All Rights Reserved: JusticeExperts.com Logical Process to a Physical Design Implementing Criminal...
-
date post
21-Dec-2015 -
Category
Documents
-
view
218 -
download
0
Transcript of All Rights Reserved: JusticeExperts.com Logical Process to a Physical Design Implementing Criminal...
All Rights Reserved: JusticeExperts.com
Logical Process to a Physical Design
Implementing Criminal Justice Technologies in the 21st Century
All Rights Reserved: JusticeExperts.com
Data(What)
Function(How)
Network(Where)
People(Who)
Time(When)
Motivation (Why)
Objectives/Scope
List of things important to the enterprise
List of processes the enterprise performs
List of locations where the enterprise operates
List of organizational units
List of business events/cycles
List of business goals/strategies
Conceptual
(Owners’ View)
Entity relationship diagram
Business process model
Logistics network
Organization chart with roles, skill sets, security issues
Business master schedule
Business rules
Logical
(Architect’s View)
Data model Essential data flow diagram; application architecture
Distributed system architecture
Human interaction architecture (roles, data, access), security requirements
Dependency diagram, entity life history (process structure)
Business rule model
Physical
(Designer’s View)
Data architecture (tables and columns); map to legacy data
System design
System architecture (hardware, software types)
User interface (how the system will behave), security design
“control flow” diagram
Business rule design
Build & Implement(Programmer’s View)
Data design, physical storage design
Detailed Program Design
Network Architecture
Screens, security architecture (who can see what?)
Timing definitions
Rule specification in program logic
Functioning System
Converted data Executable programs
Communications facilities
Trained people, using the system
Business events
Enforced rules
T
E
C
H
N
O
L
O
G
Y
All Rights Reserved: JusticeExperts.com
• Logical Design means constructing a high-level solution to a broad and complex problem.
• In response, a vendor will respond with a proposal to design and deploy a “physical” suite of tools and services (integration suite).
Logical Technology Design
All Rights Reserved: JusticeExperts.com
InternalRequirements
ConceptualVision
RealizedVision
ExternalRequirements
EmergingTechnologies
Choices
BPR
Costs &Changes
ExistingTechnologies
Impacts
DesignDecision
Test/AdjustGoals/Objectives
All Rights Reserved: JusticeExperts.com
DesignDesign
EmergingStandards
InternalRequirements
ExternalRequirements
All Rights Reserved: JusticeExperts.com
DesignDesign
EmergingStandards
InternalRequirements
ExternalRequirements
Business Process Requirements:
Multiple-domains of enterpriseConflicting objectivesAntiquated manual processesMissing data/data integrityDisparate readiness for automation
Logical Design:
• SEARCH Exchange Model (JIEM)• Logical Data Model • Logical Technology Requirements:
- Distributed n-Tier Hub and Spoke Design- Web Services (WSDL)- Message Oriented Middleware (CORBA, RMI, IIOP, JMS)
• HTML,XML,XHTML,XACML,XBML,ebXML
Conceptual Design:
Vision/Goals/ObjectivesBusiness Process ModelsData ModelsTechnology Models
Push-Pull-Publish-Query-Subscribe
All Rights Reserved: JusticeExperts.com
DesignDesign
EmergingStandards
InternalRequirements
ExternalRequirements
•National Reporting Requirements: NCSC, NCIC, UCR, NIBRS
•National Standards Requirements: ebXML, ISO 1-1179, NIST, OASIS, EFTS
•Data Practices and Policy
•Federal Standards Models: NASCIO, GLOBAL
•Federal Intelligence Reporting: DHS/FBI
•Community Right to Know
All Rights Reserved: JusticeExperts.com
DesignDesign
InternalRequirements
ExternalRequirements
Open Architecture (non-proprietary)
HTTPTCP/IP
JavaJ2EE.NETC#
WSDLUDDI
XML/XSLT/XPath
EmergingStandards
All Rights Reserved: JusticeExperts.com
Usability Scalability
Auditing
Interoperability Maintainability
Availability
Reliability Integrity
Security
Flexibility
EfficiencyPerformance
Event Logging
All Rights Reserved: JusticeExperts.com
Security
Usability
Flexibility
Auditing
Scalability
Interoperability
Efficiency
Availability
Reliability
Performance
Maintainability
Integrity
Event Logging
All Rights Reserved: JusticeExperts.com
Evolving ArchitectureEvolving Architecture
Goals
Objectives
LogicalDesign
New BusinessFunctions
CurrentEA/SOAPlatform
ReadyBusiness Needs
Analysis
Alternative 1Alternative 1
Alternative 3Alternative 3
AlternativeAlternative 22EvolvedEA/SOAModel
CHOOSE
New As-is-Built
Migration Plan/Strategy
All Rights Reserved: JusticeExperts.com
CountyCountyRegionRegion CountyCounty
CountyCountyRegionRegion
RegionRegionStateState
SystemsSystems
XMLXML
XMLXMLXMLXML
XMLXML
XMLXML
ICJIS Integration SuiteICJIS Integration Suite
Middleware and Web Services
• Individual
• Incident
• Case
• Rules
• XML
• RegistryIndex
Internet
All Rights Reserved: JusticeExperts.com
CorrectionsCorrectionsLELE ProbationProbation
CourtsCourtsDADA
DefenseDefenseStateState
SystemsSystems
XMLXML
XMLXMLXMLXML
XMLXML
XMLXML
ICJIS Integration SuiteICJIS Integration Suite
Middleware and Web Services
• Individual
• Incident
• Case
• Rules
• XML
• RegistryIndex
Internet
All Rights Reserved: JusticeExperts.com
CJ Technology Model
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
Rules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Index ServicesRegistry Services
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepositoryICJIS Integration Suite
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
1. Registration – links key documents in different systems
2. Publish – allows agencies to provide data on the backbone in addition to their own systems
3. Subscription – proactive notification of events
4. Query – ability to find individuals, cases and events in attached systems
5. Messaging – standard means of communication among systems
6. Rules-Based Workflow – conditions to be used for processing and workflow
7. Linkages – addt’l functions designed to aid the system and users in accessing and searching through linked data
ICJIS is defined by the following functionality:
All Rights Reserved: JusticeExperts.com
Benefits•Links related law enforcement documents together, reducing the chance of records going into “suspense”
•Links all records of a given individual together, regardless of names or aliases used, where that individual’s identity can be verified using biometrics.
•Links an individual to all associated criminal justice records on that individual, bridging Law Enforcement and the Judiciary.
Example•An investigator knows a specific criminal justice agency and the associated RMS case number in that agency - they then automatically receive links to the following associated documents:
•The incident report•Any available property and inventory reports•Criminal complaints associated with that incident•Search warrants•Arrest warrants•Arrest reports, etc….
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
Rules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
ICJIS Integration Suite XML
Repository
Index ServicesRegistry Services
All Rights Reserved: JusticeExperts.com
Benefits
• Increases query speed• Removes need to directly access end systems
Example
• An officer wishes to search for an individual at 2:00 AM, but many major systems are offline or temporarily unavailable. The published index of data informs the officer that the individual has been involved in 15 prior incidents, has 3 separate court disposition documents and is flagged as currently on probation.
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
Rules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepository
Index ServicesRegistry Services
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
Benefits
• Automated notification as an event occurs – no need to continuously search for new events
Example
• A probation officer is instantaneously notified when one of their probationers is involved in an incident.
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
SubscriptionRules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepository
Index ServicesRegistry Services
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
Benefits
• Provides a means for investigators, law enforcement and other criminal justice personnel to find records on individuals, incidents or cases, regardless of which Criminal Justice county, office or system they are stored.
• Compiles all the data into a single location for ease of selection, comparison and use.
Example
• An investigator wishes to find all individuals, stored in any system in any county in the state, that are Caucasian, between the ages of 25 and 30 , between 5’10” and 6’ tall and that have a unique tattoo on their left forearm.
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
Rules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepository
Index ServicesRegistry Services
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
Benefits
• Provides a complete communicate infrastructure between Justice Info systems.
• Enables different Criminal Justice systems to communicate, regardless of platform or software.
Example
• County attorneys create a criminal complaint request. Instead of printing and providing this request to the Courts, the Integration Suite sends a “message” with this document directly to the Courts, allowing them to avoid the need to re-key crucial data.
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
WorkflowRules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepository
Index ServicesRegistry Services
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
Benefits
• Allows almost an infinite variety of actions to be performed on data used in the Backbone.
• Allows new actions to be defined easily to route documents between systems, extract information or perform detailed analyses.
Example• A rule is created to automatically check for the existence of biometrics and
additional incident information on an individual as that individual appears in court. This automatically provides to the judge or court admin the following:
1. A complete criminal history of the individual appearing2. A notification of the lack of existing biometrics on that individual if
required3. A provision of existing biometrics on the individual summoned to
court to compare to the individual actually appearing
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
WorkflowRules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepository
Index ServicesRegistry Services
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
Benefits• Allows users to “walk” through the links between documents and data in
the criminal justice system, regardless of the county, office or system in which they are stored.
• Provides a quick means to search for additional incidents involving an individual’s aliases.
• Provides a quick means to find more detail on all the incidents an individual has been involved in
Example• A crime occurs involving 2 individuals. One is apprehended, but only a
description of the other individual’s height, weight, race and gender has been determined. An investigator searches for records on the apprehended individual. Once found, it is determined that the individual was involved in a similar incident earlier. The investigator then Searches Linkages to incident and “drills down”, finding links to 3 other individuals involved in the crime. Continuing to Search Linkages, the investigator then links to the 3 other individuals, finding one with a description matching the missing suspect. That detailed record then provides the investigator with key contact information with which to find the suspect.
All Rights Reserved: JusticeExperts.com
SecurityRules
Operating System
Hardware
Application Services Web Services Messaging Services Data Services
Workflow Services
Event ParserEvent Processor
Event Rules
UserInfo
WorkflowRules
RegistryData
Subscription Services
Subscription EngineMonitor & MatchingNotification Service
Distributed RequestServices
Request ProcessorDispatcher/Collator
UI Services
Index
Logs
Directory ServicesSecurity FilteringLogging/Auditing
Configuration
Adapter Services
Network InterfaceTransformation Service
Source Interface
XMLRepository
Index ServicesRegistry Services
ICJIS Integration Suite
All Rights Reserved: JusticeExperts.com
All Rights Reserved: JusticeExperts.com
LocalPublishing
Arm & Registry
PolicyDecision
Point
Local PolicyEnforcement Point
All Rights Reserved: JusticeExperts.com
Central PDP Central Registry Central UDDI
All Rights Reserved: JusticeExperts.com
AuthID
Vetted Agency - User
Central PDP Metadata Registry Central UDDISAML Registry
All Rights Reserved: JusticeExperts.com
Central PDP Central UDDI
AuthID
Vetted Agency - User
Metadata RegistrySAML Registry
All Rights Reserved: JusticeExperts.com
Central PDP Central UDDI
AuthID
Vetted Agency - User
Metadata RegistrySAML Registry
DataDiscovery Server
All Rights Reserved: JusticeExperts.com
DataExchange Server
Central PDP
Central UDDIMetadata Registry
SAML Registry
DataDiscovery Server
Query Engine
DataDiscovery User Interface
Cro
ssflo U
ser A
ccess
AuthID
Vetted Agency - User
1
2
3
3
4