Method for fixing and saving evidence of computer crime and device therefor

A computer and evidence technology, applied in computer security devices, computing, program control devices, etc., to achieve the effect of ensuring legality, reliability, and good compatibility

Inactive Publication Date: 2007-08-15
PEKING UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no complete set of computer crime evidence collection methods at home and abroad, and this field is a new thing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for fixing and saving evidence of computer crime and device therefor
  • Method for fixing and saving evidence of computer crime and device therefor
  • Method for fixing and saving evidence of computer crime and device therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The specific embodiment of the present invention will be described in detail below with reference to the accompanying drawings. FIG. 1 is a flow chart of the computer crime evidence fixing and preservation method of the present invention.

[0023] The method for fixing and preserving computer crime evidence of the present invention includes: step S10 of starting the suspect device: modifying the Bios setting of the suspect computer, so that the computer supports CD priority startup, and automatically guides the system to start the suspect computer; identity authentication step S20, by reading evidence Use the private key of the personnel, and encrypt a piece of data with the private key, and then use the public key of the forensic personnel built in the system to decrypt the content, compare the two sets of data obtained, if the two sets of data are the same, proceed to step S30, if The two sets of data are different, so exit the system. In addition, methods such as user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides one computer criminal evidence fix and ensuring method, which comprises the following steps: starting suspect devices to modify the suspect Bios set to primordially start the supportive disc; identification step to identify the person for electron evidence; recording device and operating information for evidence person, operation time and evidence medium; data images and property computing for property on the magnetic disc static memory medium for total images; crossly identifying according to fix result and process legality contract to ensure more than two legality evidence person on spot; printing the operation information and signature for final determination to fulfill electron signature and paper signature.

Description

technical field [0001] The present invention relates to a method for fixing and preserving computer crime evidence and a device for realizing the method, in particular to a method and realization of obtaining, fixing and preserving electronic evidence in various judicial disputes caused by the use of computers and networks and in the process of investigating computer crime Apparatus for the method. Background technique [0002] With the rapid development of information technology, computers and networks have become an important part of social, political, economic and cultural life, and are profoundly changing people's lives. At the same time, the dependence on information technology has also brought huge security risks to human society. There are more and more judicial disputes and computer crimes related to computers, which are becoming more and more prominent, and have a tendency to further expand. Sufficiently reliable and convincing electronic evidence has become an imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q50/00G06F21/00G06F9/445G06F21/31G06Q50/26
Inventor 唐勇韦韬高明张行功
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products