Application of Security Protection Management of All-in-One Card System in Military Industrial Park

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

One-card system business challenges

  The military industry group is a relatively independent scientific research and production system that performs dual functions (military functions and economic functions) and obtains dual benefits (military benefits and economic benefits). This paper specifically expounds the requirements of its enterprise park for the management of people and vehicles safe access and proposes solutions.

business challenges

  The military industry group has the characteristics of “state-owned property rights, the particularity of the military industry and the combination of military and civilian products”, and its organizational structure basically adopts a three-level management model: group headquarters, second-level groups (research institutes, sectors, bases, directly affiliated institutions), research and production. place. In response to the “Twelfth Five-Year Plan”, the important development goals of the military industry group determined by the National Defense Science, Technology and Industry Bureau clearly pointed out that in accordance with the phased goals of the composite development of mechanization and informatization of military construction, the information on the scientific research and production of weapons and equipment should be closely, coordinated and advanced in advance. Focus on top-level design and overall planning, and promote the construction of advanced manufacturing capabilities with digitalization as the core. Because the military industry group is an important secret-related unit, it is the first to solve the daily management process and the integrated security protection management problem of secret-related requirements, reduce management conflicts, and eliminate management loopholes. The large number of personnel and vehicles is a characteristic of the military industry group. Therefore, safety protection management is very critical. A slight omission will bring huge losses to the national property, and may even affect the personal safety of the military industry group staff.

Therefore, in order to solve the current situation that the daily safety management of the military industry group is complicated and cannot be controlled in real time, a more scientific and effective management mechanism and prevention mechanism are established to realize the safety management from extensive to refined management, so as to meet the requirements of the distributed mode of group enterprises. The need for hierarchical control:

Improve the access management of internal personnel: It is required to efficiently control the authority of employees to enter and exit the internal area of ​​the group, to prevent the occurrence of potential hidden dangers, and to adopt a combination of password and biometric verification mode in some important secret-related places;

Optimize the management of visitors and outsiders: Quickly collect personnel information and issue visitor cards through valid certificates such as second-generation ID cards. At the same time, it is necessary to limit the scope of activities of those who hold visitor cards. All important and secret places need to verify the authenticity of the visitor’s identity through the visitor inspection terminal;

Unified elevator access management: Anyone who reaches the controlled floor or area of ​​the elevator within the group needs to be authorized;

Standardize the use of secret-related PC equipment: use reliable identity authentication technology to solve the problem of secure login and authority management of the system, and use card swipe to achieve secure login for secret-related PC equipment in the group, which is used to replace the traditional login form of entering user names and passwords;

Precise vehicle entry and exit management: All vehicles entering and exiting need to be recorded, and external vehicles travel along the designated route.

Products and Technologies

A security access control product that introduces a smart card security authentication mechanism.

Enterprise park one-card system products, including key management system, password encryption machine, dual interface card reader, universal card reader, etc.

A contactless CPU card that complies with the requirements of the Ministry of Construction and the PBOC2.0 e-wallet specification.

Consumer POS machine based on 32-bit embedded platform.

Pedestrian safety passage.

Vehicle access control products.

One-card solution

  The enterprise park one-card is composed of key management system, card initialization system, one-card basic platform, access control management system, personnel access management system, consumption system, self-service system, attendance system, meeting sign-in system, and Web query system. Vehicle access management system and elevator control system integration. With an authorized CPU card, the internal staff of the group can realize applications such as access control of people and vehicles, employee attendance, various consumptions within the group, meeting check-in, and bathroom water saving.

Internal personnel management: adopt the network management method of access control controller, electromagnetic lock access control system and pedestrian safety channel equipment. All areas of the Group’s office building, laboratory workshops, military product processing workshops, archives rooms and other key fields need to enter and exit by swiping cards and passwords or biometric equipment verification, and the Group’s gates are installed with pedestrian safety passages to allow internal personnel to swipe cards to enter and exit and prevent outsiders from arbitrarily in and out. Unauthorized personnel try to enter and exit with audible and photoelectric alarm prompts and card swiping records inquiries. At the same time, personnel card swiping logs can be queried in real time, clearly showing each employee’s on-the-job time, and can also provide data support for internal personnel performance assessment.

Visitor management system: Visitors or temporary foreign personnel need to hold valid ID cards or letters of introduction for information registration, and use ID card scanning and one-click photography to quickly obtain visitor information. The telephone interviewee will issue a unified visitor card after confirming the visitor. Visitors or temporary foreign personnel enter the visited area after verifying their identities through the personnel inspection terminal, and use the identity inspection functions of access management equipment such as relevant elevator control and pedestrian safety passages to monitor the activity location of visitors.

Elevator control system: The card reader is installed in the elevator, and the linkage with the visitor management system is realized at the same time. Employees within the group can select their activity areas after swiping their cards according to their authorized authority (there are multiple authorized areas for employees), and visitors or temporary personnel can only reach the areas authorized by their visitor cards by swiping their cards.

Secret-related PC equipment login management system: the employee card replaces the PC device login user name, and the authorized employee card can enter the login password to enter the computer operating system after swiping the card. At the same time, it has employee card swiping log and log query of unauthorized personnel swiping card.

Vehicle access management system: use vehicle gates and ground induction coils to control vehicle access. At the same time, the camera records the license plate number to record the information of the vehicle entering and leaving. Internal vehicles uniformly issue RFID tags for long-distance card reading to achieve non-stop card swiping. External vehicles need to apply for a system temporary card (system CPU card) to swipe in and out, and travel along the designated route within the group. When vehicles enter and exit key areas, the system adds license plate recognition and comparison functions. Internal vehicles enter and exit through RFID and the system saves vehicle license plate information through double identification. After the external vehicle license plate recognition is correct, the CPU card is handed over to the duty personnel for vehicle inspection. You can leave after confirmation.

The system relies on the company’s existing informatization infrastructure to build, adopts a layered platform system architecture, and is subject to the overall framework of the group’s informatization construction. In order to fully integrate existing applications and information resources and provide users with multi-channel and multi-modal services, the system adopts unified standard specifications (including information standards, interface standards, etc.) The application systems within the system are integrated in a loosely coupled manner, and the collection and processing of information is completed collaboratively. The system is generally divided into three layers: system software, application middleware layer, and application domain.

Epilogue

With the help of the all-in-one card system in the enterprise park, the military industry group realizes the management and control of the group’s internal personnel access, visitors and external personnel access management, vehicle access (internal and external) management, office confidential PC equipment login management, consumption management, attendance management, etc., to achieve group management and control. Integrated and real-time, strengthen the standardization level of the group’s safety and security work, and provide employees with a safer and more orderly working environment and convenient life. At present, it has been applied to a research institute of China Shipbuilding, a factory of China Shipbuilding, a military unit in Langfang City and many other military enterprises or units, and has played an important role in improving the level of safety protection management in the military industry.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare