A key obstacle to building an identity authentication system

Statement before the text:

     1) The descriptions and data about "fake goods" and phenomena such as Alibaba, "WeChat" and Tencent in this blog post are all from articles on the Internet. All introductions are purely for strategic proof needs. Regarding the introduction of relevant descriptions and data, bloggers do not hold opinions or positions in the blog post.

    2) There are some sarcastic words in the article, which are just to adjust the atmosphere of the writing, it does not mean that the bloggers have the intention and purpose of offending these two great companies.


      From the perspective of technical implementation, there are no obstacles to building an identity authentication system as shown in Figure 1. Not only are there no implementation barriers now, there were no technical barriers years ago. Since there are no technical barriers to implementation, what barriers have successfully prevented the emergence of an identity authentication system?

      No need? Obviously not.

      The blogger previously expressed a view that network security issues are first and foremost management issues. Building a low-cost, efficient and accurate identity authentication system is a key point to solve the management problem.

       Similarly, the obstacle to building the identity authentication system (or other forms of identity authentication system) shown in Figure 1 is also not a technical problem, but still a management problem.

       Specifically, this obstacle can be roughly divided into the following major obstacles: 1) Who is the project responsible unit (project leader) for building the identity authentication system? 2) Which government management information systems in the state of information islands need to be connected to the identity authentication system? 3) What kind of network application service must use the identity authentication information of the identity authentication system? And so on, and a long list of obstacles if you like.

        But in the opinion of bloggers, as long as a key obstacle point is solved, none of the obstacle points listed above are obstacles. This key obstacle is the effectiveness of the identity authentication system, especially the long-term effectiveness.

       It is indeed difficult to directly prove the direct positive relationship between the identity authentication system and network security, but observing a large-scale network application and its development process has considerable inspiration and guidance for the construction and future prospects of the identity authentication system effect. This network application is now that the majority of investors and friends use the network client to conduct stock trading and fund scheduling of stock accounts. This network application has a user group that is comparable to that of e-commerce, but this network application has an unparalleled transaction scale of e-commerce. And unparalleled fit with the wealth of the people.

      Today, the total turnover of the Shanghai and Shenzhen stock markets has risen rapidly from 6.1 trillion in 2000 to 111.3 trillion in 2017. In 2017 , the total amount of online retail transactions was only a mere 7.18 trillion yuan .

      Since the late 1980s and early 1990s, China has reopened the two stock exchanges in Shanghai and Shenzhen. The means for investors to speculate in stocks has also evolved from the beginning of investors to fill in forms at securities companies to buy and sell stocks, to telephone entrustment, and finally to through The network conducts stock trading and capital scheduling. When the network communication technology was just introduced into stock trading commission and fund scheduling and for a considerable period of time in the future, various user fund security incidents; internal and external collusion between securities companies and theft of user and company funds occurred from time to time. However, through years of continuous construction, today the China Securities Regulatory Commission has established a sound and efficient security management mechanism for the stock market. The core basis of this management mechanism is an accurate identity authentication mechanism and a series of management specifications.

        In particular, it should be pointed out that quite a few management regulations formulated by the CSRC can be directly or indirectly projected onto the stock trading system. And this direct or indirect projection function makes the business management through the network, in terms of mechanism, have a powerful remedial mechanism. Even if there is a loophole in the management specification, this loophole can only be discovered and exploited once. Once this vulnerability occurs, it will be patched or improved in time (Note 1). In 2014, after the non-safety factors that caused the rapid rise of the stock market (non-compliant illegal fund allocation business) were successfully defused, the illegal fund allocation business was completely removed from the market (a well-known company that was suspended by the China Securities Regulatory Commission not long ago). The case of an actor 50 times leveraged buyout of a listed company is a good example). Today, the majority of investors do not need to worry at least that their identity information will be stolen; the funds and stocks in the stock account do not need to worry about being stolen or sold. happens sometimes).

        Basically, in the same period of time, network technology began to be applied to two network applications that are directly related to people's lives today, stock trading commission and e-commerce. Contrasting, you will find some very interesting differences (see Table 1) and commonalities (see Table 2). These differences and commonalities can justify the necessity and effectiveness of the identity authentication system for building a secure network environment from both positive and negative aspects, especially in terms of long-term effectiveness, an accurate and precise identity authentication system, It can provide long-term and lasting network security for network applications.

        Figure 2 is an identity authentication system capable of identifying securities practitioners. With the support of this system, the government can not only effectively crack down on the "fake goods" that plague e-commerce and ordinary consumers, but also effectively crack down on various counterfeiters, fake stock gods, and counterfeiters in the currently unsupervised online world. Stockist.

        Today, network security has been incorporated into the national strategy, which shows that the country has made up its mind to rectify all kinds of chaos in the online world. The biggest problem and obstacle encountered by the current government is the lack of a handy cyberspace management tool to effectively manage the online world.

        The identity authentication system is such a handy and effective tool. Through this tool, the government can effectively, accurately and quickly manage various activities in the entire online world just like the CSRC manages the Shanghai and Shenzhen stock markets in the online world.

 

        I've read a few interesting reports recently. According to the report, Alibaba and Tencent are making great efforts to crack down on counterfeiting, and they have achieved corresponding results. One of the reports said that Alibaba has set up an anti-counterfeiting team of more than 2,000 people, investing more than 1 billion yuan annually in "professional" anti-counterfeiting.

        But what bloggers want to say is that whether Tencent or Alibaba, they may have overlooked the following points:

        1) The so-called professional anti-counterfeiting they carry out, no matter how professional, is only enterprise-level anti-counterfeiting. Its credibility and professionalism are far less professional and more credible than those from relevant government departments and authorized professional testing agencies and certification agencies. After all, no matter how much you say, it is only what you say, but I actually bought fake goods from you and was deceived.

        2) In today's online world where counterfeiting is easy and counterfeiting is difficult, it is obviously a fool's dream to rely on a 2,000-person counterfeiting team and a special anti-counterfeiting fund of 1 billion yuan/year to get rid of the trouble of counterfeiting and "whiten" yourself. Because of the 2,000-person anti-counterfeiting team and the 1 billion yuan/year investment in anti-counterfeiting, in front of the total number of fraudulent practitioners and total output value in today's Internet industry, it is really nothing.

        3) At present, the public security departments are more likely to use a strategy of targeting the entire crime chain with a point-to-point approach to crack down on cyber fraud crimes. In the same way, if enterprises and the government can jointly invest more resources in blocking the smooth circulation of "fake goods" on the network, they will be able to achieve more management effects with less effort. To paraphrase the phrase "without buying and selling, there will be no killing", that is: if the Internet "has fakes", it is impossible for your home to be "without fakes"; if the Internet "without fakes", your home will naturally "have no fakes".

       4) With the determination and action to invest huge resources in cracking down on counterfeiting, how to invest huge resources to crack down on counterfeiting is a priority for managers who hold the right to allocate huge resources. Whether to do more with less and do it once and for all (such as the gameplay below) or do it with half the effort and not make a big deal (such as the current gameplay of Alibaba and Tencent), in the sand table deduction, the judgment has been made.

       A new way of "fake":

       Building an identity authentication system as shown in Figure 1 does not cost 1 billion yuan, right? Once completed, the maintenance and operation cost of the system will not cost 1 billion yuan per year.

       Without this system, for Alibaba, the investment in anti-counterfeiting this year is 2,000 people + 1 billion, and next year it should be 2,100 + 1.05 billion, and more resources will be needed in the year after. However, the consequences of such investment are still that it is impossible to "whitewash" oneself, and the most important thing is that "fake goods" will also grow simultaneously on its e-commerce platform.

      With this system (for example, Alibaba will start from this year, spend 3 years, invest 500 people + 300 million per year, and build the identity authentication system in Figure 1 for the government for free, then start from the 4th year), under Alibaba The number of "fake goods" on all e-commerce platforms will start to decline significantly and rapidly, and until "fake goods are hard to find", the anti-counterfeiting team of more than 2,000 people can be transferred to other positions, and more than 1 billion yuan / year The anti-counterfeiting funds will no longer need to be spent. At the same time, Alibaba and Tencent do not have to worry about the counterfeit manufacturers being driven out by the other party to make a comeback on their own sites.

       According to media reports, Alibaba has exclusively cultivated multiple anti-counterfeiting weapons, so that some "fake goods" were beaten to death as soon as they were launched. And if Alibaba cooperates with relevant government departments to fight counterfeiting, it also cooperates with relevant departments to cultivate this ultimate weapon of "anti-counterfeiting", then once the practice is completed, the effect is that "fake goods" will not be available online at all.

      For the e-commerce industry, especially the two e-commerce giants Alibaba and Tencent, this system has two more important meanings: 1) From now on, no one can use "fake goods" and "weak intellectual property protection". And so on similar topics, malicious attacks on it, deliberately suppressed. If it is classified or reclassified into the " Notorious Market List ". 2) The corruption of the internal personnel of the enterprises who help "fake goods" to enter the two e-commerce platforms will be completely eliminated from the system

  

Table 1: Differences

Contrast point

E-commerce industry

stock buying and selling orders

Responsible for Industry Cyber ​​Security

E-commerce companies have to take responsibility for network security from many government departments.

The CSRC is responsible for the safety of all market participants in the stock market.

The influence of relevant laws and regulations on network security on the promulgation and implementation of industry development

There is no obvious and direct help to the network security of the e-commerce industry

There is obvious and immediate help.

The total size of the industry size accounted for by non-security incidents

The total size of non-security incidents has grown in tandem with the development of the industry as a whole. There are more and more cases of user accounts being stolen and used fraudulently on each e-commerce platform. And the entire industry is still trying to find a killer solution to completely eradicate the theft and fraudulent use of user accounts.

The trading volume of stock trading through the Internet is increasing, but the funds and stocks on the stock trading accounts of investors are becoming more and more secure. The incidents of the theft of funds and stocks on investors' accounts, which were reported in the early days, have not been reported in the newspapers for a long time.

The scale of counterfeiting and buying fakes

In the rapid development of the e-commerce industry, the scale of counterfeiting and buying counterfeit industries has also grown rapidly. Sometimes it is difficult for you to distinguish whether it is the production and purchase of counterfeit products that promotes the development of e-commerce, or the development of e-commerce that promotes the development of counterfeit production and purchase of fake products. (Note 2)

The room for various violations (such as companies obtaining listing qualifications through fraud, high-leverage mergers and acquisitions, employees' illegal buying and selling of stocks, etc.) is getting smaller and smaller.

The impact of counterfeiting and buying fakes on the industry

Making and buying fakes has become a huge obstacle to the development of the industry.

The negative impact on the development of the industry caused by counterfeiting and obtaining improper benefits through fraud is getting smaller and smaller.

 

Table 2: Commonalities

The introduction of network technology has played a strong role in promoting the development of the e-commerce industry and the stock trading industry.

In the entire online world, people will encounter not only fake goods and e-commerce, but also fake book dealers, fake stock gods, and fake stock specialists (Note 3).

 

Note 1:

     This "management loophole" can only be a single patching mechanism, and it is also a very, very, very important management mechanism for establishing a long-term effective network management mechanism. The existence of this mechanism can objectively prevent a management loophole from being used repeatedly, and make the management loopholes in the entire management system not more and more, but less and less.

 

Note 2:

   Alibaba is a typical observation sample of the relationship between "e-commerce" and "fake goods".

    An undeniable fact is that in the process of Taobao from "0" to "1", "fake goods" contributed a lot. It may not be possible to say "there is no counterfeit goods, there is no Taobao from 0 to 1", but it can be said that "without fake goods, there is no rapid development of Taobao. Before Taobao collapses, it will complete the leap from 0 to 1" . From the launch of Taobao to today, "fake goods" still follow Alibaba's shadow and grow together.

      It is precisely because of this that the word "fake" will inevitably be brought up to talk about some important development nodes of Alibaba. And once someone talks about "fake goods", Alibaba will stand up bravely, beat his chest, swear and swear, saying that he will fight against "fake goods", say "no" to "fake goods", and "fake goods". "Fakes" are irreconcilable, so what? Then there are "fakes" that still go hand in hand with Alibaba.

      Even if Alibaba invests a huge amount of anti-counterfeiting resources such as "more than 2,000 people + 1 billion" every year, Alibaba is still unable to get rid of the negative impact of "fake goods" on its development.

      As a giant Internet company listed in the United States, Taobao, a subsidiary of Alibaba, was again included in the "Notorious Market List" by the Office of the United States Trade Representative at the end of 2017 . This more or less also illustrates some problems. Judging from the statement of Alibaba President Bethune on the matter reported in the media, "fake goods" is a very, very important reason why the USTR re-classified Taobao into the "Notorious Markets List", at least one was released . The very, very, very important reason on the countertop is probably the only reason it is placed on the countertop.

       Could it be that the Chinese government and Chinese enterprises can only allow the old and the United States to use the excuses of "fake goods" and "unfavorable intellectual property protection" to suppress them, and they have no ability to fight back except to express regret and indignation. ?

       Can we make a bold assumption that Alibaba donated and built the Chinese version and the American version of the identity authentication system as shown in Figure 1 for the Chinese government and the U.S. government, respectively, and borrowed its own identity authentication system between the governments of China and the United States (the Trump classmate is not Speaking of, are he friends with Da Da and Jack Ma?), he has successfully facilitated the interconnection of the two countries' identity authentication systems (such as Shenzhen-Hong Kong Stock Connect and Shanghai-Hong Kong Stock Connect), and I dare not say that Taobao will not be banned by the US Trade Representative . The office is once again included in the "Notorious Market List", but one thing is certain, that is, the USTR must no longer use the excuses of "unfavorable intellectual property protection work" and "fake goods rampant" to include Taobao again in the " list of notorious markets". Notorious Market List". Because if the Office of the US Trade Representative also takes "unfavorable intellectual property protection work" as an important or only excuse to put "Taobao" or "WeChat" on the table or re-enter the "Notorious Market List" , which would be tantamount to an announcement by the USTR to the world that "with the use of efficient, accurate, and effective management tools for cyberspace applications, the US government is still unable to provide legal and effective knowledge in the online world. effective protection of property rights”.

 

Note 3)

        According to the relevant laws and regulations of the state, enterprises or individuals engaged in securities business are required to obtain corresponding qualifications. However, in the vast and boundless online world, the China Securities Regulatory Commission is as powerless as other relevant institutions with management responsibilities for the god-like existence of counterfeit brokers, counterfeit stock gods, and counterfeit specialist stockists.

 

 Figure 1: Schematic diagram of the identity authentication system



Figure 2: Schematic diagram of the identity authentication system that can identify securities practitioners




Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325900896&siteId=291194637