Is Hangzhou passport to citizen center
the following is the process:
1. Fill in the form and make an appointment on the official website of the entry exit department
2. According to the appointment time, bring your certificate to the entry exit administration to fill in and hand in the form
3. Pay by bank card as required
4
5. Collect your ID card and receipt on or after the date indicated on the receipt. Registered residence 15 working days, non registered residence must be 30 working days.
No, Saturday and Sunday are weekends, not working hours. Weekend refers to the rest time on Saturdays and Sundays, including alts' work rest and children's study rest
On March 25, 1995, Li Peng, the then Premier of the State Council, signed the State Council's order No. 174, which decided to implement the two-day weekend since May 1, 1995, that is, "state organs and institutions implement unified working hours, and Saturdays and Sundays are weekly rest days." It is stipulated that the working hours will be changed from May 1 to 40 hours a week, which is the household name of the two-day weekend working system
extended information:
notes for passport handling:
1. Apply for the passport in advance, give the issuing authority enough time, and do not rush to apply when the date of going abroad is approaching, so as to avoid delay
When getting the passport, the operator and the holder should carefully check the name, gender, birthplace, etc. on the passport, and check whether the Chinese pinyin is correct, and whether the steel seal, the seal and signature of the licensing authority are complete. The holder shall sign in the signature column of the passport holder with a pen. If the name on the passport is wrong, do not sign for the time being and report to the licensing authority The passport is an important identity document for people going abroad, so the holder should keep it properly, and all items on the passport should not be defaced or altered It is necessary to prevent the loss and theft of passport. If a passport is lost or stolen abroad, the party concerned shall immediately report in writing to our embassies and consulates abroad; If the passport is lost or stolen in China, it should be reported to the relevant passport reporting unit or public security organ immediately, and it should be declared invalid in the newspaper. After returning to China, holders of multiple valid passports shall return their passports to the original licensing authority for unified custody. Those who do not go abroad for some reason after receiving the license should also return their passport to the original licensing authority6. To borrow the old passport, the personnel who go abroad again must present the approval of the mission, the approval of the personnel who go abroad and the letter of introction from the dispatching department
1. Go to the office halls of traffic detachment teams in various cities, districts and counties, and query by touching the query terminal
2. Log in the external service website of public security and traffic administration bureau of Public Security Bureau of each city: find the vehicle violation query, and input the license plate number and engine number for violation query
3. Call 12580 or 114 to inquire
4
5. Traffic violation query tool, input license plate information query, network can directly query
6. Log in the official website of public security and traffic administration bureau of each city, and input the last four digits of license plate number, engine number or the last six digits of vehicle frame number to query.
Introction
RSA cryptosystem is a public key cryptosystem proposed earlier. In 1978, Rivest, Shamir and Adleman of Massachusetts Institute of Technology (MIT) proposed an asymmetric (public key) cryptosystem based on number theory, called RSA cryptosystem. RSA is a block cipher system based on "the prime factorization of large integers is a difficult problem"
encrypting a file only solves the problem of confidentiality of the transmitted information, and other means are needed to prevent others from destroying the transmitted file, and how to determine the identity of the sender, which is digital signature. In e-commerce security system, digital signature technology plays a very important role. Digital signature technology is used in source identification, integrity service and undeniable service of e-commerce security service. In e-commerce, a perfect digital signature should have the ability that the signer can't deny, others can't forge, and can verify the authenticity in front of a notary
there are many ways to realize digital signature. At present, public key encryption technology is widely used in digital signature, such as PKCs (Public Key Cryptography Standards), digital signature algorithm, X.509 and PGP (pretty good privacy) based on RSA date security company. In 1994, American Institute of standards and technology published the digital signature standard, which makes the public key encryption technology widely used. Asymmetric encryption algorithm is used in public key encryption system< At present, digital signature is based on public key system, which is another application of public key encryption technology. Its main method is that the sender generates a 128 bit hash value (or message digest) from the message text. The sender encrypts the hash value with his private key to form the sender's digital signature. Then, the digital signature will be sent to the receiver as an attachment of the message. The receiver first calculates the 128 bit hash value (or message digest) from the received original message, and then decrypts the digital signature attached to the message with the sender's public key. If the two hash values are the same, the receiver can confirm that the digital signature belongs to the sender. The original message can be identified by digital signature
signing on a written document is a means of confirming a document, which has two functions: first, it confirms the fact that the document has been signed because it is difficult to deny its own signature; Second, because the signature is not easy to counterfeit, it confirms the fact that the file is real
digital signature has something in common with written document signature. Digital signature can also confirm the following two points: first, the information is sent by the signer; Second, the information has not been modified since it was issued. In this way, the digital signature can be used to prevent the electronic information from being falsified or sent in the name of others. Or send (receive) the letter and then deny it
there are three widely used digital signature methods: RSA signature, DSS signature and hash signature. These three algorithms can be used alone or combined together. Digital signature is realized by encrypting and decrypting data with cryptographic algorithm. Digital signature can be realized with DES algorithm and RSA algorithm. But the three technologies are more or less flawed, or there is no mature standard
the biggest convenience of RSA or other public key cryptography algorithms is that there is no key distribution problem (the more complex the network is and the more users there are, the more obvious its advantages are). Because public key encryption uses two different keys, one is public and the other is private. The public key can be stored in the system directory, unencrypted e-mail information, telephone yellow pages or bulletin boards. Any user on the Internet can obtain the public key. The private key is private to the user and held by the user. It can decrypt the information encrypted by the public key
the digital signature technology in RSA algorithm is actually realized by a hash function. The characteristic of digital signature is that it represents the characteristics of the file. If the file changes, the value of digital signature will also change. Different files will get different digital signatures. One of the simplest hash functions is to accumulate the binary codes of a file and take the last bits. Hash functions are public to both sides of the sending data
DSS digital signature is jointly developed by the National Institute of standardization and the national security administration. As it is promulgated and implemented by the US government, it is mainly used by companies doing business with the US government, while other companies seldom use it. It is only a signature system, and the US government does not advocate the use of any encryption software that weakens the government's eavesdropping ability, which is in line with the US national interest
hash signature is the most important digital signature method, also known as digital digest or digital finger print. It is different from RSA digital signature which is a separate signature. The digital signature method is closely linked with the information to be sent, which is more suitable for e-commerce activities. Combining the indivial content of a business contract with the signature increases the credibility and security more than the separate transmission of the contract and signature. Digital digest, also known as Sha (secure hash algorithm) or MD5 (MD standard for message digest), is designed by Ron Rivest. The encoding method uses one-way hash function to "digest" the plaintext to be encrypted into a string of 128 bit ciphertext, which is also called finger print. It has a fixed length, and different plaintext abstracts must be consistent. In this way, the abstract can be used as a fingerprint to verify whether the plaintext is the "real body"
only by adding digital signature and verification can secure transmission be realized on the public network. The process of file transmission with digital signature and verification is as follows:
the sender first obtains the digital signature from the original text with hash function, and then encrypts the digital signature with the private key of the developed party using public key system, and appends the encrypted digital signature to the original text to be sent
the sender chooses a secret key to encrypt the file and transmits the encrypted file to the receiver through the network
the sender encrypts the secret key with the public key of the receiver, and transmits the encrypted secret key to the receiver through the network
the receiver uses its own private key to decrypt the key information and obtain the plaintext of the secret key
the receiver decrypts the file with the secret key to get the encrypted digital signature
the receiver decrypts the digital signature with the sender's public key to get the plaintext of the digital signature
the receiver recalculates the digital signature with the plaintext and hash function, and compares it with the decrypted digital signature. If the two digital signatures are the same, the file is not damaged in the process of transmission
If a third party impersonates the sender to send a file, because the receiver uses the sender's public key when decrypting the digital signature, as long as the third party does not know the sender's private key, the decrypted digital signature and the calculated digital signature must be different. This provides a secure way to confirm the identity of the sender
secure digital signature enables the receiver to guarantee that the file is actually from the claimed sender. Since the private key of the signature can only be saved by the sender himself, others can't do the same digital signature, so he can't deny that he participated in the transaction
although both the encryption and decryption process of digital signature and the encryption and decryption process of private key use public key system, the implementation process is just the opposite, and the key pairs used are also different. The digital signature uses the sender's key pair, the sender encrypts with his private key, and the receiver decrypts with the sender's public key. This is a one to many relationship: anyone with the sender's public key can verify the correctness of the digital signature, while the private key encryption and decryption uses the receiver's key pair. This is a many to one relationship: anyone who knows the receiver's public key can send encrypted information to the receiver, Only the only person who has the private key of the receiver can decrypt the information. In the practical process, a user usually has two key pairs, one is used to encrypt and decrypt the digital signature, and the other is used to encrypt and decrypt the private key. This method provides higher security.
As one of the important methods to maintain the security of data and information, digital signature can solve the problems of forgery, repudiation, impersonation and tampering. Its main functions are as follows:
-
· anti counterfeiting. Others can not forge the signature of the message, because the private key is only known by the signer himself, so it is impossible for others to construct the correct signature result data
-
· tamper proof. The digital signature is sent to the receiver together with the original file or digest. Once the information is tampered, the receiver can judge the invalid file by calculating the digest and verifying the signature, so as to ensure the integrity of the file
-
· non repudiation. Digital signature can be used not only as the basis of identity authentication, but also as the evidence of signer's signature operation. To prevent the receiver from repudiating, the receiver can be required to return a message signed by himself to the sender or a trusted third party in the digital signature system. If the receiver does not return any message, the communication can be terminated or restarted, and the signer has no loss, so both parties can not deny it
-
· confidentiality. Once the handwritten signature file is lost, the file information is likely to leak, but the digital signature can encrypt the message to be signed. In the network transmission, the message can be encrypted with the public key of the receiver to ensure the information confidentiality
-
· identity authentication. In digital signature, the customer's public key is the symbol of his identity. When the private key is used for signature, if the receiver or verifier verifies with his public key and passes, then it is certain that the signer is the one who has the private key, because the private key is known only by the signer