The design and implementation of Shantou Vocational College’s one-card system construction plan

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

 Preface

Shantou Vocational and Technical College is composed of the headquarters, Jinyuan campus, Xinjin campus and Dongdun campus. There are more than 1.5×104 students of various types and more than 700 faculty members. According to the college’s informatization development plan and system deployment process arrangement, the headquarters of the college and the Jinyuan campus shall realize network interconnection in the same city and initiate the construction project of the all-in-one card system. The project is divided into two phases, the first phase and the latter phase. The first phase of the project includes: the canteen selling system, intelligent water control system, book borrowing system, etc. Later projects include: extension and access of educational administration system, computer management system, access control and attendance management system, intelligent power control system, bank transfer system, etc., to truly realize the sharing of information and resources, and realize the comprehensive all-in-one card application. According to the construction goals and requirements of the college campus card system, this paper designs and implements the technical solutions of the system.

1. Overview of system construction goals and demand analysis

“Campus All-in-One Card” refers to the use of cards to complete all situations involving cash or identification within the school.The card integrates student ID, work ID, ID card, library card, wallet, etc., and achieves the electronic and intelligent management of fees and management of ID, consumption, etc.[1].

The construction of the one-card system should realize: 1) Form a unified information platform, promote the standardization of education information, and build an excellent digital space and information sharing environment; 2) Realize a unified electronic payment and fee collection management throughout the school to solve various campus fees collection Trouble, miscellaneous, difficult and other issues; 3) Integrate and drive the construction of various management information systems to improve school management efficiency and management level; 4) Promote the construction of school network application platforms, and gradually complete the upgrade of the school’s application system architecture.

The requirements of the system are mainly investigated from the perspectives of business, function, technology, etc. The following author only discusses the analysis of technical requirements.

The technical requirements mainly include: 1) Identity information comes from a unified identity management center, and the data synchronization mechanism is based on a unified identity center and data center; 2) Building a one-card private network to improve system security and maintainability; 3) Integrating existing differences 4) The card structure design needs to have an identity authentication information area, an electronic wallet information area, a custom information area, and multiple electronic wallets with sufficient redundancy; 5) Support offline payment; 6) Provide a common development interface, Facilitate expansion and upgrade; 7) Integration, development, operation and management tools that meet various applications must be provided.

The main requirements for campus cards are as follows: use non-contact radio frequency cards; the terminal’s sensing distance range is 5-10 cm; the data area in the card stores identity information and e-wallet information, and the card adopts directory management; the personal identity information in the card Including the cardholder’s name, gender, school/work number, ID number and other information[2].

2. The overall design of the system

The overall design of the system includes: overall system framework, software architecture, data flow and database, etc.

2.1 Overall system framework

The system consists of three parts: data center, all-in-one card platform, and interface server. Among them, the all-in-one card platform uses COM+ technology to integrate card application systems, self-service systems and management systems; the interface server uses COM/DELL interface technology to connect library management, educational administration systems, access control systems, etc. As shown in Figure 1.

CO M+ is programming based on binary components and interfaces. By using a transparent RPC layer, remote method calls can be made across process and computer boundaries. CO M+ components can be upgraded and expanded in finished products without affecting the client applications that use them. CO M+ promotes COM components to the application layer. It shields the low-level details of all components through various supports of the operating system.[3].

The use of good interface technology makes the architecture good scalability, low coupling, and easy to upgrade and expand.

2.2 Software Architecture

The software architecture is shown in Figure 2. The system adopts the .NET development environment and provides a three-tier structure with COM+ as the intermediate communication component. The software system architecture consists of a data layer, a business layer and a presentation layer. Among them, the business layer (ie, the middle layer) is mainly responsible for business rules, data access, and legality verification. The biggest advantage of an application using a three-tier system is that it separates the business logic. The client does not directly interact with the database, but establishes a connection with the middle layer through COM/DCOM communication, and then the middle layer interacts with the database. When the business logic needs to be changed, the presentation layer and the back-end data service layer are not affected. Therefore, it can meet the scalability or expansibility requirements of the campus all-in-one card application. At the same time, the system provides standard interfaces, APIs, dynamic libraries, third-party agents, etc. for financial systems, educational management systems and other systems, and processes business requests from other systems in real time to achieve integration with other systems.

2.3 Data flow diagram

The main user groups of the system are students, faculty and staff. Therefore, when analyzing the data flow of the system, the author focuses on the data flow of system users. Due to the huge functions of the system and the many levels of data flow, in order to briefly explain the operating mechanism of the system, only the most important top-level data flow diagram will be analyzed here. The data flow diagram is shown in Figure 3 and Figure 4.

The external entities of the system mainly include students, faculty, temporary staff, and administrators; the system’s data processing mainly includes cardholder information management, card user management, system management, transaction processing, bank front-end computers, and accounting processing, etc.; Data storage mainly includes historical transaction tables, account settlement tables, daily and monthly settlement detailed reports, and statistical reports.


Figure 3 Data processing flow chart

Three, database model design

The system uses SQL Server 2000 database management system. There are many tables used for different functions in the system database, and there are mainly two types of tables:

1) Basic function table. The main function of this type of table is to record some basic auxiliary information needed by other tables. Including user password, student personal information, teacher personal information corresponding table, consumption record information table, etc.;

2) Function operation table. This type of table is used to record the data generated by the operation of each system function.

The design of the database is of great importance to the ultimate success of the system, and the definition of each table and its fields will directly affect the effect of users. Especially the design of data tables related to user consumption records, system accounting records, etc., is the most important thing. Therefore, the use of a database management platform with good performance will play a key role in the stability of the system and the security of the underlying data.

This system uses two-dimensional relational database tables. Due to the large number of tables and the huge amount of data, the one-card system requires high performance (such as time and space overhead) for the calculation, query, filtering, and sorting of data records. Therefore, The system adopts a more advanced software architecture based on the middle layer. The middle layer interacts with the system database. This interaction is encapsulated in a specific database access module to ensure the independence and reliability of database operations.

Four, system security design

In order to ensure the high reliability and availability of the all-in-one card system, security planning must be made for the card. At the same time, network information security cannot be ignored.

4.1 Security Design of Campus Card

Regarding the security of campus cards, methods such as card encryption, backup, performance inspection and information partitioning are mainly adopted to ensure the security of card use[4]. The specific security plan is as follows:

1) Encrypted card area. The card is divided into 32 areas, and each area has independent password information. Before reading and writing the information in each area, a password verification must be performed, and the information in this area can be accessed only after the verification is correct;

2) Information backup. The information in the card is recorded twice in a backup method, so that the reliability of the information is more guaranteed;

3) Performance inspection. Due to the large storage space in the card, the system records detailed amount information in the card. This information itself has a complete information verification mechanism. The POS machine or software system can determine the validity of the card based on the verification information;

4) Information partition. Put the amount information and identity information in different partitions to improve data independence and controllability.

4.2 Network security design ideas

The database platform of the all-in-one card system is connected to the campus network. To ensure data security, unauthorized users should reduce access to the database system and application systems. Static VLAN technology can be used to assign all hosts and terminal devices that need to access the database server to specific VLAN ports, and bind the MAC address to the switch port to ensure the legitimacy of data access.

On the other hand, a VPN based on the campus network can be used, that is, a dedicated data communication network is created on the campus network infrastructure. The data is transmitted in the campus network through a secure encrypted tunnel, thus ensuring the confidentiality and exclusiveness of communication.

In order to share campus network resources, the one-card private network and the campus network use firewalls for single-channel communication to ensure that the one-card network can access campus network resources, but the campus network cannot access the one-card private network, so as to prevent possible illegal interception and make the network on the one-card network. The equipment can operate safely and stably[5].

5. Multi-campus all-in-one card system construction

Figure 5 shows the deployment of the multi-campus one-card system.

In order to effectively utilize the network information resources of the multi-campus campus, the interconnection between the various campuses of the college should be fully considered when designing the multi-campus all-in-one card system. This system uses VPN channels to interconnect the multi-campus one-card sub-systems, and a good system operation mechanism is designed to ensure the stability and unity of the system.

The school headquarters set up a main center, and the campus set up sub-centers and deployed emergency servers and intermediate layers. When the VPN channel is normally connected, all branch center services are processed through the main middle layer; when the VPN channel is not available, the branch center middle layer takes over the campus business; when the VPN channel is open, the program will automatically transmit the latest service data to the main server , And switch to the main middle tier.This operating mechanism can effectively ensure the robustness of the system[6].

The campus all-in-one card project should adopt the construction concept of “unified planning and step-by-step implementation”. Start with the implementation of small-scale applications, and then gradually transition and expand to medium-scale application deployment, and finally achieve the overall goal of “all-in-one card” construction. After detailed demonstration, the main technical parameters adopted by this system are shown in Table 1.

Six, conclusion

The system adopts a software architecture based on the middle layer and is developed under the .NET framework. The database adopts SQL Server 2000. The system runs on a private card network that is logically isolated from the campus network. Good card security and network security mechanisms ensure Reliability of system operation. The system has powerful functions, stable operation, strong manageability and scalability, and has achieved the project’s predetermined goals.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare