of identity information are not displayed or copied when they are unnecessary. When the three pieces of identity information need to be displayed or copied, the ID card does not need to be extracted from the protective cover.
- the opaque tape on the surface of the protective cover is peeled off; the opaque tape on the surface of the protective cover is printed with a text indication of the position of the masked information.
- the ID card information can be displayed in three levels of information: “complete”, “normal” and “basic”.
- “Complete” information refers to the display of the explicit information of the ID card other than the second group ID card verification code.
- the "normal” information refers to the ID information displayed in addition to the ID card verification code information, "basic” information, Display ID information other than ID card verification code and home address.
- the date and validity period of the issuance of the identity card on the front of the ID card is expressed in 7-digit code, immediately after the name of the issuing authority; the year, month and day are represented by two digits in total, and another digit indicates the period of use; 9 The following years are indicated directly by numbers.
- the capital letter X indicates 10 years, Y indicates 20 years, and Z indicates long-term.
- the ID card verification code has two groups, each group of 9 digits, 8 digits of verification code plus one verification code, which is automatically generated by the citizen information management system each time a new ID card is issued or replaced.
- the first set of ID card verification codes can be used for identity network verification of the information service system and ID card network verification based on the ID card reader.
- the second set of ID card verification codes is only used for identity network verification of the information service system.
- the method for generating the ID card verification code is to generate the 16-digit number by the asymmetric encryption algorithm by the ID number and the random number generated when the card is issued, and the first 8 digits are subjected to the check operation to obtain a check code to be added to the 8-digit number.
- the latter 8 digits are subjected to a check operation to obtain a check digit added to the 8 digits to form a 9 digit second digit ID card verification code.
- the usual identity network verification such as online game real name verification, ticket real name verification, only use the first set of verification codes; in the financial, customs, airport and other application systems, the second set of verification codes is needed for identity network verification. Since the second group of verification codes is used less frequently, and the ID card reader cannot be displayed, the degree of confidentiality will be higher than the first group of verification codes, thereby achieving the classification and confidentiality effect of the ID card verification code.
- ID card IC card can store identity information and extended application information within 10 or less.
- the fingerprint information in the identity information includes two commonly used hand fingerprint data, which can be replaced with other hand fingerprint data when requested by the citizen information platform management organization if necessary.
- the home address and ID card information in the identity information can also be modified by applying to the Citizen Information Platform Authority.
- the ID card IC card can read one of the three levels of ID card information according to different authorizations and can only be read by the Citizen Information Platform Management Organization according to the three types of authorized ID card readers.
- the extended application information can be installed. Read by the corresponding application system management authority authorization module.
- the ID card IC card reader has also been improved accordingly.
- the readers are classified according to "basic”, “normal” and “complete”.
- ID card IC card reading permissions are divided into three types: “basic”, “normal” and “complete”. Each reader can only display one of the three ID information levels for different industries and different occasions.
- the identity information collection needs the "complete” type displays the ID information in addition to the second group ID card verification code, and the "normal” type displays the ID card ex-visual information in addition to the ID card verification code information, the "basic” type. Displaying the ID information in addition to the ID card verification code and home address; In addition to the three levels of ID card information, the ID card IC card can not be displayed by the ID card reader.
- the permission is read, and the third area stores the contents of the "complete" information of the ID card except for the "normal” information of the ID card, which can be read by the "complete” permission.
- the ID card reader has built-in multiple encryption and authorization module interfaces, and can install the ID card reading and writing authorization module, so that the ID card reader can read and write the ID card information according to one of the three levels.
- the ID card reading and writing authorization module is issued by the public security department.
- the authorization module of the extended application system can also be installed, so that the identity card can be extended to be applied to other business systems, and the authorization module of the extended application system is authorized by the corresponding management department of other business systems to be issued by the public security department.
- the verification steps for the authenticity of the ID card are:
- the ID card can be read and displayed, it can indicate that the information read from the ID card IC card has passed the verification of the ID card information authorization module in the reader/writer; (2) The reader displays the information and the corresponding identity. Whether the appearance information of the certificate is consistent. That is to check the consistency in the identity card, to prevent malicious "replacement" behavior on the ID card. "Change core" is the most difficult to identify an ID card fraud, that is, the surface information of the ID card is true or only the photo is fake, and the IC card contained in the ID card uses another real person's real ID IC card. Or its copy card replacement.
- the method for verifying the legality of ID card readers in the offline state is as follows: (1) The eye-to-eye comparison of the ID card surface image, the reader display photo and the real person; 2) Whether the ID card password input to the reader/writer can be verified by the password of the ID card IC card; (3) Whether the human body fingerprint information input to the reader/writer is matched with the human body fingerprint information in the ID card IC card.
- the above three verification functions of the ID card reader for the legality of the holder are independent of each other and can be used alone or in combination.
- the information service system sets up ID card network verification times counters for three types of ID card readers, and the number of verifications of the corresponding type is increased by 1 each time after ID card reader verification by one type of ID card reader/writer.
- the IC card also stores the current value of the ID card network verification times based on each type of ID card reader, and the ID card network verification method by the ID card reader is: any type of ID card reader.
- the information contained in the ID card IC card is read, including the ID card information displayed by the reader/writer, the human body fingerprint information, and the current value of the verification number counter sent to the information service system for authenticity verification of the ID card, and the information is the same as the comparison content.
- the corresponding type counter of the service system is incremented by 1 and the value of the same type of network verification number in the ID card IC card is refreshed.
- the network verification method for ID card holder legality by ID card reader is (1) the ID card password input to the reader/writer is sent to the information service system for ID card password verification; (2) Input to read and write The human body fingerprint information is sent to the information service system to perform human body fingerprint information matching.
- the human hand fingerprint information may be any one of the ten fingers or all ten fingers.
- the difference between the ID card network verification by the ID card reader and the ID card verification by the offline ID card reader based on the Citizen Information Platform system is that the former can find the counterfeit in time by setting up the ID card network verification counter.
- the cloning or theft of a citizen ID card IC card thereby fundamentally eliminating the forgery, cloning or misappropriation of the citizen ID card. If the ID card is lost or the ID card is copied, you only need to go to the Citizen Information Platform Management Agency to report the ID card loss and receive a new ID card. The original ID card cannot be verified by the ID card network, so you cannot continue to use it.
- the counterfeiter cannot know that the ID card cannot be verified by the network. . Even in the most extreme cases, the counterfeiter has all the identity information such as identity information, ID card password, ID card network verification number, etc. The true and false ID cards are exactly the same at a certain time and cannot be distinguished. Then the true and false ID cards are in them. After a network verification, after changing the ID card network verification times information, the other one must not be verified by the network.
- the result is that, or the real ID card can always be verified through the network, and the fake ID card has not been verified by the network, or the fake ID card has passed the network verification, and the real ID card is legal if the network verification fails.
- the certificate holder will promptly report the loss and report the use of the fake ID card in the shortest time.
- the ID card password verification may be required, and the human body fingerprint information verification is required.
- the application scope of human fingerprint information in the ID card IC card should be strictly regulated by administrative regulations or administrative regulations.
- the ID card password verification should be mainly used. It can cooperate with the identification and verification of human fingerprint information, and can never use human fingerprint information verification separately. This is mainly due to the consideration of personal fingerprint information confidentiality and personal safety.
- the newly activated ID card should be the initial identity information of the ID card (including the name, ID chip IC card chip serial number, ID card number, ID card verification code, current value ID card network verification number) at the same time in the citizen information platform. And the ID card is saved in the IC card, and the identity information called ID card is initialized before it can be officially used. If you want to enable the ID card password and the two hand fingerprint information comparison functions in the ID card, you should manage it through the citizen information platform. The two functions of the application for the application and review can be opened separately or simultaneously.
- the modification of the ID card password should be carried out through the ID card reader of the networked information service system.
- the operation steps are as follows: (1) verify the old password; (2) set the new password, the new password is input to the reader and the same test, read and write
- the device applies for password modification to the citizen information platform through the information service system. After the password is successfully modified, the reader writes the new password into the ID card.
- the ID card password is written and the information service system password is saved at one end, and one end is invalid.
- the ID card will not be verified online.
- the license holder should To the public security organs at the county level or above (or the citizen information platform management agency), to handle the identity information initialization business of the identity card, the ID card can be used frequently by JH.
- the unit identity network verification can be performed. The method is as follows: Use the unit digital certificate U shield, and input the "unit full name or unit mailbox receiving and sending account + unit digital certificate U shield password", that is, the unit can be completed. Authentication.
- the second is to enter "name or ID number + ID card verification code 2" and "ID card password”
- the third is to use the citizen digital certificate U Shield, enter "name or ID number +. citizen digital certificate ⁇ ⁇ password”, that can complete the citizenship network verification; in the banking, telecommunications and other application systems can be embedded in the identity verification interface of the information service system for identity network verification After the verification is passed, the application system can obtain citizenship information suitable for the application system according to rules such as administrative regulations, administrative regulations or authorization of the owner of the personal information.
- the type of citizenship information obtained by the application system from the citizen information platform may be one of three levels of identity card information, or may be comprehensive information including work permits, driver's licenses, professional titles, academic qualifications, household registration information, etc., suitable for application.
- the system needs and is subject to the consent of the owner of the personal information or the authorization of administrative regulations and administrative regulations. Therefore, each application system can use personal information in a standardized and reasonable manner, so that personal information is not abused or illegally used. It is convenient to carry out real-name system of various businesses, such as real-name mobile phone system, real-name system of online games, and real-name system of ticket.
- the identity verification service is embedded in various business systems to achieve close cooperation with various business systems.
- the entire verification process is completed automatically when the business is handled. No manual intervention is required, and the business processes and habits of each system are not changed. , can greatly improve the efficiency of business processes of various systems.
- the above methods for inquiring and verifying identity information are legally authorized to display or on the basis of the citizen's own authorization, thus ensuring the legitimacy, necessity and legitimacy of identity information inquiry in terms of system and technology. It overcomes the shortcomings in the society based on the "National Citizenship Information System” database, which makes the ID card information easy to check, charge inquiry, and excessive inquiry through the network or mobile phone.
- the method of inspection also covers the identification of basic identity information and the identification of special identity information (such as driver's licenses, various professional licenses, qualifications, credits, etc.).
- special identity information such as driver's licenses, various professional licenses, qualifications, credits, etc.
- the banking system adopts the above-mentioned ID card network inspection method for the account opening, report loss and access review, and sends the notification message of the processed business to the citizen's mobile phone and e-mail, and notifies the mailbox user at the first time. It can eliminate the use of other people's ID cards to open or report losses and fraudulent deposits, thus avoiding all kinds of fraud activities related to this. Open or report lost accounts and other businesses to carry out such network ID check, the mailbox users can know the use of their ID cards in the first time, whether they are fraudulently used by others, and if they find an abnormality, they will report the case immediately, which can effectively prevent the identity. The occurrence of various illegal activities caused by fraudulent use.
- This ID card network verification method will completely deny the financial institutions such as banks
- the card can only be used as an excuse to review the authenticity of the authenticity of the certificate, which can ensure the deposit and withdrawal of the depositor and the loss of the report.
- the application of the ID card network inspection method in the banking system ensures the implementation of the real name system of the bank account. , to ensure that the bank account funds are all traceable, and will not be invisible because of the account name.
- the information service system connects various external systems that provide unit or personal information, including information resource systems and business application systems, and establishes various information item index or classification index databases for various units or personal information for unit or personal identity information retrieval. And statistical services; providing unit or individual identity verification through the citizen information management system; providing unit or personal information classification query, classification inspection, and classification display service through the email system; through the application system for the information service demand side (including this The platform's email system) provides an information service embedded module to provide the aforementioned information services. For example, in the banking application system, the identity verification module is embedded, and the identity network verification is performed, and the business for bank account opening and account cancellation is carried out.
- the e-mail system provides a separate network storage space for the mailbox users.
- the user can set up a hierarchical directory to store various documents (hereinafter referred to as user documents) set by the user; the user documents or user information documents in the mailbox can be provided as needed
- the user establishes a password autonomously, and the user document and the user information document can establish a related link.
- the user information document can be opened through an associated link built on the user document, and the associated user document can be opened through the associated link on the user information document. In this way, the mailbox user can put the summary of the content of the user information document, edit, and the like into the user document for reference.
- the e-mail user can determine the required user information document to display the document, number it, and set the display password; when the mailbox user needs to display the user information document, in the unit or personal information display interface in the e-mail system, first You can view or display the unit or personal information (including identity information) by performing identity network verification on the organization or citizen, and then entering "document number, display password".
- the method can be completed by using a computer to access the Internet or a mobile phone.
- content such as personal identification information needs to be displayed, the citizen can implement the email without opening the email, and the other information of the mailbox can be avoided.
- an individual who forgot to bring an ID card he can prove his true identity by this method. This has greatly facilitated the accommodation of tourist hotels.
- the user information document can be selected, and after checking the identity, the user information document link with the set time is provided to the unit in the mailbox system through the e-mail system. Or the target mailbox of the personal information requester, the user information document link can also be forwarded to the designated other target mailbox.
- the authorization to send a citizen's ID card information to the court through the citizen information platform provides conditions for the court to receive complaints online and file a case online. This method of authorizing the inspection unit or personal information provided by the Citizen Information Platform as a third party can prevent cyber fraud to the greatest extent.
- An online information exchange system is embedded in the e-mail address, except for the general chat system, which can be used for one-on-one private chat or application.
- Friends group chat it is characterized by the opening of units, communities and chat rooms set up by industry, and there are special person management according to the administrative level. All the people who participate in the chat room have real names and are added to each other as mailboxes. You can authorize your personal information (check the box in the optional box of a user information document) to let the other party view their own information (including their own identity information) in the chat system.
- E-mails sent and received in the e-mail system can be specified as "online reading” and "download reading”.
- the sender of the e-mail can specify that the e-mail to be sent is one of the two forms.
- the recipient can receive the message as "download and read” when receiving. Designated as one of the two forms; "Read Online” messages can only be read through the email system's dedicated email management software, and cannot be downloaded for reading; messages designated as "download and read” can be managed by dedicated email Software or general email management software is downloaded to local storage and reading. In this way, for some mails with high confidentiality requirements, by selecting the "online reading" mode, the risk of mail leakage can be better prevented.
- Each e-mail is provided with various letter templates for writing various types of application letters.
- e-mails with legal documents they should conform to the written requirements of laws and regulations, that is, they can tangibly express the contents, and It can be retrieved at any time; it can accurately represent the content that was originally generated, sent or received; it can reliably guarantee that the content remains intact and unchanged from the time of final formation, but the letter can exist during forwarding, storage and display. Formal changes such as changes in the attributes of the letter; any changes in the content and form of the letter can be found.
- e-mails of a legal document nature are transmitted in cipher text during the process of sending and receiving.
- the letters received by the receiving party are consistent with the content, layout and paper type generated by the sender, and the e-mail can be stamped with the content of the letter.
- the associated graphic seal which is pre-stored in the e-mail system, any changes in the content of the letter will directly lead to significant changes in the stamp pattern; the received letter contains the text, logo and receipt of the citizen information platform.
- the e-mail will be automatically saved after being sent successfully, and can be downloaded or displayed, printed, saved letter content, layout and paper type and the citizen information platform on it.
- the text, logo, and the email address of the receiving and sending party and the time when the letter is sent cannot be changed. Otherwise, the stamp pattern will be changed significantly.
- E-mail E-mails can be classified and archived as needed.
- the E-type mailboxes are owned by the administrative departments of the state organs or the Citizen Information Platform. They cannot receive e-mails from other websites, and only receive this e-mail.
- the mail sent by the mailbox in the mailbox system to the sender's mail marked as "blacklist" by the special mailbox will directly enter the trash in the mailbox, and will be automatically cleared after the set period, and a prompt will be sent back.
- the party’s mail is placed in the trash can.
- the Class A mailbox has all the target mailboxes to the administrative area or authorized area of the jurisdiction - the function of sending letters or SMS messages to one or one-to-many, beyond the administrative area or authorization of its jurisdiction.
- the regional target mailbox can only send letters or SMS messages one-on-one.
- the target mailbox is unconditionally received, and will automatically return a receipt of "letter received”; the B-type mailbox is owned by a unit or citizen other than the class A mailbox user.
- Class B mailbox receiving mail status can be divided into six types: “receive all information” -, “receive system information”, “receive small group sending information”, “receive non-group sending information”, "receive friend information”;”receive all information””It means receiving all mails from outside the system and within the system.
- “Receiving information in the system” means receiving only all the mails in the system, including mass mailings.
- "Receiving small group sending information” means receiving only the mail in the system.
- B-type mailbox users can send or send mobile phone short messages to the mailbox users in the system through the e-mail system, but they are restricted by the receiving status of the target e-mail.
- the receiving status of the target e-mail is "receive all information", “receive system information”
- the mailbox user can receive a single or group mobile phone short message of the mailbox user in the system; when the receiving status is "receive small group sending information", the mailbox user can receive the mobile phone short message sent by the mailbox user in the system, and the specified number is excluded.
- the above non-friend group sends a text message; when the receiving status is "receive non-broadcast information", the mailbox user can receive the mobile phone short message of the mailbox user in the system, but does not receive the non-friend group mobile phone short message; when the receiving status is "received” When the friend information is ", only the mobile phone text message of the friend mailbox user in the system is received, including the group's mobile phone text message.
- the first opening of the citizen's e-mail address should be handled through the application and review of the citizen information platform.
- the citizen e-mail account includes the e-mail login account and the e-mail account.
- the two types of e-mail accounts are initially set to the citizen ID number.
- the email receiving and sending account is always fixed as the citizen ID number, and the email login account (mainly composed of English letters, numbers, and Chinese characters) can be changed by the email user application; once the email login account is successfully changed, the original email login account is changed. That is to say, if you lose your utility, you can only use the newly established email login account and password to log in to the mailbox. As such, each citizen's email address is relatively confidential.
- the first opening of the e-mail address of the unit should be processed through the application and review of the Citizen Information Platform.
- the e-mail account of the unit includes the e-mail login account and the e-mail account.
- the initial number is set to the national unified organization code number.
- the email receiving and dispatching account is always fixed to the organization code number, and the email login account (mainly composed of English letters, numbers, and Chinese characters) can be changed by the application of the user's mailbox. After the email login account is successfully changed, the original The email login account is invalid. You can only use the newly created email login account and password to log in to the email address.
- the e-mail system can set a unique "legal representative mailbox" representing the unit under each unit's e-mail directory, which is the full name of the unit.
- the department can set up multiple levels of departmental mailboxes. A certain number of post mailboxes can be set up according to the needs; the e-mails of all levels of the unit can be applied to the management agency of the e-mail system to be named by the unit with the corresponding name of the department.
- the legal e-mail and department e-mail are both a tool for external communication and a public platform for information exchange within the unit; the supervisor can mobilize, the department or post mailbox is unchanged, and the work information in the mailbox is permanently saved, and the department or position is stored in the department. Historical archives online.
- the e-mail address book service provided by the e-mail system publicizes the e-mail address of the unit or citizen in the form of name or name on the e-mail website of the Citizen Information Platform, that is, each e-mail address is the real name or name of the e-mail user.
- the sequence of enterprises, individual industrial and commercial households, institutions, social organizations (including legal persons or unincorporated organizations) shall be arranged according to the administrative regions of the central, provincial (including municipalities, autonomous regions, and the following), cities, counties, and townships (towns);
- the citizen's e-mail address book collects the legal e-mails of all citizens according to the law, according to the administrative area where the citizen's household registration is located, that is, the administrative area of the province, city, county, township (town), street or administrative village to which the citizenship is located.
- Orchestration for part not willing to citizens who publish too specific places of residence may apply to the citizen information platform management agency to arrange e-mail address records according to their surnames at the county or city level.
- citizens may choose one of two arrangements, the default is the first arrangement;
- Citizen's e-mail address book can also be arranged according to the unit.
- Each unit can apply to the e-mail system to combine the legal e-mail address of the new and old employees of the unit under the same unit e-mail communication directory.
- the employee's e-mail address can be externally
- the display may also be limited to the display of employees of the unit, hidden from the outside, and the display mode shall be determined by the employees of the unit; if the citizen moves to a different administrative area, or transfers the work to a new unit, the legal e-mail address will follow the new household registration place.
- the new unit is arranged in the new e-mail communication directory, but the e-mail still exists in the original communication directory list and can receive the mail normally, but the words "has been moved" or "transferred" are marked.
- the mailbox in the mailbox directory is the same as the receiving and sending account, still pointing The only e-mail address;
- E-mail system provides e-mail public address book arranged by industry, professional and other classification methods for the unit, and provides e-mail public address book for citizens according to industry, profession, professional title and other classification methods, each unit Or citizens can submit their application to join a certain category of mailbox address book by submitting relevant supporting documents, which is designed to facilitate the exchange of information between units and people in the same category.
- each unit or citizen can conveniently find the e-mail address of the relevant administrative agency in an administrative area, which brings great convenience for the unit or citizen to handle relevant administrative affairs.
- online fraud you can make a complaint or report by simply finding the e-mail address of the public security organ or industrial and commercial organization in the administrative area.
- you need to pay taxes you only need to log in to the tax hall through the website link of the tax authorities in the administrative area. This makes the virtual network world and the real world realize the real connection, realizing the virtual world.
- the unit or citizen e-mail address may be attached to the introductory information of the e-mail user, but the content shall be approved by the public information platform management organization, and the unit e-mail address may be linked to the external website of the unit.
- the Citizen Information Platform has a mobile phone SMS notification function with a "bind" number for the mailbox, which is used to publish announcements or Real-time email login and ID network verification information, the unit or citizen can choose to open all or part of the SMS notification service.
- the e-mail system can authenticate the identity network through the authentication service embedding module from the information service system.
- the unit or citizen mailbox user who authenticates the identity network can restore the initial mailbox login account or retrieve the current mailbox login account, email password recovery or The reset operation allows the user to enable or disable the function in the mailbox; the unit or citizen can apply to the management agency of the citizen information platform, restore the initial email login account or retrieve the current email login account according to certain procedures. , mailbox password recovery or reset business.
- the operation log and the ID verification log are set in the citizen information platform.
- the operation log includes the login record of the mailbox and the operation record of the user information in the mailbox.
- the login record includes the total number of login mailboxes and the IP address and login time of the login computer.
- the mobile phone number is recorded, and the user can check the operation log to find the abnormal login mailbox in time, and the operation record of the user information in the mailbox, including the modification of the mailbox password, the inquiry, the inspection and the display of the user information;
- the ID verification log includes The number of ID card verifications corresponding to the three ID card readers and the IP address and login time of the registered computer. By checking the ID card verification log, the e-mail user can find out whether the ID card has been stolen or "cloned" by others; Operational logs and ID verification logs enable tracking of the "action trajectory" of a particular citizen.
- the Citizen Information Platform has a special account for the statutory authority to view logs (operation log and ID verification log) and citizenship information. Only statutory bodies (usually public security organs or procuratorates above the provincial level) pass the system procedures for specific posts. The written authorization of the member can be opened, and the scope of the legal authority of different types and levels is open to the law.
- the beneficial effects of the invention can easily and quickly query, inspect, display, verify the identity card and exchange information of the citizen or unit information realized, prevent the disclosure of identity information, and eliminate the goal of forging identity cards to see social and economic benefits. It is very huge.
- the economic and social benefits are enormous.
- FIG. 1 is a schematic diagram of the structure of the citizen information management platform.
- the citizen information management system manages the identity information of citizens (units).
- the information service system provides an authentication service.
- E-mail system (including e-mail website) Provides mailbox management and online communication.
- Business management systems at all levels mainly manage the issuance of ID cards and the distribution of e-mail addresses.
- An application system refers to various application systems that use an authentication service.
- the network terminal refers to various terminals that can be logged into the mailbox website.
- Figure 2 is a schematic diagram showing the structure of the main view of the ID card protection cover. Including the cover sheet plastic material part 1, the cover sheet tongue waterproof tape part 2, the protective sleeve insertion port 3, the protective cover front 4. Among them, the cover tongue plastic material part 1 with the cover sheet tongue waterproof tape part 2 can completely seal the protective cover, so that it has waterproof function.
- the protective cover insertion port 3 is an ID card insertion port.
- Figure 3 is a structural diagram of the sealed state of the rear view of the ID card cover. Including the reverse side of the protective cover 5, home address masking tape 6, ID card verification code 1 masking tape 7, ID card verification code 2 masking tape 8. Among them, the reverse side of the protective cover 5 is a part of the cover card that can transparently display the identity card information. Home address masking tape 6, indicating the location of the home address. ID card verification code 1 masking tape 7 and ID card verification code 2 masking tape 8 indicates the display position of the ID card verification code. Three pieces of tape can be uncovered and covered separately.
- Figure 4 is a schematic diagram of the use status of the ID card cover.
- the front information of the ID card is displayed and can be copied.
- Figure 5 is a schematic diagram of the use status of the ID card cover. The reverse side of the ID card is displayed and can be copied.
- Figure 6 is a schematic diagram of the use state of the rear view of the ID card cover. The information on the ID card opposite to the ID card verification code and the home address was blocked by three tapes.
- Figure 7 is the structure of the ID card reader. It includes a radio frequency unit, a display unit, a storage unit, a keyboard unit, a fingerprint unit, a security unit, a communication unit, and a control unit.
- RF unit The wireless information exchange with the IC card contained in the ID card is realized by RF.
- Storage unit A storage font for reading character dot matrix information when a display unit displays characters.
- Keyboard unit You can enter a value or password.
- Fingerprint unit - can collect human fingerprints and can be used for human hand fingerprint comparison.
- Security unit Various authorization cards can be installed.
- Communication unit Used to connect to a computer.
- Control unit Manage other units, mainly to read identity information, authenticate offline, and connect to network authentication through a computer.
- the Citizen Information Platform Management Organization integrates the original citizen ID card and household registration information management organization of the public security organ, and is managed hierarchically by the central, provincial, municipal, county, and community.
- the management agencies at or above the county level apply the corresponding business management system to manage the issuance of ID cards.
- Community organizations can apply community-level business management systems, empower community workers to manage various group chat rooms, and conduct business or social management services such as announcements, advertisements, and social surveys in IP days.
- the phenomenon of personal information being sold, sold and leaked is very serious in the country, which has aroused widespread concern of the Chinese people, but has never found a cure.
- the existing channels for protecting personal information are mainly legal protection and self-discipline protection, and lack of preventive (or technical) protection.
- the invention fills the blank of preventive protection by reforming the three display methods of the new design of the ID card and the ID card reader.
- the “Resident Identity Card Law” should be amended, especially the ID card information and layout design and ID card IC card information should be adjusted as shown in the present invention. It is necessary to legislate through the citizenship Information Protection Law as soon as possible to regulate the registration, inspection and use of citizenship information. It is stipulated in the legislation that all places and occasions that require registration, registration, and certification with a personal name should register their real name and ID number.
- the construction and promotion of the citizen information management platform and its e-mail website are divided into four stages: The first stage is based on the existing public security organ's citizen ID card and household registration information system, and establishes a citizen information management platform and its e-mail website. Establish a citizen information management system and provide e-mail service; In the second stage, build an information service system to carry out citizenship verification services; and in the third stage, use e-mail system to conduct information services such as access, inspection and display of citizen information; In the stage, improve the citizen information management system, gradually stop the operation of the original public security organ's citizen ID card and household registration information system. In the fifth stage, improve the functions of various parts of the citizen information management platform, including establishing legal e-mails of various units, and realizing the unit.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Educational Administration (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201080037501.7A CN102667832B (zh) | 2009-09-25 | 2010-09-24 | 一种公民信息管理方法 |
AU2010297872A AU2010297872A1 (en) | 2009-09-25 | 2010-09-24 | Method for managing citizen information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910153010 | 2009-09-25 | ||
CN200910153010.8 | 2009-09-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011035549A1 true WO2011035549A1 (zh) | 2011-03-31 |
Family
ID=43795330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/001473 WO2011035549A1 (zh) | 2009-09-25 | 2010-09-24 | 一种公民信息管理方法 |
Country Status (3)
Country | Link |
---|---|
CN (5) | CN105678512A (zh) |
AU (1) | AU2010297872A1 (zh) |
WO (1) | WO2011035549A1 (zh) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8060555B2 (en) | 2005-08-17 | 2011-11-15 | Canada Post Corporation | Electronic content management systems and methods |
CN103281385A (zh) * | 2013-05-31 | 2013-09-04 | 重庆大学 | 适应于分布式多层级扁平化信息管理系统设计的方法 |
CN104915236A (zh) * | 2015-06-23 | 2015-09-16 | 迪安杰科技无锡有限公司 | 嵌入式生物认证平台处理系统 |
CN105913216A (zh) * | 2016-03-31 | 2016-08-31 | 中铁程科技有限责任公司 | 铁路客票公安处理系统 |
CN106453363A (zh) * | 2016-10-27 | 2017-02-22 | 郑州中软高科信息技术有限公司 | 基于总线技术的多二代身份证网络编解码系统 |
CN107423987A (zh) * | 2017-09-26 | 2017-12-01 | 深圳福鸽科技有限公司 | 一种本地式快递物流实名认证系统及认证方法 |
CN110825814A (zh) * | 2019-11-20 | 2020-02-21 | 陈学凡 | 一种基于国家人口基础信息创建公民身份区块链的方法 |
TWI696364B (zh) * | 2015-03-20 | 2020-06-11 | 香港商阿里巴巴集團服務有限公司 | 群聊中進行私聊的方法、裝置、用戶端、伺服器及系統 |
CN112766897A (zh) * | 2021-01-14 | 2021-05-07 | 台州市公安局 | 一种基于大数据综合信息技术应用的吸毒人员管理方法 |
US11070505B2 (en) | 2018-06-29 | 2021-07-20 | Beijing Bytedance Network Technology Co., Ltd. | Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium |
CN118692615A (zh) * | 2024-07-02 | 2024-09-24 | 湖北省疾病预防控制中心(湖北省预防医学科学院) | 一种基于二维码的疫苗接种评价信息系统 |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102332000A (zh) * | 2011-07-22 | 2012-01-25 | 深圳市财富万方信息技术有限公司 | 一种个人社会化服务系统及其实现方法 |
CN103425948A (zh) * | 2012-05-18 | 2013-12-04 | 无锡指网生物识别科技有限公司 | 二代身份证读卡器及指纹采集一体机 |
CN103632109B (zh) * | 2013-11-07 | 2016-08-03 | 汪风珍 | 身份证隐私保护与挂失系统 |
CN103903211A (zh) * | 2014-03-31 | 2014-07-02 | 合肥晶奇电子科技有限公司 | 基于链式相关性的居民收入复合排查方法 |
CN103996035A (zh) * | 2014-04-09 | 2014-08-20 | 娲石水泥集团武汉万世科技有限公司 | 一种旅客安检身份认证产品 |
CN103973709B (zh) * | 2014-05-27 | 2017-03-22 | 天津七一二通信广播股份有限公司 | 使用警用集群网络实现身份证信息比对验证的方法 |
CN103973714B (zh) * | 2014-05-29 | 2017-10-13 | 华翔腾数码科技有限公司 | 电子邮件账户生成方法及系统 |
CN104867091A (zh) * | 2015-05-25 | 2015-08-26 | 江苏物联网研究发展中心 | 一种市民邮箱系统 |
CN104951928B (zh) * | 2015-06-30 | 2019-01-22 | 梅卓军 | 一种电子证照信息交互的系统及方法 |
CN106027479B (zh) * | 2016-01-21 | 2019-04-05 | 李明 | 一种身份证认证信息处理请求的动态处理方法及系统 |
CN106230866A (zh) * | 2016-09-29 | 2016-12-14 | 广州鹤互联网科技有限公司 | 一种电子签批安全管理方法及系统 |
CN106910149A (zh) * | 2017-01-22 | 2017-06-30 | 胡雄焱 | 一种公民身份证号码的替代号码生成系统及生成方法 |
CN107481165A (zh) * | 2017-07-03 | 2017-12-15 | 浙江建林电子电气股份有限公司 | 一种智能告示装置及使用方法 |
CN108234297B (zh) * | 2018-01-19 | 2021-02-12 | 论客科技(广州)有限公司 | 限制邮件系统使用真实姓名发信的方法、系统与装置 |
WO2019196027A1 (zh) * | 2018-04-11 | 2019-10-17 | 于志 | 基于cn39码认证居民身份证号码的系统及方法 |
CN109145891B (zh) * | 2018-06-27 | 2022-08-02 | 上海携程商务有限公司 | 客户端及其识别身份证的方法、识别身份证的系统 |
CN109191655A (zh) * | 2018-10-18 | 2019-01-11 | 杭州博采网络科技股份有限公司 | 一种基于公安验证用户信息的摇号系统 |
CN110247927B (zh) * | 2019-06-28 | 2021-12-03 | 北京金山云网络技术有限公司 | 一种云计算资源的权限管理方法及装置 |
CN111784296A (zh) * | 2020-07-01 | 2020-10-16 | 山东爱城市网信息技术有限公司 | 一种政务事项材料管理工具及其业务办理方法 |
CN112183137B (zh) * | 2020-09-25 | 2021-12-07 | 天津理工大学 | 一种二代身份证读卡器动态配置接口系统 |
CN112163072B (zh) * | 2020-09-30 | 2024-05-24 | 北京金堤征信服务有限公司 | 基于多数据源的数据处理方法以及装置 |
CN117453629B (zh) * | 2023-12-22 | 2024-03-08 | 厦门无链之链科技有限公司 | 一种基于u盾的个人移动区块链数据档案管理系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818971A (zh) * | 2006-03-10 | 2006-08-16 | 湖南省公民信息管理局 | 结合第二代居民身份证应用的公民身份信息核查方法及其核查装置 |
CN101474924A (zh) * | 2009-01-20 | 2009-07-08 | 庄秀宝 | 一种智能ic身份证 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1162791C (zh) * | 1999-03-06 | 2004-08-18 | 李玉彬 | 数字式身份证的复验和全国联网管理的方法 |
US6847969B1 (en) * | 1999-05-03 | 2005-01-25 | Streetspace, Inc. | Method and system for providing personalized online services and advertisements in public spaces |
CN1329993A (zh) * | 2001-08-17 | 2002-01-09 | 王冬云 | 可读写防伪居民身份证 |
CN1430176A (zh) * | 2001-12-31 | 2003-07-16 | 郑向昆 | 一种指纹磁卡身份证的制作方法 |
CN1818917A (zh) * | 2005-11-30 | 2006-08-16 | 杨红光 | 一种指纹身份证及其系统及用其进行交易的方法 |
CN101136909B (zh) * | 2006-10-09 | 2011-07-06 | 北京国政通科技有限公司 | 利用通信网络核查用户真实身份的方法及系统 |
CN101123505A (zh) * | 2007-08-06 | 2008-02-13 | 张伟民 | 网络签约安全服务系统 |
CN201281860Y (zh) * | 2008-10-24 | 2009-07-29 | 长春鸿达光电子与生物统计识别技术有限公司 | 指纹身份验证ic卡读写器 |
-
2010
- 2010-09-24 AU AU2010297872A patent/AU2010297872A1/en not_active Abandoned
- 2010-09-24 CN CN201511032369.1A patent/CN105678512A/zh active Pending
- 2010-09-24 CN CN201080037501.7A patent/CN102667832B/zh not_active Expired - Fee Related
- 2010-09-24 WO PCT/CN2010/001473 patent/WO2011035549A1/zh active Application Filing
- 2010-09-24 CN CN201410602257.4A patent/CN104408486B/zh not_active Expired - Fee Related
- 2010-09-24 CN CN201410602189.1A patent/CN104408485B/zh not_active Expired - Fee Related
- 2010-09-24 CN CN201010297589.8A patent/CN102033901B/zh not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1818971A (zh) * | 2006-03-10 | 2006-08-16 | 湖南省公民信息管理局 | 结合第二代居民身份证应用的公民身份信息核查方法及其核查装置 |
CN101474924A (zh) * | 2009-01-20 | 2009-07-08 | 庄秀宝 | 一种智能ic身份证 |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8595292B2 (en) | 2005-08-17 | 2013-11-26 | Canada Post Corporation | Electronic content management systems and methods |
US8060555B2 (en) | 2005-08-17 | 2011-11-15 | Canada Post Corporation | Electronic content management systems and methods |
CN103281385A (zh) * | 2013-05-31 | 2013-09-04 | 重庆大学 | 适应于分布式多层级扁平化信息管理系统设计的方法 |
TWI696364B (zh) * | 2015-03-20 | 2020-06-11 | 香港商阿里巴巴集團服務有限公司 | 群聊中進行私聊的方法、裝置、用戶端、伺服器及系統 |
CN104915236A (zh) * | 2015-06-23 | 2015-09-16 | 迪安杰科技无锡有限公司 | 嵌入式生物认证平台处理系统 |
CN105913216A (zh) * | 2016-03-31 | 2016-08-31 | 中铁程科技有限责任公司 | 铁路客票公安处理系统 |
CN106453363A (zh) * | 2016-10-27 | 2017-02-22 | 郑州中软高科信息技术有限公司 | 基于总线技术的多二代身份证网络编解码系统 |
CN107423987A (zh) * | 2017-09-26 | 2017-12-01 | 深圳福鸽科技有限公司 | 一种本地式快递物流实名认证系统及认证方法 |
US11070505B2 (en) | 2018-06-29 | 2021-07-20 | Beijing Bytedance Network Technology Co., Ltd. | Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium |
US11582181B2 (en) | 2018-06-29 | 2023-02-14 | Beijing Bytedance Network Technology Co., Ltd. | Group chat initiating method on basis of shared document, device and apparatus therefor, and storage medium |
CN110825814A (zh) * | 2019-11-20 | 2020-02-21 | 陈学凡 | 一种基于国家人口基础信息创建公民身份区块链的方法 |
CN112766897A (zh) * | 2021-01-14 | 2021-05-07 | 台州市公安局 | 一种基于大数据综合信息技术应用的吸毒人员管理方法 |
CN118692615A (zh) * | 2024-07-02 | 2024-09-24 | 湖北省疾病预防控制中心(湖北省预防医学科学院) | 一种基于二维码的疫苗接种评价信息系统 |
Also Published As
Publication number | Publication date |
---|---|
CN102667832B (zh) | 2016-01-20 |
CN104408485B (zh) | 2018-09-28 |
AU2010297872A1 (en) | 2012-06-21 |
CN102033901B (zh) | 2014-12-10 |
CN104408486A (zh) | 2015-03-11 |
CN102033901A (zh) | 2011-04-27 |
CN102667832A (zh) | 2012-09-12 |
CN104408485A (zh) | 2015-03-11 |
CN105678512A (zh) | 2016-06-15 |
CN104408486B (zh) | 2020-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104408486B (zh) | 一种身份证读写器 | |
US11049349B2 (en) | Computerized voting system | |
Winn | Open Systems, Free Markets, and Regulation of Internet Commerce | |
US6216116B1 (en) | System and method for handling permits | |
US20070265947A1 (en) | Generating event messages corresponding to event indicators | |
US20070265946A1 (en) | Aggregating event indicators | |
CA3038506A1 (en) | Computerized voting system | |
Sliusar et al. | Blockchain technology application for electronic voting systems | |
US20070265945A1 (en) | Communicating event messages corresponding to event indicators | |
Thomas | Is Malaysia's MyKad the'One Card to Rule Them All'? The Urgent Need to Develop a Proper Legal Framework for the Protection of Personal Information in Malaysia | |
Richards | The Utah digital signature act as model legislation: A critical analysis | |
Basu et al. | E-commerce and the law: a review of India's Information Technology Act, 2000 | |
Rambarran | I Accept, But Do They:... The Need for Electronic Signature Legislation on Mainland China | |
Thomson | Critical issues in identity management-challenges for Homeland Security | |
CN111222105A (zh) | 一种网络映射证件签发方法 | |
Larson | Cast your ballot. com: Fulfill your Civic Duty over the Internet | |
Chaum | Numbers can be a better form of cash than paper | |
CN201876910U (zh) | 一种信息管理系统 | |
Christensen et al. | Maintaining the integrity of electronic tendering by government-reflections on the capacity of the Australian legal framework to meet this challenge | |
JP2001216395A (ja) | 所持紙幣による認証システムとその応用 | |
Susilawati et al. | Implementation of Electronic Transactions of Notary's Deeds in Improving Legal Certainty and Data Security | |
Shi et al. | The Right to Personal Data Portability: Practices and Prospects | |
Pimenidis et al. | E-identification technologies for e-government interoperability in the EU | |
JP6145319B2 (ja) | 個人等情報制御システム | |
KR20010092026A (ko) | 주민등록번호를 이메일 복수 아이디로 발급하는 방법 및그에 따른 이메일 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080037501.7 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10818243 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010297872 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2010297872 Country of ref document: AU Date of ref document: 20100924 Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10818243 Country of ref document: EP Kind code of ref document: A1 |