Trusted Domain resolves the deadlock in the Internet

Trusted Domain resolves the deadlock in the Internet

In October 2014, the news that China initiated the management of network ID cards (abbreviated as eIDs, all referred to as virtual identity electronic tags) was confirmed once again and has been piloted in many places. It is reported that the United States has initiated the management of network ID cards and has begun piloting in two states. The EU's "European Digital Agenda" released in 2010 also clearly puts forward "enhanced trust, security, and protection of prepaid cardholder data and establish strong authentication". At present, 10 countries in the European Union have started online identity authentication.

It is correct to solve the current problems encountered by the Internet by strengthening the eID management method: when human beings cannot fully manage social networks and manage the Internet, they cannot define the Internet correctly. When they cannot find a matching solution, eID is undoubtedly a kind of The most practical solution. However, I think there is an excellent solution, that is, the "trusted domain" theory.

What is a trusted domain theory?

Before explaining the theory of the trusted domain, we first define the Internet: The Internet is the mapping of human society and even human civilization on the high-speed information platform. Trusted domain theory is derived from this definition. Without this foundation, it cannot breed the theory of trusted domains and the subsequent derivation.

A trusted domain is a collection of trusted identities. The current trusted identities are independently verified and identified by various network service providers. Each Internet customer must log in to the Internet through the service provider portal. It can be said that innumerable entrances have caused a sharp increase in the risk of the Internet. The area in which each service provider on the Internet is responsible is a small trusted domain. These small trusted domains correspond to trusted communities of human society.

The world’s Internet is thus divided into small and credible tribes, which is far behind the real world. Why do you say that? In the real world, I can go to Wangfujing to shop at the same time and I can also freely choose restaurants and theaters to enjoy their services. But on the Internet, can Taobao's customers go to Jingdong to buy a screw? Even if Tencent is willing to open up some of the service providers' log-in portals, it is also a service of the same level, which is difficult to achieve across different levels. For example, QQ customers face obstacles in the level of identity and service synchronization. Some information services only need the user name level identity to obtain, but because QQ opened the login information, may provide the service provider with advanced identities, including payment, QQ customers for their own convenience to hurt their own choice , thus spreading personal privacy.

It may be that readers disapprove of this fragmented service and individual trustworthy tribes, but when credible departments evolved into later stages, the risk emerged. Through smart big data analysis, this customer is fragmented in various service providers, and with the specific information of the Internet IP, I can get a complete information of a customer, including the identity of the real society. What's terrible is that this big data analysis can be used to obtain privacy, such as individual hobby and hobbies that cannot be known even through torture, and even some invisible split personality that one cannot identify.

This is the inevitable result of the current development of the Internet. Customers and service providers are not equivalenced in the security level. The process of service integration has increased the difficulty of protecting the customer's network rights, making the customer's identity information vulnerable to attack. The result is that customers are either The nakedness of the Internet requires that you must have strong professional knowledge and use relatively complicated operations to protect your online rights.

I summed up the defects of the original credible tribe in the original stage as four major blocks: cost (the cost of logging in and registering the security department for repeated construction and customer security protection), security (easily attackable decentralized defense structure), and operations ( Continually complicated technologies have led to a slower promotion of services, a slowdown in the evolution of the Internet, and asymmetry (information, identification, security, means, etc. of customers and service providers).

Advantages and disadvantages of eID management

The government-led eID management in many countries is the crux of the Internet. At the stage where there is no conclusion and corresponding theory in the world, the alternative operation method is first practiced, so the advantages and disadvantages of this solution are obvious.

The biggest advantage of management through eID is that through the authentication and identification technology of the government endorsed, all trusted tribes are opened, and customers can use the unified authentication identity to carry out network life and connect scattered trusted tribes together. This area is a trusted domain, but this is a trusted domain at the same level. In this trusted domain, the service was opened up, which greatly reduced the costs of all parties in the Internet. With the gradual deepening of eID, each new and old service provider shares a customer base, simplifies operations and improves efficiency, and reduces costs while improving the service provider's productivity.

Managing with eID has both advantages and disadvantages. As early as 2011, President Barack Obama put forward a national strategy for online identity cards, also known as the National Cyberspace Trusted Identity Strategy (NSTIC). The most important part of this strategy is the role of the country in the evolutionary process. To effectively protect human rights and sovereignty over the Internet, the government cannot become an authentication and identification agency for this Internet portal, including any major unit or group, and must have a non-profit nature similar to that of the United Nations or notary office. Institutions with the principles of four “public” (open, fair, impartial, and trustworthy) are responsible for this role. This institution generally cannot be set up or designated by the government. The best condition is that the market evolves autonomously to develop such an institution. The state is only responsible for strategic guidance and promotion.

Why can't government departments do authentication and identification of Internet portals? I assume a scenario to deduct. If the entrance authentication and identification institution is a government department, this institution must also have a superior authority, and the practitioners also have a job identity and career path. The human's self-motivation will prompt them to make the option of maximizing their profits. Similarly, those who have the right to manage will have to make full use of these identity data to quickly achieve their goals if they want to deal with competition or crisis during their term of office. Otherwise, they will not be human society. Therefore, even if the transparency is higher in the United States, it also draws a red line, emphasizing the government's role in this area.

Health correctly implements trusted domains

So, how to implement a trusted domain correctly and healthily? The result of my research is that we must first legislate. Without rules, it is impossible to define the bottom line of behavior without legislation. It is difficult to clearly define what is being infringed upon and what should be protected. Only by establishing the basic status of network human rights and sovereignty can the corresponding construction and development paths be developed in turn.

China does not have the right to speak on the root server, but we also need this huge Internet propeller. Then, we must begin to position and price this propeller, and really confirm the development model from any perspective without any selfishness. Both the back door and the speculative mentality will pick up their own feet.

The complete statement of a trusted domain is the identification and authentication system of third-party trusted identities. This system is not to identify who the customer is, just to confirm whether this customer is credible. The trusted domain model is to build a network ecosystem that corresponds to the real society, allowing participants to engage in social activities at a higher speed, rather than controlling participants or controlling participants' behavior. Each participant should have the same free and autonomous rights as in real society. If customers do bad things on the Internet, they will also face the same responsibility as real society. They will not be safer or more dangerous because they are online. This system is to guarantee the equality and synchronization of each client. Its role is to filter anti-rule behavior rather than anti-social behavior.

I emphasize the human rights and sovereignty of the Internet and emphasize the importance of grading identities. This is to better correspond to the actual conditions of the real society. The network society should be more progressive than the actual society, not more backward. This is the principle. A city is a real-world trusted domain. People in the streets are all human. At least they are theoretically trusted. However, they cannot predict the security of their future behavior because their behavior is determined by their own consciousness. In this urban trusted domain, any behavior has the basis for determining their identity. This is also the purpose of the different levels of identification such as student ID, household registration, passport, ID card, and driver's license.

The establishment of a trusted domain will become an upgraded version of the current Internet, just as finding a new continent, the first-mover will certainly have more right to speak, in the premise of improving the level of security to simplify the entry verification process.

At the same time, the truly healthy and sound establishment of the trusted domain model can enable us to guarantee the security evolution of the Internet at a relatively low cost in the current fierce Internet competition, ensure the maximum innovation of the Internet, and deploy more social capital to invest in this field. We can achieve structural transformation from the forefront of the economy, at the same time we can optimize our network security layout, gain the right to speak in the Internet legislation and system construction, gradually change the layout and management structure of the current root server, and achieve a three-dimensional global network structure of the root server matrix. To break all monopoly and demarcation economic activities, so that China's capacity and capacity advantages have been fully played.

Ungrouped

  • [Worldwide Compatibility]With a worldwide 100-240V AC input, it's a truly global charger and perfect for international traveling. Compatible with iOS, Android, & Windows smart phones as well as tablets, speakers, cameras, and other 5V USB devices
  • With 9 years experience in the filed, Shenzhen WAWEIS Technology Co., Ltd is one of the best power supply device manufacturer in China. Our world-class production plant passed ISO9001:2008 & ISO14001:2004 certifications and is equipped with the state-of-art technology and machines. The main products we make are power adapters, which can be used in laptop, LCD display, LED lights, CCTV camera(12v series), Speaker(24v series), Balance car(42v series). All our products comply with European environmental standard as well as CCC,RoHS ,CE , FCC.

Ungrouped,High Quality Ungrouped,Ungrouped Details, CN

Shenzhen Waweis Technology Co., Ltd. , https://www.waweis.com

Posted on