%0 Journal Article %A YANG Minghui %A ZOU Xiang %T Evaluation of US Electronic Identity Guide %D 2019 %R 10.3778/j.issn.1002-8331.1906-0444 %J Computer Engineering and Applications %P 22-28 %V 55 %N 23 %X With the development of computer technology, cyberspace has become the focus of attention of all countries and is known as the fifth big strategic space of the name. But cyberspace is facing increasing security threats, and network identity information disclosure is one of the most prominent. Most major countries in the world have begun to develop network trusted identity management rules and strategies to protect cyberspace security by standardizing the participants in the network as the starting point. Taking the third edition of the Electronic Identity Guide issued by the United States as an example, the main contents of the guide are introduced, the differences of each version guide are compared and analyzed, then advantages and disadvantages are summarized. Several suggestions are made for the construction of hierarchical trusted network identity management and evaluation in China. Based on the front analysis, several improvements are proposed, which include: during electronic identity certificate issuance stage the credential issue level is graded statistically, and different credential issue levels will be provided for different application scenarios to protect user privacy, in the subsequent stage the credential issue level will be dynamically adjusted according to user behavior to provide a safe and reliable service. %U http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.1906-0444