Secret-related asset management solutions
[ad_1]
1. Introduction to the system
1.1 Mission
TIIS system is based on the “object management” and is mainly used for the management objects of classified information (that is, classified information carriers, divided into: paper carriers and electronic carriers) and application objects (that is, contact, use, and storage of classified information). People) management. Organically combine secret-related targets and management units, and incorporate them into effective management control through the management chain.
1.2 How to use
Mark important information objects with RFID tags to make them the target, and store the target data in the database (database) to make them a target that can be identified by the TIIS system, and deploy the target identification and data in the TIIS system in different management units and monitoring points Reading device-RFID reader, which reads the target data that enters the coverage area of the antenna (data acquisition platform); transmits the data to the management server through a wireless network (data transmission platform), and uses various configuration modules to Data analysis, research and judgment, and release (service platform); respond to target behaviors according to module configuration. Realize the safe and effective management of important information carriers, involved personnel, and related behaviors.
This technology is being vigorously promoted by the U.S. Department of Defense, and the full deployment of troops will begin in the first half of this year. my country also issued relevant technology development white papers and industrial development support policies at the beginning of the year.
The TIIS system will essentially change the previous management model, based on the “process management” of important information, which not only includes the management of the object itself, but more importantly, it can generate, move, disseminate, store, and inspect important information. The development process of a series of events is managed. Management events are always accompanied by the development process of things. They are recorded, analyzed, and summarized, evaluated and judged according to pre-established rules, and issued early warnings and alarms. It can manage matters more humanely and get rid of the interference of human factors at the same time, embodying “humanities, science and technology, humanities management”.
1.3 Main functional requirements
It is composed of three parts: target tag, reader, data exchange and management system. The main functional requirements are:
a) Real-time target recognition and data storage function
b) Target matching function
c) Identify data transmission function
d) Target data release and statistical functions
e) Analysis, evaluation and early warning function
f) Authority control and real-time query function
g) Regional positioning function
h) Monitoring and alarm function
i) The function of the remote control management unit
g) The mobile deployment function of the management unit
2. System composition
2.2 System function modules
2.2.1 Use of cataloging system
The cataloging system is an independent functional module in the TIIS system. The main task is to classify and catalog the incoming documents.
2.2.2 Use of the approval system
Including: Approval documents, approval inquiry, approved inquiry, document tracking, and the setting of system related parameters.
2.2.3 Use of retrieval system
The retrieval system mainly provides the retrieval of the bibliography of this data room, and users can query the required information in various ways and make an appointment.
2.2.4 Management chain system
The main functions of the management chain system include: certificate processing, certificate cancellation, file borrowing and returning, user information query, file information query, operator’s work record, and the setting of system related parameters.
The main tasks of the management chain system function maintenance are: management chain function parameter setting, server parameter setting, user password setting, loan processing and administrator setting, etc.
2.2.5 Entry and exit monitoring
The main functions of entry and exit monitoring include: entry and exit personnel identification and registration, entry and exit document identification and registration, and matching judgment of the corresponding authority between the personnel and the file held, and the corresponding response is made in accordance with the system rules.
Through the entry and exit monitoring, the location status of files and personnel can be inquired in real time, the carrying situation of the files, whether there are any violations of management regulations, and the entire process can be recorded.
3. System features
1. Real-time management, quick and easy operation, detailed log records, complete “management link”;
2. Automatic identification, long distance, high precision, good anti-interference, strong environmental adaptability, and realize “intelligent judgment”;
3. The information is disclosed by level, with strict authority control and clear levels, to achieve “upward responsibility”;
4. The system data and the system hardware fingerprint are bound and encrypted, and the module data is encrypted for transmission;
5. The system is independently encrypted and coded to prevent information leakage and facilitate data fusion;
6. A strong supervisory and supervisory role requires personnel to consciously abide by system rules and operating procedures, which facilitates real-time control, inspection and supervision by leaders;
7. Humanized management, avoid conflicts, unique early warning and alarm functions;
8. Unique quantitative management of safety credit value and quantitative work statistics, which is convenient for quantitative assessment;
9. Distributed structure, convenient for networking, mobile deployment and scope expansion;
10. Modular design is convenient for function expansion and special module customization.
4. Application areas
1. Army
2. Government agencies
3. Institutions
4. Books and archives management department
5. Research institutes
6. The safety management requirements of enterprises and companies
7. High-end application customers
5. The significance of building the TIIS system
In the future, due to the advanced nature and strong development trend of the technology (target recognition management) and concepts (the combination of humanistic technology and system management) used by the TIIS system, we can combine its technology with Concepts are widely applied to the daily management, training, assessment, exercises, and logistical support of the troops to achieve the goal of building a system, improving a concept, making an exploration, and opening up a prospect.
6. System application in different environments:
Taking into account the application environment and network quality problems of different units, this system has extremely low requirements for the network environment. We hereby propose several solutions for you:
1. Our company tailors for you to meet your actual deployment and operating environment usage specifications;
2. It is recommended that you unified management and centralized storage of important information carrier files;
3. The deployment of the client does not require a dedicated machine, and can be deployed single or multiple at the same time;
4. As far as possible, set the monitoring channel (installation setting of the monitoring terminal) in a one-way access occasion;
5. If the network of your unit is extremely limited, you can use the network service that comes with the windows system to set it up. You only need a telephone line to connect.
[ad_2]