ABSTRACT
With the development of computer technology, cyberspace has become the focus of attention of all countries. However, cyber space is facing increasing security threats, and the leakage of online identity information is the most prominent one. Most of the major countries in the world have begun to formulate the rules and policies of network trusted identity management to protect the security of cyberspace by regulating each participant in the network. Therefore, it is particularly important to ensure its safe and stable operation. This paper briefly analyzes the current electronic identity authentication, puts forward the electronic identity authentication model to ensure the security of network identity, and puts forward some suggestions on the management of network electronic identity.
- China Internet Network Information Center (CNNIC). The 44th Statistical Report on Internet Development in China [EB/OL]. Retrieved Sept 20, 2023 from http://www.cac.gov.cn/2019zt/44/ index.htmGoogle Scholar
- Information technology—Security techniques—Entity authentication assurance framework:ISO/IEC 29115[EB/OL]. Retrieved Sept 20, 2023 from https://www.iso.org/standard/45138.htmlGoogle Scholar
- Information technology—Security techniques—Information security management systems requirements: ISO/IEC 29003[EB/OL]. Retrieved Sept 20, 2023 from https://www.iso.org/standard/ 54534.htmlGoogle Scholar
- UK's Cabinet Office.Good practice guide No.44, authentication credentials for online government services [EB/OL]. Retrieved Sept 20, 2023 from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/370032/GPG_44_authentication_and_credentials_v2_0_Oct_2014.pdfGoogle Scholar
- Li ZHANG. 2012. Analysis of the United States' National Strategy for Trusted Identity in Cyberspace. Journal of Jiangnan Social University 14.4(2012):4Google Scholar
- NIST special publication 800-63-1. Electronic authentication guideline[EB/OL](2011-12). Retrieved Sept 20, 2023 from https://doi.org/10.6028/NIST.SP.800-63-1Google ScholarCross Ref
- NIST special publication 800-63-2. Electronic authentication guideline[EB/OL](2013-08). Retrieved Sept 20, 2023 from https://doi.org/10.6028/NIST.SP.800-63-2Google ScholarCross Ref
- NIST special publication 800-63 revision 3. Digital identity guidelines[EB/OL](2017-06). Retrieved Sept 20, 2023 from https://doi.org/10.6028/NIST.SP.800-63-3Google ScholarCross Ref
- Haijiao ZHU. 2011. The legal Nature of Electronic Authentication Inquiry. Information Network Security. 3(2011):3Google Scholar
- Kejie HUANG, Xi YE. 2012.Electronic Commerce Identity Authentication System Based on Dynamic Password Technology. Market Modernization 3(2012):1Google Scholar
- Information technology-Identification cards-Integrated circuit(s) cards with contacts: ISO/IEC 7816[EB/OL](2013-10). Retrieved Sept 20, 2023 from https://www.iso.org/standard/ 24536.htmlGoogle Scholar
- YANGL. 2019. The blockchain: State-of –the-art and research challenges[J]. Journal of Industrial Information Integration, 2019.15(4):80-90Google Scholar
- NIST special publication 800-63.Digital identity guidelines: authentication and lifecycle management[EB/OL](2017-06). Retrieved Sept 20, 2023 from https://doi.org/10.6028/NIST.SP.800-63bGoogle ScholarCross Ref
- Shuilong TAO.2015. Research on Credential Guarantee and Security Model of Electronic Archive ID Card. Archival Studies 3(2015):6Google Scholar
Recommendations
Identity assurance in the UK: technical implementation and legal implications under the eIDAS regulation
WebSci '16: Proceedings of the 8th ACM Conference on Web ScienceThe UK Government has been designing a new Electronic Identity Management (eIDM) system that, once rolled--out, will take over how citizens authenticate against online public services. This system, Gov.UK Verify, has been promoted as a state--of--the--...
A Study on the Commerce Security Characteristics for Electronic Business
ICEE '10: Proceedings of the 2010 International Conference on E-Business and E-GovernmentWith the overall popularity of the internet, the electronic commerce has come into being in recent years and has been a great development based on internet. As a new business model, electronic commerce is a new form of business. At the same time, the ...
Re-Shaping the EU Digital Identity Framework
dg.o 2022: DG.O 2022: The 23rd Annual International Conference on Digital Government ResearchElectronic authentication and digital signature are the base components of the European Union (EU) Digital Single Market. The area is regulated by the eIDAS (electronic identification and trust services for electronic transactions in the internal ...
Comments