Method for implementing digital-forensics-oriented digital evidence supervision chain

A technology of digital evidence and implementation method, applied in the direction of digital data authentication, digital transmission system, user identity/authority verification, etc., can solve the problem of wrong time and location of digital evidence, and achieve the effect of improving efficiency

Active Publication Date: 2014-06-25
临沂城投思索信息技术有限公司
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem in the prior art that the time and place where the digital evidence error occurs cannot be uniquely located, the present invent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing digital-forensics-oriented digital evidence supervision chain
  • Method for implementing digital-forensics-oriented digital evidence supervision chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. However, the examples given are not intended to limit the present invention.

[0025] Such as figure 1 As shown, the present invention provides a schematic flow diagram of a method for implementing a digital-oriented digital evidence chain of custody, including:

[0026] S1, extracting data from the electronic device to obtain time stamp information and a unique device identification number.

[0027] S2, using the data verification technology, apply the Hash algorithm to the extracted data, time stamp information and unique device identification number, obtain the Hash value, and attach it to the extracted data packet.

[0028] S3, if there are multiple data sources, extract their timestamp information and chain of custody information, and arrange the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for implementing a digital-forensics-oriented digital evidence supervision chain. The method comprises the steps that first, timestamp information, a data package and an unique equipment identification number are extracted, then a Hash algorithm is used for encrypting to form calibration, so that data supervision chain information is formed, and when errors happen to digital evidence, backtracking is conducted according to the data supervision chain to find the time and place in which problems happen. According to the method, the timestamp information is added in the supervision chain information, the time of data changes is recorded, if a third party tampers or deletes the data and the like, the time can be recorded, meanwhile, the Hash algorithm is used for conducting signature validation on all the steps in the evidentiary process, and therefore the place where the errors happen to the digital evidence is effectively positioned. The problem that in the prior art, the time and the place in which the errors happen to the digital evidence can not be uniquely positioned is solved, and the efficiency of digital forensics work is improved.

Description

technical field [0001] The invention relates to the technical field of digital forensics, in particular to a method for realizing a chain of custody of digital evidence oriented to digital forensics, which effectively improves the efficiency of digital forensics by using a time stamp and a Hash algorithm to form a chain of custody. Background technique [0002] Digital forensics technology includes electronic forensics, network forensics, computer forensics, etc. It is a technology and tool for collecting and discovering evidence from computers, mobile electronic devices and other related electronic devices. Its purpose is to investigate digital crimes related to digital technology, such as e-commerce fraud, intellectual property infringement, computer intrusion, etc., to effectively ensure the security of relevant information in digital devices such as computers, mobile phones, and communication networks, and to build an overall information security framework. , to prevent ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G06F21/44H04L9/32
Inventor 何泾沙刘公政赵斌万雪姣黄娜
Owner 临沂城投思索信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products