Supercharge Your Innovation With Domain-Expert AI Agents!

Method for decrypting WeChat encrypted data based on binary system

An encrypted data, binary technology, used in digital data protection, electrical digital data processing, instruments, etc.

Inactive Publication Date: 2016-06-15
MWH TECH LLC
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a method for decrypting WeChat encrypted data based on binary, which can effectively solve the problem of WeChat encrypted database files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for decrypting WeChat encrypted data based on binary system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples.

[0014] A method based on binary decryption of WeChat encrypted data, taking an Android phone as an example:

[0015] 101 Obtain the unique imei number and WeChat uid of the Android device, and calculate the key; 102 Make an image file of the Android device; 103 Use the WeChat encryption algorithm to encrypt the file identification to generate a unique and exclusive data feature; 104 Use the encrypted data feature to make in 102 In the free area of ​​the image file, retrieve the content consistent with the data characteristics produced by 103 and obtain its address, if there is, execute 105, if not, end; 105 uses the WeChat algorithm to decrypt the data encrypted by 103.

[0016] The specific method of 101 is as follows: You can directly obtain the uniqu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for decrypting WeChat encrypted data based on the binary system, and belongs to the field of electronic data evidence collection. The method comprises the following steps of 101 obtaining a unique exclusive imei number of the Android device and a WeChat uid, and calculating the secret key; 102 making a mirror image document of the Android device; 103 encrypting a file identification by means of a WeChat encryption algorithm, and generating a unique exclusive encrypted data characteristic; 104 searching the content which is consistent with the data characteristic generated in the step 103 in the clear area of the mirror image document made in the step 102 by means of the encrypted data characteristic, and obtaining the address of the content, if the content is found out, a step 105 needs to be executed, if the content is not found out, the steps are ended; and 105 decrypting data encrypted in the step 103 by means of the WeChat encryption algorithm. The method for decrypting WeChat encrypted data based on the binary system is advantaged in that the problem that the WeChat encrypted data cannot be decrypted is solved, and the method is a major breakthrough for electronic evidence collection work.

Description

technical field [0001] The invention relates to the field of electronic forensics, in particular to a method for decrypting WeChat encrypted data based on binary. Background technique [0002] With the continuous improvement and expansion of the service level and service types provided by mobile communication technology, mobile phones have increasingly become an indispensable contact tool in people's work and life. Not uncommon. Mobile phone forensics is an effective means of combating such crimes. Conceptually speaking, mobile phone forensics is to collect, preserve and analyze relevant electronic evidence from mobile phone SIM cards, mobile phone internal / external memory cards and mobile network operator databases, and finally obtain legally effective evidence that can be recognized by the court. process of evidence. [0003] At present, there are generally three types of criminal acts involving mobile phones: one is that mobile phones are used as communication tools du...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 黄旭赵飞朱星海张佳强
Owner MWH TECH LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More