Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wechat evidence-taking method and system based on data collision

A data collision, WeChat technology, applied in the direction of digital transmission system, transmission system, digital data protection, etc., can solve the problems of unrecognized, unable to obtain and analyze UID, unable to analyze and collect WeChat data, and achieve convenient decryption and high security. Effect

Active Publication Date: 2017-05-31
兰州中和科技有限责任公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the user UID is not known or the same mobile phone logs in multiple WeChat accounts, the UID cannot be obtained and analyzed, or the WeChat user UID corresponding to the local file cannot be identified, and thus the WeChat data cannot be analyzed and collected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wechat evidence-taking method and system based on data collision
  • Wechat evidence-taking method and system based on data collision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] Embodiment 1. A WeChat forensics method based on data collision. The following will combine figure 1 A WeChat forensics method based on data collision in this embodiment is introduced in detail.

[0016] Such as figure 1 As shown, a WeChat forensics method based on data collision includes the following steps:

[0017] Step 1: Create a collision database, encrypt the UID of the user's WeChat ID, and store the first encrypted character string obtained after encryption as a local file directory name in the collision database;

[0018] Step 2: Query the directory name of the local file to be evidenced in the collision database, and obtain the UID corresponding to the directory name of the local file to be evidenced;

[0019] Step 3: Generate an AES decryption key according to the obtained user's WeChat code UID, and use the AES decryption key to decrypt the encrypted file of WeChat to complete WeChat evidence collection.

[0020] In this embodiment, in the step 1, the s...

Embodiment 2

[0042] Embodiment 2. A WeChat forensics system based on data collision. The following will combine figure 2 A WeChat forensics system based on data collision in this embodiment is introduced in detail.

[0043] Such as figure 2 As shown, a WeChat forensics system based on data collision includes a creation module, an encryption module, a query module and a decryption module. The creation module is used to create a collision database; the encryption module is used for user micro-signal code UID to encrypt, and the first encrypted character string obtained after encryption is stored in the collision database as a local file directory name; the query The module is used to inquire about the local file directory name to be obtained in the collision database, and obtains the user micro-signal code UID corresponding to the local file directory name to be obtained; the decryption module is used to generate an AES decryption key according to the obtained user micro-signal code UID ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wechat evidence-taking method and system based on data collision. The method comprises the following steps: creating a collision database, encrypting a user wechat number UID, and storing the first encrypted character string obtained after encryption in the collision database as a local file directory name; querying a to-be-taken local file directory name from the collision database and acquiring the corresponding user wechat number UID; generating an AES decryption secret key according to the acquired user wechat number UID, and decrypting the encrypted file of the wechat through the AES decrypting secret key to finish the wechat evidence-taking. A mapping relation of the user local data and the user wechat number UID is completely established through the collision database by use of the relevance between the local data and the user UID of the wechat, the wechat evidence-taking can be realized by conveniently decrypting the encrypted file of the wechat; the wechat number UID of each user can be accurately acquired when multiple wechat accounts login at the same time, the specific decryption is performed, and the security is extremely high.

Description

technical field [0001] The present invention relates to the technical field of data encryption and decryption, in particular to a WeChat evidence collection method and system based on data collision. Background technique [0002] The traditional mobile phone forensic analysis system decrypts the extracted WeChat local files, obtains the WeChat user UID by analyzing the fields of the cached files, and then transforms the UID to obtain the decryption key to achieve decryption. However, when the user UID is not known or the same mobile phone logs in multiple WeChat accounts, the UID cannot be obtained and analyzed, or the WeChat user UID corresponding to the local file cannot be identified, and thus the WeChat data cannot be analyzed and collected. In order to overcome the above-mentioned technical defects, it is necessary to establish a mapping relationship between the user's local data and the user data information in the server database, so as to facilitate the completion of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06G06F21/62
CPCG06F21/6218H04L9/0631H04L9/0866
Inventor 操家庆桂坤
Owner 兰州中和科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products