Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and a device for judging the reliability of a file timestamp

A judging method and time stamping technology, applied in the direction of file system, file system function, digital data protection, etc., to achieve the effect of improving reliability and facilitating detection

Active Publication Date: 2019-02-26
XIAMEN MEIYA PICO INFORMATION
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As for the latter, that is, the situation where the timestamp information of the file is directly tampered with, there is currently no effective determination method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a device for judging the reliability of a file timestamp
  • A method and a device for judging the reliability of a file timestamp
  • A method and a device for judging the reliability of a file timestamp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0031] Generally speaking, the time precision of the file system is much higher than the second. It is considered that the modified timestamp has a relatively low precision, and in most cases it can only reach the second. Assuming that the precision of a file system timestamp is m seconds, m is usually much smaller than 1, and the probability that the decimal record value of the file timestamp is a whole second is That is to say, in most cases, there will not be too many zeros at the end of the time stamp, and if the number of zeros at the end of the time stamp exceeds a certain threshold, it can be determined that the time stamp of the file to be determined is not credible.

[0032] Such as figure 1 Shown is a schematic diagram of a method fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for judging the reliability of a timestamp of a document, which relate to the field of electronic data forensics identification. The method comprises thefollowing steps of: acquiring a timestamp recorded by a file to be judged in a file system, and converting the timestamp into a decimal system; determining the number of last zeros of the timestamp asN; when the N) = preset threshold value n, it is judged that the timestamp of the file to be judged is not trustworthy. The technical proposal of the invention can effectively judge whether the timestamp information of the file is tampered with, can conveniently detect a large number of files, improves the reliability of the electronic data of the file, and fills the blank of the timestamp trustworthiness judging method of the file.

Description

technical field [0001] The invention relates to the field of electronic data evidence collection and appraisal, in particular to a method and device for judging the credibility of a file time stamp. Background technique [0002] The issue of time is one of the core issues of electronic data forensics, and it is also the basis of all identification and analysis. Once the time cannot be accurately determined, the credibility of the research and judgment results will be compromised or even completely lost. There are two main ways to tamper with the time, one is to modify the system time, resulting in a passive error in the time recorded in the file; the other is to directly tamper with the timestamp information of the file. [0003] At present, judging whether the operating system time is credible (possibly tampered with) is mainly judged through the event log of the operating system. As for the latter, that is, the situation of directly tampering with the timestamp informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/17G06F21/64
CPCG06F21/64
Inventor 胡壮赵庸仲丽华卢建斌
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products