Font Size: a A A

The Design And Implementation Of The Credit System Of The Verification

Posted on:2013-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:2248330374981617Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Under the leadership of the Provincial Public Security Bureau, the Municipal Party Committee and municipal government, the city’s public security organs thoroughly implement the spirit of the Provincial Public Security Science and Technology Information Construction, Public Security Information as a strategic task of the drive the city public security work leaps and bounds and base task of the first works of engineering construction, in accordance with the overall planning, step by step, key breakthroughs, and comprehensively promote the principles of,"also can not be on but also on the dauntless spirit, lifting force of the global hard work, self-reliance, to increase the input of manpower, material and financial resources, a strong push forward the construction of city public security information, the information construction to achieve a leapfrog development."Three Basics" Project Construction to carry out and the province’s public security science and technology both construction crucial since, the city’s public security organs at all levels of information construction as the primary leading engineering to promote the construction of "three bases", the initiative to coordinate communication and actively fight for the party committees government attention and support of relevant departments, so that the city Public Security Information quickly promoted to the Party committees at all levels, government is an important grass-roots foundation engineering, not only the public security organs at all levels of leadership "key", but also a vast number of the conscious action of the police officers.In order to actively adapt to the development of information technology requirements, implement the spirit of the Nanjing meeting, combined with the province this year, further promote the application of information technology "activities, in September last year, the front line police station visited by Dongying PUC found that grass-roots lack of an efficient personnel query tool, not a complete set at large, illegal drug-related, Falun Gong, the petitioners on the system, front-line police investigation and the parties can not quickly and efficiently check the Chengdu Guoteng offline second generation ID card reader, offline only query at large libraries and some can download the blacklist stored on the machine the more there is the public security officers at large data loss risk (inconsistent with the public security confidentiality mechanisms) and manually upgrade cumbersome, while the application of information technology partial rejuvenation of the existing information system operation is complicated, and that indirectly raises the threshold for application of information technology, which restricts the scope of application of information technology, the above reasons, the primary front-line police develop a set of security, and practical verification than system, to accelerate the application of information technology to become a top priority, this system uses the language of the JAVA programming language, database MYSQL, Oracle, the front interface with Ajax framework-the js Ext.
Keywords/Search Tags:Verification, JAVA Technology, Database
PDF Full Text Request
Related items