Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reliability verification method, device and system based on computer forensics

A technology of computer forensics and verification methods, which is applied in the field of reliability verification of computer forensics, and can solve problems such as inability to complete hidden computer viruses

Active Publication Date: 2021-04-16
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional computer forensics and reliability verification schemes for computer forensics can only deal with overt computer viruses, but cannot complete the detection of hidden computer viruses (hidden computer viruses refer to the codes of computer viruses that are not directly stored in the computer). , but such as hidden in the real space) forensic reliability verification of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reliability verification method, device and system based on computer forensics
  • Reliability verification method, device and system based on computer forensics
  • Reliability verification method, device and system based on computer forensics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0054] refer to Figure 1-2 , the embodiment of the present application provides a reliability verification method based on computer forensics, the computer forensics is the forensics of hidden computer viruses, including:

[0055] S1. Obtain hidden computer viruses, image recognition models and coding rules obtained from computer forensics;

[0056] S2. Turn on the preset visible light generator, so that the visible light is irradiated on the real picture frame existing in the real space; wherein the real picture frame has a real portrait; wherein, the real picture is com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reliability verification method, a device and a system based on computer forensics. The method comprises the steps of obtaining hidden computer viruses, an image recognition model and a coding rule; enabling visible light to irradiate a real picture frame; performing first image acquisition processing to obtain a first image, and obtaining a first image recognition result; performing first encoding processing to obtain a first code; enabling ultraviolet rays and visible light to irradiate the real picture frame at the same time; performing second image acquisition processing to obtain a second image, and obtaining a second image recognition result; obtaining a second code; enabling the real picture frame to be only irradiated by ultraviolet rays; performing third image acquisition processing to obtain a third image, and obtaining a third image recognition result; performing third encoding processing to obtain a third code; integrating into a total code, and calculating a similarity value; and if the similarity value is greater than the similarity threshold, judging that the computer evidence obtaining is reliable. Therefore, the reliability verification of evidence obtaining of the hidden computer viruses is realized.

Description

technical field [0001] This application relates to the field of computers, in particular to a reliability verification method, device and system for computer forensics. Background technique [0002] Computer forensics refers to the use of computer identification and analysis technology to distinguish the contents of the records generated during the operation of the computer system to prove the facts of the case. It can be applied to the forensics of computer viruses, and it also needs to be able to verify the reliability. However, traditional computer forensics and reliability verification schemes for computer forensics can only deal with overt computer viruses, but cannot complete the detection of hidden computer viruses (hidden computer viruses refer to the codes of computer viruses that are not directly stored in the computer). , but the reliability verification of forensics such as hidden in the real space). Contents of the invention [0003] This application propose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06F21/56
Inventor 樊凯明哲毕凯峰张佳发陈华军张华兵王健母天石李慧娟邓子杰付志博黄海英李昳周磊刘家豪叶思斯
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products