Method for acquiring evidence using wireless terminal and server
A wireless terminal and server technology, applied in wireless communication, user identity/authority verification, radio/induction link selection and arrangement, etc., can solve the problem of poor stability, difficult to become a strong evidence identification program, and the text of short messages is easy to be modified and other problems, to achieve the effect of improving authenticity, not easy to modify, improving stability and authenticity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] For example, a possible application scenario (used to strengthen the understanding of this technology):
[0045] The user of the 3G mobile phone with this function was attacked, and immediately recorded a DV of the suspect's attack with the mobile phone. At the same time, because the mobile phone contains a GPS receiving chip (if not, the communication network can also provide the corresponding approximate location and time), Therefore, the mobile phone can obtain the information of the location and the time information. When the mobile phone shoots a DV, it automatically integrates the latitude and longitude information and time information of the shooting location into the recorded DV through a certain encryption algorithm, even if the DV is exported to the PC. In addition, it is difficult to modify the DV taken during this period, and, according to the settings of the owner, the mobile phone also transmits these data to the server in real time through the 3G high-spee...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 