Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 446-449.

• Information Security • Previous Articles     Next Articles

Personnel Identification System Based on Mobile Police

CAI Yu-xin, GONG Si-liang, YANG Ming, TANG Zhi-wei, ZHAO Bo   

  1. (The Third Research Institutute of Ministry of Public Security,Shanghai 200000,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Under the conditions of informationization and dynamic society,how to maintain public security and strengthengrassroots infrastructure has become an urgent issue for the public security organs.This paper combined the needs of the actual police to improve the public security organs’anti-terrorism stability,major activities security and public secu-rity prevention capabilities,and built a “cloud”-“pipe”-“end”mobile identity police verification system based on the advanced technologies of public security network and security access.The systemimplements various forms of mobile IP terminal security access mechanisms and information security protection strategies for different application scenarios,not only reduces the cost of public security-related business,but also improves work efficiency,createing certain and social benefits.

Key words: Intelligence platform, Verify and record, Secure access, “cloud”-“pipe”-“end”, Anti-terrorism stability

CLC Number: 

  • TP391
[1]李洪,渠凯.SSL VPN安全方案与发展趋势分析[J].电信技术,2011(1).
[2]吴世忠.信息安全保障[M].北京:机械工业出版社,2014.
[3]彭发喜.大中型企业信息安全体系架构研究[J].信息与电脑(理论版),2017(17).
[4]蒋敏慧,钟磊,李楠,等.无线网络用户行为安全管理设计[J].信息系统工程,2017(7).
[5]段瑞霞.基于智能终端的移动审批应用研究[J].数字技术与应用,2016(11).
[6]刘建.B/S系统中应用公钥证书的技术研究[D].济南:山东大学,2006.
[7]邱鹏飞.B/S架构下一次性口令身份认证方案的设计与实现[D].太原:太原理工大学,2008.
[8]蒋华,姚莹,鞠磊.服务链中可认证的组密钥管理方案[J].计算机应用研究,2018,(6):1-2.
[9]宋钰.基于SOA架构的企业信息系统集成的研究与应用[J].电子技术与软件工程,2019(3):256.
[10]周瀚章,冯广,龚旭辉,等.基于大数据的ETL中的数据清洗方案研究[J].工业控制计算机,2018,31(12):108-110.
[11]翁业林,周泓,侯兵.面向企业级数据中心的分布式ETL研究与设计[J].软件工程,2018,21(12):15-18.
[12]饶宏博,石磊.基于B/S架构安全检查管理平台建设方案[J].智能计算机与应用,2019,9(1):257-258,261.
[13]洪小龙,陈崇平.视频网终端安全准入系统的设计与实现[J].广东公安科技,2018,26(4):5-7.
[14]孙艳丽.无线宽带VPDN技术及其应用的研究[J].数字通信世界,2017(3):198-199.
[15]赵荣辉,王瑜琦.新一代移动警务即时通信消息互联方案[J].警察技术,2018(6):53-56.
[16] 刘宏舸.移动警务终端技术的要求及发展趋势[J].数字技术与应用,2018,36(10):224-225.
[17] 韩秀德,陈昌前.移动警务信息资源跨网络边界安全共享策略研究[J].警察技术,2018(5):43-46.
[18]王亮,周仁贵,廖承斌.多模智能移动警务终端在公安情勤指一体化中的应用[J].警察技术,2018(6):57-60.
[1] CHEN Liang, ZENG Rong-ren, LI Feng and YANG Wei-ming. Trust Chain Transfer Model Based on Non-interference Theory [J]. Computer Science, 2016, 43(10): 141-144, 181.
[2] QIAO Zhen,LIU Guang-jie,LI Ji and DAI Yue-wei. Survey on Secure Access Technology in Mobile Ad-hoc Network [J]. Computer Science, 2013, 40(12): 1-8,30.
[3] SHU Ming-lei,TAN Cheng-xiang,TAN Bo. Secure Communication Scheme of Mobile VPN Based on IKE Protocol [J]. Computer Science, 2010, 37(5): 84-86.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning[J]. Computer Science, 2019, 46(8): 1 -8 .
[2] GAO Li-zheng, ZHOU Gang, LUO Jun-yong, LAN Ming-jing. Survey on Meta-event Extraction[J]. Computer Science, 2019, 46(8): 9 -15 .
[3] CAI Li, LI Ying-zi, JIANG Fang, LIANG Yu. Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots[J]. Computer Science, 2019, 46(8): 16 -22 .
[4] YANG Zhen, WANG Hong-jun. Important Location Identification of Mobile Users Based on Trajectory Division and Density Clustering Method[J]. Computer Science, 2019, 46(8): 23 -27 .
[5] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation[J]. Computer Science, 2019, 46(8): 28 -34 .
[6] ZHONG Feng-yan, WANG Yan, LI Nian-shuang. Node Selection Scheme for Data Repair in Heterogeneous Distributed Storage Systems[J]. Computer Science, 2019, 46(8): 35 -41 .
[7] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics[J]. Computer Science, 2019, 46(8): 42 -49 .
[8] ZHANG Hui-bing, ZHONG Hao, HU Xiao-li. User Reviews Clustering Method Based on Topic Analysis[J]. Computer Science, 2019, 46(8): 50 -55 .
[9] LI Bo-jia, ZHANG Yang-sen, CHEN Ruo-yu. Method for Generating Massive Data with Assignable Distribution[J]. Computer Science, 2019, 46(8): 56 -63 .
[10] LU Xian-guang, DU Xue-hui, WANG Wen-juan. Alert Correlation Algorithm Based on Improved FP Growth[J]. Computer Science, 2019, 46(8): 64 -70 .