Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model

A trusted network and model technology, applied in the field of web data forensics and reconnaissance, can solve problems such as loss of criminal evidence, fixed storage devices, and lack of applicability to different organizations, achieving a balance of sensitivity, good practicability, and high reliability. The effect of credit forensics services

Active Publication Date: 2014-12-10
HEFEI UNIV OF TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing host electronic forensics technology has great limitations: most of the methods are relatively targeted, lack of applicability to different organizations, etc.
It is difficult to fix the storag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
  • Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
  • Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In this embodiment, the feature of the three-layer trusted webpage forensics model in a trusted webpage forensics system based on the three-layer trusted webpage forensics model is that the webpage forensics process is designed into three layers, from bottom to top are network data layer, The content crawling layer and the screenshot forensics layer perform data acquisition at different levels, and cross-validate the stored evidence at different levels; at the same time, restore the original web pages from the acquired web page components and display them in the local browser shown in reality. The bottom network data layer is responsible for recording network communication data, which are all original binary; the content crawling layer is responsible for saving related webpage files; the screenshot forensics layer takes screenshots of crawled webpages and saves them as pictures. Such as Figure 4 As shown, through the three-layer forensics model of this system, the evi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted webpage forensics system and a trusted webpage forensics method based on a three-layer trusted webpage forensics model. The trusted webpage forensics system comprises an evidence obtaining server, an evidence storage server and an evidence presentation server. The evidence obtaining server is used for extracting and fixing evidences; the evidence storage server is used for storing the evidences; and the evidence presentation server is used for verifying reliability of the evidences and generating evidence files. The trusted webpage forensics system and the trusted webpage forensics method based on the three-layer trusted webpage forensics model can obtain and fix the evidences of webpage information, save the acquired evidences reliably and then generate forensic evidence files to assist in case detection.

Description

technical field [0001] The invention belongs to the field of electronic evidence collection, and in particular relates to a method for obtaining evidence and reconnaissance of web page data. Background technique [0002] At present, the existing electronic forensics technology mainly focuses on host electronic forensics, which belongs to the mainframe evidence acquisition technology: the safe acquisition technology of computer system files used to avoid damage and interference to the original medium, and the security of disk or other storage media. Damage-free backup technology, etc. Existing host electronic forensics technology has great limitations: most of the methods are relatively targeted and lack applicability to different organizations. In particular, there are the following problems when it is directly used to obtain evidence on Internet webpage content: [0003] 1. It is impossible to directly obtain the data storage medium of the Internet content provider. It i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/951G06F16/986
Inventor 胡东辉夏东冉李亚东樊玉琦吴信东
Owner HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products