Secret Carrier Lifetime Management System_Military and Civil Industry Application Solution
[ad_1]
Object Oriented
The product mainly consists of application approval and real-time monitoring modules. The former is mainly for archives and mainly involves the owners of secret-related carriers and management leaders at all levels. The latter is mainly for the monitoring room, mainly involving the monitoring personnel of each controlled area.
Introduction
In recent years, incidents of leakage of secrets caused by improper management and improper use of secret-related media have emerged in the military in an endless stream. Although there are strict confidentiality management requirements for the storage of secret-related information, and strict control and approval are required for carrying out, the loss of secret-related media still occurs from time to time.
The core function of the secret-related carrier life-span management system is mainly composed of two parts: the application approval module and the real-time monitoring module. These two major parts are operated in B/S and C/S modes respectively.
value of customer
1. Simple operation
Each step of the system operation only needs to click a button to complete, which reduces the burdensome work of the leader, and at the same time realizes paperless office work, is well-documented, and can be printed and archived.
2. Clear approval relationship
Leaders at all levels will receive the pending approval form only after the subordinate leaders have completed the approval, and the relationship is clear. Different security levels require different levels of leaders to approve, simple and flexible.
3. Strengthen the management of secret-related carriers and reduce the risk of leakage
Through all-weather real-time monitoring, timely discovery of unauthorized secret-related carriers, protect the safety of the carriers, reduce the risk of leakage, and regulate personnel behavior.
4. Strong anti-interference
Microwave equipment has strong anti-interference ability and can monitor the controlled equipment in the vehicle and in the trunk. When the vehicle speed reaches 120Km/h, it can also monitor normally. When there is malicious damage, the system will give an alarm.
Module business flowchart
Application approval business process
Real-time monitoring of business processes
Module core function
Application business management
When a confidential device holder needs to bring a device outside, he needs to log in to the system and fill in the application form. The system will automatically report layer by layer according to the system organization. If the approval is not completed, the applicant can cancel the application at any node, or Real-time dynamic query of approval status.
Approval business management
When the system detects an application form approved by the leader at this level, it reminds the leader to log in for approval. The leader simply clicks the button, and the system automatically adds a digital signature to complete the approval process. For each step of the approval process, the system will record the relevant operation traces.
real time monitoring
Foreign personnel carrying secret-related equipment through the controlled area, the monitoring computer reads the equipment signals in the controlled area in real time around the clock, and judges whether they are authorized according to the read information, and rest assured that the authorized equipment is normal, and the unauthorized equipment is intercepted by sound and light alarms. , Start recording on-site evidence collection, send text messages to remind the holders and their immediate superiors, the system judges the direction of entry and exit according to the location, and facilitates the interception by on-site management personnel. Microwave equipment can monitor many controlled equipment in the vehicle and the trunk, and has good anti-interference performance.
Main hardware equipment
[ad_2]