WO2006060946A1 - A method for creating the personal organization internet authentic communication system - Google Patents

A method for creating the personal organization internet authentic communication system Download PDF

Info

Publication number
WO2006060946A1
WO2006060946A1 PCT/CN2005/001972 CN2005001972W WO2006060946A1 WO 2006060946 A1 WO2006060946 A1 WO 2006060946A1 CN 2005001972 W CN2005001972 W CN 2005001972W WO 2006060946 A1 WO2006060946 A1 WO 2006060946A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
internet
organization
trusted
data
Prior art date
Application number
PCT/CN2005/001972
Other languages
French (fr)
Chinese (zh)
Inventor
Zhenyun Ning
Original Assignee
Zhenyun Ning
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenyun Ning filed Critical Zhenyun Ning
Publication of WO2006060946A1 publication Critical patent/WO2006060946A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to law and computer Internet communications, and more particularly to a method of constructing a personal organization Internet trusted communication system. Background technique
  • the most primitive interaction is to directly communicate with each other within a distance that can be dialogued; with the words, they begin to have correspondence; the invention of the telephone has telephone communication; when the Internet appears, there is Internet communication.
  • Communication that is, communication such as letters, telephones, and the Internet, extends people's ability to communicate. People can use communication to conduct indirect interactions beyond the distance of dialogue. With the expansion of communication scope, people's communication scope is also wider. .
  • communication is a tool by which human beings can extend their ability to communicate and have the attributes of social interaction.
  • the inventor of the present application invented a method for constructing a personal organization Internet trusted communication system based on the personal organization archives legal system based on the social interaction of communication, fundamentally making up for these defects, and creating a kind of An unprecedented organization of the Internet that allows people to be assured of global Internet interactions Trusted communication methods are simple, efficient, fair and free for human society. Summary of the invention
  • the invention includes the following methods:
  • the method for constructing an internet communication system of the invention comprises a method for constructing a trusted communication platform of each archive station and a method for constructing a trusted communication software: based on a personal organization archive legal system, a trusted communication platform of each archive station, 5 Networking, computers or handhelds that install trusted communication software together constitute a personal organization Internet trusted communication system that can realize personal organization Internet trusted communication.
  • the method for constructing a trusted communication platform of each file station is based on human selfishness and communication, and may be implemented based on technologies such as computer, internet, digital signature, etc., with personal organization regarding body (organization), identity , ability, employment, conduct, rights, traces, communications, etc. can fully support the Internet and the law to promote legal contacts, set their own obligations, record specific rights, protect the legitimate interests of the history, the current data for its archive data content, set up individuals Organize the archives legal system, establish a national personal organization archive database controlled by the individual organization archives legal system, store all or part of the individual organization's archives data, and build a national personal organization archive database as the basis to achieve personal organization Internet trusted communication.
  • the credible communication platform of each archive station can ensure the accurate billing and timely charging of the communication operators.
  • the trusted communication software in the trusted communication software construction method achieves the goal of enabling individual organizations to use the personal communication data, or the private communication IC device, or the specific human biological characteristics.
  • the personal organization Internet trusted communication based on the social interaction of communication, based on the individual organization file data controlled by the personal organization file legal system, using digital signature as the basic means, directly and globally unique and universal
  • the personal organization ID number or the anonymous digital certificate serial number is the calling party and the called party ID.
  • the personal organization Internet Trusted Communication System consists of a trusted communication platform for each file station built under the personal organization file legal system, the Internet, a computer or a handheld computer with trusted communication software.
  • a personal organization Internet trusted communication system construction method including a file station trusted communication platform construction method and a trusted communication software construction method.
  • Trusted Communication Its personal organization Internet Trusted Communication (hereinafter referred to as Trusted Communication) is based on the social interaction of communication. It is based on the individual organization's archives data controlled by the individual organization archives legal system, with digital signature as the basic means, directly to the world. The only and common personal organization identification number or anonymous digital certificate serial number is called the calling and called identification, which is not restricted by the location change. It is implemented on the Internet, has a complete communication and trust chain, and can fully support the law to protect the communication in each case. Multimedia communication of legitimate interests.
  • the basis of its communication and trust chain is the data of individual organizations and digital signature technology stored in the national personal organization archive database.
  • the credibility of archival data is based on the framework, setting and control of the legal system with the personal organization archives legal system as the core; the credibility of digital signatures is based on digital signatures, which are “not pretending, irreversible, non-repudiation, anyone Can be verified. "Technical characteristics.
  • Being credible beforehand is an effective means of facilitating harmonious transactions. Many transactions, especially larger ones, Or transactions with higher security requirements, only on the basis of pre-existing credibility, knowing the other party's data such as ability, conduct, financial resources, product quality, etc., and determining their ability to perform, can make people feel confident in determining the transaction. This increases the probability of a qualified party's trading, and it is also the case. It also deters people from constraining their behavior and maintaining a good record. This is another function that is credible beforehand. Otherwise, if there is a lack of credibility beforehand, even if there are eligible parties, they will have to abandon the transaction because they are concerned about the risk of trading, which hinders the pursuit of interests by the parties to the transaction. It is also a phenomenon that is currently prevalent. There is no choice, only a certain kind of transaction can be made under the psychological state of war, no harmony.
  • Simple and credible evidence that is, electronic evidence of transactions left in the use of trusted communication transactions, provides the possibility of remotely submitting evidence to participate in litigation using trusted communications, and is simpler and more trustworthy than traditional other types of evidence. Much more. Simple and reliable means, that is, in the process of litigation, no matter where the court is, even if it does not cooperate, as long as the legal procedure can be used to achieve the delivery of its legal documents, it is simple, reliable and efficient.
  • the infringement based on the infringement can not only be profitable at present, but will be recorded in the stain, and in the future, the interest will be affected by the non-interest, and it will surely deter and regulate the legal interaction of the Internet contacts, thus realizing the simple and safe organization of each individual. , efficient global interaction.
  • trusted communication is a communication that meets the direct needs of individuals to organize social interactions (such as communicating with someone, etc.) and fundamental pursuits (such as obtaining certain benefits, etc.).
  • the construction method of the trusted communication platform of the archive station first needs to be based on human selfishness and communication, and make full use of the realization of computer, internet and digital signature technology, design a legislative plan for the personal organization archives legal system, and establish through the legislative procedure.
  • the personal organization archives legal system establishes a national personal organization archive database that stores all or part of the individual organization's data on the body (organization), identity, ability, employment, conduct, traces, rights, communications and other categories.
  • a trusted communication platform for each archive station can be constructed, with the focus on establishing personal organization archives laws. Institutions and related strategies, the specific programs are: (1) Personal organization file law (design plan)
  • Article 2 This Law classifies all social activity subjects into individuals and organizations, collectively referred to as individual organizations.
  • Organization refers to a legally established or established organization, including legal entities or unincorporated organizations such as state agencies, social organizations, companies, partnerships, and sole proprietorships.
  • Article 3 The personal organization files referred to in this Law refer to the history and current data sets of individual organizations that can fully support the Internet and the law to promote efficient exchanges, set specific obligations, record their specific rights, and protect the legitimate interests of all parties involved.
  • Article 4 The identity of an individual organization with a globally unique and versatile identity is the legal identity and file identification of the individual organization, and the name or name of the individual organization is the legal secondary identification.
  • Article 5 In addition to the activities prohibited by law from anonymous communication, an individual organization may perform various anonymous communication activities by using the serial number of the anonymous digital certificate issued by the archive station, and its legal consequences are attributed to the actor identified by the serial number of its anonymous digital certificate. .
  • Article 8 The archivist, that is, the personal organization file, is the right subject of the archives and enjoys the right to use the files. Unless otherwise stipulated by law, it enjoys the right to confidentiality of files and is protected by law.
  • the Archives Bureau shall be established by the highest administrative organ of the State to establish and manage the national personal organization archive database and its archives stations.
  • the archive station is the national individual organization archive database working organization. It directly undertakes the establishment of personal organization files and the review, entry, inquiry and certification of archive data.
  • the archives bureau establishes it throughout the country according to the needs, and implements the vertical management of the archives bureau. Government jurisdiction.
  • the area under the jurisdiction of the archive station is determined by the archives bureau, but the archiver can independently select the archive station for archival data activities.
  • the Archives Bureau can set up a dispatching agency, the Archives Branch, to assist in the management of the archives.
  • the archive station can set up a dispatching agency, that is, a file sub-station, as needed to provide convenient data services for archivists.
  • the national personal organization archives database is composed of the individual archives database of the archives stations throughout the country. It is used to store the archives data of all individual organizations in the country, which are reviewed, established and entered by the archives officers at various archives stations.
  • Article 12 The personal organization file data that has been entered into the national personal organization archive database shall not be rewritten or deleted. Individual organizations may inquire and use the data through the Internet in accordance with the methods and procedures stipulated in this Law. All data activities shall have records and electronic signatures of the parties. .
  • Article 13 The archive data of the national individual organization archive database has legal effect and can be used as the legal basis for individual organizations to carry out various social activities.
  • Article 14 The national personal organization archive database system shall establish a legal letter box for all archivists, and only accept legal documents prescribed by law, which shall be reviewed and sent by the archives officer. Unless otherwise stipulated by law, the legal documents submitted shall be deemed to be 3 days after expiration. In order to be served, the archivist should set up a legal document arrival notice for his legal letter box and check it in time.
  • Article 15 If one party has a legitimate cause with the other party, one party may apply to the archives station for service to the other party's legal documents, and after being reviewed by the archives officer, the archives officer shall send the legal person's mailbox to the addressee.
  • the specific review procedures and methods shall be separately prescribed by law.
  • Article 16 The archivist is a staff member who establishes personal organization files and audits, enters, inquires, and issues personal organization file data in the archive station.
  • Article 19 The archives officer shall be devoted to his duties and shall, as far as practicable, review the authenticity and completeness of the data of the operational files, and shall not disclose or use the archived data that is known during the performance of his duties.
  • Article 21 The salary of the archives officer shall not be less than 8 times the local average salary.
  • Article 22 Personal profile data items include:
  • Competence 1. Physical ability; 2. Knowledge ability; 3. Operation ability; 4. Logical thinking ability; 5. Organization and coordination ability; 6. Emotional ability; 7. Education; 8. Degree; 9. Licensing qualification; Successful cases; 11, technical rewards; 12, technical negligence.
  • Competence 1. Physical ability; 2. Knowledge ability; 3. Operation ability; 4. Logical thinking ability; 5. Organization and coordination ability; 6. Emotional ability; 7. Education; 8. Degree; 9. Licensing qualification; Successful cases; 11, technical rewards; 12, technical negligence; 13, production conditions; 14, operating conditions; 15, practice conditions.
  • Article 29 Individual organization files are established from the birth or establishment of natural persons.
  • Article 30 A medical service institution with a birth attendance service shall be equipped with a natural person birth record recorder from the archive station.
  • the medical institution shall, on the day of its birth, collect the biometric parameters from the legally approved practicing physician and submit it to the local archive station for personal file.
  • the guardian shall bring the born person to the archive station to establish a personal file within 30 days.
  • Article 31 When an organization is approved to be established or established, the approval authority will transfer the relevant data to the local archives to establish an organizational file. If it is not established, the organization is not established or is invalid.
  • Any individual organization that occupies the currency in the online payment or network should affix its specific consideration. When an individual organization finds that the file data of the person does not conform to the actual situation, it shall promptly make corrections.
  • Article 33 Any individual organization may apply to the archives for the publication of benchmark classification information that can be provided to the public and can meet the various needs of the public, study, work, production, operation, etc., and the classification information of the archives in the archives after review by the archives officer. Freely posted online, the applicant should be responsible for its authenticity.
  • Article 34 Any individual organization that publishes advertisements to the public shall first apply to the archives station for the publication of its baseline classification information and shall not exceed the scope of its reference classification information.
  • the public safety management agency, the owner or manager of the site, the owner or manager of the vehicle may apply to the local archives station for entrances and exits, major roads, important places, residential areas,
  • the vehicle is equipped with a tracer, records the personnel passing through it, its means of transport, and specific items. It is installed and maintained by the archive station and managed by the applicant.
  • Article 36 Tracers shall be installed in public transportation vehicles that provide accommodation and parking facilities to the public and provide passenger transportation services.
  • Article 38 The tracer shall set up a legal black and white list alarm or prompt, and the administrator shall take corresponding measures when receiving the alarm or suggestion.
  • Article 40 Public safety management agencies may use trace data to conduct social public safety monitoring and management, but may not infringe on personal privacy.
  • Article 42 Archivists have the right to inspect and use their own file data, or authorize others to exercise. Others may not access and use others without the authorization or legal procedures of the archivist.
  • Article 43 Archives data In addition to items that must be disclosed or hidden by law, an archivist has the right to determine the public status of his or her file data, and may not be disclosed without the consent of the person.
  • the archivist may go to the archives station to apply for a written certificate of his own file data.
  • Article 49 Whoever intentionally forges, divulges or illegally uses the personal organization's archives data shall compensate for the loss; the archives official department X - XX million fines, and expulsion from public office; other state agencies staff X thousand yuan - XX million fines If the circumstances are serious, the public office shall be expelled; the other personnel shall be charged 1,000 yuan - XX million yuan fine; if the crime is constituted, criminal responsibility shall be investigated.
  • the warp code value starts at 180 degrees east longitude (taking into account the date change), and circulates 96 times in the east around the earth (takes 4 times 24 hours, which is convenient for calculating the time difference), and every 1 minute is called “la”; Each la is divided into 100 equal parts, each aliquot is called “lb”; each lb is divided into 100 equal parts, each aliquot is called “lc”; each lc is divided into 100 equal parts, and each aliquot is called “Id”. . If the value of each level is not enough for two digits, use "0" to make up.
  • the latitude code value is equally divided from 90 degrees south latitude to 90 degrees 48 degrees north latitude.
  • the equal division method of other precision levels is the same as the warp code value.
  • the warp code value and the latitude code value together form a latitude and longitude coordinate code that determines the relative position of any point on the earth.
  • the a-level, d-level precision code values of a, b, c, and d are used to determine the a ⁇ d-level precision area at any location on the earth.
  • the precision area of each level is at least not greater than:
  • Class d 41. 8cmX 41. 8cm Sin (WX 180/48)
  • the latitude and longitude "a” code value is only a purely mathematical conversion relationship with the longitude and latitude "degree” value that has been used. For example: Suppose a company in Shanghai is at 121 ° 24' 08 " east longitude and 3 ⁇ 12 ' 19 " north latitude, which can be converted to -
  • the warp code is: 80a37b39c26d (90+31+12/60+19/3600) X 96/360 ⁇ 32.
  • the weft code is : 32a32bl4c07d That is to say, the equipment that can measure the latitude and longitude is equivalent to measuring the latitude and longitude code value, but only the a code value ratio value, which can make full use of the digits of each digit and can be characterized by the least digits. The greatest amount of information can make our lives easier.
  • the code values of the same precision level of the warp code value and the latitude code value are arranged in the order of the warp code value and the latitude code value, and a check code is added after each combination of the precision level codes. , constitutes the latitude and longitude coordinate combination address code.
  • the check code is the first 4 digits and the number of digits of the number. Unless the algebra of the previous 4 digits error deviation is exactly 0 or a multiple of 10, it can be detected and the probability of detection is high.
  • the address code of a company in Shanghai should be: @80323a37325b39147c26075d.
  • the address is a multi-storey building, if it needs to be distinguished, add "(floor number) one (room number) #" after the address code.
  • the company in the above example is in the 16th floor of the 12th floor, the company's address code is @80323a37325b39147c26075dl2—16tto. If the building has a more prominent name, it can also be attached to its address code, but this is only used as an auxiliary sign. Not necessary, local text is available. Assume that the building in which the company in the above example is located is called "Innovative Building". It can also be written as @80323&37325 39147026075 (112-16# Innovation Building.
  • the start character "*" and the terminator T Add “*" and "I” to the ID number, so that it is not necessary to add "identity number” to the text when writing, and is isolated from other characters, ensuring that it is separate. write, Still mixed with other words, it can make people know that it is an identity number, and it is also easy for computer to recognize. At the same time, it can also make the number of digits of the serial number directly use its natural digits, without adding unnecessary cumbersome without specifying the number of digits in advance.
  • 8-bit address code 8-bit address code with no address prefix, check code, and precision level code for the a and b-level address codes of the file station.
  • the archive station is an organization that directly undertakes the establishment of an individual organization archive database and the review, entry, inquiry and certification of individual organization archive data in the "personal organization archives legal system", and is also the statutory body responsible for the compilation of identity. If the address code of a file station is "@80323a37325b", the 8-digit address code is "80323732".
  • the personal category code is 0; Others 1 - 9 integers are various organization category codes. Such as: “1” is a national institutional organization, “2” is a social organization, “3” is a financial organization, “4" is a school organization, “5" is a medical organization, “6-9 “For other business organizations, etc.
  • ID It is the serial number that the archive station has compiled for individuals or organizations that have created files on this site and does not repeat within the scope of the site. It can be randomly determined, or sorted naturally, or artificially. However, the date of birth is an important personal privacy and should not be directly used as a prefix for the serial number.
  • Check code is the single digit of the digits of the previous digits. For verification, as long as any one digit is wrong, it can be detected; if it is more than two digits, unless the algebra of the error is a multiple of 0 or 10, it can be detected, there is a higher The probability of error detection.
  • the serial number of the anonymous digital certificate is the serial number of each file station when it issues an anonymous digital certificate to the filer.
  • the structure can be: " *#"+” 8-digit file station address code "+" 8-digit year and month date value (eg '20050101') "+” file station to issue anonymous numbers for each file holder of this file station
  • the natural serial number of the certificate " +
  • the identity number of the signer is not displayed, only the serial number of the anonymous digital certificate is displayed, or the name of the anonymous digital certificate is at most, and the digital signer can be attached.
  • An anonymous name the identity number of the digital signer cannot be known by the other person from the serial number or the anonymous name. It is an anonymous digital signature.
  • the identity number corresponding to the anonymous digital certificate serial number can be encrypted and recorded by the archive station database system, and if necessary, it can be found through legal procedures.
  • Classified information is a variety of information that is publicly released by individuals and organizations and can meet the needs of public life, work and study, production, and operation.
  • the benchmark classification information is the classification information of the individual organization, which is classified by the archives review and standardized editing, which is easy to search and locate, and is written into the personal organization file.
  • the archive station benchmark classification information network is the sum of the unified and centralized publication of individual and organization public benchmark classification information web pages. Its contents include:
  • Benchmark business communication information that is, supply and demand information of goods or services organized by individuals.
  • Benchmark civil communication information that is, information on non-profit civil interactions between equal subjects, such as partnerships, associations, partnerships, friends, and marriage.
  • Base country management information that is, various information in the process of national institutions in the management of national society. Such as the identity number, address, composition, responsibilities, authority, etc. of the national institutional organization, as well as legislation (including enacted laws and regulations, etc.), administrative, procuratorial, trial and other information.
  • a benchmark knowledge base that is, a more mature or well-established scientific knowledge. All data entering the benchmark knowledge base must be reviewed by selected agencies and selected articles and books, and paid for by the tax, free of charge to the public, and popular science.
  • the content of the archives benchmark classification information network in theory, can be all-encompassing, all-encompassing, unlimited expansion, and any information that can meet some legitimate needs of others can be included.
  • any individual organization can apply to the archives station to publish classified information according to legal procedures, and publish it free of charge after being reviewed by the archive station (with tax support).
  • the applicant is responsible for its authenticity. The officer assumes the responsibility for review.
  • the handheld is a handheld computer with wireless data communication, document writing, digital signature, identification, network payment, satellite positioning, and the ability to scan and read barcodes, magnetic cards, IC cards, and more.
  • wireless data communication including wireless access to the Internet through the base station, close range (0. 1m range) with other handheld devices or other equipment (such as cash registers, etc.) directional wireless communication data communication, close range (100m range) with Other equipment instruments (such as tracers, etc.) have no direction wireless data communication.
  • the handheld is an important product for personal organization of Internet trusted communications. Only with the support of the handheld, the advantages of its trusted communication can be fully realized, so that social interaction can be simple and efficient.
  • Trusted communication software construction method Based on the trusted communication platform of each archive station, the existing technical means are used to construct software for the specific content and process of trusted communication on the computer or the handheld.
  • the specific content and process of its trusted communication are: (1) login; (2) selective communication; (3) trusted home page; (4) paging; (5) website communication; (6) one-way communication; (7) Instant dialogue communication; (8) Palm or mobile computer arbitrarily accessing the Internet; (9) Presenting archive data; (1 ⁇ network payment; (11) Remote real person authentication; Trace record; (13) Communication encryption.
  • the login is a communication person who inserts a private communication IC card on a computer or a handheld computer that is connected to the Internet and has access to the Internet.
  • the person or organization authorized by the IC card can "login” on the computer. "The Internet pages others and is paged by others. And the same computer can accommodate multiple people to log in and connect to multiple communication terminals.
  • Private communication IC card is an ic card containing private organization private communication data and capable of performing communication digital signature calculation;
  • Private communication data is data that can be digitally signed by communication, that is, an individual organization communication digital certificate issued by an archive station, containing a personal organization identification number or an anonymous digital certificate serial number, and its corresponding public and private keys, and the impact on communication
  • the selected data consisting of communication factors such as quality, communication costs (such as Internet operators, routing, speed, bandwidth, etc.);
  • the encrypted private key on the ic card cannot be exported and copied technically, thereby ensuring the security of the private key;
  • the "private communication IC card” can be self-made if it has operational capabilities and conditions; otherwise, it is assisted by the archives archive officer.
  • the computer and the IC card are combined, and the digital signature of the identity verification is sent to the file station included in the identity number or the anonymous digital certificate serial number.
  • the user is authenticated.
  • the dynamic or static address identification data of the computer in the Internet is archived in the "communication link" item, that is, the "login” of the correspondent is completed; and the digital signature of the communication factor is also sent to the Internet operator. , Internet operators charge accordingly.
  • the computer or handheld computer can also enter specific human biometric parameters (such as fingerprint, iris, avatar, etc.) and enter the personal identification number or anonymous digital certificate serial number. Log in with real-life authentication.
  • specific human biometric parameters such as fingerprint, iris, avatar, etc.
  • Selecting communication means that on the basis of the authenticity of the calling identity and its related file data, each communication person sets the calling range and its communication type of receiving the paging, so as to receive the required communication as desired, and reject the need. Communication.
  • the trusted home page is supported and managed by the archive station trusted communication platform in the trusted communication, and the page for displaying the trusted data of the called party is firstly presented to the caller.
  • Its contents It is the link data of the identity number, name (name), conduct, benchmark classification information, etc., which is legally disclosed or voluntarily disclosed by the called party.
  • Its communication links include link menus for communication extensions, websites, and even current phones, mobile phones, and so on.
  • the calling party When the calling party is paged, if it is strobed and there are no other control items, the page facing the calling party is the trusted home page of the called party, and then the calling party clicks the menu link to realize the corresponding communication.
  • the home page can be blank, and directly enter the corresponding communication when called.
  • the trusted communication software After logging in, when paging is called, as long as the called identity number or the anonymous digital certificate serial number learned in the anonymous interaction is input, the trusted communication software first acts on the file station of the address code included in the paging identifier. If it is strobed, it reads the "communication link" data of the called party, and then uses the data to connect the data flow between "calling" and "called” to achieve communication. Even if the called party is not online, you can receive the text, language, and image in the range of data that the file station or its designated proxy server can bear. The called party can be automatically obtained by logging in again. If the called party is online and does not answer, you can go to the called computer to leave a text, a foreign language, and a picture.
  • the calling party is the strobed range of the called party, after paging the "identity number", there will be such as residential, office, handheld, certain department, etc.
  • the secondary menu of the prompt (and the menu after the second level can also set the display range), just click the corresponding menu. If necessary, you can continue to extend down the level. Of course, you can also enter the corresponding code when you enter the ID number, you can directly enter the specified communication.
  • the calling party can control the real identity number and name of the private communication IC card to the called party, or add other trusted file data (such as work unit and its position), and even display The trusted address code of the calling party, open the door of the called party with credibility and sincerity.
  • the caller can also call anonymously.
  • the called party can only know its anonymous digital certificate serial number, or add an alias, and the called party knows that the calling party is anonymous. Whether the called party receives or not depends on the called setting. But if anonymous The caller maliciously harasses the damage, etc. After the corresponding legal procedures, the anonymous caller is also available, and can reduce the level of communication and the legal responsibility.
  • the identity number other than the fake private communication IC card can be excluded, but it is impossible to exclude someone from lending their private communication IC card or communication to others for use, and can only be adjusted by law. If someone lends their private communication IC card to someone else for malicious paging and communication, it should be jointly and severally liable by law, but this often gives damage to the borrower, and usually no one will lend it easily. Moreover, in the case where the demand is high, the real identity of the correspondent can be verified by remote identification.
  • Website communication is the process of data exchange between a communication person and a personal organization website, including viewing web pages, video on demand, uploading data, and the like.
  • any website or personal homepage is set up by a specific individual or organization, and must have its own people, which can be attributed to the website of an individual or organization.
  • the website can also be regarded as a kind of database, and the web page is only the window for the database to be viewed and exchanged.
  • One-way communication means that as long as the calling party is in the receiving range of the called party, even if the called party is online, there is no need to be answered by the calling party, and the calling party can directly send the text, voice, audio and video data to the called computer in one direction.
  • SMS In the current fax, SMS, but its function and role, it is not the current fax, SMS can be compared; if the called is not online, as long as the amount of data sent by the caller does not exceed its archive station proxy server or its designated proxy server The bearing value can also be sent directly to the called archive station proxy server or its designated proxy server.
  • the called party when the called party logs in again, it automatically receives data from the proxy server; if the called party is not online, and the called data volume exceeds the value of the called proxy server, the calling party can store the call to the called party, and when the called party logs in again, The calling party is also online, and the calling computer automatically sends the stored data to the called party in one direction.
  • the system automatically sends out the receipt and reading receipt.
  • the communication content is digitally signed, it can ensure the credibility of its communication content, and the receipt sent back automatically by the system has legal evidence effect.
  • the caller and the called party After the caller and the called party are connected, they can use their own computers to select instant messaging communication such as text, voice, audio and video, and store their communication content at will.
  • instant messaging communication such as text, voice, audio and video
  • one or more voice, audio and video dialogue terminals can be installed on the computer and extended to a remote location from the computer, and the computer functions like a switch, even if the conversation communication is as convenient as the current telephone, and Video conversations can also be made as needed.
  • the handheld or mobile computer can access the Internet arbitrarily, that is, the handheld or mobile computer can wirelessly access the Internet through the public wireless base station, or the handheld can directly access the Internet by wire, or the mobile computer can access the Internet by wire at the guest, and then realize the foregoing The same trusted communication.
  • the public wireless base station is only an Internet access port, and is responsible for wirelessly accessing the Internet in the air by the handheld or mobile computer within the effective signal coverage range of the base station. After the access, the handheld or mobile computer is treated as the computer in the aforementioned trusted communication, and the same private communication IC card can be used as well. Based on the identity verification and network payment of the archive station trusted communication platform, each public wireless base station can independently charge the service fee of the Internet access user through the base station, and there is no distinction between the home office management and the roaming user (ie, the foreign user and the local user).
  • the base station can access the Internet at the base station as long as it is within the effective signal coverage of the base station and complies with certain technical standards and protocols and makes a digital signature that agrees to pay the relevant fees. Therefore, each base station can independently operate the accounting and the user can access the Internet through the local base station or interface.
  • the direct wired access to the Internet by the handheld or mobile computer it is mainly because of the additional cost of accessing the Internet through the public wireless base station, and sometimes the quality of the wireless signal is not satisfactory. Many indoors often affect the wireless signal due to shielding and the like. Strength, even unable to send and receive.
  • you return to your home, or at the office, or when you are on a business trip you can plug the handheld directly into the standard interface on your computer.
  • the private communication content on the handheld is automatically loaded on the computer, and you can log in to the computer.
  • Internet and can be operated on a computer (the operating conditions are better than the handheld), if the handheld is dialed out, it will automatically return to the public wireless base.
  • the status of the station accessing the Internet you can also log in to the Internet by inserting the handheld or mobile computer into the Internet-free standard interface.
  • the handheld or mobile computer can also be connected to the Internet via Bluetooth technology.
  • Presenting the archival data means that in the social interaction activities, one party uses the trusted communication to present the process of storing the archive data of the personal organization archive database in the archive station based on the needs of the communication.
  • the archivist Since the archivist is the owner of the file, as long as the identity is verified, you can open your own file and select the required data items to present to others. As long as the data presented is the file data of the file station, it is presented.
  • the file data is digitally signed by the archive station, and the recipient or other person can verify whether the data is from the file station trusted communication platform by verifying the digital signature.
  • Remote real-person authentication is based on the voluntary use of a biometric parameter entry device to record the biometric parameters of the person in real time and in real time, and then use the archive station encryption public key to encrypt and send it to the archive station identity verification system. The system will inform the verification result. The process of the other party.
  • the "voluntary” can be my own initiative; or it can be my consent to the other party's request.
  • the "request” may be in the process of communication, selecting an operation item, requesting the other party to pass the remote real person identity verification; or setting in the selection communication item, the setting requires the other party to pass the remote real person identity verification, Accept some type of communication;
  • Internet payment that is, the currency that the payer will need to pay, on the Internet, by digital signature, credibly instructing its deposit bank, from the currency of its account or the credit overdraft currency, to the recipient deposit bank account Currency payment behavior within. It is a major use of trusted communications.
  • the recipient will first accept and accept the payment and its consideration (ie, the goods, services, loan request and commitments, etc.), the recipient's identification number, the deposit bank identification number, and accept the payment, digitally signed, Send to the payer.
  • the payment and its consideration ie, the goods, services, loan request and commitments, etc.
  • the payer's deposit bank determines that the payer's deposit is sufficient to pay the amount, pays the bill to the bank designated by the recipient, and retains and sends the payment instruction (with the recipient's mail) sent by the payer to the bank.
  • the receiving bank that pays the account.
  • the receipt and notification of the recipient will be retained, and the receipt will be returned to the payer according to the payment path.
  • the payment reason and the recipient's identification number may be directly indicated in the payment instruction.
  • the deposit of the payer The bank pays the specified amount to the recipient's designated deposit bank's recipient account.
  • This process can be performed automatically in an instant by a special program of trusted communication software.
  • the digital certificate in the file can be sufficient to support online payment with any bank, without having to go through the digital certificate signing procedures at the bank counters as it is currently.
  • Trace records are records of the location or location of an individual or organization's authorized person at the time of login or authentication, and are archived in their respective files, and are automatically completed by trusted communication software.
  • the location or location range of the inbound interface is known. Under the action of the trusted communication software, the login person's identity number and its location or location range can be recorded, and the trace record can be realized. .
  • the identity number and the real person are misplaced, if the real person is not authenticated, the recorded trace is unreliable and can only be used as a reference data.
  • the misplacement may be limited and controlled to some extent by legal means, and its reference value and role are not low. Of course, the most reliable one is the trace recorded during real-life authentication.
  • the tracer is actually a computer with a device for entering biometric parameters. Has three major functions: 1 identification; 2 black and white list warning or prompt; 3 trace records.
  • the traditional and simplest identification is to take the photo on the ID card and the actual appearance.
  • the identification under the trusted communication system is to compare the biometric parameters stored in the personal organization archive database of the trusted communication platform with the biometric parameters actually entered.
  • Tracer identification unlike the aforementioned "remote real-life authentication", is the identification process with special personnel supervision.
  • the acquisition method may be an automatic answering of the handheld device, that is, the trace device sends a wireless command requesting response to the identification channel, and when the person holding the handheld enters the identification channel, automatically responds to the identifier to the tracer; or may pass the ic card
  • the magnetic card is swiped, barcode scanned, and manually entered to obtain the identification number of the identified person.
  • the identity number and the entered biometric parameter data are sent to the trusted communication platform identity identification system, and compared with the data pre-existing in the personal organization file database, the recognition result feedback tracer can be obtained. , complete the identification.
  • the identified person can also exchange the digital signature signed by the trusted communication platform and the biometrics specified in the pre-existing personal organization archive database to the tracer through the handheld, magnetic card, IC card, and the tracer is verified by the digital signature and The results of the identification can also be obtained by checking the biometric parameters.
  • the biometrics entered can only be searched in the personal organization file database for the identity number with the biometric parameter, but it may take a long time.
  • the resulting identity number is preferably re-checked with other biometric parameters of the identity number.
  • the identification in addition to the identification of people, in certain places, including the identification or recording of vehicles, items, etc., in a different way.
  • Legal black and white list warning or reminder When identifying, if a trusted communication platform encounters people and things on the legal black and white list in real time, a specific alarm or prompt is issued by the tracer, and the tracer supervisor on the spot takes measures. Dispose of it, or report it to a specific organization or individual on a blacklisted disposal plan.
  • Blacklist of laws A list of judicial controls that are determined by legal procedures and need to be seized and controlled. Such as criminal suspects, criminals, criminal tools, stolen goods, etc.
  • Legal whitelist A list of assistance and control that is determined by legal procedures for the purpose of goodwill assistance. Such as missing minors, mental patients, infectious sources, dangerous goods, etc.
  • Trace record On the basis of identification, the location of the tracer is the current location of the identified person or vehicle, and the time to complete the identification and the identified identity number or anonymous digital certificate serial number are recorded. , and then homing to the archive, you can complete the trace record.
  • the homing archive is to record the identity number recorded by the tracer or the time corresponding to the serial number of the anonymous digital certificate, and the location of the tracer, and write the file under the identity number or the anonymous digital certificate serial number through trusted communication.
  • the tool is written under the name of the driver and owner of the vehicle (including the co-owner), and the specific item is written in the name of the carrier, and this record of each moment can constitute the activity trace of the identity person or vehicle.
  • the trace data recorded by the tracer is also transmitted to the government security management department in real time.
  • the recorded identity number must be encrypted by the public key of the archive station, if there is no legal cause, non-legal procedures It is impossible for anyone to know the true identity number recorded.
  • the recorded data is just a type of hidden data that is potentially available.
  • the government's security management department only uses the trace data to monitor the macroscopic situation of the flow of people in each area, and does not involve the hidden details of specific individuals.
  • the other party can conveniently use its public key for asymmetric encrypted communication; if the amount of data is large, it can be encrypted by using the public key of the other party. Randomly generated symmetric keys, then symmetrically encrypted communication.
  • the archives station may be set up by the government in a more economically developed city, the archive station and the city address shall be marked with a unified global positioning address code, the personal organization file shall be identified by the address code identification number, and the personal organization archive database shall be established.
  • the basic archive station trusted communication platform.
  • the archival project should try to set comprehensive and unified standards. If the data cannot be realized temporarily, it can be empty.
  • the Internet can be used for trusted communication, and the degree of trust depends on the archive station pair. The completeness of the archive data collection and the credibility of the control. If there is no join and no ID or anonymous digital certificate serial number, but as long as the trusted communication software is installed, the person who has joined the identity number can also be paged, but the identity is untrustworthy and cannot be paged.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention is a method for creating the Internet communication system, and in particular is a method for creating the personal organization internet authentic communication system. It creates the legal system of personal organization recording, and creates the communication platform for each recording station and the country personal organization recording database storing all the data about the body (organic), identity, capability, occupation, character, right, whereabouts, communication etc of the personal organization in the country or some of all, based on the possible of the realization of the computer, internet, digital signature etc. Using the digital signature as the basic means over the internet, and using the global personal organization identity number or the serial number of the anonymous digital certificate as the calling subscriber and called subscriber directly, it realizes the authentic communication having the perfect intercourse authentic link. The invention could improve the intercourse, and return the lawful rights and interests to the victim and punish the infringer in the individual case, awe and make the Internet users’ intercourse lawful. Accordingly, it legally ensures the right of everyone is secure, realizes the global intercourse simply, safely and effectively.

Description

个人组织互联网可信通信系统构建方法 技术领域  Personal organization internet trusted communication system construction method
本发明涉及法律与计算机互联网通信, 具体地说, 涉及个人组织互联网可信通 信系统构建方法。 背景技术  The present invention relates to law and computer Internet communications, and more particularly to a method of constructing a personal organization Internet trusted communication system. Background technique
众所周知, 世上的每一个人, 每一个人的一生, 都少不了与他人相互交往。 交往, 是社会的最基本内容, 其核心, 是利益交易。  As everyone knows, every person in the world, every person's life, must interact with others. Communication is the most basic content of society, and its core is interest transactions.
最原始的交往, 是在可对话的距离内直接对话交往; 有了文字后, 就开始有了 书信交往; 电话的发明, 就有了电话交往; 互联网的出现, 就有了互联网交往。  The most primitive interaction is to directly communicate with each other within a distance that can be dialogued; with the words, they begin to have correspondence; the invention of the telephone has telephone communication; when the Internet appears, there is Internet communication.
通信, 也即书信、 电话、 互联网等通信, 延伸了人们的交往能力, 人们可以借 助通信的手段进行超过对话距离的间接交往, 并随着通信范围的扩展, 人们的交往 范围也越来越广。  Communication, that is, communication such as letters, telephones, and the Internet, extends people's ability to communicate. People can use communication to conduct indirect interactions beyond the distance of dialogue. With the expansion of communication scope, people's communication scope is also wider. .
显然, 通信, 是人类借以延伸交往能力的工具, 具有社会交往的属性。  Obviously, communication is a tool by which human beings can extend their ability to communicate and have the attributes of social interaction.
当前, 已有了全球性的互联网, 全球性交往已成为可能。  Currently, there is a global Internet, and global interaction has become possible.
然而,现在的各种通信不外乎都是以通信工具标识为主被叫标识,如电话号码、 手机号码、 IP地址等, 并非是人们因交往需求而通信的直接目标。 即使知道对方的 姓名或名称, 如果不知道对方经常变化的通信工具标识(如电话号码等) , 也无法 实现与之交往通信的目的, 哪怕是善意的, 或是对方希望的, 都无济于事。  However, all kinds of communication nowadays are nothing more than the identification of the communication device as the called party identification, such as phone number, mobile phone number, IP address, etc., is not a direct target for people to communicate due to communication needs. Even if you know the name or name of the other party, if you don't know the identity of the communication tool (such as the phone number) that the other party changes frequently, you can't achieve the purpose of communication with it, even if it is good or the hope of the other party, it will not help.
更大不足, 是当前的各种通信在很大程度上都缺乏一种可信性, 即证据性。 即 使是刚刚兴起 CA数字签名的可信, 也因缺乏一种完整的交往可信链, 无法充分支 持法律对合法利益保护的简单性、 高效性和完整性。  The bigger deficiency is that most of the current communications lack a credibility, that is, evidence. Even if it is just the credibility of the digital signature of CA, it lacks a complete communication and trust chain, and cannot fully support the simplicity, efficiency and integrity of legal protection of legitimate interests.
基于人的自私性, 仅凭诚信是不够的, 谁都有可能抓住某种漏洞侵害对方而取 得违法或非法利益, 谁也会因某种缺陷而担心被他方侵害、 使自己丧失合法利益, 从而使得人们不敢轻易将先进的互联网通信应用于利益交往,无法充分利用互联网 的高效性实现人们对利益更简捷的追求。  Based on human selfishness, honesty alone is not enough. Anyone who can seize a loophole to infringe on the other party can obtain illegal or illegal interests. Whoever is worried about being infringed by others and losing his legitimate interests because of certain defects, Therefore, people dare not easily apply advanced Internet communication to interest exchanges, and can not make full use of the efficiency of the Internet to achieve people's pursuit of simpler interests.
显然, 这是一种缺陷与遗憾。  Obviously, this is a flaw and a regret.
为此, 本申请的发明人基于通信的社会交往性, 发明了一种建立在个人组织档 案法律制度基础之上的个人组织互联网可信通信系统构建方法,从根本上弥补这些 缺陷, 开创一种前所未有的、使人们可以放心于互联网全球交往的个人组织互联网 可信通信方式, 给人类社会以简单、 高效、 公平、 自由。 发明内容 To this end, the inventor of the present application invented a method for constructing a personal organization Internet trusted communication system based on the personal organization archives legal system based on the social interaction of communication, fundamentally making up for these defects, and creating a kind of An unprecedented organization of the Internet that allows people to be assured of global Internet interactions Trusted communication methods are simple, efficient, fair and free for human society. Summary of the invention
本发明包括如下方法:  The invention includes the following methods:
1、 全球定位地址码编制方法;  1. Global positioning address code preparation method;
2、 个人组织身份号编制方法;  2. Method for compiling personal organization identification number;
3、 个人组织档案法律制度方案;  3. The legal system plan for individual organization files;
4、 各档案站可信通信平台构建方法;  4. Construction method of trusted communication platform for each archive station;
5、 可信通信软件构编方法。  5. The method of constructing trusted communication software.
本发明的一种互联网通信系统的构建方法,包括各档案站可信通信平台构建方 法、可信通信软件构编方法: 以个人组织档案法律制度为基础, 由各档案站可信通 信平台、 5:联网、安装可信通信软件的计算机或掌机共同构成可以实现个人组织互 联网可信通信的个人组织互联网可信通信系统。  The method for constructing an internet communication system of the invention comprises a method for constructing a trusted communication platform of each archive station and a method for constructing a trusted communication software: based on a personal organization archive legal system, a trusted communication platform of each archive station, 5 Networking, computers or handhelds that install trusted communication software together constitute a personal organization Internet trusted communication system that can realize personal organization Internet trusted communication.
在上述方法中, 所述各档案站可信通信平台构建方法, 基于人的自私性与交往 性, 基于计算机、 互联网、 数字签名等技术的实现可能, 以个人组织关于身体(组 织体) 、 身份、 能力、 从业、 品行、 权益、 踪迹、 通信等各类能够充分支持互联 网与法律促进合法交往、设定本人义务、记载具体权利、保护合法利益的历史、 当前数据为其档案数据内容, 设立个人组织档案法律制度,建立由个人组织档案法 律制度控制、 存储本国所有或部分个人组织档案数据的国家个人组织档案数据库, 构建以国家个人组织档案数据库为基础、 以实现个人组织互联网可信通信为目标、 可以确保通信经营者准确计费和及时收费的各档案站可信通信平台。  In the above method, the method for constructing a trusted communication platform of each file station is based on human selfishness and communication, and may be implemented based on technologies such as computer, internet, digital signature, etc., with personal organization regarding body (organization), identity , ability, employment, conduct, rights, traces, communications, etc. can fully support the Internet and the law to promote legal contacts, set their own obligations, record specific rights, protect the legitimate interests of the history, the current data for its archive data content, set up individuals Organize the archives legal system, establish a national personal organization archive database controlled by the individual organization archives legal system, store all or part of the individual organization's archives data, and build a national personal organization archive database as the basis to achieve personal organization Internet trusted communication. The credible communication platform of each archive station can ensure the accurate billing and timely charging of the communication operators.
在上述方法中,所述的可信通信软件构编方法中的可信通信软件的实现目标是 使得各个人组织, 凭借本人私密通信数据、 或私密通信 IC装置、 或特定的人体生 物特征,使用任何一部安装可信通信软件、有线或无线接入互联网的计算机或掌机, 通过各档案站可信通信平台及其相关个人组织档案数据的作用,实现个人组织互联 网可信通信登录、 选择通信、 可信首页、 寻呼、 网站通信、 单向通信、 即时对话通 信、 掌机或移动计算机任意接入互联网、 出示档案数据、 网络支付、 远程实人身份 验证、 踪迹记录、 通信加密的内容与过程。  In the above method, the trusted communication software in the trusted communication software construction method achieves the goal of enabling individual organizations to use the personal communication data, or the private communication IC device, or the specific human biological characteristics. Any computer or handheld that installs trusted communication software, wired or wireless access to the Internet, through the role of the file station trusted communication platform and its related personal organization file data, realizes personal organization Internet trusted communication login, selective communication , trusted homepage, paging, website communication, one-way communication, instant conversation communication, handheld or mobile computer arbitrarily accessing the Internet, presenting archival data, online payment, remote real-time authentication, trace recording, communication encrypted content and process.
在上述方法中, 个人组织互联网可信通信, 基于通信的社会交往性, 以个人组 织档案法律制度所控制的各个人组织档案数据为基础, 以数字签名为基本手段, 直 接以全球唯一和通用的个人组织身份号或匿名数字证书序号为主叫、被叫标识, 不 N2005/001972 In the above method, the personal organization Internet trusted communication, based on the social interaction of communication, based on the individual organization file data controlled by the personal organization file legal system, using digital signature as the basic means, directly and globally unique and universal The personal organization ID number or the anonymous digital certificate serial number is the calling party and the called party ID. N2005/001972
受地点变化的限制,在互联网上实现具有完整交往可信链的多媒体通信, 既可以促 进社会交往, 又可以充分支持法律在个案上复回被侵害人的合法利益和惩治侵害 人, 威慑和规范各个人组织守法交往, 从而实现简单、 安全、 高效全球交往。 本发明的最佳实施方案 Limited by the change of location, the realization of multimedia communication with a complete communication and trust chain on the Internet can not only promote social interaction, but also fully support the law to return the legitimate interests of the infringed person and punish the offender, deterrence and norms. Individuals organize law-abiding interactions to achieve simple, safe, and efficient global interactions. BEST MODE FOR CARRYING OUT THE INVENTION
个人组织互联网可信通信系统,由在个人组织档案法律制度之下所构建的各档 案站可信通信平台、 互联网、 安装有可信通信软件的计算机或掌机共同构成。  The personal organization Internet Trusted Communication System consists of a trusted communication platform for each file station built under the personal organization file legal system, the Internet, a computer or a handheld computer with trusted communication software.
个人组织互联网可信通信系统构建方法,包括档案站可信通信平台构建方法和 可信通信软件构编方法。  A personal organization Internet trusted communication system construction method, including a file station trusted communication platform construction method and a trusted communication software construction method.
其个人组织互联网可信通信(以下简称可信通信),是基于通信的社会交往性, 以个人组织档案法律制度所控制的各个人组织档案数据为基础,以数字签名为基本 手段,直接以全球唯一和通用的个人组织身份号或匿名数字证书序号为主叫、被叫 标识, 不受地点变化的限制, 在互联网上实现、 具有完整交往可信链、 可以充分支 持法律在个案上保护交往各方合法利益的多媒体通信。  Its personal organization Internet Trusted Communication (hereinafter referred to as Trusted Communication) is based on the social interaction of communication. It is based on the individual organization's archives data controlled by the individual organization archives legal system, with digital signature as the basic means, directly to the world. The only and common personal organization identification number or anonymous digital certificate serial number is called the calling and called identification, which is not restricted by the location change. It is implemented on the Internet, has a complete communication and trust chain, and can fully support the law to protect the communication in each case. Multimedia communication of legitimate interests.
其交往可信链: 就是在人们的交往中, 使用可信通信施行利益交易时, 使用可 信通信所实现的事前、 事中、 事后的可信。  Its credible chain of communication: It is the credibility of pre-, post-, and post-implementation realized by credible communication when using trusted communication to carry out interest transactions in people's interactions.
①事前可信: 也即在人们确定交易前, 可以基于交易的需求, 使用可信通信 出示的诸如职权、 能力、 品行、 财力、 踪迹、 产品等各种档案数据, 并且只要具有 档案站的数字签名, 其数据的真实性与数据传输过程的不可冒充性、 不可篡改性, 是可以信赖的。  1 Be credible beforehand: that is, before people determine the transaction, they can use various information such as authority, capability, conduct, financial resources, traces, products, etc. presented by trusted communication based on the needs of the transaction, and only have the number of the archive station. Signature, the authenticity of its data and the impossibility of the data transmission process, can not be modified, can be trusted.
②事中可信: 就是在使用可信通信交易时, 其数字签名项下的交易主体与交 易内容, 不可冒充、 不可篡改、 不可抵赖, 是可以信赖的。  2 Trustworthy in the matter: When using trusted communication transactions, the transaction subject and transaction content under the digital signature item cannot be impersonated, tamperable, and non-repudiation, and can be trusted.
③事后可信: 也就是在交易后, 如果合法利益受到侵害, 使用可信通信和事 中留下的交易证据, 可以充分支持法律在个案上实现简单、 高效、 完整地复回被侵 害人的合法利益和惩治侵害人,互联网交往各方的合法利益在法律上的安全是可以 信赖的。  3 Afterwards, it is credible: that is, after the transaction, if the legitimate interests are infringed, the use of trusted communication and the evidence of the transaction left in the matter can fully support the law to achieve a simple, efficient and complete return of the infringed person on the case. Legal interests and punishment of infringements, the legal interests of the parties to the Internet are legally secure.
其交往可信链的基础,是存储在国家个人组织档案数据库中各个人组织档案数 据和数字签名技术。档案数据的可信, 是基于以个人组织档案法律制度为核心的法 律体系之构架、 设定与控制; 数字签名的可信, 是基于数字签名具有 "不可冒充、 不可篡改、 不可抵赖, 任何人都可验证。 "的技术特性。  The basis of its communication and trust chain is the data of individual organizations and digital signature technology stored in the national personal organization archive database. The credibility of archival data is based on the framework, setting and control of the legal system with the personal organization archives legal system as the core; the credibility of digital signatures is based on digital signatures, which are “not pretending, irreversible, non-repudiation, anyone Can be verified. "Technical characteristics.
事前可信,是促成和谐交易的有效手段。许多的交易,特别是较为重大的交易, 或安全性要求较高的交易, 只有在事前可信的基础上, 确切知悉对方诸如能力、 品 行、财力、产品质量等数据, 确定其履行能力等情况后, 才有可能使人放心确定交 易,从而增加符合条件方的交易机率,也正是如此,也会威慑人们约束自己的行为, 保持一种良好记录, 此乃也不失为事前可信的另一种功能。否则, 如果缺少事前可 信, 即使有着符合条件的各方, 也会因他方担心交易风险而不得不放弃交易, 妨碍 潜在交易各方对利益的追求, 也正是目前所普遍存在的现象, 如果没有选择余地, 就只能在战战兢兢的心理状态下作出某种交易, 无和谐可言。 Being credible beforehand is an effective means of facilitating harmonious transactions. Many transactions, especially larger ones, Or transactions with higher security requirements, only on the basis of pre-existing credibility, knowing the other party's data such as ability, conduct, financial resources, product quality, etc., and determining their ability to perform, can make people feel confident in determining the transaction. This increases the probability of a qualified party's trading, and it is also the case. It also deters people from constraining their behavior and maintaining a good record. This is another function that is credible beforehand. Otherwise, if there is a lack of credibility beforehand, even if there are eligible parties, they will have to abandon the transaction because they are worried about the risk of trading, which hinders the pursuit of interests by the parties to the transaction. It is also a phenomenon that is currently prevalent. There is no choice, only a certain kind of transaction can be made under the psychological state of war, no harmony.
事中可信, 备留了有效的交易证据。  Trustworthy in the matter, with valid evidence of transaction.
事后可信, 是基于简单可信的证据与简单可靠的手段。简单可信的证据, 也就 是在使用可信通信交易时所留下的交易电子证据,为使用可信通信远程提交证据参 加诉讼等事项提供了可能, 比起传统的其它类型证据要简单可信得多。简单可靠的 手段, 也就是在诉讼的过程中, 无论被告等人身在何处、 即使不予配合, 只要经法 定程序, 都能使用可信通信实现其法律文书的送达, 简单、 可靠、 高效, 从根本上 解决法律 "送达"之无奈; 无论诉讼等事项的各方参与人身在何处, 都可使用可信 通信在异处远程实现诉讼庭审等事项, 使诉讼等活动简单、 高效; 最后, 可信通信 所记录各档案人的财产、踪迹等数据, 经法定程序, 是法律裁判得以执行的可靠保 证, 并可在可信通信的支持下, 简单、 高效, 从而在个案上实现简单、 高效、 完整 地复回被侵害人的合法利益和惩治侵害人,是互联网交往各方合法利益在法律上安 全的可靠保证, 也是可信通信的实质性追求。并且, 基于侵害人的侵害行为不但不 能当前得利, 反而会被记录于污点, 并于今后利益交往以不利益影响, 必将威慑和 规范互联网交往人合法交往, 从而实现各个人组织简单、 安全、 高效全球交往。  Believable afterwards is based on simple and credible evidence and simple and reliable means. Simple and credible evidence, that is, electronic evidence of transactions left in the use of trusted communication transactions, provides the possibility of remotely submitting evidence to participate in litigation using trusted communications, and is simpler and more trustworthy than traditional other types of evidence. Much more. Simple and reliable means, that is, in the process of litigation, no matter where the defendant is, even if it does not cooperate, as long as the legal procedure can be used to achieve the delivery of its legal documents, it is simple, reliable and efficient. Basically solve the helplessness of the law "delivery"; regardless of where the parties involved in litigation and other matters are involved, they can use trusted communication to remotely realize litigation trials and other matters in a remote place, so that litigation and other activities are simple and efficient; Finally, the data recorded by the Trusted Correspondence Record, such as the property and traces of each archivist, is a reliable guarantee for the execution of the legal judgment through legal procedures, and can be simple and efficient with the support of trusted communication, thus making it simple in case. Recovering the legitimate interests of the infringed person and punishing the offenders efficiently and completely is a reliable guarantee for the legal security of the legitimate interests of all parties involved in the Internet, and is also a substantial pursuit of trusted communications. Moreover, the infringement based on the infringement can not only be profitable at present, but will be recorded in the stain, and in the future, the interest will be affected by the non-interest, and it will surely deter and regulate the legal interaction of the Internet contacts, thus realizing the simple and safe organization of each individual. , efficient global interaction.
显然,可信通信是一种能够满足各个人组织社会交往的直接需求(诸如与某人 通信等) 与根本性追求 (诸如取得某种利益等) 的通信。  Obviously, trusted communication is a communication that meets the direct needs of individuals to organize social interactions (such as communicating with someone, etc.) and fundamental pursuits (such as obtaining certain benefits, etc.).
1、 档案站可信通信平台构建方法  1. Method for constructing trusted communication platform of archive station
档案站可信通信平台的构建方法, 首先需要基于人的自私性与交往性, 并充分 利用计算机、互联网、数字签名技术的实现可能, 设计出个人组织档案法律制度立 法方案, 通过立法程序, 设立个人组织档案法律制度, 建立存储本国所有或部分个 人组织关于身体(组织体) 、 身份、 能力、 从业、 品行、 踪迹、 权益、 通信等类别 数据的国家个人组织档案数据库。在此基础上, 以支持可信通信、确保通信经营者 能准确计费和及时收费为目标,利用现有的技术,即可构建各档案站可信通信平台, 其重点是设立个人组织档案法律制度和相关策略, 其具体方案为: ( 1 ) 个人组织档案法 (设计方案) The construction method of the trusted communication platform of the archive station first needs to be based on human selfishness and communication, and make full use of the realization of computer, internet and digital signature technology, design a legislative plan for the personal organization archives legal system, and establish through the legislative procedure. The personal organization archives legal system establishes a national personal organization archive database that stores all or part of the individual organization's data on the body (organization), identity, ability, employment, conduct, traces, rights, communications and other categories. On this basis, with the goal of supporting trusted communication, ensuring that communication operators can accurately charge and timely charge, and using existing technologies, a trusted communication platform for each archive station can be constructed, with the focus on establishing personal organization archives laws. Institutions and related strategies, the specific programs are: (1) Personal organization file law (design plan)
第一章 总则  Chapter I General
第 1条 为了充分利用互联网构建简单、 安全、 高效的全球交往体系, 保护 和促进个人组织对合法利益的追求,维护社会交往秩序,构建和谐社会,制定本法。  Article 1 This Law is enacted in order to make full use of the Internet to build a simple, secure and efficient global communication system, to protect and promote the pursuit of legitimate interests by individual organizations, to maintain order of social interaction, and to build a harmonious society.
第 2条 本法将所有社会活动主体分类为个人、 组织二种, 合称个人组织。 组织, 是指合法成立或设立的机构, 包括国家机构、 社会团体、 公司、 合伙企 业、 独资企业等法人或非法人组织。  Article 2 This Law classifies all social activity subjects into individuals and organizations, collectively referred to as individual organizations. Organization refers to a legally established or established organization, including legal entities or unincorporated organizations such as state agencies, social organizations, companies, partnerships, and sole proprietorships.
第 3条 本法所称的个人组织档案,是指个人组织能够充分支持互联网与法 律促进高效交往、 设定本人具体义务、 记载本人具体权利、 保护交往各方合法 利益的历史、 当前数据集。  Article 3 The personal organization files referred to in this Law refer to the history and current data sets of individual organizations that can fully support the Internet and the law to promote efficient exchanges, set specific obligations, record their specific rights, and protect the legitimate interests of all parties involved.
第 4条 以具有全球唯一性和通用性的个人组织身份号为个人组织法定身份 标识和档案标识, 个人组织姓名或名称, 为法定辅助身份标识。  Article 4 The identity of an individual organization with a globally unique and versatile identity is the legal identity and file identification of the individual organization, and the name or name of the individual organization is the legal secondary identification.
第 5条 除法律禁止匿名交往的活动外, 个人组织可以以档案站为其颁发的 匿名数字证书序号为标识施行各种匿名交往活动,其法律后果归属于其匿名数字证 书序号所标识的行为人。  Article 5 In addition to the activities prohibited by law from anonymous communication, an individual organization may perform various anonymous communication activities by using the serial number of the anonymous digital certificate issued by the archive station, and its legal consequences are attributed to the actor identified by the serial number of its anonymous digital certificate. .
第 6条 本法适用于国家个人组织档案数据库的建立与管理, 个人组织档案 的建立, 以及个人组织档案数据的记录、 査询、 使用。  Article 6 This Law applies to the establishment and management of national personal organization archives, the establishment of personal organizational files, and the recording, inquiry and use of personal organizational archives.
第 7条 个人组织档案的建立和记录必须坚持真实原则。 因过错使个人组织 档案数据失真的个人组织, 应当承担其法律责任。  Article 7 The establishment and recording of personal organizational files must adhere to the principle of truth. Individual organizations that distort the archives of personal organizations due to faults shall bear their legal responsibilities.
第 8条 档案人, 即个人组织档案本人, 是档案的权利主体, 享有档案使用 权, 除法律另有规定外, 享有档案隐密权, 受法律保护。  Article 8 The archivist, that is, the personal organization file, is the right subject of the archives and enjoys the right to use the files. Unless otherwise stipulated by law, it enjoys the right to confidentiality of files and is protected by law.
第 9条 政府应当采用先进的管理方式和先进的技术, 确保个人组织档案数 据及其活动的安全可靠与便利。  Article 9 The government shall adopt advanced management methods and advanced technologies to ensure the security, reliability and convenience of individual organization file data and its activities.
第二章 国家个人组织档案数据库及其管理机构  Chapter II National Individual Organization Archives Database and Its Management Organization
第 10条 由国家最高行政机关设立档案局, 建立和管理国家个人组织档案数 据库及其各地档案站。  Article 10 The Archives Bureau shall be established by the highest administrative organ of the State to establish and manage the national personal organization archive database and its archives stations.
档案站为国家个人组织档案数据库工作机构,直接承担个人组织档案的建立与 档案数据的审核、 录入、 查询、 出证, 由档案局根据需要在全国各地建立, 实行档 案局垂直管理, 不受地方政府管辖。  The archive station is the national individual organization archive database working organization. It directly undertakes the establishment of personal organization files and the review, entry, inquiry and certification of archive data. The archives bureau establishes it throughout the country according to the needs, and implements the vertical management of the archives bureau. Government jurisdiction.
档案站所管辖区域由档案局确定,但档案人可以自主选择档案站进行档案数据 活动。 档案局可以根据需要设立派出机构, 即档案分局, 协助管理档案站。 The area under the jurisdiction of the archive station is determined by the archives bureau, but the archiver can independently select the archive station for archival data activities. The Archives Bureau can set up a dispatching agency, the Archives Branch, to assist in the management of the archives.
档案站可以根据需要设立派出机构, 即档案分站, 为档案人提供便利的数据服 务。  The archive station can set up a dispatching agency, that is, a file sub-station, as needed to provide convenient data services for archivists.
第 11条 国家个人组织档案数据库由全国各地档案站个人组织档案数据库共 同组成, 用于存储全国所有个人组织档案数据, 由档案官在各地档案站审核、建立 和录入。  Article 11 The national personal organization archives database is composed of the individual archives database of the archives stations throughout the country. It is used to store the archives data of all individual organizations in the country, which are reviewed, established and entered by the archives officers at various archives stations.
第 12条 已录入国家个人组织档案数据库的个人组织档案数据不得改写和删 除, 个人组织可以通过互联网按照本法规定的方式与程序查询、 使用该数据, 所有 数据活动应当有记录和当事人的电子签名。  Article 12 The personal organization file data that has been entered into the national personal organization archive database shall not be rewritten or deleted. Individual organizations may inquire and use the data through the Internet in accordance with the methods and procedures stipulated in this Law. All data activities shall have records and electronic signatures of the parties. .
第 13条 国家个人组织档案数据库的档案数据具有法律效力, 可以作为个人 组织进行各种社会活动的法律依据。  Article 13 The archive data of the national individual organization archive database has legal effect and can be used as the legal basis for individual organizations to carry out various social activities.
第 14条 国家个人组织档案数据库系统为所有档案人设立法定信箱, 只接收 法律规定的法律文书, 由档案官审核和送入, 除法律另有规定外, 所送入法律文书 期满 3日视为送达,档案人应当为其法定信箱设定法律文书到达通知,并及时査阅。  Article 14 The national personal organization archive database system shall establish a legal letter box for all archivists, and only accept legal documents prescribed by law, which shall be reviewed and sent by the archives officer. Unless otherwise stipulated by law, the legal documents submitted shall be deemed to be 3 days after expiration. In order to be served, the archivist should set up a legal document arrival notice for his legal letter box and check it in time.
第 15条 如果一方与另一方存有合法事由, 一方可以向档案站申请向另一方 法律文书送达, 经档案官审核后, 由档案官送入被送达人法定信箱。具体审核程序 与方法, 由法律另行规定。  Article 15 If one party has a legitimate cause with the other party, one party may apply to the archives station for service to the other party's legal documents, and after being reviewed by the archives officer, the archives officer shall send the legal person's mailbox to the addressee. The specific review procedures and methods shall be separately prescribed by law.
第三章 档案官  Chapter III Archives Officer
第 16条 档案官是在档案站具体操作建立个人组织档案和审核、录入、查询、 出证个人组织档案数据的工作人员。  Article 16 The archivist is a staff member who establishes personal organization files and audits, enters, inquires, and issues personal organization file data in the archive station.
第 17条 担任档案官的人员必须具备下列条件:  Article 17 The personnel serving as archivists must meet the following conditions:
(一) 理工类本科以上学历;  (1) Bachelor degree or above in science and engineering;
(二) 取得三级以上计算机等级;  (2) Obtaining a computer level of three or more levels;
(三) 取得法律职业资格;  (3) Obtaining legal professional qualifications;
(四) 年满 28周岁, 有 3年以上工作经历;  (4) At least 28 years of age, with more than 3 years of work experience;
(五) 身体健康。  (5) Good health.
有下列情形之一的人员不得担任档案官:  A person who has one of the following circumstances may not serve as an archivist:
(一) 曾故意犯罪或因赌博、 吸毒、 欺诈被行政处罚的;  (1) having been deliberately guilty of crimes or being punished by gambling, drug abuse or fraud;
(二) 职务赔偿责任保险金余额不足 50万元的;  (2) The balance of liability insurance premiums is less than 500,000 yuan;
(三) 曾有逃避债务行为的;  (3) There have been acts of evading debt;
(四) 曾被开除公职的。 档案官必须参加职务赔偿责任保险。 (4) Those who have been expelled from public office. Archivists must participate in job liability insurance.
第 18条 实行档案官个人负责制, 每个档案官独立完成每项操作, 对其操作 的真实性和完整性独立承担责任。  Article 18 The individual accountability system of the archives officer shall be implemented. Each archiver shall complete each operation independently and shall be solely responsible for the authenticity and completeness of its operations.
第 19条 档案官应当忠于职守,应当尽最大可能审核所操作档案数据的真实 性和完整性, 不得泄露和使用在履行职务过程中所知悉的档案数据。  Article 19 The archives officer shall be devoted to his duties and shall, as far as practicable, review the authenticity and completeness of the data of the operational files, and shall not disclose or use the archived data that is known during the performance of his duties.
第 20条 档案官为了核对个人组织档案数据,有权査阅相关的资料,相关组 织或个人应当予以协助。  Article 20 In order to verify the data of an individual's organization, the archives officer has the right to access relevant materials, and relevant organizations or individuals shall assist.
第 21条 档案官工资待遇不得低于当地平均工资 8倍。  Article 21 The salary of the archives officer shall not be less than 8 times the local average salary.
第四章 个人组织档案数据项目  Chapter IV Personal Organization File Data Project
第 22条 个人档案数据项目包括:  Article 22 Personal profile data items include:
A. 身体: 1、 身份号; 2、 姓名; 3、 数字证书; 4、 相片; 5、 指纹; 6、 眼虹 膜; 7、 声音; 8、 DNA标记; 9、 出生记录; 10、 体检记录; 11、 诊疗记录。  A. Body: 1. Identity number; 2. Name; 3. Digital certificate; 4. Photograph; 5. Fingerprint; 6. Eye iris; 7. Sound; 8. DNA mark; 9. Birth record; 10. Medical record; 11, medical records.
B. 身份: 1、 国籍; 2、 区籍; 3、 民族; 4、 参加党派与团体; 5、 信奉宗教; 6、 近亲属; 7、 婚姻状况; 8、 监护人; 9、 被监护人; 10、 被委托人; 11、 聘护律 师事务所; 12、 职权; 13、 委托代理权。  B. Identity: 1. Nationality; 2. Districtship; 3. Ethnicity; 4. Participation in parties and groups; 5. Belief in religion; 6. Close relatives; 7. Marital status; 8. Guardian; 9. Guardian; Trustee; 11, hiring a law firm; 12, authority; 13, entrusted agency.
C. 能力: 1、 体能; 2、 知识能力; 3、 操作能力; 4、 逻辑思维能力; 5、 组织 协调能力; 6、 情绪能力; 7、 学历; 8、 学位; 9、 执业资格; 10、 成功案例; 11、 技术奖励; 12、 技术过失。  C. Competence: 1. Physical ability; 2. Knowledge ability; 3. Operation ability; 4. Logical thinking ability; 5. Organization and coordination ability; 6. Emotional ability; 7. Education; 8. Degree; 9. Licensing qualification; Successful cases; 11, technical rewards; 12, technical negligence.
D. 从业: 1、 许可执业权; 2、 许可经营权; 3、 许可生产权; 4、 从业记录; D. Employment: 1. Licensing right; 2. Licensing right; 3. Licensing production right; 4. Employment record;
5、 业内评价; 6、 基准分类信息。 5, industry evaluation; 6, benchmark classification information.
E. 品行: 1、 刑事处罚; 2、 行政处罚; 3、 欺诈行为; 4、 失信行为; 5、 恶 意纠缠诉讼; 6、 拒不执行已决法律义务; 7、 重大违纪; 8、 通信品行等级。  E. Conduct: 1. Criminal punishment; 2. Administrative punishment; 3. Fraudulent behavior; 4. Untrustworthy behavior; 5. Malicious entanglement litigation; 6. Refusal to enforce the legal obligation; 7. Major disciplinary violation; .
F. 踪迹: 1、 住所; 2、 踪迹; 3、 出入境登记。  F. Traces: 1. Residence; 2. Traces; 3. Entry and exit registration.
G. 权益: 1、 货币; 2、 固定资产; 3、 动产; 4、 债权; 5、 债务; 6、 知识产 权; 7、 股权及其份额; 8、 合伙企业投资权及其份额; 9、 独资企业投资权及其份 额。  G. Equity: 1. Currency; 2. Fixed assets; 3. Movable property; 4. Creditor's rights; 5. Debt; 6. Intellectual property rights; 7. Equity and its share; 8. Partnership investment rights and shares; Corporate investment rights and their share.
H. 通信: 1、 法定信箱; 2、 通信链接; 3、 可信首页; 4、 通信数字证书。 第 23条 组织档案项目包括- H. Communication: 1. Statutory mailbox; 2. Communication link; 3. Trusted homepage; 4. Communication digital certificate. Article 23 Organizational archival projects include -
A. 组织体: 1、 身份号; 2、 名称; 3、 数字证书; 4、 组建人; 5、 组建事由;A. Organization: 1. Identity number; 2. Name; 3. Digital certificate; 4. Formation person; 5. Establishment cause;
6、 管理机构; 7、 组成人员; 8、 批准书; 9、 成立日期。 6. Management organization; 7. Composition personnel; 8. Approval; 9. Date of establishment.
B. 身份: 1、 国籍; 2、 区籍; 3法定代表人; 4、 授权代表人; 5、 被委托人; 6、 职权; 7、 委托代理权。 B. Identity: 1. Nationality; 2. District citizenship; 3 Legal representative; 4. Authorized representative; 5. Trustee; 6. Authority; 7. Entrusted agency.
C. 能力: 1、 体能; 2、 知识能力; 3、 操作能力; 4、 逻辑思维能力; 5、 组织 协调能力; 6、 情绪能力; 7、 学历; 8、 学位; 9、 执业资格; 10、 成功案例; 11、 技术奖励; 12、 技术过失; 13、 生产条件; 14、 经营条件; 15、 执业条件。  C. Competence: 1. Physical ability; 2. Knowledge ability; 3. Operation ability; 4. Logical thinking ability; 5. Organization and coordination ability; 6. Emotional ability; 7. Education; 8. Degree; 9. Licensing qualification; Successful cases; 11, technical rewards; 12, technical negligence; 13, production conditions; 14, operating conditions; 15, practice conditions.
D. 从业: 1、 许可经营权; 2、 许可生产权 ; 3、 从业记录; 3、 业内评价; 4、 基准分类信息。  D. Employment: 1. Licensing management rights; 2. Licensed production rights; 3. Employment records; 3. Industry evaluation; 4. Benchmark classification information.
E. 品行: 1、 刑事处罚; 2、 行政处罚; 3、 欺诈行为; 4、 失信行为; 5、 恶意 纠缠诉讼; 6、 拒不执行已决法律义务; 7、 重大违纪; 8、 通信品行等级。  E. Conduct: 1. Criminal punishment; 2. Administrative punishment; 3. Fraudulent behavior; 4. Untrustworthy behavior; 5. Malicious entanglement litigation; 6. Refusal to enforce the legal obligation; 7. Major disciplinary violation; .
F. 踪迹: 1、 住所; 2、 踪迹。  F. Traces: 1. Residence; 2. Traces.
G. 权益: 1、 货币; 2、 固定资产; 3、 动产; 4、 债权; 5、 债务; 6、 知识产 权; 7、 股权及其份额。  G. Equity: 1. Currency; 2. Fixed assets; 3. Movable property; 4. Creditor's rights; 5. Debt; 6. Intellectual property rights; 7. Equity and its share.
H.通信: 1、 法定信箱; 2、 通信链接; 3、 可信首页; 4、 通信数字证书。 第 24条 个人组织档案项目实施细则由最高行政机关制定。  H. Communication: 1. Legal letter box; 2. Communication link; 3. Trusted home page; 4. Communication digital certificate. Article 24 The implementation rules of the individual organization archives project shall be formulated by the highest administrative organ.
第五章 个人组织档案建立与数据录入、 查询、 使用和出证  Chapter V Establishment of Personal Organization Files and Data Entry, Query, Use and Certification
第 25条 除具有外交豁免权的外国人和外国组织外, 凡是在本国境内的个人 组织都应当按照本法规定的项目与内容全面、真实、准确、及时建立个人组织档案。  Article 25 Except for foreigners and foreign organizations with diplomatic immunity, all individual organizations within their own territory shall establish personal organization files in a comprehensive, true, accurate and timely manner in accordance with the items and contents stipulated in this Law.
第 26条 个人组织档案实际数据发生变化的, 应当及时录入。  Article 26 If the actual data of an individual organization file changes, it shall be entered in time.
第 27条 所有录入个人组织档案的数据应当有当事人的电子签名。  Article 27 All data entered into an individual's organizational file shall be electronically signed by the parties.
第 28条 个人组织档案不得重复建立。  Article 28 Individual organization files shall not be established repeatedly.
第 29条 个人组织档案自自然人出生和组织成立或设立起建立。  Article 29 Individual organization files are established from the birth or establishment of natural persons.
第 30条 具有接生服务的医疗服务机构应当由档案站配备自然人出生记录 仪。  Article 30 A medical service institution with a birth attendance service shall be equipped with a natural person birth record recorder from the archive station.
自然人在医疗机构活体出生的, 医疗机构应当在其出生的当日, 由法律批准的 执业医师采集各项生物特征参数, 及时提交给当地档案站建立个人档案。  Where a natural person is born in a medical institution, the medical institution shall, on the day of its birth, collect the biometric parameters from the legally approved practicing physician and submit it to the local archive station for personal file.
自然人不在医疗机构出生的, 其监护人应当在 30日内将出生人带到档案站建 立个人档案。  If a natural person is not born in a medical institution, the guardian shall bring the born person to the archive station to establish a personal file within 30 days.
第 31条 组织在被批准成立或设立时, 由批准机构将有关数据传入当地档案 站建立组织档案。 未建立的, 组织不成立或设立无效。  Article 31 When an organization is approved to be established or established, the approval authority will transfer the relevant data to the local archives to establish an organizational file. If it is not established, the organization is not established or is invalid.
第 32条 任何个人组织, 在社会活动中确定、 产生出本法所规定档案项目的 数据时, 应当及时向档案站提交归位存档, 并对其真实性负责。  Article 32 When any individual organization determines or produces data on the archives items specified in this Law in social activities, it shall promptly submit the vesting archives to the archives station and be responsible for its authenticity.
任何个人组织在网络支付或网络收受货币时, 应当归位存档其具体对价事由。 个人组织发现本人档案数据与实事不符时, 应当及时提出予以更正。 第 33条 任何个人组织可以向档案站申请发布能够向公众提供的、 可以满足 公众生活、 学习、 工作、 生产、 经营等各种需求的基准分类信息, 经档案官审核后 在档案站基准分类信息网上免费发布, 申请人应当对其真实性承担责任。 Any individual organization that occupies the currency in the online payment or network should affix its specific consideration. When an individual organization finds that the file data of the person does not conform to the actual situation, it shall promptly make corrections. Article 33 Any individual organization may apply to the archives for the publication of benchmark classification information that can be provided to the public and can meet the various needs of the public, study, work, production, operation, etc., and the classification information of the archives in the archives after review by the archives officer. Freely posted online, the applicant should be responsible for its authenticity.
第 34条 任何个人组织向公众发布广告的, 应当首先向档案站申请发布其基 准分类信息, 并不得超出其基准分类信息的范围。  Article 34 Any individual organization that publishes advertisements to the public shall first apply to the archives station for the publication of its baseline classification information and shall not exceed the scope of its reference classification information.
第 35条 为保障安全或其它需要, 公共安全管理机构、场所所有人或管理人、 交通工具所有人或管理人可以向当地档案站申请在各边境出入口、交通要道、重要 场所、居民小区、交通工具安装踪迹仪,记录通过的人员及其交通工具、特定物品, 由档案站安装与维护, 申请人管理。  Article 35 In order to ensure safety or other needs, the public safety management agency, the owner or manager of the site, the owner or manager of the vehicle may apply to the local archives station for entrances and exits, major roads, important places, residential areas, The vehicle is equipped with a tracer, records the personnel passing through it, its means of transport, and specific items. It is installed and maintained by the archive station and managed by the applicant.
第 36条 向公众提供住宿与停泊交通工具的场所、 提供客运服务的公共交通 工具应当安装踪迹仪。  Article 36 Tracers shall be installed in public transportation vehicles that provide accommodation and parking facilities to the public and provide passenger transportation services.
第 37条 凡是在各种社会交往活动中能够方便记录踪迹的, 都应当设置踪迹 记录, 由公共安全管理机抅监督执行。  Article 37 Where it is convenient to record traces in various social interaction activities, trace records shall be set up and supervised by public safety management agencies.
第 38条 踪迹仪应当设置法律黑白名单报警或提示, 管理人在得到报警或提 示时, 应当采取相应措施  Article 38 The tracer shall set up a legal black and white list alarm or prompt, and the administrator shall take corresponding measures when receiving the alarm or suggestion.
第 39条 所有通过踪迹仪人员及其交通工具、 特定物品应当接受身份识别与 记录,所有记录的踪迹数据应当实时传送当地档案站归位存档,但不得向法律规定 以外的个人组织传送。  Article 39 All tracers and their means of transport and specific items shall be identified and recorded. All recorded trace data shall be transmitted to the local archive station for archival purposes in real time, but shall not be transmitted to personal organizations other than those required by law.
第 40条 公共安全管理机构可以使用踪迹数据进行社会公共安全监控与管 理, 但不得侵犯个人隐私。  Article 40 Public safety management agencies may use trace data to conduct social public safety monitoring and management, but may not infringe on personal privacy.
第 41条 限制进入的场所, 经向当地档案站申请准许后, 可以在踪迹仪中设 置允许通过的人员和交通工具, 其踪迹数据可以在准许范围内被查询和使用, 但必 须在踪迹仪前明示准许査询、 使用及其范围, 并不得侵犯他人的隐私。  Article 41 Where access is restricted, after permission is applied to the local archive station, persons and vehicles allowed to pass may be set in the tracer, and the trace data may be inquired and used within the permitted range, but must be in front of the tracer. Express permission to inquire, use and its scope shall not infringe on the privacy of others.
第 42条 档案人有权査阅和使用本人档案数据, 或者授权他人行使。 他人未 经档案人授权或法定程序, 不得查阅和使用。  Article 42 Archivists have the right to inspect and use their own file data, or authorize others to exercise. Others may not access and use others without the authorization or legal procedures of the archivist.
第 43条 档案数据除法律规定必须公开或隐密的项目外, 档案人有权决定本 人档案数据的公开状态, 非经本人同意, 不得被公开。  Article 43 Archives data In addition to items that must be disclosed or hidden by law, an archivist has the right to determine the public status of his or her file data, and may not be disclosed without the consent of the person.
第 44条 个人组织可以查询和合法使用他人正在公开的档案数据。  Article 44 Individual organizations may inquire and lawfully use the archive data that others are making public.
第 45条 为了社会的共同利益和保护个人组织的合法利益,经向档案站申请, 由档案官审查并负责,有关的国家机构可以在合理的范围内使用相关个人或组织的 档案数据。 Article 45 For the common interests of the society and the protection of the legitimate interests of individual organizations, the application to the archives station shall be reviewed and accounted for by the archives officer, and the relevant state agencies may use the relevant individuals or organizations within reasonable limits. File data.
第 46条 个人和组织应当谨慎保管好自己的私人密钥, 不得转借和泄露, 不 慎泄露的,应当立即注销。因泄露私人密钥而被他人假冒进行的数据活动仍然有效, 行为人与私人密钥所有人承担连带责任。  Article 46 Individuals and organizations shall carefully take care of their private keys, and may not lend or disclose them. If they are accidentally disclosed, they shall immediately cancel them. The data activity impersonated by others due to the disclosure of the private key is still valid, and the actor and the private key owner bear joint responsibility.
第 47条 如果档案人不具备档案数据操作能力或条件, 可以到档案站委托档 案官操作。  Article 47 If the archivist does not have the ability or condition to operate the file data, he may go to the archive station to commission the filer to operate.
第 48条 如果需要, 档案人可以到档案站申请出具本人档案数据的书面证明 书。  Article 48 If necessary, the archivist may go to the archives station to apply for a written certificate of his own file data.
第六章 法律责任  Chapter VI Legal Liability
第 49条 故意伪造、 泄露、 非法使用个人组织档案数据的, 应当赔偿损失; 档案官处 X—— X X万元罚金, 并开除公职; 其他国家机构工作人员处 X千元—— X X万元罚金, 情节严重的, 开除公职; 其他人员处 X千元—— X X万元罚金; 构 成犯罪的, 追究刑事责任。  Article 49 Whoever intentionally forges, divulges or illegally uses the personal organization's archives data shall compensate for the loss; the archives official department X - XX million fines, and expulsion from public office; other state agencies staff X thousand yuan - XX million fines If the circumstances are serious, the public office shall be expelled; the other personnel shall be charged 1,000 yuan - XX million yuan fine; if the crime is constituted, criminal responsibility shall be investigated.
第 50条 对个人组织档案数据失真、 泄露、 非法使用有过失责任的, 应当赔 偿损失; 情节严重的, 国家机构工作人员辞退公职; 构成犯罪的, 追究刑事责任。  Article 50 Anyone who is responsible for the distortion, disclosure or illegal use of personal organization's archives data shall be liable for compensation; if the circumstances are serious, the staff of the state agency shall be dismissed from public office; if it constitutes a crime, criminal responsibility shall be investigated.
(2) 全球定位地址码编制方法  (2) Global positioning address code preparation method
A、 以经纬度地理坐标为基础设定经线码值和纬线码值, 但不分东西经和南北 纬。  A. Set the warp code value and the latitude code value based on the latitude and longitude geographic coordinates, but do not distinguish between east and west and north and south latitude.
B、 经线码值以东经 180度为零点起点 (虑及日期变更) , 向东绕地球一圈 96 等分(取 4倍于 24小时, 便于计算时差) , 每 1等分称 " la"; 每 la再分 100等 分, 每 1等分称 " lb"; 每 lb再分 100等分, 每 1等分称 " lc" ; 每 lc再分 100 等分, 每 1等分称 " Id" 。 每一级码值不够两位的, 用 "0"补。  B. The warp code value starts at 180 degrees east longitude (taking into account the date change), and circulates 96 times in the east around the earth (takes 4 times 24 hours, which is convenient for calculating the time difference), and every 1 minute is called "la"; Each la is divided into 100 equal parts, each aliquot is called "lb"; each lb is divided into 100 equal parts, each aliquot is called "lc"; each lc is divided into 100 equal parts, and each aliquot is called "Id". . If the value of each level is not enough for two digits, use "0" to make up.
纬线码值从南纬 90度起到北纬 90度 48等分, 其它精度级别的等分方法与经 线码值相同。  The latitude code value is equally divided from 90 degrees south latitude to 90 degrees 48 degrees north latitude. The equal division method of other precision levels is the same as the warp code value.
经线码值与纬线码值, 共同构成确定地球上任何一点相对位置的经纬线坐标 码。 并以 a、 b、 c、 d的 4级精度码值, 确定地球上任一地点所处的 a ~~ d级精度 区域。  The warp code value and the latitude code value together form a latitude and longitude coordinate code that determines the relative position of any point on the earth. And the a-level, d-level precision code values of a, b, c, and d are used to determine the a ~~ d-level precision area at any location on the earth.
按 WGS- 84 GPS基准椭球的赤道半径 a=6378137m计算, 设纬线码值为 W, 则各 级精度区域至少不大于:  According to the equatorial radius of the WGS-84 GPS reference ellipsoid a=6378137m, if the latitude code value is W, then the precision area of each level is at least not greater than:
a级: 18km X 418km Sin (WX 180/48)  Class a: 18km X 418km Sin (WX 180/48)
b级: 4. 18km X 4. 18km Sin (WX 180/48 ) c级: 41. 8raX 41. 8ra Sin (WX 180/48) Level b: 4. 18km X 4. 18km Sin (WX 180/48 ) Class c: 41. 8raX 41. 8ra Sin (WX 180/48)
d级: 41. 8cmX 41. 8cm Sin (WX 180/48)  Class d: 41. 8cmX 41. 8cm Sin (WX 180/48)
因单位经线码值的间隔距离是随着纬线偏离赤道(W=24)越大而变小, 精度区 域也是如此, 但单位纬线码值的间隔距离则基本保持不变。  Since the separation distance of the unit warp code value becomes smaller as the latitude deviates from the equator (W=24), the precision area also does, but the separation distance of the unit latitude code value remains substantially unchanged.
实际上, 该经纬 "a"码值与原早已使用的经纬 "度"数值只是一种纯数学换 算关系。 例如: 假定上海某公司在东经 121 ° 24' 08 " , 北纬 3Γ 12 ' 19 " , 可换 算为- In fact, the latitude and longitude "a" code value is only a purely mathematical conversion relationship with the longitude and latitude "degree" value that has been used. For example: Suppose a company in Shanghai is at 121 ° 24' 08 " east longitude and 3 Γ 12 ' 19 " north latitude, which can be converted to -
( 180+121+24/60+8/3600) X 96/360^80. 373926 经线码为: 80a37b39c26d (90+31+12/60+19/3600 ) X 96/360^32. 321407 纬线码为: 32a32bl4c07d 也就是说, 原来能够测量经纬度的器材, 也就等于可以测量该经纬 a码值, 只 是 a码值比度数值, 更能充分利用每一位的数字, 能够以最少位的数字, 表征最大 量的信息, 可以使我们的生活更简捷。 (180+121+24/60+8/3600) X 96/360^80. 373926 The warp code is: 80a37b39c26d (90+31+12/60+19/3600) X 96/360^32. 321407 The weft code is : 32a32bl4c07d That is to say, the equipment that can measure the latitude and longitude is equivalent to measuring the latitude and longitude code value, but only the a code value ratio value, which can make full use of the digits of each digit and can be characterized by the least digits. The greatest amount of information can make our lives easier.
C、 以 "@"为前缀, 将经线码值、 纬线码值同一精度级别的码值按经线码值、 纬线码值的顺序排列, 并在每一精度级别组合码后加一位校验码, 构成经纬坐标组 合地址码。该校验码为前面 4位数值和数的个位数, 除非前面 4位数值错误偏差的 代数和正好为 0或 10的倍数, 否则都可检出, 检出概率较高。 在上例中, 上海某 公司的地址码应为: @80323a37325b39147c26075d。  C, prefixed with "@", the code values of the same precision level of the warp code value and the latitude code value are arranged in the order of the warp code value and the latitude code value, and a check code is added after each combination of the precision level codes. , constitutes the latitude and longitude coordinate combination address code. The check code is the first 4 digits and the number of digits of the number. Unless the algebra of the previous 4 digits error deviation is exactly 0 or a multiple of 10, it can be detected and the probability of detection is high. In the above example, the address code of a company in Shanghai should be: @80323a37325b39147c26075d.
D、如果地址是多层多房的建筑物,需加以区分时, 则在其地址码后面加"(楼 层号)一(房号) #" 。 假设上例的公司在第 12层楼 16号房, 则该公司地址码为 @80323a37325b39147c26075dl2— 16tto如果所在的大楼有较为醒目的名称, 也可附 在其地址码后面, 但这只作为辅助标示, 并非为必要, 可用当地文字。假设上例的 公司所在的大楼叫 "创新大厦", 也可写成@80323&37325 39147026075(112— 16# 创新大厦。 同时, 如果有必要, 也可用本国文字同时标注, 如将上例标示为: @80323a37325b39147c26075dl2— 16#中国上海市 X X路 X X号创新大厦,以辅助记 忆和新旧地址标示方法的过渡。  D. If the address is a multi-storey building, if it needs to be distinguished, add "(floor number) one (room number) #" after the address code. Suppose the company in the above example is in the 16th floor of the 12th floor, the company's address code is @80323a37325b39147c26075dl2—16tto. If the building has a more prominent name, it can also be attached to its address code, but this is only used as an auxiliary sign. Not necessary, local text is available. Assume that the building in which the company in the above example is located is called "Innovative Building". It can also be written as @80323&37325 39147026075 (112-16# Innovation Building. At the same time, if necessary, it can also be marked with the national text, as shown in the above example: @80323a37325b39147c26075dl2 — 16# Innovation Building, No. XX, XX Road, Shanghai, China, with a transition from auxiliary memory and new and old address marking methods.
(3) 个人组织身份号编制方法  (3) Method for compiling personal organization identification number
个人组织身份号的结构 : " *" + "8位地址码" + " 1位身份类别码" + "身 份序号 (位数随序号大小而定) " + " 1位校验码" + T 。  The structure of the personal organization identification number: " *" + "8 digit address code" + "1 digit identity category code" + "identity serial number (number of digits depending on the serial number) " + " 1 digit check code " + T .
其中:  among them:
起始符 "*"与结束符 T : 在身份号中加入 "*"与 , 旨在使之无需在 书写时特别用文字加注 "身份号", 并与其它文字相隔离, 确保无论是单独书写、 还是与其它文字混合书写, 都可使人知晓是身份号, 也便于计算机识别; 同时还可 使身份序号的位数直接使用其自然位数, 无需事先规定位数而增添不必要的烦琐The start character "*" and the terminator T: Add "*" and "I" to the ID number, so that it is not necessary to add "identity number" to the text when writing, and is isolated from other characters, ensuring that it is separate. write, Still mixed with other words, it can make people know that it is an identity number, and it is also easy for computer to recognize. At the same time, it can also make the number of digits of the serial number directly use its natural digits, without adding unnecessary cumbersome without specifying the number of digits in advance.
8位地址码: 为档案站所在地的 a、 b级地址码的无地址前缀、 校验码、 精度 级别符的 8位地址码。 档案站, 是在 "个人组织档案法律制度"中直接承担个人组 织档案数据库的建立和个人组织档案数据的审核、 录入、 查询、 出证的机构, 也是 负责编制身份标识的法定机构。 如某档案站地址码为 "@80323a37325b" , 则该 8 位地址码为 "80323732" 。 8-bit address code: 8-bit address code with no address prefix, check code, and precision level code for the a and b-level address codes of the file station. The archive station is an organization that directly undertakes the establishment of an individual organization archive database and the review, entry, inquiry and certification of individual organization archive data in the "personal organization archives legal system", and is also the statutory body responsible for the compilation of identity. If the address code of a file station is "@80323a37325b", the 8-digit address code is "80323732".
身份类别码: 个人的类别码为 0; 其他 1—— 9的整数为各种组织类别码。 如: " 1 "为国家机构性组织, "2"为社会团体宗旨性组织, "3"为金融性组织, "4" 为学校性组织, "5"为医疗性组织, "6—— 9" 为其他经营性组织等。  Identity Category Code: The personal category code is 0; Others 1 - 9 integers are various organization category codes. Such as: "1" is a national institutional organization, "2" is a social organization, "3" is a financial organization, "4" is a school organization, "5" is a medical organization, "6-9 "For other business organizations, etc.
身份序号: 是档案站为在本站建立档案的个人或组织所编制的、在本站范围内 不重复的序号。 可以是随机确定, 或是自然排序, 或是人为选择。 但出生年月日是 个人的重要隐私, 不应当被直接作为编制身份序号的前缀。  ID: It is the serial number that the archive station has compiled for individuals or organizations that have created files on this site and does not repeat within the scope of the site. It can be randomly determined, or sorted naturally, or artificially. However, the date of birth is an important personal privacy and should not be directly used as a prefix for the serial number.
校验码: 为前面各位数码和的个位数。 用于校验, 只要任何一位数有误, 都可 以被检出; 如果是两位以上有误, 除非是误差的代数和为 0或 10的倍数, 也都可 以被检出, 有较高的检错概率。  Check code: is the single digit of the digits of the previous digits. For verification, as long as any one digit is wrong, it can be detected; if it is more than two digits, unless the algebra of the error is a multiple of 0 or 10, it can be detected, there is a higher The probability of error detection.
(4) 匿名数字证书序号  (4) Anonymous digital certificate serial number
匿名数字证书序号, 就是各档案站为档案人颁发匿名数字证书时所编排的序 号。  The serial number of the anonymous digital certificate is the serial number of each file station when it issues an anonymous digital certificate to the filer.
其结构可为 : " *#"+" 8位档案站地址码" +" 8位年月日数值(如' 20050101 ' ) " + "档案站在本日内为本档案站各档案人颁发匿名数字证书的自然排列序号" + 以匿名数字证书作数字签名时,不显示其签名人的身份号, 只显示其匿名数字 证书序号,或者最多为了便于匿名交往的称呼,可再附上由数字签名人随意取名的 绰名, 他人从该序号或绰名无法得知数字签名人的身份号, 是一种匿名数字签名。 但该匿名数字证书序号所对应的身份号可由档案站数据库系统中加密记录着,如果 需要, 经法定程序, 即可査知。  The structure can be: " *#"+" 8-digit file station address code "+" 8-digit year and month date value (eg '20050101') "+" file station to issue anonymous numbers for each file holder of this file station The natural serial number of the certificate " + When the digital signature is signed by the anonymous digital certificate, the identity number of the signer is not displayed, only the serial number of the anonymous digital certificate is displayed, or the name of the anonymous digital certificate is at most, and the digital signer can be attached. An anonymous name, the identity number of the digital signer cannot be known by the other person from the serial number or the anonymous name. It is an anonymous digital signature. However, the identity number corresponding to the anonymous digital certificate serial number can be encrypted and recorded by the archive station database system, and if necessary, it can be found through legal procedures.
也就是说, 基于行为人的可查性, 即使是以匿名数字签名匿名交往, 其利益与 不利益的法律后果, 依然可以归结于其匿名数字证书序号所对应身份号的个人组 织。在必要时, 经法定程序, 依然能够以其匿名数字证书序号主张权利和要求承担 责任, 与显名数字签名具有同样的法律后果。 因此, 人们在交往活动中, 就可以基于保护隐私或隐密的考虑, 以匿名数字签 名与他人匿名交往, 同样可以匿名使用本人的档案数据与他人通信、交易、 网络支 付等各种社会交往,也同样可以将其匿名交往中利与不利的档案数据归位存档于本 人档案。 That is to say, based on the traceability of the actor, even if the anonymous digital signature is anonymously associated, the legal consequences of the interests and non-interests can still be attributed to the personal organization of the identity number corresponding to the anonymous digital certificate serial number. When necessary, through legal procedures, it is still possible to claim rights and requirements with its anonymous digital certificate serial number, with the same legal consequences as a prominent digital signature. Therefore, in the interaction activities, people can anonymously associate with others by anonymous digital signatures based on the protection of privacy or confidentiality. They can also anonymously use their own file data to communicate with others, such as communication, transactions, and online payment. It is also possible to archive the file data of the anonymous and unfavorable anonymous data in the anonymous file.
无疑,这是一种崭新的交往方式,是传统交往体系中根本不可能有的交往方式。 Undoubtedly, this is a new way of communication, a form of communication that is impossible in the traditional system of communication.
( 5 ) 档案站基准分类信息网 (5) archive station benchmark classification information network
分类信息,就是个人、组织公开发布的, 能够满足公众生活、工作学习、生产、 经营等需求的各种类别信息。  Classified information is a variety of information that is publicly released by individuals and organizations and can meet the needs of public life, work and study, production, and operation.
基准分类信息, 就是个人组织, 经档案站审核与标准化编辑分类的、便于搜索 定位、 并写入个人组织档案的分类信息。  The benchmark classification information is the classification information of the individual organization, which is classified by the archives review and standardized editing, which is easy to search and locate, and is written into the personal organization file.
档案站基准分类信息网,就是统一集中公布个人、组织公众基准分类信息网页 的总和。 其内容包括:  The archive station benchmark classification information network is the sum of the unified and centralized publication of individual and organization public benchmark classification information web pages. Its contents include:
基准商业交往信息, 也即各个人组织的商品或服务的供求信息。  Benchmark business communication information, that is, supply and demand information of goods or services organized by individuals.
基准民事交往信息, 也即平等主体之间, 诸如合伙、 结社、 结伴、 交友、 征婚 等非赢利民事交往信息。  Benchmark civil communication information, that is, information on non-profit civil interactions between equal subjects, such as partnerships, associations, partnerships, friends, and marriage.
基准国家管理信息, 也即国家机构在管理国家社会过程中的各种信息。如国家 机构性组织的身份号、 地址、 组成、职责、职权等, 以及立法(包括颁布的法律法 规等) 、 行政、 检察、 审判等信息。  Base country management information, that is, various information in the process of national institutions in the management of national society. Such as the identity number, address, composition, responsibilities, authority, etc. of the national institutional organization, as well as legislation (including enacted laws and regulations, etc.), administrative, procuratorial, trial and other information.
基准知识库, 也即较为成熟或已有定论的科学知识。凡进入该基准知识库的数 据, 必须是经过专门机构审核选定的文章与书籍, 并以税收支付版费, 免费向公众 开放, 普及科学。 总之,档案站基准分类信息网的内容,在理论上,可以是无所不及、无所不包, 无限扩充, 凡是能够满足他人某种合法需求的信息都可包括在内。  A benchmark knowledge base, that is, a more mature or well-established scientific knowledge. All data entering the benchmark knowledge base must be reviewed by selected agencies and selected articles and books, and paid for by the tax, free of charge to the public, and popular science. In short, the content of the archives benchmark classification information network, in theory, can be all-encompassing, all-encompassing, unlimited expansion, and any information that can meet some legitimate needs of others can be included.
对此, 任何个人组织, 如果需要, 都可按法定的程序, 向档案站申请发布分类 信息, 经档案站审核后免费发布(以税收支持) , 申请人对其真实性承担责任, 审 核的档案官承担审核责任。  In this regard, any individual organization, if required, can apply to the archives station to publish classified information according to legal procedures, and publish it free of charge after being reviewed by the archive station (with tax support). The applicant is responsible for its authenticity. The officer assumes the responsibility for review.
同时, 即使由一国、 多国、乃至全世界的各档案站基准分类信息网所共同构成 的基准分类信息, 是一种海量信息; 但对于需要者来说,只要按地区、 按类别、 按 价格等关键项逐级点击鼠标, 即可搜索定位所需的信息。 "大海捞针不再难", 正 是计算机与网络的优势。 并且, 信息量越大, 更能满足需要者的需求, 更能使人们 在互联网上与陌生的不特定各方实现全球交往。 At the same time, even the basic classification information composed of the reference classification information networks of archives stations in one country, many countries, and even the whole world is a kind of massive information; but for those who need it, as long as they are by region, by category, by price When the key items are clicked on the mouse, you can search for the information you need for positioning. "The needle in a haystack is no longer difficult", which is the advantage of computers and networks. Moreover, the greater the amount of information, the better the needs of those who need it, and the more Global interaction with unfamiliar and unspecified parties on the Internet.
基于一种优良的品质、优势的技术, 基于一种法律的共同倡导、 约定俗成、基 准统一, 各档案站基准分类信息网, 自然而然就会成为人们发布信息与寻觅信息的 首选, 成为人们供求双方信息沟通之桥。  Based on a technology with excellent quality and superiority, based on a common advocacy, convention, and benchmarking of a law, the basic classification information network of each archive station will naturally become the first choice for people to publish information and seek information. Bridge of communication.
2、 掌机  2, the handheld
掌机, 就是具有无线数据通信、 编写文档、 数字签名、 身份识别、 网络支付、 卫星定位, 以及可以扫描阅读条形码、 磁卡、 IC卡等功能的掌上计算机。  The handheld is a handheld computer with wireless data communication, document writing, digital signature, identification, network payment, satellite positioning, and the ability to scan and read barcodes, magnetic cards, IC cards, and more.
其无线数据通信, 包括通过基站无线接入互联网, 近距离 (0. 1m范围) 与其 他掌机或其它设备仪器 (如收银机等) 有方向无线对驳数据通信, 近距离 (100m 范围) 与其它设备仪器 (如踪迹仪等)无方向无线数据通信。  Its wireless data communication, including wireless access to the Internet through the base station, close range (0. 1m range) with other handheld devices or other equipment (such as cash registers, etc.) directional wireless communication data communication, close range (100m range) with Other equipment instruments (such as tracers, etc.) have no direction wireless data communication.
掌机, 是个人组织互联网可信通信的重要产品。只有在掌机的支持下, 其可信 通信的优势才能得以充分发挥, 才能给社会交往以简单与高效。  The handheld is an important product for personal organization of Internet trusted communications. Only with the support of the handheld, the advantages of its trusted communication can be fully realized, so that social interaction can be simple and efficient.
3、 可信通信软件编构方法  3. Trusted communication software construction method
可信通信软件编构方法: 在各档案站可信通信平台的基础上,利用现有的技术 手段, 以在计算机或掌机上实现可信通信特定内容与过程为目标构编软件。  Trusted communication software construction method: Based on the trusted communication platform of each archive station, the existing technical means are used to construct software for the specific content and process of trusted communication on the computer or the handheld.
其可信通信的特定内容与过程为:(1)登录;(2)选择通信;(3)可信首页;(4)寻呼; (5)网站通信;(6)单向通信;(7)即时对话通信;(8)掌机或移动计算机任意接入互联网; (9)出示档案数据; (1Φ网络支付; (11)远程实人身份验证; 踪迹记录; (13)通信加密。  The specific content and process of its trusted communication are: (1) login; (2) selective communication; (3) trusted home page; (4) paging; (5) website communication; (6) one-way communication; (7) Instant dialogue communication; (8) Palm or mobile computer arbitrarily accessing the Internet; (9) Presenting archive data; (1 Φ network payment; (11) Remote real person authentication; Trace record; (13) Communication encryption.
具体如下:  details as follows:
( 1 )登录  (1) Login
登录, 就是通信人, 在装有可信通信软件、且已接入互联网上的计算机或掌机 上插入私密通信 IC卡,该 IC卡所载的个人或组织授权人即可在该计算机上"登录" 互联网寻呼他人和被他人寻呼。并且同一部计算机可以容纳多人登录与连接多个通 信终端。  The login is a communication person who inserts a private communication IC card on a computer or a handheld computer that is connected to the Internet and has access to the Internet. The person or organization authorized by the IC card can "login" on the computer. "The Internet pages others and is paged by others. And the same computer can accommodate multiple people to log in and connect to multiple communication terminals.
其中:  among them:
私密通信 IC卡, 是存有个人组织私密通信数据和能够进行通信数字签名运算 的 ic卡;  Private communication IC card is an ic card containing private organization private communication data and capable of performing communication digital signature calculation;
私密通信数据, 就是由能施行通信数字签名的数据, 即由档案站颁发的、包含 个人组织身份号或匿名数字证书序号的个人组织通信数字证书及其对应的公私密 钥, 以及本人对影响通信质量、 通信费用等通信因素(如互联网经营者、 路由、 速 度、 带宽等) 的选定数据组成; 同时, 在 ic卡上的加密私钥, 在技术上不能被导出的和复制, 从而确保私钥 的安全; Private communication data is data that can be digitally signed by communication, that is, an individual organization communication digital certificate issued by an archive station, containing a personal organization identification number or an anonymous digital certificate serial number, and its corresponding public and private keys, and the impact on communication The selected data consisting of communication factors such as quality, communication costs (such as Internet operators, routing, speed, bandwidth, etc.); At the same time, the encrypted private key on the ic card cannot be exported and copied technically, thereby ensuring the security of the private key;
该 "私密通信 IC卡", 如有操作能力和条件, 可自行制存; 否则, 就由档案 站档案官协助制存。  The "private communication IC card" can be self-made if it has operational capabilities and conditions; otherwise, it is assisted by the archives archive officer.
私密通信 IC卡插入计算机后,在可信通信软件的引导下,计算机与 IC卡结合, 向身份号或匿名数字证书序号所含的档案站发出身份验证的数字签名, 通过验证 后, 再将本计算机在互联网中所处的动态或静态的地址标识数据, 归位存档于"通 信链接"项目, 即完成了通信人的 "登录"; 同时也向互联网经营者发出对通信因 素选定的数字签名, 由互联网经营者据此收费。  After the private communication IC card is inserted into the computer, under the guidance of the trusted communication software, the computer and the IC card are combined, and the digital signature of the identity verification is sent to the file station included in the identity number or the anonymous digital certificate serial number. After verification, the user is authenticated. The dynamic or static address identification data of the computer in the Internet is archived in the "communication link" item, that is, the "login" of the correspondent is completed; and the digital signature of the communication factor is also sent to the Internet operator. , Internet operators charge accordingly.
另外, 如果所使用的计算机或掌机具有特定人体生物特征参数录入装置, 也可 通过录入特定人体生物特征参数(如指紋、 眼虹膜、 头像等)和输入本人身份号或 匿名数字证书序号, 再通过实人身份验证, 即可实现登录。  In addition, if the computer or handheld computer has a specific human biometric parameter input device, it can also enter specific human biometric parameters (such as fingerprint, iris, avatar, etc.) and enter the personal identification number or anonymous digital certificate serial number. Log in with real-life authentication.
(2 )选择通信  (2) Select communication
选择通信,就是在主叫身份及其相关档案数据真实可信的基础上, 各通信人设 定自己接收寻呼的主叫范围及其通信种类, 以便随心所欲地接收需要的通信、拒收 非需通信。  Selecting communication means that on the basis of the authenticity of the calling identity and its related file data, each communication person sets the calling range and its communication type of receiving the paging, so as to receive the required communication as desired, and reject the need. Communication.
其设定包括:  Its settings include:
只接收或拒绝接收某些指定身份号或匿名数字证书序号的寻呼;  Only receive or refuse to receive certain pages with the specified identity number or anonymous digital certificate serial number;
只接收能够输入特定密码的寻呼;  Only receive pages that can enter a specific password;
只接收或拒收某些指定职务、 行业范围的寻呼;  Only accept or reject certain specified job, industry-wide pages;
拒收低于某种通信品行等级的不特定公众的寻呼;  Rejecting pages of unspecified public that are below a certain communication line level;
接收或拒绝接收匿名寻呼;  Receiving or refusing to receive anonymous pages;
以及设定对什么样的人、 哪些人接收什么类型的通信, 如单向通信、 即时语音 对话、 即时音像对话等。  And setting what type of communication to whom and who receives, such as one-way communication, instant voice conversation, instant audiovisual dialogue, and the like.
向特定个人、 组织的网站定制特定的信息, 如新闻、 天气预报、 政府公告等。 总之,在各方通信人身份及其相关资料可信的基础上, 就可以真实地滤除和选 通指定的寻呼。 即使作为通信标识的身份号是公开的,但也无需担心非需通信的搔 扰, 只要设定将其滤除即可, 而无需像现在这样, 只能靠隐密电话号码逃避搔扰, 或者是非需邮件的搔扰, 防不胜防。  Customize specific information, such as news, weather forecasts, government announcements, etc., to specific individuals, organizations' websites. In short, based on the credibility of the identity of the parties and their associated information, the specified pages can be truly filtered and strobed. Even if the identity number as the communication identifier is public, there is no need to worry about the nuisance of communication, as long as it is set to filter it out, instead of relying on the secret phone number to avoid harassment, or It is a harassment of non-mail, and it is impossible to prevent.
同时, 基于社会管理的需求, 对于诸如自然灾害警报、 善意警示或告知、 法律 文书送达等特定的信息, 经法定程序, 可由档案站穿透任何拒收设定, 强制送达, 发送给所辖公众或特定的个人、 组织, 并由系统自动发回阅读回执。 At the same time, based on the needs of social management, specific information such as natural disaster warnings, bona fide warnings or notifications, legal document delivery, etc., through legal procedures, can be penetrated by the archive station for any rejection setting, mandatory delivery, Send it to the public or specific individuals, organizations, and automatically send back read receipts.
另外, 在选择通信、 身份识别的基础上, 还可实现合法的远程访问、 协助、 控 制等功能。  In addition, based on the choice of communication and identification, legal remote access, assistance, control and other functions can be realized.
(3) 可信首页  (3) Trusted Homepage
可信首页, 就是在可信通信中, 由档案站可信通信平台支持与管理, 最先面向 主叫展示被叫可信数据的页面。  The trusted home page is supported and managed by the archive station trusted communication platform in the trusted communication, and the page for displaying the trusted data of the called party is firstly presented to the caller.
其内容: 为被叫法定公开或自愿公开的身份号、 姓名 (名称) 、 品行、 基准分 类信息等档案数据, 通信链接。其通信链接包括通信分机、 网站等链接菜单, 甚至 还可以包括现行的电话、 手机等。  Its contents: It is the link data of the identity number, name (name), conduct, benchmark classification information, etc., which is legally disclosed or voluntarily disclosed by the called party. Its communication links include link menus for communication extensions, websites, and even current phones, mobile phones, and so on.
这是可信通信的一种高级附加项, 旨在给实现法律规定或自愿面向公众展示 "被叫"可信面貌, 提供一种有效的途径。  This is a high-level add-on to trusted communications that aims to provide an effective way to implement legal requirements or voluntarily present to the public the credible face of “called”.
当主叫寻呼时, 如果被选通, 且无其它控制项, 首先面向主叫的页面就是被叫 的可信首页, 然后再由主叫点击菜单链接, 即可实现相应的通信。  When the calling party is paged, if it is strobed and there are no other control items, the page facing the calling party is the trusted home page of the called party, and then the calling party clicks the menu link to realize the corresponding communication.
如果该首页无内容, 可为空白, 并在被叫时直接进入相应的通信。  If the home page has no content, it can be blank, and directly enter the corresponding communication when called.
(4) 寻呼  (4) paging
登录后, 当需要寻呼被叫时, 只要输入被叫的身份号或在匿名交往中得知的匿 名数字证书序号, 可信通信软件首先作用于该寻呼标识所含地址码的档案站, 如果 被选通, 就读取被叫的 "通信链接"数据, 再以该数据连接 "主叫"与 "被叫"之 间的数据流而实现通信。即使被叫不在线, 也可以通过档案站或其指定的代理服务 器所能承受的数据量范围内留文、 留语、 留像, 被叫只要再登录, 就可自动取得。 如果被叫在线而无接听, 即可径直向被叫的计算机留文、 留语、 留像。  After logging in, when paging is called, as long as the called identity number or the anonymous digital certificate serial number learned in the anonymous interaction is input, the trusted communication software first acts on the file station of the address code included in the paging identifier. If it is strobed, it reads the "communication link" data of the called party, and then uses the data to connect the data flow between "calling" and "called" to achieve communication. Even if the called party is not online, you can receive the text, language, and image in the range of data that the file station or its designated proxy server can bear. The called party can be automatically obtained by logging in again. If the called party is online and does not answer, you can go to the called computer to leave a text, a foreign language, and a picture.
如果个人组织有包括移动掌机在内的多部可区别的分机,且主叫是被叫的选通 范围, 寻呼 "身份号"之后, 将出现有如住宅、 办公室、 掌机、 某部门等提示的二 级菜单 (且该二级以后的菜单也可以设定显示范围) , 只要点击相应的菜单即可。 如果需要, 还可继续逐级向下延伸。 当然, 也可在输入身份号时, 再加输相应的代 码, 即可直接进入指定的通信。  If the individual organization has multiple distinguishable extensions including the mobile console, and the calling party is the strobed range of the called party, after paging the "identity number", there will be such as residential, office, handheld, certain department, etc. The secondary menu of the prompt (and the menu after the second level can also set the display range), just click the corresponding menu. If necessary, you can continue to extend down the level. Of course, you can also enter the corresponding code when you enter the ID number, you can directly enter the specified communication.
寻呼时,主叫方可以自主控制向被叫显示私密通信 IC卡的真实身份号与姓名, 或者再加上其它可信的档案数据资料(如工作单位及其职务等),甚至还可以显示 主叫方所处的可信地址码, 以可信与诚意开启被叫之门。  When paging, the calling party can control the real identity number and name of the private communication IC card to the called party, or add other trusted file data (such as work unit and its position), and even display The trusted address code of the calling party, open the door of the called party with credibility and sincerity.
同时,主叫也可以匿名呼叫,被叫只能知道其匿名数字证书序号,或再加綽名, 且被叫明知主叫是匿名的, 至于被叫是否接收, 就取决于被叫的设定。但如果匿名 主叫恶意搔扰损害等, 经过相应的法律程序, 匿名主叫也是可査的, 并可降低其通 信品行等级与追究法律责任。 At the same time, the caller can also call anonymously. The called party can only know its anonymous digital certificate serial number, or add an alias, and the called party knows that the calling party is anonymous. Whether the called party receives or not depends on the called setting. But if anonymous The caller maliciously harasses the damage, etc. After the corresponding legal procedures, the anonymous caller is also available, and can reduce the level of communication and the legal responsibility.
在技术上, 可以排除假冒私密通信 IC卡之外的身份号, 但无法排除有人将自 己的私密通信 IC卡或通信登录出借给他人使用, 只能靠法律来调整。 如果有人将 自己的私密通信 IC卡出借给他人恶意寻呼与通信, 则应当由法律规定承担连带责 任, 但这往往会给出借人带来损害, 通常也不会有人轻易出借。 并且, 在要求较高 的场合, 可通过远程身份识别检验通信人的真实身份。  Technically, the identity number other than the fake private communication IC card can be excluded, but it is impossible to exclude someone from lending their private communication IC card or communication to others for use, and can only be adjusted by law. If someone lends their private communication IC card to someone else for malicious paging and communication, it should be jointly and severally liable by law, but this often gives damage to the borrower, and usually no one will lend it easily. Moreover, in the case where the demand is high, the real identity of the correspondent can be verified by remote identification.
另外, 如果一个人屡屡恶意寻呼与通信, 在个人组织档案法律制度之下, 通过 相应的法律程序, 将被降低通信品行等级, 从而会被许多人列入拒收的范围之中, 既可阻止其再行不端, 又可使其自食不利益之苦果, 并将威慑世人不可为之。  In addition, if a person repeatedly maliciously pages and communicates, under the personal organization file legal system, through the corresponding legal procedures, the communication line level will be lowered, which will be included in the rejection range by many people. Preventing them from doing wrong again can make them suffer from self-sufficiency and will not deter the world.
( 5 ) 网站通信  (5) Website communication
网站通信, 就是通信人与个人组织网站的数据交换的过程, 包括阅览网页、视 频点播、 上传数据等。  Website communication is the process of data exchange between a communication person and a personal organization website, including viewing web pages, video on demand, uploading data, and the like.
这是将目前大家所称的网站或个人主页纳入个人组织互联网可信通信体系之 中的结果, 旨在强调网站的归属性与责任性, 以改变目前个人主页、 网站给人似似 而虚之感觉的形象。  This is the result of incorporating the current website or personal homepage into the personal organization's Internet trusted communication system. It aims to emphasize the attribution and accountability of the website, so as to change the current personal homepage and website. The image of feeling.
事实上,任何网站、个人主页都是特定的个人或组织设立的,必定有其所属人, 都可归结为个人、 组织的网站。  In fact, any website or personal homepage is set up by a specific individual or organization, and must have its own people, which can be attributed to the website of an individual or organization.
同时, 也是将个人组织的信息活动一体化, 确保一种整体性, 使个人组织的信 息活动简单和统一。  At the same time, it also integrates the information activities of individual organizations to ensure a holistic nature and make the information activities of individual organizations simple and unified.
其实, 网站也可视为一种数据库,而网页只是该数据库供人阅览与数据交换的 窗口。  In fact, the website can also be regarded as a kind of database, and the web page is only the window for the database to be viewed and exchanged.
在具体操作时, 人们只要输入身份号或匿名数字证书序号, 选择网站通信, 或 在其 "可信首页"上点击其网站链接, 就可阅览该个人或组织的网站, 除非阅览人 已被设定拒绝。  In the specific operation, people only need to enter the identity number or anonymous digital certificate serial number, select website communication, or click on their website link on their "trusted home page", you can view the website of the individual or organization, unless the reader has been set Definitely refused.
( 6 ) 单向通信  (6) One-way communication
单向通信, 就是只要主叫在被叫方的选受范围, 即使被叫在线, 也无需被叫人 应答, 主叫就可单向径直给被叫计算机发送电文、 语音、 音像等数据, 类似于现在 的传真、 短信, 但其功能与作用, 就不是现在的传真、 短信可以比拟的; 如果被叫 不在线,只要主叫所发送的数据量不超过其档案站代理服务器或其指定代理服务器 的承受值,主叫也可单向径直给被叫档案站代理服务器或其指定的代理服务器发送 数据, 当被叫再次登录时就自动从代理服务器收受数据; 如果被叫不在线, 且主叫 数据量超过被叫代理服务器承受值, 主叫可向被叫贮存呼叫, 当被叫再次登录后, 主叫也在线, 主叫计算机就自动将所贮存的数据径直单向发送给被叫。 One-way communication means that as long as the calling party is in the receiving range of the called party, even if the called party is online, there is no need to be answered by the calling party, and the calling party can directly send the text, voice, audio and video data to the called computer in one direction. In the current fax, SMS, but its function and role, it is not the current fax, SMS can be compared; if the called is not online, as long as the amount of data sent by the caller does not exceed its archive station proxy server or its designated proxy server The bearing value can also be sent directly to the called archive station proxy server or its designated proxy server. Data, when the called party logs in again, it automatically receives data from the proxy server; if the called party is not online, and the called data volume exceeds the value of the called proxy server, the calling party can store the call to the called party, and when the called party logs in again, The calling party is also online, and the calling computer automatically sends the stored data to the called party in one direction.
被叫收受、 阅读后, 由系统自动发回收受、 阅读回执。  After the called party accepts and reads, the system automatically sends out the receipt and reading receipt.
如果对通信内容实施数字签名,则可以确保其通信内容的可信, 且系统自动发 回的回执, 具有法律上的证据效力。  If the communication content is digitally signed, it can ensure the credibility of its communication content, and the receipt sent back automatically by the system has legal evidence effect.
(7) 即时对话通信  (7) Instant dialogue communication
主叫与被叫通连后, 就可以根据需要, 利用各自的计算机, 随意选择电文、语 音、音像等即时对话通信, 并可随意存储其通信的内容。 同时, 可以在计算机上安 装一个或多个语音、音像对话终端, 并延伸到离计算机较远的地点, 其计算机就起 着类似于交换机的作用, 即使对话通信就像现在的电话一样方便, 并且还可根据需 要进行视频对话。  After the caller and the called party are connected, they can use their own computers to select instant messaging communication such as text, voice, audio and video, and store their communication content at will. At the same time, one or more voice, audio and video dialogue terminals can be installed on the computer and extended to a remote location from the computer, and the computer functions like a switch, even if the conversation communication is as convenient as the current telephone, and Video conversations can also be made as needed.
也当然, 仍然可以保持现有的电话通信, 并可与计算机通信互联。  Of course, existing telephone communications can still be maintained and communicated with the computer.
(8)掌机或移动计算机任意接入互联网  (8) Any access to the Internet by a handheld or mobile computer
掌机或移动计算机任意接入互联网,就是掌机或移动计算机任意通过公用无线 基站无线接入互联网, 或者掌机直接有线接入互联网, 或移动计算机在客处有线接 入互联网, 然后实现与前述一样的可信通信。  The handheld or mobile computer can access the Internet arbitrarily, that is, the handheld or mobile computer can wirelessly access the Internet through the public wireless base station, or the handheld can directly access the Internet by wire, or the mobile computer can access the Internet by wire at the guest, and then realize the foregoing The same trusted communication.
其中,公用无线基站只是一种互联网接入口, 承担着将本基站有效信号覆盖范 围内掌机或移动计算机在空中以无线的方式接入互联网。接入后, 掌机或移动计算 机就视同前述可信通信中的计算机, 也照样可以使用相同的私密通信 IC卡。 基于 档案站可信通信平台的身份验证和网络支付,各公用无线基站可以独立收取经本基 站接入互联网用户的服务费用,无归属局管理和漫游用户(即外地用户与本地用户) 的区分, 只要在本基站有效信号覆盖范围内, 并遵守某种技术标准与协议、且作出 同意支付相关费用的数字签名, 都可在本基站接入互联网。 因而可以做到各基站独 立经营核算和用户任意通过当地基站或接口接入互联网。  Among them, the public wireless base station is only an Internet access port, and is responsible for wirelessly accessing the Internet in the air by the handheld or mobile computer within the effective signal coverage range of the base station. After the access, the handheld or mobile computer is treated as the computer in the aforementioned trusted communication, and the same private communication IC card can be used as well. Based on the identity verification and network payment of the archive station trusted communication platform, each public wireless base station can independently charge the service fee of the Internet access user through the base station, and there is no distinction between the home office management and the roaming user (ie, the foreign user and the local user). The base station can access the Internet at the base station as long as it is within the effective signal coverage of the base station and complies with certain technical standards and protocols and makes a digital signature that agrees to pay the relevant fees. Therefore, each base station can independently operate the accounting and the user can access the Internet through the local base station or interface.
至于掌机或移动计算机直接有线接入互联网,主要是虑及通过公用无线基站接 入互联网需增加一层费用, 且有时无线信号质量并非能如意,许多室内常常因屏蔽 等原因, 影响无线信号的强度, 甚至不能收发。 当回到家里, 或处在办公室, 或出 差住宿等条件具备时, 可以将掌机直接插入计算机上的标准接口, 掌机上的私密通 信内容就自动加载在该计算机上, 在该计算机上登录于互联网, 并可在计算机上操 作(其操作条件毕竟优于掌机), 如果将掌机拨出时, 又自动返回通过公用无线基 站接入互联网的状态;也可以将掌机或移动计算机插入无计算机的互联网标准接口 直接登录于互联网。与此同时, 两种直接有线接入互联网方式的掌机插入时, 都可 以通过其标准接口给掌机或移动计算机充电, 两全其美。 当然, 在室内, 也可将掌 机或移动计算机通过蓝牙技术近程接入互联网。 As for the direct wired access to the Internet by the handheld or mobile computer, it is mainly because of the additional cost of accessing the Internet through the public wireless base station, and sometimes the quality of the wireless signal is not satisfactory. Many indoors often affect the wireless signal due to shielding and the like. Strength, even unable to send and receive. When you return to your home, or at the office, or when you are on a business trip, you can plug the handheld directly into the standard interface on your computer. The private communication content on the handheld is automatically loaded on the computer, and you can log in to the computer. Internet, and can be operated on a computer (the operating conditions are better than the handheld), if the handheld is dialed out, it will automatically return to the public wireless base. The status of the station accessing the Internet; you can also log in to the Internet by inserting the handheld or mobile computer into the Internet-free standard interface. At the same time, when two handheld devices with direct wired access to the Internet are plugged in, they can charge the handheld or mobile computer through their standard interfaces, which is the best of both worlds. Of course, indoors, the handheld or mobile computer can also be connected to the Internet via Bluetooth technology.
(9 ) 出示档案数据  (9) Presenting file data
出示档案数据, 就是在社会交往活动中,一方基于交往的需要, 利用可信通信 向另一方出示储存在档案站个人组织档案数据库档案数据的过程。  Presenting the archival data means that in the social interaction activities, one party uses the trusted communication to present the process of storing the archive data of the personal organization archive database in the archive station based on the needs of the communication.
因档案人是本人档案的权利人,只要通过身份验证, 就可以打开自己的档案查 阅, 并选定所需的数据项目向他人出示, 只要所出示的数据是存在档案站的档案数 据, 所出示的档案数据就有档案站的数字签名, 收受方或其他人, 只要通过对该数 字签名的验证, 即可验证其数据是否出自档案站可信通信平台。  Since the archivist is the owner of the file, as long as the identity is verified, you can open your own file and select the required data items to present to others. As long as the data presented is the file data of the file station, it is presented. The file data is digitally signed by the archive station, and the recipient or other person can verify whether the data is from the file station trusted communication platform by verifying the digital signature.
当然, 这应当由可信通信软件设计专门的操作项。  Of course, this should be designed by trusted communication software to design specific operational items.
如果一方对对方通信的实际操作人还存有疑虑,可以通过"远程实人身份验证" 验证。  If one party still has doubts about the actual operator of the other party's communication, it can be verified by "remote real person authentication".
( 10) 远程实人身份验证  (10) Remote real-life authentication
远程实人身份验证, 就是基于一方自愿, 使用生物特征参数录入装置实时、 实 人地录入本人生物特征参数, 再用档案站加密公钥加密发送给档案站身份验证系 统, 由系统将验证结果告知对方的过程。  Remote real-person authentication is based on the voluntary use of a biometric parameter entry device to record the biometric parameters of the person in real time and in real time, and then use the archive station encryption public key to encrypt and send it to the archive station identity verification system. The system will inform the verification result. The process of the other party.
其中的 "自愿",可以是本人的主动;也可以是本人对对方请求的同意。其"请 求"可以是在通信过程中, 选择某操作项, 要求对方通过远程实人身份验证; 也可 以是在选择通信项目中设定, 设定中要求对方必须通过远程实人身份验证,方可接 受其某种类型的通信;  The "voluntary" can be my own initiative; or it can be my consent to the other party's request. The "request" may be in the process of communication, selecting an operation item, requesting the other party to pass the remote real person identity verification; or setting in the selection communication item, the setting requires the other party to pass the remote real person identity verification, Accept some type of communication;
( 11 ) 网络支付  ( 11 ) Internet payment
网络支付, 就是支付人将所需支付的货币, 在互联网上, 通过数字签名, 可信 地指令其存款银行, 从其账户项下的货币或信用透支的货币,划账给收受人存款银 行账户内的货币支付行为。 是可信通信的一种主要用途。  Internet payment, that is, the currency that the payer will need to pay, on the Internet, by digital signature, credibly instructing its deposit bank, from the currency of its account or the credit overdraft currency, to the recipient deposit bank account Currency payment behavior within. It is a major use of trusted communications.
其流程如下:  The process is as follows:
①收受人先将与收受款项及其对价事由 (即所提供的商品、 服务、 借款请求 及其承诺等) 、 收受人身份号、 存款银行身份号, 并表示接受该款项, 经数字签名 后, 发送给支付人。  1 The recipient will first accept and accept the payment and its consideration (ie, the goods, services, loan request and commitments, etc.), the recipient's identification number, the deposit bank identification number, and accept the payment, digitally signed, Send to the payer.
②支付人审核后, 在收受人的发文上, 作出同意支付所示金额的数字签名, 发给自己的存款银行,指令在其存款或信用透支额中支付给收受人存款银行的收受 人账户。 2 After the payer has reviewed, on the recipient's post, a digital signature agreeing to pay the indicated amount. The deposit bank issued to itself, the order is paid to the recipient's deposit bank's recipient account in its deposit or credit overdraft.
③支付人的存款银行, 确定支付人的存款足够支付该款项后, 划账支付给收 受人指定的银行, 并将支付人发来的支付指令(附有收受人的发文)留存和发送给 划账支付的收款银行。  3 The payer's deposit bank determines that the payer's deposit is sufficient to pay the amount, pays the bill to the bank designated by the recipient, and retains and sends the payment instruction (with the recipient's mail) sent by the payer to the bank. The receiving bank that pays the account.
④收受人指定的银行收文收款后, 留存收文和通知收受人, 并按来款路径返 回收款收条给支付人。  4 After receiving the receipt of the bank receipt from the recipient, the receipt and notification of the recipient will be retained, and the receipt will be returned to the payer according to the payment path.
⑤如果是出资、 拨付、 赠与等单方行为, 可直接在支付指令中注明支付事由 和指向收受人身份号, 经收受人作表示同意接受和指定存款银行的数字签名后, 由 支付人的存款银行将指定的款项支付给收受人的指定存款银行之收受人账户。  5 If it is a unilateral act such as capital contribution, disbursement, gift, etc., the payment reason and the recipient's identification number may be directly indicated in the payment instruction. After the recipient expresses the consent and accepts the digital signature of the designated deposit bank, the deposit of the payer The bank pays the specified amount to the recipient's designated deposit bank's recipient account.
该过程, 可由可信通信软件的特殊程序在瞬间自动执行。  This process can be performed automatically in an instant by a special program of trusted communication software.
并且, 在实现个人组织档案法律制度的条件下, 其档案中的数字证书即可足以 支持与任何银行间的网络支付,而无需像目前这样到各银行柜台办理数字证书签约 手续。  Moreover, under the condition of realizing the personal organization archive legal system, the digital certificate in the file can be sufficient to support online payment with any bank, without having to go through the digital certificate signing procedures at the bank counters as it is currently.
于此, 如果互联网、计算机、 掌机全面普及, 基于合法社会交往, 就没有必要 继续使用现金支付。  Therefore, if the Internet, computers, and handhelds are fully popular, based on legal social interaction, there is no need to continue to use cash payments.
( 12)踪迹记录  (12) Trace record
踪迹记录,就是记录个人或组织授权人在登录时或身份验证时所处的位置或位 置范围, 并归位存档各自的档案中, 由可信通信软件自动完成。  Trace records are records of the location or location of an individual or organization's authorized person at the time of login or authentication, and are archived in their respective files, and are automatically completed by trusted communication software.
由于任何人在登录接入互联网时,其入接口的位置或位置范围是可知, 在可信 通信软件作用下, 记录登录人的身份号及其所处的位置或位置范围, 即可实现踪迹 记录。但由于存在身份号与实人错位的可能, 如果没有经过实人身份验证, 所记录 的踪迹是不可靠的, 只能作为一种参考数据。 不过, 错位的可能是有限的, 并且在 一定程度上通过法律手段予以控制, 其参考价值与作用也是不低的。 当然, 最可靠 的, 是在实人身份验证时所记录的踪迹。  Since anyone can log in to the Internet, the location or location range of the inbound interface is known. Under the action of the trusted communication software, the login person's identity number and its location or location range can be recorded, and the trace record can be realized. . However, due to the possibility that the identity number and the real person are misplaced, if the real person is not authenticated, the recorded trace is unreliable and can only be used as a reference data. However, the misplacement may be limited and controlled to some extent by legal means, and its reference value and role are not low. Of course, the most reliable one is the trace recorded during real-life authentication.
同时, 还可以用专门的踪迹仪, 在实人身份验证的基础上, 实现踪迹记录。 踪迹仪,实际上就是附有录入人体生物特征参数装置的计算机。具有三大功能: ①身份识别; ②黑白名单预警或提示; ③踪迹记录。  At the same time, it is also possible to use a special tracer to achieve trace records based on real-life authentication. The tracer is actually a computer with a device for entering biometric parameters. Has three major functions: 1 identification; 2 black and white list warning or prompt; 3 trace records.
身份识别: 就是个人法定身份标识与其身体对正的过程。也法定身份标识名下 记载的生物特征对正的过程。  Identification: It is the process of personal legal identity and its body alignment. It is also the process of alignment of biometrics recorded under the legal identity name.
传统的,也是最简单的身份识别, 就是拿身份证上的相片与实人的相貌人工对 在可信通信体系之下的身份识别,则是釆用存储在可信通信平台个人组织档案 数据库的生物特征参数与实际录入的生物特征参数相比较。 The traditional and simplest identification is to take the photo on the ID card and the actual appearance. The identification under the trusted communication system is to compare the biometric parameters stored in the personal organization archive database of the trusted communication platform with the biometric parameters actually entered.
踪迹仪身份识别, 与前述 "远程实人身份验证 "所不同的, 是识别过程有专门 人员监管。  Tracer identification, unlike the aforementioned "remote real-life authentication", is the identification process with special personnel supervision.
识别时, 需录入被识别人特定的人体生物特征参数, 如头像、 指紋、 眼虹膜、 声音等。 同时并取得被识别人的身份号。其取得方式可以是掌机自动应答, 即踪迹 仪向识别通道发出要求应答的无线指令, 当持有掌机的人员走入识别通道时, 自动 应答身份号给踪迹仪; 也可以是通过 ic卡磁卡刷卡、 条形码扫描、 人工输入取得 被识别人的身份号。然后, 通过可信通信加密后, 将身份号与录入的生物特征参数 数据,发给可信通信平台身份识别系统,与预存在个人组织档案数据库的数据比较, 即可得出识别结果反馈踪迹仪, 完成身份识别。  When identifying, it is necessary to enter specific human biometric parameters such as avatar, fingerprint, iris, sound, etc. of the identified person. At the same time, the identity number of the identified person is obtained. The acquisition method may be an automatic answering of the handheld device, that is, the trace device sends a wireless command requesting response to the identification channel, and when the person holding the handheld enters the identification channel, automatically responds to the identifier to the tracer; or may pass the ic card The magnetic card is swiped, barcode scanned, and manually entered to obtain the identification number of the identified person. Then, after being encrypted by the trusted communication, the identity number and the entered biometric parameter data are sent to the trusted communication platform identity identification system, and compared with the data pre-existing in the personal organization file database, the recognition result feedback tracer can be obtained. , complete the identification.
当然, 被识别人也可通过掌机、 磁卡、 IC卡将经可信通信平台数字签名的身 份号及其预存在个人组织档案数据库指定的生物特征交换给踪迹仪,踪迹仪经检验 数字签名与核对录入生物特征参数, 也可得出识别结果。  Of course, the identified person can also exchange the digital signature signed by the trusted communication platform and the biometrics specified in the pre-existing personal organization archive database to the tracer through the handheld, magnetic card, IC card, and the tracer is verified by the digital signature and The results of the identification can also be obtained by checking the biometric parameters.
如果因特殊原因, 无法取得被识别人的身份号, 就只能将录入的生物特征, 在 个人组织档案数据库里搜索具有该生物特征参数的身份号, 但可能需要较长时间。 所得出的身份号, 最好还是再用该身份号的其他生物特征参数核对。  If the identification number of the identified person cannot be obtained for a special reason, the biometrics entered can only be searched in the personal organization file database for the identity number with the biometric parameter, but it may take a long time. The resulting identity number is preferably re-checked with other biometric parameters of the identity number.
也当然,该身份识别, 除了对人的识别外,在特定的场所,也包括对交通工具、 物品等的识别或记录, 其方式方法也有所不同。  Of course, the identification, in addition to the identification of people, in certain places, including the identification or recording of vehicles, items, etc., in a different way.
法律黑白名单预警或提示: 就是身份识别时, 如果遇到了可信通信平台实时发 布法律黑白名单上的人与物时, 由踪迹仪发出特定的警报或提示, 由现场的踪迹仪 监管人采取措施予以处置, 或是按黑白名单上的处置方案报告给特定的组织或个 人。  Legal black and white list warning or reminder: When identifying, if a trusted communication platform encounters people and things on the legal black and white list in real time, a specific alarm or prompt is issued by the tracer, and the tracer supervisor on the spot takes measures. Dispose of it, or report it to a specific organization or individual on a blacklisted disposal plan.
法律黑名单: 是基于司法管制的目的, 经法定程序确定的、 需要予以缉拿、 控 制的名单。 如犯罪嫌疑人、 罪犯、 犯罪工具、 赃物等。  Blacklist of laws: A list of judicial controls that are determined by legal procedures and need to be seized and controlled. Such as criminal suspects, criminals, criminal tools, stolen goods, etc.
法律白名单: 是基于善意帮助的目的, 经法定程序确定的, 需要予以救助、 控 制的名单。 如失踪的未成年人、 精神病患者、 传染病源人、 危险品等。  Legal whitelist: A list of assistance and control that is determined by legal procedures for the purpose of goodwill assistance. Such as missing minors, mental patients, infectious sources, dangerous goods, etc.
踪迹记录: 就是在身份识别的基础上, 以踪迹仪所处的位置为被识别的人或交 通工具当前所处的位置,记下完成识别的时间与被识别出的身份号或匿名数字证书 序号, 然后再归位存档, 即可完成踪迹记录。 归位存档, 就是将踪迹仪所记录的身份号或匿名数字证书序号所对应的时间、 以及踪迹仪所处的位置, 通过可信通信写入身份号或匿名数字证书序号名下的档 案, 交通工具则写在交通工具驾驶人和所有人(包括共有人)名下, 特定物品写在 携带人名下, 由各个时刻的这种记录, 即可构成的该身份号人或交通工具的活动踪 迹。 Trace record: On the basis of identification, the location of the tracer is the current location of the identified person or vehicle, and the time to complete the identification and the identified identity number or anonymous digital certificate serial number are recorded. , and then homing to the archive, you can complete the trace record. The homing archive is to record the identity number recorded by the tracer or the time corresponding to the serial number of the anonymous digital certificate, and the location of the tracer, and write the file under the identity number or the anonymous digital certificate serial number through trusted communication. The tool is written under the name of the driver and owner of the vehicle (including the co-owner), and the specific item is written in the name of the carrier, and this record of each moment can constitute the activity trace of the identity person or vehicle.
同时, 也将踪迹仪所记录的踪迹数据实时传给政府安全管理部门。  At the same time, the trace data recorded by the tracer is also transmitted to the government security management department in real time.
当然, 在 "个人组织档案法律制度"中, 为了保护个人和组织的隐密权, 所记 录的身份号必须是经档案站的公钥加密过的, 如果没有法定的事由, 非经法定的程 序, 任何人都不可能知悉所记录的真实身份号。在解密前, 所记录的数据只是一种 潜在可利用的隐匿数据。政府安全管理部门只是使用踪迹数据施行监视各区域内的 人员流动的宏观状况, 不涉及具体个人的踪迹隐密。  Of course, in the "personal organization archives legal system", in order to protect the privacy rights of individuals and organizations, the recorded identity number must be encrypted by the public key of the archive station, if there is no legal cause, non-legal procedures It is impossible for anyone to know the true identity number recorded. Before decryption, the recorded data is just a type of hidden data that is potentially available. The government's security management department only uses the trace data to monitor the macroscopic situation of the flow of people in each area, and does not involve the hidden details of specific individuals.
(13)通信加密  (13) Communication encryption
在前述的各种通信中,基于各方在档中所公开的加密公钥, 对方可以很方便地 利用其公钥进行非对称加密通信; 如果数据量较大, 可以使用对方公钥加密送给随 机产生的对称密钥, 再进行对称加密通信。  In the foregoing various communications, based on the encrypted public key disclosed by the parties in the file, the other party can conveniently use its public key for asymmetric encrypted communication; if the amount of data is large, it can be encrypted by using the public key of the other party. Randomly generated symmetric keys, then symmetrically encrypted communication.
4、 前期操作  4, the previous operation
由于通过立法程序设立一个崭新的个人组织档案法律制度, 需要解决技术、观 念、 民意、 政治等诸多问题, 是一个较为漫长的过程。  Since the establishment of a new personal organization archives legal system through the legislative process, it is a long process to solve many problems such as technology, concept, public opinion and politics.
为此, 可以先在小范围的区域、 人群中试行。  To this end, you can try it in a small area and crowd.
具体的,可以先在经济较发达的城市由政府设立档案站, 以统一的全球定位地 址码编制规则标示档案站和城市地址, 以地址码身份号标识个人组织档案, 建立以 个人组织档案数据库为基础的档案站可信通信平台。 同时, 档案项目应当尽量设置 全面和统一标准, 如果暂时无法实现的数据可先空着。  Specifically, the archives station may be set up by the government in a more economically developed city, the archive station and the city address shall be marked with a unified global positioning address code, the personal organization file shall be identified by the address code identification number, and the personal organization archive database shall be established. The basic archive station trusted communication platform. At the same time, the archival project should try to set comprehensive and unified standards. If the data cannot be realized temporarily, it can be empty.
这样, 只要加入档案站可信通信平台, 有了身份号或匿名数字证书序号, 装上 可信通信软件,相互之间就可以利用互联网进行可信通信了, 其可信程度取决于档 案站对档案数据釆集的完整程度与控制的可信程度。如果没有加入而无身份号或匿 名数字证书序号, 但只要装上可信通信软件, 也可以寻呼已加入有身份号的人, 只 是其身份不可信和不能被寻呼。  In this way, as long as the file station trusted communication platform is added, the identity number or the anonymous digital certificate serial number is installed, and the trusted communication software is installed, the Internet can be used for trusted communication, and the degree of trust depends on the archive station pair. The completeness of the archive data collection and the credibility of the control. If there is no join and no ID or anonymous digital certificate serial number, but as long as the trusted communication software is installed, the person who has joined the identity number can also be paged, but the identity is untrustworthy and cannot be paged.

Claims

权 利 要 求 Rights request
1. 一种互联网通信系统的构建方法, 包括各档案站可信通信平台构建方法、 可信通信软件构编方法, 其特征在于: 以个人组织档案法律制度为基础, 由各档案 站可信通信平台、互联网、安装可信通信软件的计算机或掌机共同构成可以实现个 人组织互联网可信通信的个人组织互联网可信通信系统。 A method for constructing an internet communication system, comprising a method for constructing a trusted communication platform of each archive station, and a method for constructing a trusted communication software, characterized in that: based on a personal organization archive legal system, trusted communication is performed by each archive station The platform, the Internet, the computer or the handheld device that installs the trusted communication software together constitute a personal organization Internet trusted communication system that can realize the personal organization of the Internet trusted communication.
2.根据权利要求 1所述的互联网通信系统的构建方法, 其特征在于: 所述各 档案站可信通信平台构建方法,是基于人的自私性与交往性,基于计算机、互联网、 数字签名等技术的实现可能, 以个人组织关于身体(组织体)、身份、能力、从业、 品行、权益、踪迹、通信等各类能够充分支持互联网与法律促进高效交往、 设定 本人具体义务、 记载本人具体权利、 保护交往各方合法利益的历史、 当前数据 为其档案数据内容,设立个人组织档案法律制度,建立由个人组织档案法律制度控 制、存储本国所有或部分个人组织档案数据的国家个人组织档案数据库,构建以国 家个人组织档案数据库为基础、 以实现个人组织互联网可信通信为目标、可以确保 通信经营者准确计费和及时收费的各档案站可信通信平台。  The method for constructing an internet communication system according to claim 1, wherein: the method for constructing the trusted communication platform of each file station is based on human selfishness and communication, based on computer, internet, digital signature, etc. The realization of technology may be based on the individual organization's body (organization), identity, ability, employment, conduct, rights, traces, communications, etc. can fully support the Internet and the law to promote efficient exchanges, set my specific obligations, record my specific The rights, the history of protecting the legitimate interests of all parties involved, the current data as the content of its archives data, the establishment of a personal organization archives legal system, the establishment of a national personal organization archive database controlled by the individual organization archives legal system, storing all or part of the individual organization archives data To build a trusted communication platform for each archive station based on the national personal organization archive database and to achieve personal organization Internet trusted communication, which can ensure the accurate billing and timely charging of communication operators.
3. 根据权利要求 1所述的互联网通信系统的构建方法, 其特征在于: 所述的 可信通信软件构编方法中的可信通信软件的实现目标是使得各个人组织,凭借本人 私密通信数据、 或私密通信 IC装置、 或特定的人体生物特征, 使用任何一部安装 可信通信软件、有线或无线接入互联网的计算机或掌机,通过各档案站可信通信平 台及其相关个人组织档案数据的作用,实现个人组织互联网可信通信登录、选择通 信、 可信首页、 寻呼、 网站通信、单向通信、 即时对话通信、 掌机或移动计算机任 意接入互联网、 出示档案数据、 网络支付、远程实人身份验证、 踪迹记录、通信加 密的内容与过程。  3. The method for constructing an Internet communication system according to claim 1, wherein: the trusted communication software in the trusted communication software construction method achieves the goal of enabling individual organizations to communicate with themselves by private communication data. , or a private communication IC device, or a specific human biometric, using any computer or handheld that installs trusted communication software, wired or wireless access to the Internet, and through various archives trusted communication platforms and their associated personal organization files The role of data to achieve personal organization Internet trusted communication login, selective communication, trusted home page, paging, website communication, one-way communication, instant dialogue communication, handheld or mobile computer access to the Internet, presentation of file data, online payment Remote real-time authentication, trace recording, communication encryption content and process.
4.根据权利要求 1、 2、 3所述的互联网通信系统的构建方法, 其特征在于: 个人组织互联网可信通信,是基于通信的社会交往性, 以个人组织档案法律制度所 控制的各个人组织档案数据为基础, 以数字签名为基本手段,直接以全球唯一和通 用的个人组织身份号或匿名数字证书序号为主叫、被叫标识,不受地点变化的限制, 在互联网上实现具有完整交往可信链的多媒体通信, 既可以促进交往, 又可以充分 支持法律在个案上复回被侵害人的合法利益和惩治侵害人,威慑和规范各个人组织 守法交往, 从而实现简单、 安全、 高效全球交往。  4. The method for constructing an internet communication system according to claims 1, 2, and 3, characterized in that: personal organization internet trusted communication is based on social interaction of communication, and each person controlled by a personal organization file legal system Based on the organization of archive data, digital signature is the basic means, directly using the global unique and universal personal organization identification number or anonymous digital certificate serial number as the calling and called identification, which is not subject to the change of location, and is complete on the Internet. The multimedia communication of the trusted chain can not only promote communication, but also fully support the law to return the legitimate interests of the infringed person and punish the infringer, deterrence and standardize the organization of law-abiding interactions, thus achieving simple, safe and efficient Global interaction.
PCT/CN2005/001972 2004-12-09 2005-11-21 A method for creating the personal organization internet authentic communication system WO2006060946A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200410089309 CN1787465A (en) 2004-12-09 2004-12-09 Method for construction of real information communication system of personal organized internet
CN200410089309.9 2004-12-09

Publications (1)

Publication Number Publication Date
WO2006060946A1 true WO2006060946A1 (en) 2006-06-15

Family

ID=36577656

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/001972 WO2006060946A1 (en) 2004-12-09 2005-11-21 A method for creating the personal organization internet authentic communication system

Country Status (2)

Country Link
CN (1) CN1787465A (en)
WO (1) WO2006060946A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109308103B (en) * 2018-09-14 2021-02-26 北京清大智信科技有限公司 Millimeter-scale ultra-miniature computer for credible signature
CN112801602B (en) * 2019-11-14 2023-07-25 中移全通系统集成有限公司 Tissue transfer method, device, storage medium and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4821118A (en) * 1986-10-09 1989-04-11 Advanced Identification Systems, Inc. Video image system for personal identification
DE20009627U1 (en) * 2000-05-29 2000-09-21 Siemens Ag Device for backing up data from computer systems
WO2002084521A1 (en) * 2001-04-18 2002-10-24 Inter China Network Software Company Limited Global network and privacy control of web card systems and method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4821118A (en) * 1986-10-09 1989-04-11 Advanced Identification Systems, Inc. Video image system for personal identification
DE20009627U1 (en) * 2000-05-29 2000-09-21 Siemens Ag Device for backing up data from computer systems
WO2002084521A1 (en) * 2001-04-18 2002-10-24 Inter China Network Software Company Limited Global network and privacy control of web card systems and method thereof

Also Published As

Publication number Publication date
CN1787465A (en) 2006-06-14

Similar Documents

Publication Publication Date Title
US11288676B2 (en) Private confirmation system
Union African Union convention on cyber security and personal data protection
US8965416B2 (en) Distribution of lottery tickets through mobile devices
US20180176017A1 (en) Digital Identity System
US20060080263A1 (en) Identity theft protection and notification system
US20070093234A1 (en) Identify theft protection and notification system
Owsley TriggerFish, StingRays, and Fourth Amendment Fishing Expeditions
CN103745397A (en) System and method for realizing electronic transaction risk control based on position scene identification
SA110310576B1 (en) Device, System, and Method for Registering and Authetnticating Handwritten ‎Signatures and Archiving Handwritten Information
CN102667832A (en) Method for managing citizen information
Rubinstein et al. Systematic government access to personal data: a comparative analysis
Cooperation APEC privacy framework
Ball African union convention on cyber security and personal data protection
Ismail Electronic land administration system in Malaysia: The need for new enabling provisions
Greenleaf Promises and illusions of data protection in Indian law
WO2006060946A1 (en) A method for creating the personal organization internet authentic communication system
Kizza Anonymity, security, privacy, and civil liberties
CA2565177A1 (en) Identity theft protection and notification system
Fgee et al. E-government in Libya: Constraints, potentials and implementation
Camp Economics of Identity Theft: Avoidance, Causes and Possible Cures
KR20140125299A (en) Method for providing direct debit service through electronic signature authentication based by mobile messaging
Boateng et al. A fraud prevention and secure cognitive SIM card registration model
Guo Data Protection Measures in E-Society: Policy Implications of British Data Protection Act to China
Makanda et al. Remarks on National Cyber Security for Under Developed and Developing Countries: Focused on Malawi
Lee Internet and anonymity

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05812540

Country of ref document: EP

Kind code of ref document: A1