Font Size: a A A

Research And Application Of Informatization On Public Security Industry

Posted on:2011-08-19Degree:MasterType:Thesis
Country:ChinaCandidate:M C SunFull Text:PDF
GTID:2178360332457268Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In this world, technology has developed rapidly. Information technology affects deeply in various aspect of world. The society's information development also improves the public security information development. Public Security have more and more information of investigation on their daily work such as protect the security of society and hit the crime. So in this background the informatization on public security is very important.The informatization on public security is very essential and meaningful. The informatization on public security is the way to improve law enforcement. The informatization on public security can improve the work ability. The informatization on public security can hit crime better by sharing information and intelligence. The target of informatization on public security is information and intelligence sharing, quick reaction and operation high efficiency.Golden shield project is the project of informatization on public security. Golden shield project is important for the development of public security industry. The main content of Golden shield project is state public security network and application system. As golden shield first phase completed, informatization on public security already have a good situation. But there are also some problems. So in the second phase of golden shield project, we will try our best to make a great progress. Firstly, informatization of the ministry of public security and bureau of every province should be in the same pace. Secondly, the information and intelligence should be shared between different departments. Thirdly, the human resource is also very important. Fourth, a good and long-standing plan is very essential for good quality. At last management is the same important as the project itself.In the golden project, informatization of investigation is a very important part. While information technology needs of security, we use trusted computing technologies, combined with TPM security chip designed the cell phone investigation system based on trusted computing technology, which can safely and effectively find the sales channel of cell phone by the records of the phone. And then it will help find and track the suspect's information.According to the statistics, 40% cases about property is related with the cell phone, therefore we should establish the secure and trusted cell phone investigation system on the market. We should use the system to collect the information on the cell phone sales terminal and the second-hand cell phone market. With the information we can get the entire clue, so the cell phone investigation system can play an important role in the investigation.The client of cell phone investigation system based on trusted computing technology is deployed on the sales terminal, and the application server and database is deployed in the public security system.In the functional design, the system is divided into the following module, the system log on module, the cell phone sales message input module, the cell phone sales message inquiry module, the cell phone sales message deletion module, the cell phone sales message import module, the second-hand cell phone sales message input module, the second-hand cell phone sales message inquiry module, the second-hand cell phone sales message deletion module, the second-hand cell phone sales message import module, the second-hand cell phone purchase information input module, the second-hand cell phone purchase information inquiry module, the second-hand cell phone purchase information deletion module and the second-hand cell phone purchase information import module. These modules can manage the circulation information of the first-hand cell phone and second-hand cell phone.Cell phone investigation system based on trusted computing technology is developed on Java platform, and the database is the Oracle database, and used the TOMCAT server.With the computer technology moves and the public security industry changes unceasingly, we also hoped that we can continue to upgrade the system, such as more function, more practical, the security as well as the performance, to adapt the public security industry changes, and the cell phone investigation system can have a bigger help to the public security work. For example, On function, the system will provides more functions to manage more information of cell phone. The system also will be more practical so that the sales terminal would like to use the system. On security, the system must to ensure that the information is not divulged, sensitive information can be used to collect by TPM security chip and to encrypt stored, any operation on the data must after passing safety certification, and there are strict rights management to ensure that only certain investigators will obtain information. At last, the system should be optimized the performance to meet the requirements of numerous visits in a short time.
Keywords/Search Tags:Information, Public Security, Trusted Compute, TPM chip, Golden Shield Project
PDF Full Text Request
Related items