Home>Equipment list>Law enforcement forensics equipment>Police service/police terminal>X3 Integrated Mobile Police Terminal Mobile Intelligent Police Tablet
细节展示放大镜特效

X3 Integrated Mobile Police Terminal Mobile Intelligent Police Tablet

  • No:X3
  • Quantity:

      Recommend

    X3 Mobile Police Tablet Report
    I. Overview:
    In 2014, the Ministry of Public Security put forward four construction requirements for the national public security organs: basic informatization, police practical warfare, law enforcement standardization and team normalization. Basic informatization: fully tap the potential of basic public security work by means of informatization, and promote the continuous development and progress of public security undertakings. Police Practical Warfare: The use of public security information backstage and terminal tools to provide a strong and efficient support for the first-line actual combat. Guided by practical police operations, the goal of sharing information and strengthening police by science and technology is achieved.
    2. Network access:
    The public security mobile access system is connected to the backbone of mobile access network through data dedicated lines, and the security of the system is enhanced by the security measures provided by mobile operators (APN or VPN or VPDN), which can be extended to national applications. At present, through the use of a variety of communication modes, mainly through the 3G network connection of professional police service, the mobile police terminal can be widely popularized and covered in the vast number of police officers, and can really play the role of mobile police routine simple person-checking and vehicle-checking. According to the requirements of most policemen's business operation and use environment, 3G data is not enough to meet the needs of policemen's business. There are still bottlenecks in the operation of data business, which hinder the role of policemen at the grass-roots level. On December 4, 2013, the Ministry of Industry and Information Technology issued a 4G license, and China's 4G LTE ushered in. Accelerated development, China Mobile plans to build 4,000 base stations nationwide by the end of 2015, covering more than 300 cities and more than 1 billion people. The coverage of 4G has completely broken the bottleneck of public security data operation.
    III. Safety and Security
    According to the requirements of "Technical Guidelines for Mobile Access and Application System Construction of Public Security Information", provinces, prefectures and municipalities have established public security border platforms in accordance with this norm. There are three manufacturers of public security border platforms designated by the Ministry of Public Security, one by the Ministry of Public Security, one by Xinda Jiean, and wireless terminals accessing public security through public security border platforms. Intranet; Provide powerful security guarantee for public security data sharing in wireless terminals; With the overall advancement of "Golden Shield Project", the use of mobile access and application system of public security information to develop and make full use of public security information resources can improve the public security organs to fight against the enemy, protect the people, punish crime, and service groups. We should maintain the level and ability of national security and social stability, and improve the ability of public security organs to respond quickly and combat comprehensively.
    4. Mobile application needs of public security industry:
    The application functions of the mobile police system according to the requirements mainly include: comprehensive inquiry function of public security information, business inquiry function, traffic management function, community policing function, public security management function, adaptive tool function and so on. The comprehensive inquiry of public security information is the basic function that the police communication must provide. These system function modules can work independently or be combined flexibly according to different types of police or authority.
    1. Comprehensive inquiry of public security information
    The comprehensive inquiry function of public security information is based on the established comprehensive inquiry system of public security information, which integrates all kinds of public security information according to the personnel, goods, cases, institutions, places and other elements agreed by the Ministry of Public Security, and builds a comprehensive database to provide inquiries; some inquiries of these information are not isolated single inquiries, but rather, some inquiries of them are not isolated. It is based on five elements (personnel query, case/event query, item query, organization query and location query) association rules for comprehensive query and cross-query. The so-called association refers to the one-to-many collaborative Association of the initial information queried according to the rules of five elements, such as the driver information query, which can correlate the relevant population information, vehicle information, escaping information, local hotel industry information, entry-exit information, drug abuse and trafficking information, etc.
    The main query mode of integrated query is real-time and online secure access mode of 3G. Mobile terminal does not store business data, but only stores commonly used dictionary information. This speeds up the response speed of the system, reduces the cost of width occupancy, and automatically provides data synchronization function when the system starts to ensure the query. Ask for data security. Under different inquiry modes and various inquiries, the system automatically compares the key elements of inquiry input, such as personnel information, vehicle information, traffic violation information, driver's license information, vehicle annual inspection information and so on, with the national fugitive database, vehicle theft database, traffic violation unprocessed data record and electronic. The database such as police database is automatically compared, and the situation of key control objects, fugitives, stolen and robbed vehicles, stolen and robbed firearms, false motor vehicle license plates, overdue annual examination, overpaid drivers, drivers whose traffic violations have not been handled or who have not paid fines for more than three months, escapees or vehicles involved in traffic accidents, etc. We should make automatic comparisons and alarms, increase the effectiveness of police officers'access to criminal clues, and increase the intensity of cracking down on criminal offenders. Information inquiry covers information of permanent residents, fugitives, motor vehicles, drivers, robbed vehicles, illegal and criminal information, drug addicts, Hotel passengers, entry-exit personnel documents, detainees and other basic business data of the eight resource bases in the public security network, such as information of permanent residents, fugitives, motor vehicles, drivers, robbed vehicles, illegal and criminal information, information of drug addicts, information of hotel passengers, information of entry-exit personnel and information of detainees. Inquire. Among them, all those involved in personnel information inquiry have the function of automatically comparing the information of escaping, drug abuse, illegal crime, violent crime, motor vehicle inquiry, and the function of automatically comparing the information of stolen and stolen vehicles.
    2. Business query function
    The business query function module requests to provide specific individual business data information query entry for each element, mainly including:
    1) Personnel business inquiries (permanent population, temporary population, drivers, domestic passengers, overseas passengers, rental household owners, outbound personnel, overseas personnel, persons under investigation, working objects, fugitives, drug addicts, detainees, persons released from reform through labour, etc.)
    2) Business inquiry of articles (motor vehicles, non-motor vehicles, articles involved, stolen vehicles, etc.)
    3) Business inquiry of cases (criminal cases, economic cases, etc.)
    4) Institutional business inquiries (hotel information, rental housing, place units, key units, etc.)
    5) Office OA (document browsing, document approval, workflow reversal, etc.)
    3. Traffic Management Function
    This function module is a set of well-functioned traffic violation handling system, which conforms to the laws and regulations of "Road Traffic Safety Law", "Regulations for the Implementation of Road Traffic Safety Law" and "Regulations for Processing Procedures of Road Traffic Safety Illegal Acts" issued by the Ministry of Public Security Decree 69. Starting from the actual work of the first-line traffic and patrol police, it realizes the inquiry of traffic management business data of public security, the entry and processing of illegal traffic scene, the real-time printing of business processing notice, the scene photography and evidence collection, and the corresponding results are automatically uploaded to the business database within the public security network. At the same time, the functions of the system and the comprehensive inspection system are closely integrated. The policemen on duty on the road can obtain the detailed information and related information of local motor vehicles, drivers, traffic violations and other traffic management from the background system in real time. While completing the traffic violations and mobile corrections, they can complete the automatic comparison with other relevant databases and focus on them. Controlled objects, fugitives, stolen and robbed vehicles, stolen and robbed firearms, fake motor vehicle license plates, overdue annual examination, overweight drivers, drivers who have not dealt with traffic violations or paid fines for more than three months, escapees or vehicles involved in traffic accidents, etc. are automatically compared and alarmed. This system can not only run independently, but also be used as a supplement and extension of the traffic violation processing system developed by the Research Institute of Traffic Management of the Ministry of Public Security.
    The main functions are as follows:
    1) Mobile electronic police (illegal parking, etc.); on-site penalties (car arrest, license arrest, fine, etc.)
    2) On-site notification (certificate overdue, points overrun, electronic police pending processing, etc.)
    3) Handling of Simple Accidents
    4) Clamp checking (record checking time, checked personnel, articles, vehicles, etc.)
    5) Transport Management of Dangerous Chemicals
    4. Community policing function
    The function module of community policing is mainly for the policemen who implement community management at the front line of police stations. It can realize the inquiry of basic information and the automatic processing of business. Its main functions include:
    1. Information collection of temporary resident population (satisfying information inquiry, information collection, information change, temporary residence permit printing, etc.)
    2. Information collection of rental housing (information collection or change of rental housing, owners, tenants, etc.)
    3. Variable information collection of permanent population (education level, height, occupation, residence address, service place, marital status, contact telephone, etc.)
    4. Mobile Personnel Information Collection (Including Outgoing Personnel and Outgoing Personnel, etc.)
    5. Information Collection of Overseas Personnel (Information Collection Units and Temporary Overseas Personnel)
    6. Position control information acquisition (including second-hand mobile transaction, motor vehicle repair, etc.)
    Community policing system is closely integrated with police platform and population management system. While completing information query, it can compare information with other related databases at any time to realize data reuse, automatic comparison and alarm. After equipped with special printer, it can print temporary residence card on site and other functions. Community policemen information collection and business processing system can provide maximum support for police law enforcement. It is very helpful to find out the internal security situation of the segments, realize the new mode of community management, and maintain social stability. 5. Patrol Inventory Function
    The function module of public security management is mainly for the policemen who patrol and manage places and industries. The system can query basic information and process business. Its main functions include:
    1) On-site inspection (recording patrol scene, inspected personnel, goods, vehicles and other information)
    2) Basic information management of units (docking with police platform system, collecting or changing basic information of units)
    3) Information Management of Employees
    4) Information Management of Safety Inspection in Units
    Security management system is closely integrated with police platform and other systems. While completing information query, it can compare information with other related databases at any time to realize data reuse, automatic comparison and alarm. At the same time, it can support the display of pictures and other pictures, as well as the collection of multimedia evidence such as pictures and audio.
    6. Location Function (Requires GIS Electronic Map Coordination)
    Police Positioning System
    Police positioning system uses the channel and data services provided by mobile operators to monitor and real-time dispatch mobile targets. The system integrates GIS technology, wireless communication technology and network technology to achieve unified centralized management and real-time monitoring and dispatching of police officers. It also implements query analysis and assistant decision support with GIS system. Electronic map technology, GPS technology and business data and business processes of public security system can be organically linked and integrated to realize the functions of visual management, business processing, business analysis and GPS application based on electronic map. The application of mobile positioning system provides a powerful tool for efficient processing and decision support of public security system.
    5. Hardware requirements
    In order to meet the needs of mobile applications in the public security industry, there are relatively clear requirements for hardware configuration:
    1, conform to the mobile access standard of public security; (can access the public security intranet)
    2. Internal Anti-data leakage mechanism (one machine, one disk)
    3. CPU computing power, processing speed; (4-core high-performance processor)
    4. GPS or Beidou function; (Support PGIS application)
    5. Supporting 4G
    6. Support the handwriting function of the original handwriting; (Satisfies the leadership to sign and approve)
    7. Supporting the scanning function of the second generation certificate; (Reading the second generation certificate at the grass-roots level)
    8. Supporting fingerprint scanning function; (fingerprint input)
    9. Separable keyboard; (Supporting police input)
    10, can work for 6 to 8 hours continuously; (Guarantee that the police go out to work one day)
    VI. Advantages of X3 Products
    & Oslash; built-in 3G/4G communication module
    The built-in 3G/4G communication module of X3 mobile police professional tablet matches all network modes of telecom, Unicom and mobile operators.
    & Oslash; original handwriting and touch screen operation
    Wacom electromagnetic screen meets the needs of users for fast handwritten input, and leads the needs of original notes checking and approval for important documents. Ten-point capacitive screen provides users with accurate, fast and smooth touch experience.
    & Oslash; Beidou & amp; GPS dual-mode built-in
    Dual-mode adaptive positioning module, original rotary antenna design, to provide users with accurate location information.
    & Oslash; Solid State Hard Disk Encryption
    The 128-bit Check Sum encryption algorithm is used for high-speed shock-proof solid-state hard disk, and the encrypted binding strategy of one machine and one disk is used to prevent the leakage of user data.
    & Oslash; Rotary U-Key Interface
    Secure U-Key interface, original patent design. It is beautiful and touch-proof, convenient to plug and pull, and meets the standard of separating machine cards of the Ministry of Public Security.
    & Oslash; Apple SIM card slot
    Hidden SIM card slot design, dust-proof, loosening-proof, error-proof operation.
    & Oslash; standard leather case keyboard
    Standard PC keyboard input tools bring users the input experience of two-in-one PC tablet.
    & Oslash; Second Generation Certificate Cover Keyboard
    Multifunctional keyboard, to meet the user's second-generation certificate, fingerprint business needs.
    & Oslash; Customized Desktop
    Provide professional customized desktop according to user needs.
    The current trial and procurement units are as follows:
    1. Guangxi Public Security Bureau (14 cities)
    2. Shaanxi Province (Xi'an Public Security Bureau, Weinan Public Security Bureau, Yulin Public Security Bureau, Hanzhong Public Security Bureau)
    3. Harbin Public Security Bureau
    4. Hubei Provincial Public Security Bureau (Hubei Fire Brigade, Hubei Forest Public Security Administration Brigade, Hubei High Speed Administration Brigade, Jingmen Public Security Bureau, Yichang Public Security Bureau,)
    5. Shanxi Public Security Department
    6. Qinghai Public Security Department
    7. Gansu Longnan Public Security Bureau
    8. Henan Public Security Department

    9. Tianjin Public Security Bureau

    10. Hebei Public Security Department

    8. X3 Mobile Police Tablet Application Business System
    & Oslash; Information Browsing on Public Security Network
    & Oslash; Cooperative Office
    & Oslash; Office OA System
    & Oslash; Police Integration Platform
    & Oslash; Comprehensive Survey Platform
    & Oslash; Information Platform

    & Oslash; Fire Integrated Business Platform

    Hebei General Agent: Hebei Tongjun Network Technology Co., Ltd.

    Liu Xiaolong: 17710880860Recruitment of agents from cities and municipalities at all levels in Hebei Province