A data evidence tamper-proof method, device and system based on computer forensics

A computer forensics and anti-tampering technology, applied in the computer field, can solve the problems of poor applicability and poor convenience of data evidence anti-tampering scheme, and achieve the effect of reducing the possibility and ensuring data security

Active Publication Date: 2022-04-29
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this traditional computer forensics data evidence ant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data evidence tamper-proof method, device and system based on computer forensics
  • A data evidence tamper-proof method, device and system based on computer forensics
  • A data evidence tamper-proof method, device and system based on computer forensics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0065] refer to Figure 1-2 , an embodiment of the present application provides a method for preventing tampering of data evidence based on computer forensics, where the computer forensics is evidence for a hidden computer virus hidden in a real picture in a real space, including:

[0066]S1. The No. 1 blockchain node uses the preset visible light flash as the light source, so that the real picture in the real space is illuminated by visible light, and uses the preset visible light sensor to perform image acquisition and processing on the real picture, so as to obtain N...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a method, device and system for anti-tampering of data evidence based on computer forensics, including: No. 1 blockchain node uses a visible light flash as a light source to collect and process images to obtain No. 1 image; perform hash calculation to obtain The first hash value; the second block chain node uses ultraviolet flashlight as the light source, and performs image acquisition and processing to obtain the second image; performs hash calculation to obtain the second hash value; the third block chain node uses visible light flashlight and The ultraviolet flash lamp is used as a light source to perform image acquisition and processing to obtain the No. 3 image; perform hash calculation to obtain the third hash value; the No. 1 block chain node obtains the first ciphertext and stores it in the first block chain; The No. 2 block chain node obtains the second ciphertext and stores it in the second block chain; the No. 3 block chain node obtains the third ciphertext and stores it in the third block chain. In this way, the data security of computer forensics is guaranteed, and the possibility of being tampered with is reduced.

Description

technical field [0001] The present application relates to the field of computers, in particular to a method, device and system for preventing tampering of data evidence based on computer forensics. Background technique [0002] Computer forensics can use computer identification and analysis technology to distinguish the content of the records generated during the operation of the computer system to prove the facts of the case. For example, it can be used for forensics of computer viruses. In order to ensure the validity of the evidence, it is necessary to prevent the data of computer forensics from being tampered with. The traditional computer forensics data evidence anti-tampering scheme generally stores the computer forensics data evidence in a physical storage medium that is disconnected from the network. However, this traditional computer forensics data evidence tamper-proof solution is poor in convenience and applicability. SUMMARY OF THE INVENTION [0003] The pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64G06F21/56G06F21/60
CPCG06F21/64G06F21/56G06F21/602
Inventor 杨航明哲毕凯峰张佳发陈华军张华兵王健母天石李慧娟邓子杰李昳周磊付志博黄海英刘家豪叶思斯
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products