1, narrowing the imbalance in economic development.
2, to formulate a policy on population mobility favorable to the development of the central and western regions
3, the development of the central and western regions need a larger amount of capital investment,
4, to formulate a policy on outward population mobility,
5, to formulate policies and laws reflecting the characteristics of China's population mobility
6, to formulate a preferential policy for the floating population,
7. Mobile population family planning regulations
Industry case study
Xi'an Qian'an Information Technology Co., Ltd. in the development of the "Mobile Population Management System Program," taking into account the differences between different industries, according to each industry specifically tailored to the launch of the "Car Rental Management System," "small hotels traveler management system," "unit visitor management system" and so on. Select more representative of the car rental and small hotels to do a little analysis of these two industries.
Car rental industry
Demand analysis As long as the presentation of identity cards, driver's licenses and other valid documents, pay a deposit can be driven to travel, go out and do business. Car rental industry as a new industry in recent years, because of its fast, convenient features are popular, but with the rapid development of the industry, accompanied by more and more security risks, due to the current public security departments of the car rental industry does not have an effective security management measures, the state has not introduced relevant legal policies, resulting in a number of car rental contract fraud crime, with a news report from January 2010 to May 2011, the car rental industry is the first time in the world that the car rental industry is the first time in the world that the car rental industry is the first time in the world that the car rental industry is the first time in the world. Between January 2010 and May 2011, the Fujian Provincial Procuratorate **** prosecution involving car rental contract fraud criminal cases 98 127 people, involving more than 30 million yuan. The vast majority of cases for the parties involved through forged documents to false identity leasing vehicles and other means of implementation, and presents a cross-regional roving crimes prominent, criminal organization and other characteristics. According to reports, the suspects often through the production and sale of false documents to provide the owner of a copy of ID card, frame number and other information, forged motor vehicle license and motor vehicle registration certificate, the leaser fictional vehicle owner, and then the identity of the owner of the leased car sold or pledged to others to borrow. Such as the defendant Zheng Mou, Zhang Mou through the forgery of identity cards, motor vehicle registration certificate, has implemented the contract crime 7, involving more than 1.3 million yuan. From the vehicle after the realization of the stolen money to go up to see, some for debt repayment, some for squandering, some for gambling, drug abuse and other crimes, there are used for the issuance of loan-sharking profit. Such as the defendant Xuemou, Huangmou has leased 58 cars for collateralized borrowing, for the issuance of loan sharks and so on. From the cause of the crime, the suspects are often for the financing of gambling or repayment of loan sharks, the implementation of fraud. Such as Zhaoan County People's Procuratorate prosecution of leasing car contract fraud case 6 9 people, 8 of whom have long been involved in gambling, in order to raise gambling funds to implement fraud. In addition, the suspects also took advantage of the loophole that local people can easily rent cars, and after renting cars locally, they drove them to foreign provinces and cities to sell or pledge them. The car was sold or pledged, some were pledged again, some by many people to replace each other, resulting in the investigation and evidence collection and recovery of stolen cars difficult. Prosecutors revealed that some of the cases investigated for the gang, members of a clear division of labor, mutual cooperation, some responsible for signing a car rental contract with the car rental company, some responsible for contacting the production of false documents, some responsible for contacting the pledgee to borrow money, some act as a guarantor, and some responsible for contacting the seller of the vehicle. Prosecutors on the case after analysis that the rental car to implement the contract fraud crime is more frequent, mainly related to four factors: car rental companies or individuals can not actually test, check the identity of the rental personnel, and can not charge a high amount of vehicle security deposit, the lack of effective property security measures; vehicle pledge borrowing procedures are simple, a lot of motor vehicle owners to mortgage borrowing only delivery of vehicles and motor vehicles Vehicle pledge loan procedures are simple, many motor vehicle owners to mortgage loans only deliver vehicles and motor vehicle license, registration certificate, and did not review the authenticity of the documents, some underground money changers specializing in the provision of automobile pledge loans; leasing industry in an unorganized manner to compete, some for the purpose of pulling customers to relax the lease conditions, simplify the leasing procedures to criminals to take advantage of the opportunity; automobile trading market is not standardized, resulting in fraud proceeds from the stolen car is easy to get off the hook. Analysis of the above situation, due to the rampant rental fraud leads to the car rental industry has become a high-risk industry, how to reduce the risk of the industry, has become an urgent problem to be solved. Functional analysis of the "car rental management system" is mainly for the car rental industry is currently facing the security problems proposed by a set of solutions, the main functions are described as follows: car rental business E forensics collection of car rental personnel ID card photos, rented vehicle license plate number, rental time; information sent to rent a car personnel ID card photos, rented vehicle license plate number contains the rental time, and other information wirelessly sent to the back office of the mobile management server; information comparison information to the back office The information will be sent wirelessly to the back-end server of mobile population management; Information comparison The information will be automatically analyzed after arriving at the back-end server, and then compared and analyzed with the original database, and the result will be displayed on the home page in the form of a list, and the alarm will be issued immediately when the fugitive suspects and other sensitive persons are found. Blacklist Management Any bad credit customer who has cheated rental behavior in the car rental company will be added to the blacklist, and the rental company can check whether the current user is in the blacklist through E-identify in the process of renting cars in the future, so as to effectively avoid repeated cheating. Bulletin Information Receive various bulletin information about the car rental industry issued by the public security department, and keep abreast of the safety information of this industry.
Traveler management in small hotels
Demand analysis Metropolitan hotels are the most popular places for foreigners to stay, most of the small hotels are cheaper and have simple facilities, and the registration procedures for travelers are even more simplified, which only requires an ID card and money to stay in the hotel, and small hotels do not have a security department at all, which makes them prone to gathering hobos and fugitives. The population of small hotels is very complex, and it is very likely that they will be stolen, or that they will disappear without paying enough for their stay. Often, when a case occurs, the hotel owner is often powerless to do anything about it, and the travelers' ID cards that they register with may be fake, which makes the work of the public security authorities very difficult. The Ministry of Public Security requires nationwide hotels and guest houses to carry out identity verification and management of travelers, but due to the limited manpower and funds of public security organs, the public security control of these small hotels can only take the form of regular spot checks or surprise inspections, due to the lack of small hotels with the necessary computer network equipment, the ID card presented by the lodger or renter when registering for hotel accommodation or leasing business registration. On-the-spot identification and registration, the district police station and then retrieve the registration book for manual entry into the population management query computer network, identification of the floating population, time lag, entry analysis workload is also very heavy, making it impossible to improve the industry's science and technology in a timely and effective preventive and cooperation with the public security industry security management of hotels. On the other hand, small hotels shoulder with the public security department to do a good job with the responsibility of mobile population management statistics, but many small hotel owners only care about the rent, the other does not care about, which gives the public security department in the future population census and public security management work to bring no change, may miss the opportunity to arrest the wanted criminals, and ultimately caused by the loss of the whole society. To summarize, small hotels urgently need to establish an information exchange platform with the public security organs, so that the public security organs can understand the basic situation of the people staying in the small hotels in time, and the small hotels can also receive all kinds of notices issued by the public security organs in the first time. Functional analysis of the "small hotel visitor management system" is mainly for small hotels are currently facing security risks and the lack of effective control of the public security department of the status quo put forward a set of solutions, the main functions are described as follows: Visitor registration E identification through the collection of traveler photo ID, check-in time; information sent to the traveler photo ID contains check-in time and other information wirelessly sent to the back-end server of the mobility of the population management; Information comparison Information comparison The information arrives at the back-end server and automatically analyzes the information on the elements of the documents, and then compares and analyzes the information with the original database, and the comparison results are displayed on the home page in the form of a list, so that sensitive persons such as fugitive suspects or missing persons are found and immediately reported to the police. Bulletin Information Receive various bulletin information about the small hotel industry issued by the public security department, and keep abreast of the security information of this industry.
Editorials
Xi'an Qian'an Information Technology Co., Ltd. is a high-tech enterprise approved by the Department of Industry and Information Technology of Shaanxi Province, with a registered capital of 1 million yuan, since the establishment of the company, the company's entire staff in all walks of life with the strong support of friends, and after hard work to develop, has been the formation of a foothold in Shaanxi, in-depth Northwest, to expand the country's strategic pattern. The company's core team of personnel are engaged in large and medium-sized information technology projects for a long time, focusing on the safety of various industry sectors, to accurately understand and meet the needs of customers as a traction, guided by technological innovation to enhance customer efficiency and safety as their responsibility to carry out a wide range of multi-faceted technical cooperation, and currently in the construction of health care information technology, security monitoring, circuit analysis, troubleshooting, virtual testing, analysis of potential access to the field of research, development and production has been in the domestic market. At present, our R&D and production in the field of medical informationization construction, security monitoring, circuit analysis, fault diagnosis, virtual testing, potential pathway analysis, etc. are at the advanced level in China. Main business system integration; computer hardware and software products in the field of technology development, technical consulting, technical services, technology transfer and sales; communications, electronic products, production, sales and services; computer network engineering; electronic communications engineering; network technology services, etc. The company's current main business are: graphic platforms and their derivatives, mainly used in the electronics, military industry, aerospace, electric power industry; public security industry, Informationization construction in the field of public security, military industry; Xi'an Qian'an Information Technology Co., Ltd. has set up a good corporate image in the society with strong financial strength, high-quality professionals and high-quality and efficient services, and has been generally trusted and praised by all walks of life and the majority of customers. The company's decision-making level's excellent foresight, all the staff's positive and enterprising spirit of dedication, and the support and love from all walks of life have made it achieve remarkable results in many fields: in the field of electric power, it has successfully implemented the primary map system and intelligent two-vote management system of all the power supply bureaus and transformer substations of the electric power system of Shaanxi Province, which has provided a strong technical support to the strong electric power grid; in the field of public security, it has successfully implemented the standardized information collection of the public security system that covers all the police stations of Shaanxi Province. In the field of public security, it has successfully implemented the standardized information collection system of the public security system covering all police stations in Shaanxi Province, which has greatly improved the work efficiency of the grass-roots public security personnel; in the field of military industry, it has developed and completed the graphical quantitative analysis system of electric circuits, and the simulator system of the system has been successfully applied to all the models of missile weapons; it has completed the development of the production management system of XX Industrial Group's MES and applied it, which has received good comments from the users, and it is expected to be popularized and used by the Group in the group this year; in the field of aerospace, it has completed the potential path analysis system of the X In the aerospace field, the completion of the X-type rocket control system potential pathway analysis system, filling the gaps in the country; The company was founded a year ago, in terms of intellectual property rights have also made some achievements, the main ones are: In August 2010, the company was recognized as a software enterprise (Shaan R-2010-0029) In August 2010, the company's nickel-iron alloy automatic dosage control system V3.0 registered as a software product (Shaan DGY-2010-0060) 6 copyrights 2010, the company's nickel-iron alloy automatic dosage control system V3.0 registered as a software product (Shaan DGY-2010- 0060) 0060) 6 copyrights In March 2010, the nickel-iron alloy automatic dosage control system V3.0 (2010SR024105) In August 2010, the protocol serial port debugging tool V2.0 (2010SR066838) In August 2010, the brainstorming mind map software V1.0 (2010SR066828) In April 2011, the graphical Circuit Quantitative Analysis Platform Software V1.0 April 2011, Potential Pathway Analysis Software V1.0 May 2011, Standardized Information Acquisition Software V1.0 Monograph: Theory and Application of Potential Problem Analysis for Complex Systems, Science Press, 2008.2 Patent: Automatic Monitoring and Recognition Device for Equipment Operation Status Based on Scene Recognition (200710122654.1) Patent: Patent: Intelligent Infrared Pipeline Monitoring Technology Based on Pattern Recognition (200712037721.6) Patent: Automatic Identification Algorithm of Potential Pathways Qualitative Analysis System of Potential Pathways Second Prize of Scientific and Technological Progress of the Ministry of Aeronautics and Astronautics Second Prize of Boundary Scanning Test System of Ultra-large Scale Integrated Circuits Third Prize of Scientific and Technological Progress of the Ministry of Aeronautics and Astronautics Third Prize of Scientific and Technological Progress of the Ministry of Aeronautics and Astronautics First-class prize of Space Ministry's Scientific and Technological Progress for Potential Problem Analysis and Maintenance Decision-making Support Platform