Table 1. Security risks for identity
| Identity Category | Specific Identity | Risk Points |
|---|
| People | Administrator for identification data | Identity deception; unauthorized access; authority chaos |
| User |
| Administrator for identification |
| Third party supervisor |
| Machines | International root node | Identity deception; device vulnerability |
| National top level node |
| Secondary node |
| Enterprise node |
| Recursive resolution node |
| Industrial client |
| Objects | Industrial Internet terminal | Identity deception; false correlation between identification and product; device vulnerability |