Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 97-100.doi: 10.3969/j.issn.1671-1122.2015.09.023

• Orginal Article • Previous Articles     Next Articles

Research on Trusted Identity Architecture in Cyberspace Based on eID

Zhi-peng WANG, Ming-hui YANG, Liang LV()   

  1. Third Research Institute of Ministry of Public Security, Shanghai 201204, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

Abstract:

Trusted identity management in cyberspace is a main problem to be resolved today. In this paper, for the security issues and requirements in cyberspace, we researched on trusted identity architecture. A framework for trusted identity architecture in cyberspace based on eID was proposed, key processes working in this architecture were described, and privacy protection method against big data analysis was presented. The research shows this architecture can ensure the user identity credibility, the privacy protection, and the participation of various parts in society, and will play a crucial role in the orderly development of internet applications and the guarantee of cyberspace security.

Key words: trusted identity architecture in cyberspace, electronic identity, privacy protection

CLC Number: