Residential Garage Door,Vertical Folding Garage Doors,Villa Style Vertical Garage Door,Villa Vertical Folding Garage Door NingBo AnSheng Door Industry Technology Co.,Ltd. , https://www.speedeerdoor.com
In a word: This is the enhanced version of the "real name system."
The ubiquitous “real-name system†has a long history. How did it develop? Is it necessary?
The "real-name system" has been ubiquitous in our lives. Its existence not only facilitates government management, but also greatly safeguards our property and our lives. The “real-name system†we are talking about now refers to the network real-name system in the fields of mobile phones, the Internet, and banks. In fact, as early as in ancient times, this continent has been groping for "real-name system."
I. Clan Social Period to Western Zhou Dynasty - Named as Real (Name + Biological Characteristics)
"Name" was born during the clan society period. At that time, "surname" was the clan's clan number, and the celebrity was the personal reference. People must be named after they are born to separate them from each other. Otherwise, they cannot enter the existing social order system as independent people.
Because the life span of human beings is generally small during the clan society, people identify each other mainly based on names and biological characteristics (including voice, appearance, body shape, hair style, etc.). A smaller population makes the identification of biometrics more adequate to meet the needs, but as the number of humans increases, duplicative names and easily misidentified biometrics make humans begin to grope for new "real-name systems."
For example, if there is a name called "Heavy China" in Hedong and "Heisei" in Hexi, different clans can also be distinguished by their surnames. When a clan is large, there must be duplicate names in the clan. It is difficult to get rid of household registration information with the same name. Differentiate people.
Second, business to the Qing Dynasty - to the nationality (name + household registration)
According to Oracle records, the Shang dynasty has begun to implement a population registration system, with "departures" or "ascension", that is, records of temporary recruits. The book of "Shangshu Duoshi" said: "Yes, you have a predecessor, there is a book", it can be seen at that time that there are head statistics. This can be regarded as the germination of China's household registration system.
In the Warring States Period, Qin Xiangong promoted the “association of household registrations†and the household registration system began to develop rapidly. During the period of the Southern and Northern Dynasties, the basic framework of the household registration system was formed, and household registrations were classified and audited to inspect the population, levied taxes, transferred labor, and held a national-scale population survey. This framework has been used for the Ming and Qing Dynasties.
The emergence of the household registration system made it possible to manage large-scale populations. It allowed a large number of people to become virtual paper letters, allowing names to correspond with household registration information. To promote the development of agricultural society, while maintaining the stability of society through the shackles of personnel. However, there are no biometrics on the household registration system. They can only verify the authenticity of the household registration information. This has led to the falsification of certain dynasties and serious damage to the national interest.
III. From 1912 to the end of the 20th century - using evidence as evidence (document + household registration)
In fact, since the Sui and Tang dynasties, China had an ID card in the broad sense of the word: “Yu Fuâ€. In the Ming Dynasty, it used the “Dental Card†with the name, title, curriculum vitae, and tips of the licensee. It is in the modern sense. The card ID is very close.
The earliest identity card system in China should be the "resident card system" formulated by the Ningxia provincial government in 1936. Ningxia Province's "Residential Permit" is made of white cloth, which is 7 cm long and 3 cm wide. It contains the name, age, place of birth, occupation, length, appearance, features, and shape of the hand pattern. "Resident permits" are stipulated in the coats for inspection. Although this "resident certificate" is different from the subsequent national identity levy, it already possesses all the elements of an identity card and is the earliest prototype of a Chinese identity card.
After Japan surrendered in 1945, the National People's Government Legislative Yuan amended the then-current Household Registration Act. In 1946, the Nationalist Government announced the “Family Registration Law (Amendment Draft)†and “Detailed Rules for the Implementation of the Household Registration Lawâ€, which stipulated that the national identity card should be issued and issued. The Chinese citizens who had issued the license must have reached the age of 18 and above, regardless of gender. Under the age of 18, the automatic requester may also be granted a grant. Active servicemen will not be filled out for the time being. Since then, the old Chinese provinces and municipalities under the Kuomintang rule have established regulations for the implementation of identity cards. Since there are no specific unified regulations, the regulations formulated are also not the same.
After the liberation in 1949, Chinese citizens used their residence booklet and the unit's introduction letter for a long time to prove their identity. On April 6, 1984, the State Council approved the Ministry’s notice regarding the issuance of certain resident ID cards, and announced the “Regulations on the Implementation of the Identity Card of the People's Republic of Chinaâ€. Since then, through the implementation of the resident identity card system, China has unveiled the prelude to the resident account credentials management, and began to issue the first generation of resident ID cards.
China's new anti-counterfeiting resident identity card was opened on July 1, 1995, and the certificate adopted a holographic transparent plastic envelope.
During this period, the identity verification was greatly improved by integrating the ID of the household registration information and manual inspection. However, due to the low degree of automation of detection, lawbreakers bypass detection through tampering with ID cards or using artificial detection error loopholes, and it is not uncommon for them to open bank accounts or commit fraud crimes.
Fourth, since the 21st century - to be human (certificate + biometric)
On March 29th, 2004, the Chinese mainland officially began experimenting with re-issuing second-generation resident ID cards for residents who have built-in non-contact IC card smart chips. The larger scale renewal started in 2005. From January 1, 2013, the generation of ID cards will cease to be used, and the new second-generation ID cards will also register fingerprint information during the application.
In order to further strengthen the management of the "real-name system," the state has continuously issued a new "real-name system" management policy, which requires the elimination of telecommunications and bank "black households" with great security risks. All aspects of social life, such as the Internet, APP, transportation, and hotels, have also begun to promote compulsory "real-name certification."
Biometrics as a natural feature of the human body has the convenience of recognition and irreplaceability. Through the identification of equipment IC chips plus face recognition, fingerprint recognition and other biometric identification technologies, it can ensure the authenticity of the verified person and reduce errors. Risk detection.
Summary <br> <br> different periods of "real names" have different authentication methods, but in the final analysis, the purpose of "real name" is to confirm the authenticity of his own identity. When existing authentication methods cannot meet the needs, new authentication methods will be used instead.
There is a need for mobile and real-name authentication or other real-name witnesses such as hotels and transportation. Whether it is telecommunications, finance, or the Internet, new methods of fraud and fraud continue to emerge. The “real-name system†can target offenders and greatly limit illegal crimes.
Mobile and package also use ubiquitous real-name system of face recognition technology how to develop
In early July, mobile and package client V4.6 was officially launched. This version of the APP did not change much in the interface, but the background quietly added face recognition technology for high-risk cardholders. Face recognition authentication is based on the general "real-name system" to further strengthen the verification of identity information. In the past, only the identity card number and name were required to know, and real-name authentication could be performed. After joining the face recognition technology, it is necessary for me to carry out real-name operations to successfully pass the certification.