Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A reliability verification method, device and system based on computer forensics

A technology of computer forensics and verification methods, which is applied in the field of reliability verification of computer forensics, and can solve problems such as inability to complete hidden computer viruses

Active Publication Date: 2022-04-22
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional computer forensics and reliability verification schemes for computer forensics can only deal with overt computer viruses, but cannot complete the detection of hidden computer viruses (hidden computer viruses refer to the codes of computer viruses that are not directly stored in the computer). , but such as hidden in the real space) forensic reliability verification of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A reliability verification method, device and system based on computer forensics
  • A reliability verification method, device and system based on computer forensics
  • A reliability verification method, device and system based on computer forensics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0054] refer to Figure 1-2 , the embodiment of the present application provides a reliability verification method based on computer forensics, the computer forensics is the forensics of hidden computer viruses, including:

[0055] S1. Obtain hidden computer viruses, image recognition models and coding rules obtained from computer forensics;

[0056] S2. Turn on the preset visible light generator, so that the visible light is irradiated on the real picture frame existing in the real space; wherein the real picture frame has a real portrait; wherein, the real picture is com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a reliability verification method, device and system for computer forensics, which obtains hidden computer viruses, image recognition models and coding rules; irradiates visible light on the real picture frame; conducts the first image collection and processing, and obtains the second One image, to obtain the first image recognition result; carry out the first encoding process to obtain the first code; irradiate the ultraviolet light and visible light on the real picture frame at the same time; carry out the second image acquisition process to obtain the second image, and obtain the second Image recognition result; obtain the second code; make the real picture frame only be irradiated by ultraviolet rays; perform the third image acquisition process to obtain the third image and obtain the third image recognition result; perform the third encoding process to obtain the third code; Integrate into the total code, and calculate the similarity value; if the similarity value is greater than the similarity threshold, it is determined that the computer forensics is reliable. Therefore, the reliability verification of forensics for hidden computer viruses is realized.

Description

technical field [0001] This application relates to the field of computers, in particular to a reliability verification method, device and system for computer forensics. Background technique [0002] Computer forensics refers to the use of computer identification and analysis technology to distinguish the contents of the records generated during the operation of the computer system to prove the facts of the case. It can be applied to the forensics of computer viruses, and it also needs to be able to verify the reliability. However, traditional computer forensics and reliability verification schemes for computer forensics can only deal with overt computer viruses, but cannot complete the detection of hidden computer viruses (hidden computer viruses refer to the codes of computer viruses that are not directly stored in the computer). , but the reliability verification of forensics such as hidden in the real space). Contents of the invention [0003] This application propose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F21/56
Inventor 樊凯明哲毕凯峰张佳发陈华军张华兵王健母天石李慧娟邓子杰付志博黄海英李昳周磊刘家豪叶思斯
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products