Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GA/T 639-2006 | English | 199 |
Add to Cart
|
3 days [Need to translate]
|
The specifications on visiting control and user authorization of economic crime case management information system
| Obsolete |
GA/T 639-2006
|
PDF similar to GA/T 639-2006
Basic data Standard ID | GA/T 639-2006 (GA/T639-2006) | Description (Translated English) | The specifications on visiting control and user authorization of economic crime case management information system | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | Classification of Chinese Standard | A90 | Classification of International Standard | 35.240 | Word Count Estimation | 4,429 | Date of Issue | 2006-08-29 | Date of Implementation | 2006-10-01 | Regulation (derived from) | Announcement of the Ministry of Public Security on Abolishing 440 Standards of Public Security Industry | Issuing agency(ies) | Ministry of Public Security | Summary | This standard stipulates the user authorization, authentication and access control regulations related to the confidentiality of case information in the national economic crime case information management system. This standard applies to economic crime cases information management system research and development, construction and application. |
GA/T 639-2006: The specifications on visiting control and user authorization of economic crime case management information system ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
The specifications on visiting control and user authorization of economic crime case management information system
ICS 35.240
A90
People's Republic of China Public Safety Industry Standard
Economic crime case information management system user authorization,
Certification and Access Control Business Specification
Released on.2006-08-29
Implementation of.2006-10-01
Ministry of Public Security
Foreword
This standard was proposed by the Economic Crime Investigation Bureau of the Ministry of Public Security.
This standard is under the jurisdiction of the Computer and Information Processing Standardization Technical Committee of the Ministry of Public Security.
This standard was drafted by the Economic Crime Investigation Bureau of the Ministry of Public Security.
The main drafters of this standard. Zhao Weijia, Wang Keyuan.
Economic crime case information management system user authorization,
Certification and Access Control Business Specification
1 Scope
This standard stipulates the user authorization, certification and interviews related to the confidentiality of case information in the information management system of national economic crime cases.
Ask for control specifications.
This standard applies to the development, construction and application of information management systems for economic crime cases.
2 Terms and definitions
The following terms and definitions apply to this standard.
2.1
The unified entry and inquiry system of the national economic investigation police number, name, unit, position and other information is developed by the Economic Crime Investigation Bureau of the Ministry of Public Security.
Maintenance, the economic investigation departments at all levels are responsible for maintenance, referred to as the "National Economic Investigation Police System."
2.2
The only investigator with host case access management.
3 User authentication
a) The users of the units of the economic investigation units at all levels are imported by the system administrator from the “National Economic Investigation Police System”, using the first two codes of the administrative division.
And six police sirens as user login names. The addition, deletion and modification of users can only be completed through the National Economic Investigation Police System.
b) The system provides a user authentication mechanism based on the PKI/PMI authentication system of the Ministry of Public Security.
c) The user identity authentication is completed by the system at the same level in principle, and the lower and upper level units cannot be authenticated each other to ensure the national unified identity.
The uniqueness of the card.
4 user authorization
Case access rights include. case information access authority, case information editing authority, case information printing authority, case document review right
Limits, the approval authority of the case documents, the authority of the investigator of the case, etc. The access to the case information is the basic authority to access the case.
The remaining five permissions are logically independent of each other and there is no mutual inclusion relationship.
a) System administrator. Each level of the investigation unit sets a unique system administrator, responsible for the management of the user roles and function rights of the unit.
Register the six administrative division codes in the area where the unit is located.
b) Hosting investigators. responsible for managing the authority of a particular case. The various access rights of the case can be given to the corresponding user.
The change of the case-sponsored investigator shall be the responsibility of the system administrator of the unit. Once confirmed, it shall take effect immediately; at the same time, the original host investigation shall be cancelled.
The management function of the case.
c) Other users. have the authority granted by the sponsored investigator.
5 case access control
a) Implementing the “first responsibility system” during the alarm phase
The police are responsible for registering the information of the police, sending the person in charge of the investigation and investigation department, and handing over the investigation of the investigator. The alarm information was not handed over
|