Oriok (Anhui) Information Technology Co., Ltd. has security level 1, intelligent building level 2, system integration level 3, and confidentiality qualification to undertake national secret software development and application. Typical users: Anhui Provincial Party Committee Organization Department and 16 local city organization departments (including districts and counties) Anhui Provincial Disciplinary Inspection Committee and 16 prefectural discipline inspection committees (including districts and counties)
Mobile Party Member Management Information System Construction Plan

【background】
Incorporating party affairs into the track of information management is a new requirement for promoting party building in the network era, and it is also a new topic facing the construction of the ruling party. Establish a set of mobile party member management information system, include the routine management of mobile party members, and extend it to the party members' education, business assessment, talent collection and other directions, which is of great significance to the informationization of party and government work.

【system structure】
For system security and scalability, the system uses J2EE enterprise application solution technology platform, combined with workflow engine as process-driven technology, using MVC layered design mode, using browser-based B / S architecture HTTPS encrypted transmission is used for access, and the server uses 1024-bit SSL encryption to encrypt all data related to privacy to ensure the security of the system.


[Operating environment]
 Server  Hardware: 2 application servers, 2 database servers, 1 shared disk array, 1 load balancer (such as F5), fiber switch, Ethernet switch  Software: Operating system Red Hat Enterprise Linux Server, database Oracle11g RAC, application middleware Oracle Weblogic Server 11g, JDK1.6
 Client  Hardware: ordinary pc, cpu 奔 4 2.4MHZ or above, memory 1G, hard disk 80G
 Software: Windows XP and above operating system, Office 2003 and above, IE6 and above browser

【System functions】
The system is divided into background and foreground functions: the background is the system administrator or the hierarchical administrator of the local party committee, and the related settings or query statistics are performed; the front desk is an ordinary mobile party member or organization, which can use its own ID number or organization number. Log in to the system, conduct related business processing or receive education, participate in comments, and so on.
Background function:

System management
2. Process management
3. Personal settings:
4. Institutional staff
5. File Management
6. Flow management
7. Party member education
8. Business processing
9. Talent Strategy
10. Democratic review
11. Query statistics
12. Data Management
13. Internal communication (can include mobile party website, online promotion)

Front desk function:

 Login: ID number + password, or mobile number + SMS verification code  Enter file  Mobile registration  Party member education  Business management  Talent assessment  Democratic evaluation

Mobile terminal:
 The front-end website supports mobile browsers  Develop mobile app
 Support QR code scanning

[Security]
 Transmission security: The application server always opens https, and the content in the browser is transmitted by encryption, and the package content is secure;
 User password storage: use the irreversible encryption algorithm to encrypt and store the password. When comparing, the characters are compared after the positive encryption characters to prevent the “personal universal password” from leaking.
 Login security: You can bind the mobile phone number. With the support of the SMS interface, each login uses the SMS random verification code to verify.
 Database content security: Some sensitive information can be encrypted and stored in the database as needed;
 Database security: The database server adopts Oracle RAC cluster. When one node is down, the system can continue to run. The disk is damaged and can be recovered from the raid.
 Application service guarantee: Weblogic+ load balancer is adopted to ensure that there is no single point of failure;
 SQL injection, Xss attack: the program has been optimized to filter illegal requests;
 DDOS attack: firewall setting policy, graphic verification code;
 Server security: only open limited ports, firewall settings policies, etc.
 Data security: system timed backup.

Ouoke (Anhui) Information Technology Co., Ltd. has security level 1, intelligent building level 2, system integration level 3, confidentiality qualification to undertake national secret software development and application:
Party member information management system, integrity management file management system, cadre information management system, etc. Typical users of software:
Anhui Provincial Party Committee Organization Department and 16 local city organization departments (including districts and counties)
Anhui Provincial Disciplinary Procuratorate Committee and 16 prefectural discipline inspection committees (including districts and counties)
Http://news.chinawj.com.cn Submission:

Outdoor Reed Lights

LED Fiber Garden Reed Lights,Outdoor Scenic Spot Lawn Lights,Led Fiber Reed Lights,Outdoor LED Reed Lights

Sichuan Kangruntengpu Photoelectric Technology Co., Ltd. , https://www.kangruntoplighting.com

Posted on