Traditional Culture Encyclopedia - Traditional festivals - What strategic network does the country implement to support the research and development of safe and convenient electronic authentication technology to promote different electronic institutions?
What strategic network does the country implement to support the research and development of safe and convenient electronic authentication technology to promote different electronic institutions?
China's cyber security law clearly points out that "the state implements the network trusted identity strategy, supports the research and development of safe and convenient electronic authentication technologies, and promotes mutual recognition between different electronic authentications". At present, information technology is widely used in all fields of society, and cyberspace is highly integrated with the real society.
Facing the increasingly serious network security problems, it is becoming more and more important to integrate the identities of actors. Trusted digital identity has become an effective means to innovate social governance and improve the efficiency of social management services.
In the era of mobile Internet, digital identity has really entered people's ordinary life. Compared with the traditional identity service model, digital identity is helpful to greatly improve the overall efficiency of society and maximize the release of economic potential and user value. The development stages of digital identity have roughly experienced: centralized identity, federated identity and distributed digital identity.
Legal basis:
Article 24 of the Network Security Law of the People's Republic of China * * * When signing an agreement with users or confirming the provision of services, network operators shall require users to provide real identity information when handling network access, domain name registration services, fixed telephones, mobile phones and other services to users.
If the user does not provide true identity information, the network operator shall not provide relevant services for him. Cyberspace governance, as an important part of national governance, urgently needs to strengthen the modernization of governance system and governance capacity, especially the construction of trusted management capacity of network identity.
In recent years, with the rapid development and in-depth application of information technology, the cyberspace with the Internet as the main body has become a new space for the production and life of human society, which has greatly promoted the prosperity and progress of the economy and society, but also brought new security risks and challenges.
- Previous article:Bamboo building is which traditional dwelling in China
- Next article:What is the construction work method?
- Related articles
- The latest ranking of the world's largest cruise ships
- How to make Egg Dumplings?
- What are the special food snacks in Dali?
- Efficacy of rose butter tea
- He' nan traditional consulting room door custom made
- What are the customs before Chinese New Year?
- Harbin Art Test Training School Ranking
- May I ask... Who knows what kind of glass to drink from. (What kind of glass goes with what kind of wine). Please tell me more about it... Thank you!
- How to directly replace traditional fluorescent tubes with led t8 tubes?
- Idioms with verbs (action idioms 1000)