Reamer Shoe,Cementing Reamer Shoe,Combined Alloy Reamer,Aluminum Nose Reamer Shoe Puyang Zhongshi Group Co.,Ltd , https://www.pycentralizer.com
Seal Security Management Information System Composition and Key Technologies
The seal is a recognized certificate, especially the official seal, which can be said to be a representative of wealth and a symbol of rights. With the rapid development of economic construction, the seal has played an increasingly important role in politics, economic circulation and people's life.
At present, among the various seal enterprises in the country, there are 18,805 under 20 people, accounting for 97.2% of the total. Most small-scale seal engraving companies are hand-carved and easy to imitate. Due to fierce competition, the problems of some seal companies' infringement of formalities or lack of formalities are also very prominent.
These problems have made many economic criminals available. Most criminals made fraudulent crimes by forging fake seals and making false documents, which caused huge losses from the state, collectives and individuals, seriously disrupted the market economic order and affected the country's reputation.
Management status
Seal industry management is an important part of the management of special industries. It is of great significance to protect the legal activities of the seal industry and the normal activities of its clients, and to combat illegal crimes. After the implementation of the Administrative Licensing Law, the State Council also retained the administrative examination and approval of the seal engraving industry by the public security department, fully demonstrating that the state attaches great importance to the management of the seal industry. If the seal industry lacks strict and standardized management, it is easily used by criminals. Therefore, public security organs at all levels must conscientiously perform the duties assigned by the state and the law, take effective measures, and strictly examine and approve according to law.
How to effectively manage the seal enterprises and avoid the occurrence of violations of the bill has become a major problem for public security management. The use of seal information management system to standardize management, timely grasp the clues of public security to solve crimes, understand the trend of crime, and benefit from management has become an urgent task for local public security organs to carry out their work effectively.
According to the relevant requirements of the Ministry of Public Security, from the actuality of public security management, the establishment of the seal security management information system to ensure the normal operation of the system and the realization of national networking, it is easy to carry out imprint comparison and off-site inquiry.
The goal of building
Taking high-tech information application as the core, based on the existing public security information network and various applications, it establishes a seal security management information system, provides information management tools for public security departments, improves the efficiency of on-site work of public security organs at all levels, and enhances public security. Information sharing, unified command, rapid response, and coordinated operations.
System Components
The seal security management information system consists of the following Internet and public security network:
The Internet side mainly consists of the following four parts:
Enterprise application subsystem: Mainly complete the work of engraving application, seal cancellation and business inquiry.
The public security filing subsystem: complete the examination and approval of the seal application, the issuance of the seal information, the classification and collection of the information uploaded by the seal industry, and the analysis and processing tasks, and comprehensively provide the business functions of the public security organs at all levels for inquiries, statistical analysis and so on.
Seal engraving subsystem: to achieve the seal engraving business reception, the real-time collection of the basic information of the seal and the final delivery function of the seal, complete the tasks of data entry and restricted inquiry in the seal industry, and further strengthen the information management of the seal industry.
Basic management subsystem: implement basic information management, system docking, data interaction and cleaning functions.
Public security network application platform: comprehensively provide public security organs at all levels to inquire and verify, statistical analysis, comparison control, alarm and other business functions.
Physical isolation zone: In order to ensure the security of public security intranet business data, a physical isolation zone is specifically set up. The physical isolation zone can be a public security security border access platform or other physical isolation methods recognized by the public security. The government external network is physically isolated from the public security internal network, which improves security and reliability.
Key technical route
5.1 J2EE-based three-tier structure
The B/S three-layer structure design and design software system makes software change and business logic expansion more convenient, so it has higher flexibility and adaptability, and also has high reliability.
Java itself is a cross-platform language that runs on most operating systems, while J2EE provides security, messaging, and reliability services for EAI (Enterprise Application Integration).
5.2 dot matrix compression technology
In the GA241.3-2000 "Stamp Security Management Information System" standard, a two-dimensional run length coding compression method is specified. It is mainly used for the storage and restoration of stamps and chapter images. The principle of this method is to describe the equivalent continuous pixel points in an array and support reverse reduction.
The two-dimensional run-length coding compression method is a standard algorithm for compressing printed binary images. Compared with the bmp format color image, the effective pixel information loss is relatively large, and the algorithm only involves printed pixels, including Table line and
The signature information is all lost during the binarization process. If the chapter image information stored in the database does not have the signature of the engraver and the consular person, the chapter image information is incomplete file information. To this end, dot matrix compression technology has been specially designed to perform dot matrix compression for 600DPI color three-valued card images.
The above picture is a printing card that needs to be designed for the seal management. When the lettering company delivers the seal to the seal user, it must be printed on the printing card. The lettering company and the applicant must sign the printing card. It is better to compress and store such a printed card in the database as a whole, which is better than just retaining the printed image.
The dot matrix compression technology is a technology application for domain aggregation and compression. The main algorithm principle is to use a mathematical method to generate a custom format data file for the effective lattice outside the background. The compression ratio of this compression method is as high as 150 to 300 times, so that the credit card information storage and remote extraction will not put pressure on the network and improve information management and use efficiency. Among them, the effective pixel lattice can be 100% lossless reduction, which is unmatched by the two-dimensional run length coding algorithm. Provide technical support for the identification, identification and identification of seals in the management to retain standard prints.
5.3 Intelligent comparison technology
Comparing calculations and alarms is one of the important requirements of this project. To this end, an automated intelligent comparison engine was designed and developed. The comparison engine works in the service system mode. It automatically detects various types of information such as ID card data and enterprise organization code entering the system, and automatically compares with existing data such as CCIC to generate comparison results.
The successful development of the intelligent comparison engine has laid a solid foundation for us in the seal management process, and has also laid an important foundation for the future expansion of other special industry security management systems.
5.4 Anti-counterfeiting stamp technology
Through unremitting research on seal anti-counterfeiting technology, our technology can support a variety of physical seals such as flip seals and integral seals. Among them, the technology of integral anti-counterfeiting seals is the most prominent.
The integral anti-counterfeiting technology includes a label for the chapter surface, the handle connected to the chapter surface, the label connected to the handle, and a mounting groove for mounting the label. The chapter surface and the handle are meshed to form an organic whole which is inseparable, and the label is placed. The placement groove in the handle is welded and closed, and an inseparable organic whole is formed. Due to the inseparable nature of the face and handle, and the inseparable nature of the label and handle, there is no way for criminals to replace the chapter from the handle of the chapter and become another fake chapter. Transplanting the label to the fake stamp without damaging the label ensures the true anti-counterfeiting characteristics of the stamp.
The above identity tags can be fabricated by using a variety of high-end non-contact readable and writable information carriers such as radio frequency chips and nanochips.
5.5 Regulation Process and Technology
For a long time, the public security organs have lacked effective supervision methods for the seal engraving process and the photosensitive seal exposure, making it possible to clone the seal. The so-called clone seal refers to the seal that the same machine uses the same chapter to repeat. The prints covered by this cloned seal are extremely similar. Despite the use of our patented chip stamping technology, because the chip in the stamp can only be registered once by the system, we can use the way of reading the chip information to identify the cloned seal. However, when criminals use the cloning seal to commit crimes, it will be very difficult to obtain evidence by means of fingerprint identification.
To solve this problem, we used a chapter device interference monitor. Its working principle is as follows:
The interference monitor is an industrial control terminal with a network port that collects and transmits data. On the one hand, the carrier interference information/light interference information is randomly transmitted to the seal making device during operation, and on the other hand, the step track/transmission holographic matrix of the device is collected from the chapter device. Among them, the interference information causes the repetitive production process to mutate, and the controllable method is used to differentiate the cloned seal. The measure of interference information is less than the minimum resolution of the human eye and is limited to the minimum unit identifiable by our seal identification system. The collected engraving step trajectory/transparent holographic matrix is ​​transmitted to the “Seal Industry Social Information Collection System†by a structured device number of times code, and is parsed into a device work log by the system according to the monitor interface protocol and stored in the database. Among them, the equipment work code transmitted to the system by the monitor is the same for the same chapter information.
Through the engraving enterprise equipment work log record, the system engine can automatically identify duplicate production records and give alarms to support supervision and evidence collection.
In summary, we already have the technical means and management measures to supervise the seal making process, and fundamentally control the source of the clone seal.