RFID secret asset management system solution
[ad_1]
1. System overview
In recent years, as the application of computers has become more and more widespread, the traditional security methods of secret-related entities have fallen far short of the needs of the development of informatization. How to ensure the safety of computers and data in applications and prevent leaks has become an important task at present.
U disks, mobile hard drives, personal notebooks, etc. are the main carriers of information dissemination. There is currently no good monitoring method for its use. Most of its monitoring uses manual methods, which can no longer adapt to the current information security control. .
In response to the above situation, Shenzhen Aerospace Science and Technology Innovation Research Institute has launched radio frequency identification products as the core, combined with the company’s secret-related asset management system, to replace the traditional secret-related carrier management methods. The secret carrier must be approved by the leader to bring out the surveillance. area. The remote identification and judgment of U disks and mobile hard disks brought into or out of the monitoring area will be carried out. If illegal carriers are found, they will be reported to the police immediately, which greatly improves the scientificity, effectiveness and safety of the management of secret-related carriers. .
2. System introduction
Confidential asset management system is based on the “object management”, which is mainly used for the management objects of classified information (that is, confidential information carriers, divided into: paper carriers and electronic carriers) and application objects (that is, contact, use, and custody). Persons involved in confidential information) management. Organically combine secret-related targets and management units, and incorporate them into effective management control through the management chain. Mark important information objects with RFID tags to make them a target, and store the target data in the database (database) to make them a target that can be identified by the RFID target recognition security management system, and deploy RFID target recognition security in different management units and monitoring points The target identification and data reading device in the management system-RFID reader, reads the target data that enters the coverage area of the antenna (data acquisition platform); transmits the data to the management server through a wireless network (data transmission platform) , Analyze, judge, and publish data through various configuration modules (service platform); respond to target behaviors according to module configuration. Realize the safe and effective management of important information carriers, involved personnel, and related behaviors.
The secret-related asset management system will essentially change the previous management model. Based on the “process management” of important information, it not only includes the management of the object itself, but more importantly, it can generate, move, disseminate, and disseminate important information. The development process of a series of events such as storage and inspection is managed. Management events are always accompanied by the development process of things. They are recorded, analyzed, and summarized, evaluated, judged, and issued early warnings and alarms according to pre-established rules. It can manage matters more humanely and get rid of the interference of human factors at the same time, embodying “human science and technology, humanistic management”. The following figure shows the system structure flow chart:
Three, system function
1. Use of cataloging module
The cataloging module is an independent functional module in the RFID target recognition safety management system. The main task is to classify and catalog the incoming documents.
2. Use of Approval Module
Including: Approval documents, approval inquiry, approved inquiry, document tracking, and the setting of system related parameters.
3. Use of retrieval module
The retrieval module mainly provides the retrieval of the bibliography of this data room, and users can query the required information in various ways and make an appointment.
4. Management chain module
The main functions of the management chain module include: certificate processing, certificate cancellation, file borrowing and returning, user information query, file information query, operator’s work record, and system related parameter setting.
The main tasks of management chain module function maintenance are: management chain function parameter setting, server parameter setting, user password setting, loan processing and administrator setting, etc.
5. Entry and exit monitoring
The main functions of entry and exit monitoring include: real-time radio frequency identification, camera monitoring, log recording and voice prompts for personnel entering and exiting the surveillance area and secret carriers, and linkage with automatic doors to intercept illegal targets in real time.
Four, system characteristics
1. Real-time management, quick and easy operation, detailed log records, complete “management link”;
2. Automatic identification, long distance, high precision, good anti-interference, strong environmental adaptability, and realize “intelligent judgment”;
3. The information is disclosed by level, with strict authority control and clear levels, to achieve “upward responsibility”;
4. The system data and the system hardware fingerprint are bound and encrypted, and the module data is encrypted for transmission;
5. The system is independently encrypted and coded to prevent information leakage and facilitate data fusion;
6. A strong supervisory and supervisory role requires personnel to consciously abide by system rules and operating procedures, which facilitates real-time control, inspection and supervision by leaders;
7. Humanized management, avoid conflicts, unique early warning and alarm functions;
8. Unique quantitative management of safety credit value and quantitative work statistics, which is convenient for quantitative assessment;
9. Distributed structure, convenient for networking, mobile deployment and scope expansion;
10. Modular design is convenient for function expansion and special module customization.
Five, application areas
1. Army;
2. Government agencies;
3. Institutions;
4. Books and archives management departments;
5. Research institutes;
6. The safety management requirements of enterprises and companies;
7. High-end application customers.
[ad_2]