Three. summary of the invention
(1) general idea of technical solution of the present invention
For above situation, object of the present invention will propose a comprehensive solution to above problem computer network system exactly, comprise its identity information and can inquire about to realize the authentication of citizen or unit, citizen or unit information, can check, can show, the real name of citizen or unit information communication and use, convenience and quick, improve citizen or the unit information level of resources utilization.
The aforementioned problem to be solved of careful investigation, can find citizen or unit (being referred to as main body below) be all be information send out survivor, be again recipient and the user of information.Information environment residing for each main body is by level and the mutually different various information System's composition of scale.Various information system (can be understood as the types of databases system of all departments, every profession and trade, constituent parts) every day is all in generation or change or incoherent information relevant to main body.The information that information relevant to main body in various information system and main body self produce is referred to as main information, and the set of all main informations forms main information resource.Each main body with main information resource for object forms the information interchange relation of multi-to-multi each other.
The technical scheme that the present invention realizes is based on existing public security organ citizen ID certificate and residence management infosystem, set up nationwide citizen's information management platform, be called for short " citizen's information platform " or " platform " (Fig. 1), comprise Citizen information management system, information service system and mail box system.Citizen information management system managing electronic mailbox distributes and I.D. related service, comprises I.D. and household register information management, I.D. granting, and I.D. read write line and I.D. are read and write authorization module granting, provided identity information service to information service system.Citizen information management system builds citizenship information database based on the citizen ID certificate of public security organ and household register infosystem, can be increased time opportunity is suitable unit identity information database, store finger print information, the household register information of citizen ID certificate information, human body both hands ten finger, the basic identity information of all kinds of unit is also stored, the authentication information of record citizen or unit time opportunity is suitable.Information service system uses much information service interface to be connected with multiple external system by wide area network, possesses the management functions such as the integration of citizen or unit information, classification, index, statistics and provides the application service such as inquiry, examination, displaying, authentication, retrieval of citizen or unit information to other system.Mail box system is provided the services such as E-mail address, online exchange, social investigation, issue bulletin, releasing advertisements and provides the service such as inquiry, examination, displaying of its information by information service system to citizen or unit by website, E-mail address.Citizen's information platform management organization gives each citizen, unit distributes one from birth or the legal E-mail address setting up the lifelong free use namely had, mailbox account number is divided into login account number and transmitting-receiving account number, log in account number and refer to be exclusively used in the mailbox account number opening E-mail address, transmitting-receiving account number refers to be exclusively used in the mailbox account number of sending and receiving e-mail, log in account number and receive and dispatch account number and be initially the ID (identity number) card No. of citizen or the organization mechanism code of unit, log in account number can change, transmitting-receiving account number can not change; Give the function that mailbox possesses " the collecting and distributing base " of citizen or unit information, by the chaining service that information service system provides, integration citizen or unit are dispersed in the various information resource about himself in all kinds of external systems such as comprising identity, bank, house, traffic, water power, with citizen or unit self various information document---namely the various information of citizen or unit is linked in mailbox and presents, citizen or unit can consult self various information document or externally show operation.Have the figure seal information with electronic mail relevance in mail box system, cover the mail of figure seal, any change of its content can cause the marked change of seal graphics.Second generation identity card layout is improved; add two ID card verification codes and layout has been re-started to part identity card information displaying; I.D. is loaded in a kind of identity card information protective cover, thus the ID (identity number) card information display of " substantially ", " common " and " complete " three kinds of ranks can be pressed.Corresponding improvement has also been done to IC card of ID card read write line, for the ID (identity number) card information of three kinds of ranks, read write line is read permission section according to " substantially ", " common " and " complete " three kinds of IC card of ID card and is divided into three types, and each type all adds ID card verification code, I.D. password and I.D. network verification number information comparison and somatic fingerprint recognition function.ID (identity number) card information is read authority subregion according to aforesaid three kinds and deposits to adapt to its needs shown by three kinds of ranks by the IC-card that I.D. includes, in addition, IC card of ID card also stored for I.D. chip serial number, I.D. password and two human body fingerprint information, and store the I.D. network verification number information that carries out of identity-based card read write line respectively by read write line type, wherein home address, I.D. password and two human body fingerprint information can be authorized a change by legal, the I.D. network verification number information that the identity-based card read write line stored respectively by read write line type carries out refreshes along with the increase of network verification number of times, other identity information can not be revised.IC card of ID card is also reserved with information storage space, the application such as easily extensible employee's card, driver's license, mass transit card, medical card, social security card, bank card, thus can realize one card for multiple uses.Each citizen or unit directly can be applied to all kinds of authentications citizen's information platform by certain its digital certificate U shield (namely including the digital certificate of citizen or unit identity essential information) that check-ins from citizen's information platform management organization.
Constructed citizen's information platform can realize following ten binomial functions: (1) communication function, namely between unit, between citizen and between unit and citizen carries out mail or real-time two-way, intercommunication or video call by network; (2) information searching function, namely unit or citizen can inquire about the information about oneself be present in other information systems in oneself E-mail address in citizen's information platform; (3) information display function, namely unit or citizen are by the information such as the identity about self, credit, assets called and show with self mutually independently in other information systems to other unit or citizen, prove as third party with the information such as true identity, credit, assets realized oneself; (4) identification verification function, the identity network checking of the information service system namely in citizen's information platform or the I.D. network verification of identity-based card read write line, directly can verify whether the true and false of true identity or identity verification card and holder are the I.D. owners; (5) business operation function, unit or citizen are in the E-mail address of oneself, and footpath is linked by information service system and external system, handles relevant business operation, such as, realizes funds transfer etc. to the business operation of capital account; (6) Information Statistics function, as the statistics of the index such as the quantity in different time, place, formation to all kinds of unit or citizen; (7) investigation on the net function, can do special survey to all respondents one-to-many, and changing traditionally can only the limitation of sample survey; (8) locating function, by citizen's information platform, searches in all legal E-mail address address lists can announced on platform with all kinds of E-mail addresses of organization and citizen's naming and finds; (9) releasing advertisements function, namely can make full use of the exclusive unit of citizen's information platform and nature person's resources advantage, sets up ad distribution region by administrative region level or community type; (10) information issuing function, namely all kinds of social administrative authority can by the mail box system Information issued district in platform to specific or nonspecific object publishing information, and citizen's information platform can provide much information issuing service; (11) real-time dynamic monitoring function, under statutory authority, by the background system of citizen's information platform, can monitor the movement track of specific citizen, thus provides convenience for public security organ arrests suspect; (12) decision assistant function, citizen's information platform utilizes the advanced technology such as data fusion, data warehouse, data mining, the data message of citizen or unit information resource system is carried out profound level analysis and excavated, supports for National Macroscopic and micromanagement decision-making provide auxiliary.On the basis of above function, advantageous nationwide units and citizenry resources advantage can be utilized to develop various network platform service, such as E-business service, news report and films and television programs Video service etc.
The Citizen information management system that citizen's information platform comprises, information service system, mail box system take centralized architecture, unified management mode.Citizen's information platform is connected with all kinds of external system by the information service interface of information service system.Citizen or unit information distribution are left in the database of platform and the database of multiple external system.Using citizen ID certificate number or unit organization Institution Code as Unicode, realize the effective integration to all kinds of citizen or unit information being present in sorts of systems.Information service system links in sorts of systems the information of concerning citizen or unit based on citizen and unit information data, set up all kinds of index data bases of citizen or unit information, information retrieval, authentication and by the service of mail box system to the inquiry of citizen or unit information, examination, displaying are provided.Mail box system provides citizen or unit mailbox service, mailbox address book service and online exchange information service by mailbox website.For guaranteeing the Dynamic data exchange of citizen's information platform and other external information system, secret and safety, the safety practices such as fire wall between net, access rights and password should be set up between citizen's information platform and other all kinds of external system, between net, information transmission all should adopt the method for advanced encrypting and decrypting, prevents divulging a secret in data transmission procedure.
(2) I.D. and include the Curve guide impeller of IC-card
Easily obtain for true identity information, lawless person often utilizes true identity information to make the existing picture of personation I.D., and I.D. is demonstrate,proved information carrying breath and divided into basic identity information and relative identity information of maintaining secrecy by patent imagination of the present invention.By website, E-mail address, generally only need to show basic identity information, just can meet the object of examination true identity, in particular cases just supplement the identity information checked such as ID card verification code, home address etc. and relatively maintain secrecy.For being necessary and having the right to check the unit of identity information relatively maintained secrecy, it should have for the security system of identity information the strict regulations preventing to divulge a secret.So, the difficulty that lawless person will obtain a complete true identity information improves greatly, thus anti-blocking I.D. fraud on source.For this reason, be necessary to carry out Curve guide impeller to the existing I.D. space of a whole page.
On existing No.2 residence card basis (method for packing of the length and width size of I.D., profile, pattern, texture, font, font and size, material and IC-card is constant), two ID card verification code information are added in I.D., increase " resident identification card " five word above the photo position of I.D., and the projects such as name, sex, birthdate, nationality, ID (identity number) card No., issuing authority, data of issue and valid period are all imprinted on I.D. front, home address, two ID card verification code information are imprinted on I.D. reverse side.Home address and two ID card verification code information adopt the outward appearance textured patterns special adhesive plaster identical with I.D. to cover (repeatedly can open, cover), this special adhesive plaster back side can stamp crested information position indication character, does not just show and can not be duplicated when making these three identity informations unnecessary.If do not adopt special adhesive plaster to cover, also I.D. can be inserted in a kind of identity card information protective cover, reach same object.This identity card information protective cover, what system adopted transparent plastics material to make has anti-wear, antifouling, waterproof, fire-proof function the safe slash pocket of transparent I.D., just three opaque adhesive tapes are had to the position of ID card verification code and home address on protective sleeve surface, repeatedly can take off, cover, just do not show and can not duplicate when making these three identity informations unnecessary, and when needs display or when duplicating this three identity informations, opaque adhesive tape on protective sleeve surface, without the need to extracting from protective sleeve, only need be opened by I.D.; The opaque adhesive tape back side on protective sleeve surface is printed on word instruction (see Fig. 2, Fig. 3, Fig. 4, Fig. 5, Fig. 6) of crested information position.
Newly designed by the above I.D. space of a whole page, ID (identity number) card information can according to " complete ", " common " and " substantially " three kinds of levels of information displays." complete " information, refer to the outer display information of I.D. except ID card verification code 2, " common " information, refer to the outer display information of I.D. except ID card verification code information, " substantially " information, refers to the outer display information of I.D. except ID card verification code and home address.
The data of issue that I.D. front is contained and valid period represent in 7 position digital coding modes, are adjacent to after issuing authority's title and show; Days daily amount to six bit digital with two figure places and represent separately have one-bit digital to represent term of life; Directly numerically, capital X represents 10 years to less than 9 time limits, and Y represents 20 years, and Z represents long-term.
Described ID card verification code has 9 bit digital, 8 additional bit check codes of identifying code, is automatically produced when tying up to each I.D. provided or more renew by Citizen information management system.ID card verification code 1 may be used for the identity network checking of information service system and the I.D. network verification of identity-based card read write line, and ID card verification code 2 does not externally show, and only verifies for the identity network of information service system.The method that ID card verification code produces is, the random number produced when ID (identity number) card No. and hair fastener is generated 16 bit digital through asymmetrical encryption algorithm (such as Message Digest 5 MD5), get front 8 bit digital obtain being formed after a bit check code is added to 8 bit digital 9 ID card verification code 1 through verification computing, after getting, 8 bit digital obtain through verification computing the ID card verification code 2 forming 9 after a bit check code is added to 8 bit digital.Common identity network checking, such as online game real name verification, ticket real name verification, only need use ID card verification code 1; Just need to use ID card verification code 2 to carry out identity network checking in application systems such as finance, customs, airports.Because ID card verification code 2 access times are few, add that I.D. read write line can not show, privacy degrees higher than ID card verification code 1, thus can reach ID card verification code hierarchical security effect.
IC card of ID card can store the expanded application information within identity information and 10.Fingerprint information in identity information comprises two conventional hand finger print datas, and warp-wise citizen information platform management organization application if desired can be replaced by other hand finger print data.Home address in identity information and I.D. encrypted message warp-wise citizen information platform management organization can also be applied for and revise.Can authorize the ID (identity number) card information of one of reading three kinds of ranks according to difference and can only be read by the I.D. read write line of three types mandate by citizen's information platform management organization in IC card of ID card, expanded application information can be read by the card reader that respective application system management authorization module is housed.
(3) authenticity verification of I.D. and the legitimate verification of holder
Newly design with the I.D. space of a whole page and adapt, corresponding improvement has also been done to IC card of ID card read write line, for the ID (identity number) card information of three kinds of ranks, by read write line according to " substantially ", " common " and " complete " three kinds of IC card of ID card read permission section and are divided into " substantially ", " common " and " complete " three types, the outer display information of I.D. that often kind of read write line is merely able to show appropriate level, to be applied to different industries, the identity information acquisition of different occasion needs, the outer display information of the I.D. of " complete " type display except ID card verification code 2, the outer display information of the I.D. of " common " type display except ID card verification code information, the outer display information of the I.D. of " substantially " type display except ID card verification code and home address, in IC card of ID card except three kinds of rank ID (identity number) card information, the out of Memory contained by it can not be shown by I.D. read write line.
With " substantially " of ID (identity number) card information in IC card of ID card, " common " and " complete " three kinds of display levels adapt, " substantially " is set in IC card of ID card, " common " and " complete " three kinds of IC-cards read authority, outer for the I.D. except ID card verification code 2 display information is left in region that three have different rights in IC card of ID card, first region storing ID card " substantially " information, can by " substantially ", " common " and " complete " three kinds of authorities read, content in Two Areas storing ID card " common " information except I.D. " substantially " information, can be read by " common " and " complete " two kinds of authorities, content in 3rd region storing ID card " complete " information except I.D. " common " information, can be read by " complete " a kind of authority.
The built-in multiple encryption authorization module interface (Fig. 7) of safe unit of I.D. read write line, " substantially ", " common " or " complete " three kinds of I.D. read-write authorization modules can be installed, corresponding " substantially ", " common " and " complete " three kinds of read write line types, often kind of I.D. read write line can read and show the outer display information of the I.D. consistent with its type, and I.D. read-write authorization module is provided by public security department; Also can install the authorization module of expanded application system, I.D. can be expanded and be applied to other operation system, the authorization module of expanded application system authorizes granting by the corresponding administrative authority of other operation system through public security department.
I.D. read write line (refers to not be connected with information service system) in offline state: can (1) this I.D. by reading display, then can show that the information read from IC card of ID card have passed the checking of ID (identity number) card information authorization module read write line; (2) whether read write line display information is consistent with corresponding I.D. appearance information.Namely check I.D. property the same outside and inside, take precautions against " changing core " behavior of I.D. malice." change core " and be the most indiscernible a kind of I.D. to fake, namely I.D. surface information is be really or only photo is false, and the IC-card that I.D. the includes true IC card of ID card of another nature person or the displacement of its copy card.
I.D. read write line has for the legality identification method of I.D. holder in offline state: (1) naked eyes comparison I.D. surface photo, read write line show the degree of conformity of photo and true man three; (2) can the I.D. password being input to read write line by the password authentification of IC card of ID card; (3) the somatic fingerprint information being input to read write line whether with somatic fingerprint information matches in IC card of ID card.Above three authentication functions that card reader of ID card has holder legitimacy are separate, can apply separately, also can be with the use of.
Information service system sets up I.D. network verification number counter respectively for the I.D. read write line of three types, after carrying out I.D. network verification by the I.D. read write line of a type, the checking number of times of respective type adds 1 at every turn, also the current value of the I.D. network verification number of times done based on all types of I.D. read write lines is stored respectively in IC card of ID card, by the I.D. network verification method of I.D. read write line be: the I.D. read write line reading identity card IC-card contents of any one type comprises the ID (identity number) card information of read write line display, the current value of somatic fingerprint information and checking number counter is sent to the network comparison that information service system carries out the I.D. true and false, comparison content is identical, and the respective type counter of information service system adds 1 and refreshes the numerical value of the network verification number of times of same type in IC card of ID card.
For the life problems of IC card of ID card repetitive read-write, solved by dispersion storage space reserved in IC-card.
Be that the I.D. password that (1) is input to read write line is sent to information service system by the network verification method of I.D. read write line to I.D. possessor legitimacy, carry out I.D. password authentification; (2) the somatic fingerprint information being input to read write line is sent to information service system, carries out somatic fingerprint information matches.Human finger line information can be that any one in ten fingers refer to or whole ten fingers.
The I.D. network verification by I.D. read write line done based on citizen's information platform system is from the different of ID card verification that the I.D. read write line by off line carries out, the former can forge, clones or usurp the situation of citizen ID certificate IC-card by Timeliness coverage by setting up I.D. network verification number counter, thus fundamentally stop citizen ID certificate IC-card forgery, clone or usurp.
To be falsely used or IC card of ID card is replicated if I.D. is lost, only need arrive citizen's information platform management organization and handle I.D. and report the loss, get new I.D., I.D. originally, namely not by I.D. network verification, thus can not continue use; If other people utilize true identity information to palm off or the IC-card that replicates an I.D. and include, but be stored in information service system due to I.D. network verification number information, fake producer cannot know and makes this I.D. not by network verification.Even if under most extreme case, counterfeiter has grasped all identity informations such as identity information, I.D. password, I.D. network verification number of times, true and false I.D. is just the same at some time points, can not distinguish, so true and false I.D. wherein one pass through network verification, after changing I.D. network verification number information, another is just inevitable not by network verification.The result caused is, or true I.D. always can normal through network verification, and palm off I.D. always not by network verification, or personation I.D. have passed network verification, and true I.D. is not when network verification is passed through, lawful bearer can report to the police rapidly and report the loss, thus prevents the use of personation I.D. within the shortest time.Although it is relatively easy (increase ID card verification code in I.D. after to grasp personally identifiable information, to the grasp of identifying code also non-easy thing), but wanting to grasp I.D. network verification number information is almost impossible thing, makes above-mentioned IC card of ID card anti-counterfeiting technology fool proof.
As for the inspection to I.D. holder legitimacy, in the occasion that safety requirements is high, can namely require I.D. password authentification, require again to carry out somatic fingerprint Information Authentication.Special attention should be that the somatic fingerprint Information application scope in IC card of ID card should give strict regulations by administrative regulation or administrative rule, for the business operation of the material particulars such as such as cash in bank drawing, remittance, should mainly adopt I.D. password authentification, can coordinate and adopt somatic fingerprint information identification checking, never can be used alone somatic fingerprint Information Authentication, this is mainly for the consideration of maintain secrecy to individual finger print information needs and personal safety.
(4) identity network checking
The I.D. newly enabled, initial for I.D. identity information (comprising the I.D. network verification number of times of chip serial number contained by name, IC card of ID card, ID (identity number) card No., ID card verification code, current value) should be preserved in the IC-card of citizen's information platform and I.D. simultaneously, be called the identity information initialization of I.D., could formally use; If want to enable I.D. password, two fingerprint information comparison functions in I.D., should by handle to the management organization of citizen's information platform application, examination & verification enable formality, this two function could be open-minded individually or simultaneously.
The amendment of I.D. password should be undertaken by the I.D. read write line of networked information service system, and operation steps is: (1) checking Old Password; (2) arrange new password, the inspection of new password secondary input read write line is identical, and read write line is by information service system to the amendment of citizen's information platform application password, and after password is successfully modified, new password writes in IC card of ID card by read write line.
If there is the fortuitous events such as power-off suddenly during amendment I.D. password, one end is effective, lost efficacy in one end to cause the write of I.D. password and information service system password to be preserved, this I.D. will by line verification, in the case, the required public security organ above county level of holder (or citizen's information platform management organization), handle the identity information initialization business of I.D., I.D. could normally use.
Interface is veritified by the identity of information service system, unit identity network checking can be carried out, its method is: applying unit digital certificate U shield, and input " unit full name or unit mailbox transmitting-receiving account number+unit digital certificate U shield password ", can complete the authentication of unit.
Interface is veritified by the identity of information service system, the method can carrying out citizenship network verification has three, one is input " name or ID (identity number) card No.+ID card verification code 1 " and " I.D. password ", two is inputs " name or ID (identity number) card No.+ID card verification code 2 " and " I.D. password ", three is use citizen's digital certificate U shield, input " name or ID (identity number) card No.+citizen's digital certificate U shield password ", can complete citizenship network verification; The identity that can embed information service system in other application system such as bank, telecommunications veritifies interface, carry out identity network checking, after being verified, the citizenship information that this application system that what application system can to obtain according to administrative regulation, administrative rule or personal information that the rules such as everyone authorizes preset be suitable for needs.
Application system is from the citizenship information type acquired by citizen's information platform, it can be one of ID (identity number) card information of three kinds of ranks, also can be the integrated information comprising employee's card, driver's license, academic title, educational background, household register information etc., to be suitable for the needs of application system and to agree to through obtaining personal information owner or have the mandate of administrative regulation, administrative rule for principle.Thus make each application system can specification and reasonably utilize personal information, be unlikely to that a guy's information is abused, the anxiety of illegal use.Be convenient to the identity real name system of carrying out all kinds of business, as mobile phone identification policy, online game system of real name, ticket system of real name.
Authentication service is embedded in all kinds of operation system, realize the tight coupling with all kinds of operation system, whole verification process completes automatically when transacting business, does not need manual intervention, also can not change operation flow and the custom of each system, greatly can improve the efficiency of each system business process.
Above identity information inquiry and verification method, owing to authorizing display or carrying out in citizen oneself authorization in accordance with the law, thus in system and technically ensure that legitimacy, necessity and legitimacy that identity information is inquired about.Which overcome the upper drawback being based upon ID (identity number) card information can be looked into easily by network or mobile phone mode in " NCIIS " Basis of Database, Charge and query, excessive queries occurred of society.This checking method and cover the examination of basic identity information and the examination of special identity information (such as driver's license, all kinds of professional operation card, educational background, credit etc.).Thus thoroughly solve the proof of basic identity and the proof problem of special identity, namely solve the problem of " whom holder is " and " whom is ".This " accepting and believing " being sincerity society provides technical support.
The examination that banking system adopts above-mentioned I.D. network checking method to open for account, report the loss and access, and in the mobile phone that the notifying messages of institute's transacting business is sent to this citizen and E-mail address, at very first time notice mailbox user, can stop to claim the identity of others fraudulently to demonstrate,prove to open or report the loss account and falsely claim as one's own the phenomenon of depositing and occur, thus avoid all kinds of frauds related to this.Open or report the loss account and other business carry out this network identification card examination, mailbox user can know oneself I.D. service condition in the very first time, falsely use with or without by other people, once note abnormalities, can report a case to the security authorities immediately, can effectively stop I.D. to be falsely used the generation of all kinds of unlawful activities caused.This I.D. network verification method will be negated thoroughly bank and other financial mechanism to the excuse of " I.D. is negative formal examination, negative responsibility of discerning the false from the genuine only ", can guarantee depositor deposit and withdraw and report the loss safe and reliable.The application of I.D. network checking method in banking system, ensure that the enforcement of bank account system of real name, ensure that bank account treasury trade is all traceable, can not make to go to fund not in invisible because of certain account's undeserved reputation.
(5) information service system
Information service system connects all kinds of external systems providing unit or personal information, comprise information resource system and business application system, wide range of information projects index or category index database is set up, for the service that unit or personally identifiable information retrieve and add up for various unit or personal information; The authentication of unit or individual is provided by Citizen information management system; Unit or personal information classified inquiry, classification examination are provided by mail box system, classify and show service; Information service merge module is provided to provide aforesaid information service by the application system (comprising the mail box system of this platform) for information service party in request.Such as in bank application system, embed authentication module, carry out identity network checking, for opening a bank account, the carrying out of the business such as cancellation.
(6) mail box system
Mail box system is that mailbox user provides independently network storage space, and user can establish gradation directory certainly, stores user from the various documents (calling customer documentation in the following text) established; Customer documentation in mailbox or user profile document independently can set up password by user as required, customer documentation can be associated with user profile document and link, by building the association link on customer documentation in, user profile document can be opened, by the association link on user profile document, the customer documentation of association can be opened.So, mailbox user can be made a summary for user profile document content, editor etc. arranges achievement and be placed in customer documentation for future reference.
E-mail address user can be defined as required user profile document showing document, is numbered, and arranges displaying password; Mailbox user is when this user profile document shown by needs, unit in mail box system or personal information are shown in interface, first identity network checking is carried out to unit or citizen, and then input " document code, displaying password ", just can check or show unit or personal information (comprising identity information).The method can be completed by online computing or surfing Internet with cell phone, and when showing the contents such as personally identifiable information when needs, citizen need not open E-mail address and just can realize, and mailbox out of Memory can be avoided to expose.When individual leaves behind I.D., the true identity of oneself can be proved by the method.This brings great convenience to traveller's hotel ccommodation.
In mail box system, after unit or citizen log in mailbox, required user profile document can be chosen, after authentication, consult or this user profile document links of setting timeliness be supplied to by mail box system the target mailbox of unit in this mailbox system or personal information party in request, this user profile document links can also be transmitted to other target mailbox of specifying.Such as by citizen's information platform, the ID (identity number) card information of certain citizen is sent to law court through authorizing, just for law court receives pleadings on the net, puts on record and provide condition on the net.This at utmost can prevent network fraud by authorizing the method for examination unit or the personal information provided as third party by citizen's information platform.
E-mail address is embedded with online information AC system, except general chat system all have can one to one except private chat or application good friend group chat, it is characterized in that having offered unit, community and the chatroom by industry classification setting throughout the year, personal management is provided with according to administrative grade, participate in the whole real name of people of chatroom, the personal information mandate of oneself (ticking in the alternative frame of a certain user profile document) can allow the other side check self information (comprising the identity information of self) by the mailbox user of " adding as a friend " in chat system mutually.
The mail received and dispatched in mail box system can be appointed as " online reading " and " downloading " form, mail sending one of can specify the mail of transmission to be these two kinds of forms, and the mail of " downloading " that transmit leg can set by take over party is appointed as one of these two kinds of forms; The mail of " online reading " can only be read by the special electronic e-mail management software of mail box system, can not download; The mail being designated as " downloading " form can be downloaded to local storage and reading by special electronic e-mail management software or common email management software.So, for the mail that some confidentiality requirement are high, by selecting " online reading " pattern, the risk that mail is divulged a secret can be taken precautions against preferably.
Each E-mail address is provided with various mail template, need for the writing of various types of practical writing letter, for the electronic mail with legal documents character, should be in conformity with law, laws and regulations requirement in writing form, namely can visibly show contained content, and can transfer at any time and look into use; Accurately can show the content of original generation, transmission or reception; Reliably can ensure that, from final formation, content keeps complete, is not modified, but the change of some variation as mail attribute can be there is in mail in forwarding, storage and procedure for displaying; Communications content and pro forma any change all can be found.Specifically, the electronic mail of legal documents character in transmitting-receiving process with ciphertext form transmission, receive the mail seen mail side consistent with the communications content that transmit leg generates, format and paper type, electronic mail can be added a cover the figure seal be associated with communications content, this figure seal information leaves among mail box system in advance, any change of communications content will directly cause the marked change of lid seal graphics; The time having the word of citizen's information platform, the mailbox transmitting-receiving account number of mark and sending and receiving letter side and mail to send in the mail received and time of reception; Electronic mail sends successfully and can automatically preserve, can download and separately deposit or show, print, the time etc. that the mailbox transmitting-receiving account number of the word of the communications content preserved, format and paper type and the citizen's information platform on it, mark and sending and receiving letter side and mail send all can not be changed, otherwise will directly cause the marked change of lid seal graphics.E-mail address can carry out Put on file as required for the electronic mail received.
Citizen's information platform sets up the SMS informing function with mailbox " binding " number, issue bulletin for system or send mailbox in real time and log in and I.D. network authentication information, unit or citizen can open all or part of SMS notification service from main separation.
In mail box system, set up A and B two electron-like mailbox, category-A mailbox is that the administrative authority of unit of government offices or each level of citizen's information platform has, it can not receive the mail that the mailbox on other websites is sent, receive only the mail that the mailbox in this mailbox system sends to it, for the transmit leg mail being labeled as " blacklist " by category-A mailbox, by the dustbin directly entered in mailbox, be automatically cleared after the time limit of setting, and return the receipt that this mail of prompting transmit leg is placed to dustbin, category-A mailbox possess to administrative administrative region or authorized region all target mailbox one to one or one-to-many send the function of mail or SMS, the target mailbox exceeding its administrative administrative region or authorized region scope can only send mail or SMS one to one, target mailbox all unconditionally receives, and the receipt of meeting auto-returned one " mail receives ", category-B mailbox is had by the unit beyond category-A mailbox user or citizen.
Category-B mailbox receives mail state can be divided into six kinds: " reception full detail ", " receiving system internal information ", " receiving little sending bulk message ", " receiving non-sending bulk message ", " reception friend information "; " reception full detail " refers to and can receive and intrasystem all mail outer from system, " receiving system internal information " refers to all mails received only in native system, comprise group mail, " receive little sending bulk message " and refer to mail in the system of receiving only, get rid of the non-good friend's group mail exceeding and specify more than number, " receive non-sending bulk message " and refer to mail in the system of receiving only, do not receive the group mail of non-good friend, " reception friend information " refers to good friend's mail in the system of receiving only, and comprises the group mail of good friend.
Category-B mailbox user can by mail box system to mailbox user single-shot or group sending cellphone short message in native system, but be subject to the restriction of target mailbox accepting state, when the accepting state of target mailbox is " reception full detail ", " receiving system internal information ", mailbox user single-shot or group sending cellphone short message in this mailbox user acceptable system; When its accepting state is for " receiving little sending bulk message ", the SMS that in this mailbox user acceptable system, mailbox user sends, gets rid of to exceed and specifies the non-friend group of more than number to send short messages; When its accepting state is for " receiving non-sending bulk message ", the SMS of mailbox user in this mailbox user acceptable system, but the group sending cellphone short message not receiving non-good friend; When its accepting state is " reception friend information ", receives only the SMS of good friend's mailbox user in system, comprise the group sending cellphone short message of good friend.
Citizen E-mail address open first should by handle to the administrative authority of citizen's information platform application, examination & verification enable formality, citizen E-mail address account number comprises mailbox and logs in account number and mailbox transmitting-receiving account number, two class mailbox account numbers are initially all set as citizen ID certificate number, after mailbox is opened, mailbox transmitting-receiving account number is fixed as citizen ID certificate number all the time, and mailbox login account number (primarily of English alphabet, numeral, Chinese character composition) can change through mailbox user application; Mailbox logs in account number once changing successfully, and former mailbox logs in account number and namely loses effectiveness, and the up-to-date mailbox set up can only be used to log in account number and password login mailbox.So, the E-mail address of each citizen is in relative confidential state.
Per-unit electronics mailbox open first should by handle to the administrative authority of citizen's information platform application, examination & verification enable formality, per-unit electronics mailbox account number comprises mailbox and logs in account number and mailbox transmitting-receiving account number, the initial number being all set as the organization mechanism code that the whole nation is unified, after unit mailbox is opened, mailbox transmitting-receiving account number is fixed as the number of organization mechanism code all the time, and mailbox login account number (primarily of English alphabet, numeral, Chinese character composition) can change through unit mailbox user application; Mailbox logs in account number once changing successfully, and former mailbox logs in account number and namely loses effectiveness, and the up-to-date mailbox set up can only be used to log in account number and password login mailbox.
Mail box system can set unique " an authorised representative's mailbox " representing this unit under per unit E-mail address catalogue, titled with unit full name, can set up department's mailbox of multiple rank through this unit application, every primary department can set up the post mailbox of some as required; The departments at different levels mailbox of unit can management organization's application of warp-wise mail box system by unit independently titled with the corresponding title of this department.The legal E-mail address of unit and department's mailbox are the instrument of foreign exchanges, are also the common platforms of internal institution information interchange; Person in charge can transfer, department or position mailbox constant, the job information persistence in mailbox, becomes this department or position leaves online historical archives in.
The E-mail address Directory service that mail box system provides, the mailbox transmitting-receiving account number of unit or citizen is disclosed on the website, E-mail address of citizen's information platform with title or name form, namely each E-mail address is titled with mailbox user real name or name, account number " binding " is received and dispatched with corresponding mailbox, make E-mail address communication catalogue directly with organization or citizen's name list view, form national common electronic mailbox address book; The E-mail address of unit is according to the sequence of government offices, business unit's (comprising legal person, non-legal person enterprise, self-employed entrepreneur), public institution, social organization's (comprising legal person or juridical-person tissue), by affiliated central authorities, province's (comprising municipality directly under the Central Government, autonomous region, lower same), city, county, the arrangement of administrative region, villages (towns); Citizen E-mail address address list, summarize the legal E-mail address of citizenry in accordance with the law, according to the administrative region layout at civil domicile place, namely the administrative region layout of the province belonging to civil domicile location, city, county, villages (towns), street or administrative village is pressed, the citizen on too concrete ground, residence is externally announced for being partly unwilling, the application of warp-wise citizen information platform management organization can county or city be that unit is according to surname layout E-mail address address list, citizen from one of main separation two kinds of arranged modes, can be defaulted as the first arranged mode; The E-mail address address list of citizen can also according to unit layout, the legal E-mail address of our unit the old and new worker can be combined under same per-unit electronics mailbox communication catalogue by the application of per unit warp-wise mail box system, the E-mail address of worker both can externally be shown, also can be only limited to and show to our unit worker, external concealment, independently determines display mode by employee; If citizen moves different administrative regions, or change work is to new unit, its legal E-mail address will be arranged in new E-mail address communication catalogue according to new household register ground or new unit, but this mailbox still exists and normally can receive mail in former communication directory listing, just put on the explanation printed words of " moving " or " transferring ", its this mailbox transmitting-receiving account being arranged in different mailbox catalogue is identical, still points to unique E-mail address; Mail box system provides the public address list in E-mail address by the arrangement of the sorting technique such as industry, specialty for unit, the public address list in E-mail address by sorting technique arrangements such as industry, specialty, academic titles is provided for citizen, each unit or citizen can file an application to add in the mailbox address book of a certain classification to citizen's information platform management organization by submitting to relevant documentary evidence, are intended to the information interchange facilitating generic unit and crowd.
In the public address list aligning method in above E-mail address, per unit or citizen can find the mailbox about administration easily in certain administrative region, and this brings great convenience for unit or citizen handle relevant administrative affair.Such as when there is swindle on the net, as long as find the public security organ of this administrative region or industrial and commercial machine-operated E-mail address, namely can carry out complaining or reporting.When needing payment of duty, only need log in tax hall by the web site url shown outside the tax authority E-mail address of this administrative region, this makes virtual network world and real world achieve docking of real meaning, achieves the realization of virtual world.
The recommended information of mailbox user can be enclosed in described unit or citizen E-mail address through application, but its content should be passed through by the examination & verification of citizen's information platform management organization, can also through the external website of this unit of application link for per-unit electronics mailbox.
The open method of unit or citizen E-mail address has be by mail box system interface input mailbox log in account number add mailbox login password authentication after open mailbox at two: one, two is applying unit or individual digital U shield, by opening mailbox after input " mailbox logs in account number+digital U shield password " checking.
Each mailbox to be opened and before not closing being crossed password login by a computer expert, any other computer does not open this mailbox by password, if there is a computer to attempt to open a mailbox opened by password, if Password Input is correct, system can be pointed out " having people using this mailbox ", and this information can be sent in the mobile phone of the mailbox user having opened Mobile Phone Short Message Service at once to warn.
Mail box system can carry out identity network checking by the authentication service merge module from information service system, the mailbox that the unit that identity network is verified or citizen's mailbox user can carry out recovering initial logs in account number or fetches the operation that current mailbox logs in account number, mailbox password recovers or resets, and user can open or this function inactive in mailbox; Unit or citizen can be applied for by the management organization to citizen's information platform, according to certain check-in the mailbox login account number recovering initial or the business of fetching current mailbox login account number, mailbox password recovery or reseting.
(7) Operation Log and ID card verification daily record
Operation Log and ID card verification daily record is set up in citizen's information platform, Operation Log comprises pertinent user information operation note in mailbox login record and mailbox, login record comprises the total degree and login computer IP address and login time that log in mailbox, if surfing Internet with cell phone logs in, then record phone number, mailbox user can by checking the improper login mailbox of Operation Log Timeliness coverage, pertinent user information operation note in mailbox, comprises the operations such as mailbox password amendment, the inquiry of user profile, examination and displaying; ID card verification log packet containing the ID card verification number of times corresponding with three kinds of I.D. read write lines and verify log in computer IP address and login time, mailbox user by checking ID card verification daily record, can Timeliness coverage I.D. with or without being usurped by other people or " clone "; Operation Log and ID card verification daily record can realize the tracking of " movement track " to specific citizen.
Set up for legal office the special account checking daily record (Operation Log and ID card verification daily record) and citizenship information in citizen's information platform, only have legal office (public security organ normally above the provincial level or procuratorial organ) by opening the written authorization of specific post system programmer, and dissimilar scope of having the right to open with legal office that is rank specifies in accordance with the law.
Beneficial effect of the present invention, single citizen of just realizing or unit information are inquired about quickly and easily, check, show, ID card verification and information interchange, prevention identity information is divulged a secret, and stopping forged identity card target Social benefit and economic benefit has been very huge.By realizing the large function in aforesaid mailbox website 12, integration existed system, has constructed citizen and unit information is shared and intercommunion platform, is actually the foundation works of having constructed national information and having built.For acceleration informatization and every business innovation provide network environment support.To the informatization of the information interchange of the whole society and information sharing, social Credit Construction, population management, social security and all trades and professions with eliminate the aspects such as information resources duplicate construction all there is powerful impetus, economic benefit and social benefit huge.