Electronic evidence consolidation method and system, and equipment

A technology of electronic evidence and solidification method, which is applied in transmission systems, electrical components, user identity/authority verification, etc., and can solve the problems of fragile electronic evidence, difficulty in reviewing authenticity, and beyond recognition

Inactive Publication Date: 2018-01-30
国信嘉宁数据技术有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes electronic evidence extremely vulnerable to external damage in the process of storage, transmission and use, making it tampered beyond recognition or even dis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic evidence consolidation method and system, and equipment
  • Electronic evidence consolidation method and system, and equipment
  • Electronic evidence consolidation method and system, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] Embodiment 1 of the present invention provides a method for curing electronic evidence, the process of which is as follows figure 1 shown, including the following steps:

[0086] Step S101: the evidence collection client obtains electronic evidence files.

[0087] The evidence collection client starts the evidence collection process according to the user's evidence collection instructions; according to the evidence collection method selected by the user, it uses screen recording or screenshots to obtain the electronic evidence files requested by the user.

[0088] Documents, pictures, audio and video, digital certificates, computer programs and other electronic files, information published on web platforms such as web pages, blogs, microblogs, circle of friends, post bars, and online disks, user registration information, identity authentication information, electronic transaction records, communications Records, login logs and other information, as well as communicatio...

Embodiment 2

[0176] Embodiment 2 of the present invention provides a specific implementation process of the electronic evidence curing method, the flow of which is as follows Figure 5 shown, including the following steps:

[0177] Step S501: Start the evidence collection process.

[0178] The forensics client starts the forensics process after receiving the user's forensics instruction.

[0179] Optionally, the forensics client restarts the forensics process according to the instructions sent by the forensics server to resend the electronic evidence files after the electronic evidence files are deleted, until the number of times of re-acquisition exceeds the set threshold.

[0180] Step S502: Obtain electronic evidence files.

[0181] The forensics client collects electronic data according to the screen recording or screen capture method selected by the user, and at the same time collects the subject information, environmental information, process information, etc. that generate the ele...

Embodiment 3

[0199] Embodiment 3 of the present invention provides another specific implementation process of the electronic evidence curing method, the flow of which is as follows Figure 6 shown, including the following steps:

[0200] Step S601: the forensics client starts the forensics process.

[0201] Step S602: the evidence collection client obtains electronic evidence files.

[0202] Step S603: Divide the electronic evidence file into several small files.

[0203] The forensics client divides the obtained electronic evidence files into several small files according to the selected rules.

[0204] Step S604: Determine the hash value corresponding to each small file.

[0205] The forensics client uses the selected hash calculation method to calculate the hash value of each small file as the verification value of the corresponding small file. Wherein, the calculation method of the hash value may select the Secure Hash Algorithm (Secure Hash Algorithm, SHA1) algorithm, may select t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic evidence consolidation method and system, and equipment. The method comprises: an evidence obtaining client obtains an electronic evidence file according to a user instruction; the evidence obtaining client encrypts the obtained electronic evidence file to obtain encrypted uploading data; and when the time for evidence obtaining completion does not exceed setconsolidation uploading time, the encrypted uploading data are uploaded to an evidence obtaining server, so that the evidence obtaining server receives the encrypted electronic evidence file and stores a decrypted electronic evidence file. Therefore, the obtained electronic evidence file are uploaded correctly and the content is protected from being tampered, so that the data transmission correctness and reliability during the electronic evidence consolidation process are improved and the consolidated electronic evidence data are guaranteed to be true and effective.

Description

technical field [0001] The invention relates to the technical field of electronic evidence preservation, in particular to an electronic evidence curing method, system and equipment. Background technique [0002] There are great differences between electronic evidence and traditional legal evidence in terms of presentation, preservation and security. Electronic evidence is a product of electronic technology, which relies on computer technology, network technology, storage technology and other technologies to exist, and can exist in the form of text images, pictures, sounds, pictures, etc. and spread on the network. Electronic evidence is essentially a bunch of "0"s and "1s" processed according to coding rules. These coded data exist on media media in the form of sound, light, electricity, and magnetism, and are invisible objects that cannot be directly viewed. Invisible and intangible, only through specific equipment and technology can it be displayed as tangible content vis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
Inventor 徐茂兰甄诚
Owner 国信嘉宁数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products