Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 446-449.

• Information Security • Previous Articles     Next Articles

Personnel Identification System Based on Mobile Police

CAI Yu-xin, GONG Si-liang, YANG Ming, TANG Zhi-wei, ZHAO Bo   

  1. (The Third Research Institutute of Ministry of Public Security,Shanghai 200000,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Under the conditions of informationization and dynamic society,how to maintain public security and strengthengrassroots infrastructure has become an urgent issue for the public security organs.This paper combined the needs of the actual police to improve the public security organs’anti-terrorism stability,major activities security and public secu-rity prevention capabilities,and built a “cloud”-“pipe”-“end”mobile identity police verification system based on the advanced technologies of public security network and security access.The systemimplements various forms of mobile IP terminal security access mechanisms and information security protection strategies for different application scenarios,not only reduces the cost of public security-related business,but also improves work efficiency,createing certain and social benefits.

Key words: Intelligence platform, Verify and record, Secure access, “cloud”-“pipe”-“end”, Anti-terrorism stability

CLC Number: 

  • TP391
[1]李洪,渠凯.SSL VPN安全方案与发展趋势分析[J].电信技术,2011(1).
[16] 刘宏舸.移动警务终端技术的要求及发展趋势[J].数字技术与应用,2018,36(10):224-225.
[17] 韩秀德,陈昌前.移动警务信息资源跨网络边界安全共享策略研究[J].警察技术,2018(5):43-46.
[1] CHEN Liang, ZENG Rong-ren, LI Feng and YANG Wei-ming. Trust Chain Transfer Model Based on Non-interference Theory [J]. Computer Science, 2016, 43(10): 141-144, 181.
[2] QIAO Zhen,LIU Guang-jie,LI Ji and DAI Yue-wei. Survey on Secure Access Technology in Mobile Ad-hoc Network [J]. Computer Science, 2013, 40(12): 1-8,30.
[3] SHU Ming-lei,TAN Cheng-xiang,TAN Bo. Secure Communication Scheme of Mobile VPN Based on IKE Protocol [J]. Computer Science, 2010, 37(5): 84-86.
Full text



[1] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning[J]. Computer Science, 2019, 46(8): 1 -8 .
[2] GAO Li-zheng, ZHOU Gang, LUO Jun-yong, LAN Ming-jing. Survey on Meta-event Extraction[J]. Computer Science, 2019, 46(8): 9 -15 .
[3] CAI Li, LI Ying-zi, JIANG Fang, LIANG Yu. Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots[J]. Computer Science, 2019, 46(8): 16 -22 .
[4] YANG Zhen, WANG Hong-jun. Important Location Identification of Mobile Users Based on Trajectory Division and Density Clustering Method[J]. Computer Science, 2019, 46(8): 23 -27 .
[5] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation[J]. Computer Science, 2019, 46(8): 28 -34 .
[6] ZHONG Feng-yan, WANG Yan, LI Nian-shuang. Node Selection Scheme for Data Repair in Heterogeneous Distributed Storage Systems[J]. Computer Science, 2019, 46(8): 35 -41 .
[7] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics[J]. Computer Science, 2019, 46(8): 42 -49 .
[8] ZHANG Hui-bing, ZHONG Hao, HU Xiao-li. User Reviews Clustering Method Based on Topic Analysis[J]. Computer Science, 2019, 46(8): 50 -55 .
[9] LI Bo-jia, ZHANG Yang-sen, CHEN Ruo-yu. Method for Generating Massive Data with Assignable Distribution[J]. Computer Science, 2019, 46(8): 56 -63 .
[10] LU Xian-guang, DU Xue-hui, WANG Wen-juan. Alert Correlation Algorithm Based on Improved FP Growth[J]. Computer Science, 2019, 46(8): 64 -70 .