GA/T 462-2004 Functional framework of public security management information system
Some standard content:
This standard is prepared by the Public Security Bureau of the Ministry of Public Security. Foreword
This standard is prepared by the Computer and Information Processing Standards Promotion Technical Committee of the Ministry of Public Security. The origin of this standard is the Public Security Bureau of the Ministry of Public Security. The main drafters of this standard are: Jiu Baoli, Liu Xin, Fu Xialian, Ying Tong, Zhang Ruobeng GA/T 462—2C04
1 Scope
Public security management information system
Functional framework
This standard specifies the functional requirements of the public security management information system. This standard is applicable to the development and design of the public security management information system. 2 Normative references
CA/I 462-2004
The following clauses are included in the documents that are included in this standard: All referenced documents are noted: All subsequent amendments (excluding missing or revised versions) are not applicable to this standard. However, the parties to this standard may use the latest versions of these documents. For referenced documents without date, the latest versions are applicable. This standard, GA234 Hotel industry security management information system GA211.? Printing industry security management communication system Part 1: Basic technology GA342 Hotel industry security management information system. Digital specification Part 2: This standard A438.2 Technical specifications for motor vehicle repair and recovery systems - Part 2: External energy G4/T3 basic functions of security management information systems (points/Ti1/Ti2/Ti3 ... mThe "five elements"
refers to "people", "land", "things", "organization", and "change". "People" must be related to: the natural disease and general nature of people; "things" must be related to the world and the city; "things" must be related to public security; "weaving" must be related to the land, and things must be inspected to form a stable social entity; "firm\must be connected, in a certain period of time, by a special bed, with certain results, the work of people, land, yo, organization and other elements, the two are also missing in the discussion of public security management:
4 System function stacking
4.1 Need to be divided into a unified system
According to the public security system public security Guomen fiber loom detention setting The public security information system is divided into the following:
41.1 System Hierarchy Blocks
The system hierarchy is divided into local, provincial, and departmental levels, as shown in Figure 1! City-level system: stores all public security business information of the police stations, sub-stations, municipal public security bureaus, and departmental information nodes in the city, and prepares all the standards for public security business in the city, serving as the convergence point of the city's public security information, providing comprehensive information services for cross-regional and cross-business exchanges, and realizing dynamic information exchange through information connection with external platforms, and issuing cross-regional and cross-business inspection and guidance software,
GA/T 462—2004
Ministry-level public security management system
Public security science and information system
Local-level Ji'anshali General System
County (district)
Security (branch) bureau
Inland production
①Period planning
①Food
①Relative household shortage ratio
Heart method tobacco pipe eating
Province (for district, city 》Public Security
Department (same)
General wax plan
Law and Regulations 2Www.bzxZ.net
Psychological plan
# beat Han Ji
Transaction processing
Joint public management
Psychological education extraction management
Zhang City Public Security Bureau
Political Affairs Office System
Compared with external
The request and service
resulting in the technology!
External topic collection point
Travel. )
To use the full change push!
Customer management system: store all the data of the public security management information system of all regions (regional, self-rotating mountain), and the Ministry of Public Security issues local data, and conducts inquiries, classification, and comprehensive use of information: conducts approval operations for the relevant business of this level, and conducts comprehensive analysis and legal support for the relevant business of the state 1.
Ministry-level system: conducts all the data of the national public security management information system of the whole business of the Ministry of Public Security: conducts batch, comprehensive query, comprehensive analysis and legal support for the relevant business of the state 1.4.1.2 System division
System connection business is divided into population management books, industry theory, product intelligence egg, case card management, single internal and large-scale data security! Shenzhen, source of the six systems.
G+,T 462—2C04
) Population management system: Based on the management of permanent and temporary residents, the system implements the management of static and dynamic population information. The subsystem includes a rich collection of service models, and is reflected in the household management. Its basic business functions are in line with the requirements of GA/T1G5.【, and the management of the spiritual identity of the residents, the public business functions are in line with the requirements of A/1465.》. Resident population management: Its basic business functions are in line with 6AT13.? The provisions of the current regulations: the management of the basic business functions and weaknesses of the rental house (A/T15.4b); the management of the work objects; the management of the basic business functions and weaknesses of the business (A/T135.4b); the management of the special industry: the management of the industry itself and the management of the objects of its business activities are the two main lines, the management of the clerical staff, the management of the printing press and the management of the hall industry are the main ones. The six-one salary package business mainly includes: the management of the hall industry, its basic business laws and regulations comply with the provisions of GA231, the management of the goods industry (pawn industry, scrap collection industry), the management of the motor vehicle repair industry Its herbal business functions are in line with the A438. regulations, and the annual single Shenzhen. This business is in line with the regulations of 4. One-use system management. This business can produce the A411.2 part of the specified) controlled material hanging management system: with the core production, A decoration, 4 storage, pure use, import and other types of management as the main line, with the former sample American enterprises and institutions, personnel production examination management media, the actual situation of the official use of stable documents, the first place, the good month test this system and other types of controlled items such as invitation signature management, the main business of this system is: official use inspection management. Its business is based on the provisions of (A/T465.5), monthly busy management. Its E business is in accordance with the provisions of A/T45.7. Civil explosion and public insurance goods management. Its business can comply with the provisions of (A/16.8) (d) case management system: with the whole process management of (school) cases as the main line, and implement the overall exchange of positions, some criminal cases. Administrative system: case management: This system covers the main business blocks such as case management, public security black (Chinese) and foreign management. Its basic business life is in accordance with the provisions of GA/T455.9 (tt||) unit internal and large-scale activity custody system, with the management of units, nuclear or listening to the situation, security agencies and personnel as the main decision, to achieve the opposite unit, economic and cultural security unit type activity chaos. Security and protection management. The business management system of the police station: In addition to the subsystems of civil personnel management, special medical industry management, property management, case vehicle management, internal and personnel management and other subsystems, it also includes security and heat protection, property information management, internal affairs management, age management! , post-school chapter, geographic information management: The business functions of this system are in accordance with GA/T46.10.
4.2 Public functions
To support business management, the system provides the following public functions: This public function: in accordance with 4T1G3.
System service:
Product access and authority management are in accordance with GA, 144, 4.3 Node application architecture
4.3.1 Node application architecture
In the nodes of the municipal, provincial and ministerial public security information systems, the multi-cloud architecture is used, with ten seats in each layer as shown in Figure 2. This H system architecture includes the user layer (including application maintenance and WF), the business control layer (including the production and operation layer, the industrial element business layer, the market document layer, etc.), the digital management layer (including the digital library system, the environmental file system, the system management layer ... tt||Weh customer
wir service
document system
Figure 2 Public security management information system book point seat application system structure The following is an explanation of the overall structure of the nodes of the municipal public security management information system. 4.3.2 Customer Display
Customer production provides complete human-computer interaction. The customer layer solves the system's sales and auxiliary functions, such as real-time data collection, command grabbing, external management and use, display and printing of information, etc., and is subject to the constraints of the business control layer and provides specific applications according to the requirements of the "service action".
4.3.3 Business Control Layer
Business control realizes operation flow control, authority control, and priority control.! Operation control converts the service request from the application layer into a series of business operations, and completes the application request through the services of the business layer. By weighing the real-time requirements of the business, the importance, relevance and other factors, the business priority is given to determine the order of executing the business request, and the user of Shenzhen obtains the total benefit. The authority control fully supports the user authentication and authorization scheme of "Jinhou Lao\" and can be combined with "Jingong\" The access selection system is reversed, and the corresponding business is assigned according to the user's position, rank, division, privileges and other information, and additional business requests are rejected. Weh provides hot query services on Wc, and the public security business information is fully monitored and integrated through the public security network. The w limit service is subject to business control and supports special business agreements to achieve controlled services. 4.3. The system business layer creates a system for the management of business information at the business layer, and the public security business is distributed into multiple business subsystems to ensure GA/T 262—2004
To support the business characteristics of public security management, each system consists of a business unit, which is controlled by the business control layer to achieve quick connection between users and the company's business. By using the five essential business layer instances, the subsystem business layer realizes the connection between the business logic and the abstract business requirements, and only the business related to the security business is processed period by period with the main business as the main line. 4.3.5/Five essential business layers
The essential business layer organizes the overall business and research of people, things, places, objects, years and other essential business, and provides various related information for consultation. 4.3.6 Storage support layer
Storage support and activation of data servers, the interaction of data storage/data storage of the server, through this layer to solve the problem of micro-carrying voice and test level, to achieve the activation of the database strategy can be independent of the business system, the data platform difference.
4.3.7 System management module
The system flow model reflects the contribution of each level, through the monitoring and prediction of the service layer's operation and resource allocation, the system supervision and guidance of the kinetic energy, to achieve system management and maintenance. Main management functions: User management domain:
User access and authority management:
Configuration management:
Version control:
Performance control:
Audit,
4.3.8 Financial Engineering System Interface Module
According to the interface module, the interface module should be in the local city data point and above. Realize the connection with "Finance Store One I\Its service payment sub-institution 1: Fully realize the "Enterprise Residence Two Process\Total Position Force Confidentiality Requirements of the Resource Addition, System 5. Careful, security certification will be daily standard, provide data sharing, room request services, web browsing, etc. 5. Access functions to its subsystems at all levels
Tip: This standard content only shows part of the intercepted content of the complete standard. If you need the complete standard, please go to the top to download the complete standard document for free.