On the evening of September 26, 2024, the Institute of International and Strategic Studies (IISS), Peking University (PKU) held the 78th session of the "North Pavilion Seminar" lecture series. Associate Professor Hu Ling from the Law School and the Institute for Artificial Intelligence at PKU delivered a lecture titled "Identity, Authentication and Digital Social Governance" and engaged in communication with the attending students and faculty. The lecture was chaired by Associate Professor Gui Yongtao, Deputy Dean of the School of International Studies (SIS) and Vice President of IISS, PKU.
Associate Professor Hu explored the structure and risks of the digital identity system, ranging from basic identity to digital identity, and from concept to practice.
First, Prof. Hu defined the concepts of basic identity and digital identity, pointing out that the power of authentication is a core authority of the state. By issuing identity documents to citizens, the state completes statistical surveys on aspects such as public services, achieving effective governance. The authentication process involves two key aspects: proving "who you are" and verifying "you are you," which identifies not only an individual's social relationships, but also the consistency of individuals participating in different transaction processes.
Prof. Hu then discussed the expansion, dilution, identification diversification, and digital transformation of basic identity, focusing on two different technological approaches to digital identification cards, the emerging methods of online number and certificate-based authentication, secondary identity recognition, and the social significance of facial recognition.
He noted that facial recognition is not only a simple social identity verification process but also signifies a reshaping of identity authentication and behavior recognition systems within society. Currently, using machines to identify and authenticate an individual's social identity in place of other members of society represents a new application of facial recognition as an identifier in contemporary society. This approach can enhance the efficiency of online transactions, reduce the overall cost of social transactions, and significantly increase the credibility of the entire digital environment. However, Prof. Hu also pointed out that opponents argue there is a risk of facial data leaks during the storage phase, and since facial features are unique, any leakage could result in irreparable damage. Despite these concerns, Hu argued that discussions about the risks of facial data leakage remain vague and are not as evident as those involving theft of identification card numbers, account passwords, or identification cards. Beyond the extreme cases of misappropriated facial data files, the more likely risk lies in the failure to achieve genuine informed consent, potentially leading to an increase in identity fraud activities.
In addition, Prof. Hu pointed out that some valuable identity information could result in the emergence of unregulated markets, such as digital scalpers, cross-regional professional identity abuses, virtual underground markets, and basic identity black markets.
During the Q&A session, Prof. Hu exchanged views with students and faculty on issues such as cross-border identity authentication services, risks in the collection and use of individual identity information by enterprises, new methods of identity authentication using online certificates and numbers, and citizens' rights to refuse to provide personal identity information. (Contributor: Wang Shiyu)
Editor: Li Fangqi Photographer: Zheng Peijie