Credible extraction method for digital evidence of Android

An extraction method and digital evidence technology, applied in the usage of multiple keys/algorithms, telephone communication, electrical components, etc., can solve problems such as illegal data acquisition, and achieve the effect of ensuring originality and non-repudiation

Active Publication Date: 2013-12-25
山东政信大数据科技有限责任公司
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, attackers can still bypass security access control by using technical means such as network proxy or broadcast m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible extraction method for digital evidence of Android
  • Credible extraction method for digital evidence of Android
  • Credible extraction method for digital evidence of Android

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. However, the examples given are not intended to limit the present invention.

[0023] like figure 1 As shown, the present invention provides a schematic flow diagram of a credible extraction method for Android-oriented digital evidence, including:

[0024] Step S1, extracting data from the mobile device, obtaining time stamp information and a unique device identification number;

[0025] Step S2, using data verification technology, applying HASH algorithm to the extracted data, time stamp information and unique device identification number to obtain a hash value, which is convenient for future data verification;

[0026] Step S3, using the DES symmetric encryption algorithm, using the shared key randomly generated by the forensics client to package an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a credible extraction method for digital evidence of Android. The credible extraction method comprises the following steps: step 1, data are extracted from a mobile device, and timestamp information and a unique device identification number are obtained; a data verification technology is used for acquiring a hash value of a result of the step 1; a DES symmetric encryption algorithm is adopted for packaging and encrypting the hash value, the data, the timestamp information and the unique device identification number through a shared key generated randomly by an evidence obtaining client-side; an RSA asymmetric cryptographic algorithm is adopted for encrypting the shared key through a public key distributed by an evidence obtaining server, and the encrypted shared key is sent to the evidence obtaining server; after the evidence obtaining server receives the data, a private key of an RSA algorithm is used for decryption to obtain the shared key, and the shared key is used for decryption to obtain the hash value and a data package; a HASH algorithm is applied to the data package to obtain a new hash value, and whether the two hash values are the same is judged through comparison. The credible extraction method for the digital evidence of Android can improve the originality and false accusation forbiddingness of the data.

Description

technical field [0001] The invention relates to the technical field of digital evidence collection, in particular to an Android-oriented trusted extraction method of digital evidence. Background technique [0002] Digital forensics technology includes electronic forensics, network forensics, computer forensics, etc. It is a technology and tool for collecting and discovering evidence from computers, mobile electronic devices and other related electronic devices. Its purpose is to investigate digital crimes related to digital technology, such as e-commerce fraud, intellectual property infringement, computer intrusion, etc., to effectively ensure the security of relevant information in digital devices such as computers, mobile phones, and communication networks, and to build an overall information security framework. , to prevent network security and other related attacks, and assist enterprises and judicial agencies to collect evidence of digital crimes. The present invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/14H04M1/725
Inventor 何泾沙刘公政万雪姣赵斌
Owner 山东政信大数据科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products