Electronic data relation chain generation system and method based on social network data chain

An electronic data and social network technology, applied in digital data authentication, digital data protection, data processing applications, etc., can solve problems such as no way to start, data service providers can not clearly know, increase the amount of data processing, etc., to ensure independence , avoid illegal intrusion and data pollution, and ensure the effect of integrity

Active Publication Date: 2021-02-05
福建中锐电子科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, it has been found in practice that relying solely on forensic equipment cannot meet the data analysis requirements
On the one hand, more and more data are stored on mobile smart terminals. There are hundreds of thousands or even millions of WeChat chat records stored in a mobile phone. The evidence clues in the case are submerged in a large amount of invalid data. Key pieces of clues need to be quickly mined and retrieved through analysis software; on the other hand, if the data itself is incomplete (which is the most common case, as criminals usually delete information in time), the above existing technologies cannot be used ; Even if the judiciary often requires the data service provider to provide data, it usually directly submits the mobile phone itself to the data service provider, so that the data service provider cannot clearly know what kind of data the judiciary needs and how to legally provide the data. In addition, the relationship network of criminal suspects is intricate, and there are correlations between application data such as calls, text messages, instant messaging, Weibo, geographic information, and e-commerce on mobile smart terminals. How to solve complex relationships? Quickly locating the path of criminal clues in the network also requires the support of analysis software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic data relation chain generation system and method based on social network data chain
  • Electronic data relation chain generation system and method based on social network data chain
  • Electronic data relation chain generation system and method based on social network data chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In the following, the invention will be further described in conjunction with the accompanying drawings and specific embodiments.

[0052] see figure 1 , is a module architecture diagram of an electronic data relationship chain generation system based on a social network data chain according to an embodiment of the present invention.

[0053] figure 1 The electronic data relationship chain generating system based on the social network data chain of an embodiment of the present invention shown in an embodiment of the present invention includes the following components:

[0054] The judicial authentication terminal is used to generate a judicial authentication login signal, and the judicial authentication login signal is generated based on the suspect information of the mobile terminal involved in the case to be obtained;

[0055] The data timestamp authentication terminal is used to connect to a third-party independent timestamp authentication center, and is used to re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an electronic data relation chain generation system and method based on a social network data chain. The system comprises a judicial authentication terminal, a data timestamp authentication terminal, a data access device, a visualized engine and an application data server, wherein the judicial certification terminal is used for generating a judicial certification login signal; the data timestamp authentication terminal receives the authentication timestamp label; the data access device associates and then stores the authentication timestamp label and the acquired electronic data; and the visualized engine generates a visualized electronic data relation chain generated based on the social network data chain based on the electronic data information stored in the data access device. The method generates a visualized electronic data relationship chain map based on social network data of at least one mobile terminal. According to the technical scheme, an artificial intelligence technology, a knowledge graph technology and a data mining algorithm are applied, a suspect physical and virtual identity relation network is constructed, and case visualization is achievedfrom multiple dimensions such as time, space, social contact and capital.

Description

technical field [0001] The invention belongs to the technical field of electronic evidence processing, and in particular relates to a system and method for generating an electronic data relationship chain of a social network data chain. Background technique [0002] In the era of the Internet of Everything, mobile smart terminals and applications have become important carriers for committing crimes, and the electronic data in smart terminals and their applications has become an important source of evidence for the public security to crack cases. [0003] In recent years, with the popularization of mobile smart terminals and 4G networks, the world has entered the era of mobile Internet, and the Internet has become more and more developed, but cybercrime is becoming the "Sword of Damocles" of the Internet. Statistics show that 60% of online fraud originates from mobile devices, and of these 60% fraud, 80% originate from mobile applications. Once a cybercriminal gains access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/9536G06F16/9537G06F21/45G06F21/64G06Q50/00G06Q50/26
CPCG06F16/9536G06F16/9537G06F21/45G06F21/64G06Q50/01G06Q50/265G06F2221/2151
Inventor 郑友敏张丽君刘元生郑旭
Owner 福建中锐电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products