A data evidence tamper-proof method, device and system based on computer forensics
A computer forensics and anti-tampering technology, applied in the computer field, can solve the problems of poor applicability and poor convenience of data evidence anti-tampering scheme, and achieve the effect of reducing the possibility and ensuring data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.
[0065] refer to Figure 1-2 , an embodiment of the present application provides a method for preventing tampering of data evidence based on computer forensics, where the computer forensics is evidence for a hidden computer virus hidden in a real picture in a real space, including:
[0066]S1. The No. 1 blockchain node uses the preset visible light flash as the light source, so that the real picture in the real space is illuminated by visible light, and uses the preset visible light sensor to perform image acquisition and processing on the real picture, so as to obtain N...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com