Central bank supervises virtual currency on June 20
1
2
3
4. Protect the property rights and interests of the public, protect the legal tender status of RMB, prevent the risk of money laundering and maintain financial stability
5. Avoid excessive speculation in the name of "virtual currency" for virtual commodities such as bitcoin, which will damage the public interest and the legal tender status of RMB.
the central bank's supervision of virtual currency is mainly reflected in the supervision of bitcoin. The central bank forbids any enterprise or indivial to use bitcoin as a payment tool. As a payment tool, virtual currency has great risks, Therefore, the central bank's supervision of virtual currency is very strict
On March 28, the central bank held a national teleconference on monetary gold and silver work in 2018. Fan Yifei, vice governor of the people's Bank of China, pointed out that we should further strengthen reform and innovation and solidly promote the research and development of digital currency of the people's Bank of China. We should strictly strengthen internal management and external supervision, attach great importance to and effectively strengthen the quality control of RMB, carry out large amount cash management, build a cash clearing enterprise supervision system in accordance with the law, carry out the rectification and clean-up of all kinds of virtual currencies, and strive to build a "five in one" anti-counterfeit currency working mechanism
from the perspective of global digital currency regulatory practice, China has adopted a more stringent regulatory approach, but it does not mean that China can stay out of the global financial innovation wave. In the future, China should actively participate in the global governance of digital currency and enhance its influence and voice in the development of digital currency and regulatory rules
Enterprises can comprehensively investigate the security of contract management software through the information security certification of contract management software and the backup measures of the software for the contract
first, user identity security, ensure that the user identity is never impersonated
generally reliable electronic contract SaaS management software, through personal identity authentication system, State Administration for Instry and commerce enterprise information system, Ministry of public security citizen network identity, Eid recognition system, anti-counterfeiting CA digital certificate, face living recognition and other ways, carries out real name authentication for user identity, The authenticity and uniqueness of user identity are fully guaranteed
Second, data security, file data to prevent leakage
excellent electronic contract SaaS management software uses military standards to encrypt files, file storage and transmission adopts high-intensity encryption technology to ensure that files are only visible to me. At the same time, through a variety of technologies, it fully ensures the security and integrity of the file data in the SaaS management software of the electronic contract, and prevents the tampering, forgery and leakage of the file data
The SaaS management software of electronic contract with high security has passed ISO27001 information security authentication, the third public security institute's Eid electronic identity system docking authentication, and the Ministry of public security's level 3 protection evaluation, which brings users the same security protection system as the bank and meets the financial level security protection requirementsFourth, trusted cloud enterprise SaaS certification, services are recognized by the authority
with the large-scale application of SaaS services, enterprises have higher and higher requirements for data security, service quality and operation ability when purchasing SaaS services. As the only authoritative trust evaluation system in the field of cloud computing, trusted cloud has become one of the important criteria for enterprises to choose SaaS service providers
1、 Network security
1) the trusted signature system adopts the standard of HTTPS to provide API service, and the SSL protocol is used to reinforce the network link, and the aes256 symmetric encryption algorithm is used to realize the security encryption. Even if the attacker intercepts the network transmission packet, the plaintext content can not be obtained, so as to realize the security of network transmission
The system can scan and filter the transmitted data packets, set the access rules according to the user, IP address, access type and other ways, and detect and prevent the common intrusion behavior3) the trusted signature system has a perfect intrusion detection function, which can respond immediately to the detection of illegal behavior. The response methods include: the network system supports regular inspection of security vulnerabilities, and corrects network security vulnerabilities and system misconfiguration according to the inspection results
4) the firewall has been set for the connection between the electronic seal management mole and the external system, and the point-to-point response is realized through the IP white list to prevent abnormal IP requests for API services P>
two, data security
assured sign electronic contract system provides the same level of data encryption services as Alipay, uses sectioned file storage, dynamic password and other security protection mechanisms to ensure the safety of contract data, so as to prevent attackers from acquiring the complete data content. p> Segmented file storage: a data security storage scheme, which logically divides the original file into multiple data blocks, generates dynamic salt password through specific information, and stores it on different servers after encryption. Through segmented storage, the encrypted files are stored on different servers to prevent all files from being decrypted at one time by attackers
Dynamic password: a password generated according to specific information, such as the MD5 value of account name, and used to encrypt the file. Even if the file encrypted by salt password is obtained by website attackers, because there are no encryption rules, the cost of decryption is increased3) blockchain certificate deposit
assured signature will store electronic contracts in assured signature by using blockchain technology, and jointly promote the application of certificate deposit based on blockchain through cooperation with suppliers. Users can store the electronic contract, signer, file hash value and other information in the blockchain through assured signature. Once stored, no party can tamper with it to ensure the effectiveness and security of users' electronic evidence