HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 639-2006 English PDF

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 639-2006English199 Add to Cart 3 days [Need to translate] The specifications on visiting control and user authorization of economic crime case management information system Obsolete GA/T 639-2006

PDF similar to GA/T 639-2006


Standard similar to GA/T 639-2006

GB/T 37230   GB 13954   GA/T 671   GA/T 543.24   GA/T 543.23   GA/T 649   

Basic data

Standard ID GA/T 639-2006 (GA/T639-2006)
Description (Translated English) The specifications on visiting control and user authorization of economic crime case management information system
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard A90
Classification of International Standard 35.240
Word Count Estimation 4,429
Date of Issue 2006-08-29
Date of Implementation 2006-10-01
Regulation (derived from) Announcement of the Ministry of Public Security on Abolishing 440 Standards of Public Security Industry
Issuing agency(ies) Ministry of Public Security
Summary This standard stipulates the user authorization, authentication and access control regulations related to the confidentiality of case information in the national economic crime case information management system. This standard applies to economic crime cases information management system research and development, construction and application.

GA/T 639-2006: The specifications on visiting control and user authorization of economic crime case management information system


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
The specifications on visiting control and user authorization of economic crime case management information system ICS 35.240 A90 People's Republic of China Public Safety Industry Standard Economic crime case information management system user authorization, Certification and Access Control Business Specification Released on.2006-08-29 Implementation of.2006-10-01 Ministry of Public Security

Foreword

This standard was proposed by the Economic Crime Investigation Bureau of the Ministry of Public Security. This standard is under the jurisdiction of the Computer and Information Processing Standardization Technical Committee of the Ministry of Public Security. This standard was drafted by the Economic Crime Investigation Bureau of the Ministry of Public Security. The main drafters of this standard. Zhao Weijia, Wang Keyuan. Economic crime case information management system user authorization, Certification and Access Control Business Specification

1 Scope

This standard stipulates the user authorization, certification and interviews related to the confidentiality of case information in the information management system of national economic crime cases. Ask for control specifications. This standard applies to the development, construction and application of information management systems for economic crime cases.

2 Terms and definitions

The following terms and definitions apply to this standard. 2.1 The unified entry and inquiry system of the national economic investigation police number, name, unit, position and other information is developed by the Economic Crime Investigation Bureau of the Ministry of Public Security. Maintenance, the economic investigation departments at all levels are responsible for maintenance, referred to as the "National Economic Investigation Police System." 2.2 The only investigator with host case access management.

3 User authentication

a) The users of the units of the economic investigation units at all levels are imported by the system administrator from the “National Economic Investigation Police System”, using the first two codes of the administrative division. And six police sirens as user login names. The addition, deletion and modification of users can only be completed through the National Economic Investigation Police System. b) The system provides a user authentication mechanism based on the PKI/PMI authentication system of the Ministry of Public Security. c) The user identity authentication is completed by the system at the same level in principle, and the lower and upper level units cannot be authenticated each other to ensure the national unified identity. The uniqueness of the card.

4 user authorization

Case access rights include. case information access authority, case information editing authority, case information printing authority, case document review right Limits, the approval authority of the case documents, the authority of the investigator of the case, etc. The access to the case information is the basic authority to access the case. The remaining five permissions are logically independent of each other and there is no mutual inclusion relationship. a) System administrator. Each level of the investigation unit sets a unique system administrator, responsible for the management of the user roles and function rights of the unit. Register the six administrative division codes in the area where the unit is located. b) Hosting investigators. responsible for managing the authority of a particular case. The various access rights of the case can be given to the corresponding user. The change of the case-sponsored investigator shall be the responsibility of the system administrator of the unit. Once confirmed, it shall take effect immediately; at the same time, the original host investigation shall be cancelled. The management function of the case. c) Other users. have the authority granted by the sponsored investigator.

5 case access control

a) Implementing the “first responsibility system” during the alarm phase The police are responsible for registering the information of the police, sending the person in charge of the investigation and investigation department, and handing over the investigation of the investigator. The alarm information was not handed over