Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

71 results about "Digital evidence" patented technology

Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence is relevant, whether it is authentic, if it is hearsay and whether a copy is acceptable or the original is required.

Digital evidence storage platform and evidence storage method based on block chain

ActiveCN110912937AAvoid single point of failure problemsSolve the problem of SQL syntax that does not support relational databasesUser identity/authority verificationDistributed File SystemSoftware engineering
The invention provides a digital evidence storage platform based on a block chain. In the platform, a server performs hash operation on a file in response to a request of submitting an electronic format file by a client to obtain a hash value corresponding to the file; the server performs information interaction with the distributed file system, names the file with a corresponding hash value, stores the file and acquires a storage ID of the file; the server performs information interaction with the blockchain network, and submits the hash value, the storage ID and the file creation informationcorresponding to the file to the blockchain network; the blockchain network successfully stores transaction data through the smart contract after consensus and packages the transaction data into blocks, and then returns successfully stored block transaction ID values to the server; and the server locally stores the submitted file and the hash value, the storage ID and the transaction ID corresponding to the file, and returns the storage state information of the file to the client. The authenticity and reliability of the data can be ensured.
Owner:HANGZHOU INST OF ADVANCED TECH CHINESE ACAD OF SCI

Array honey pot cooperative control method based on block chain

The invention relates to an array honey pot cooperative control method based on a block chain. The method comprises the following steps: constructing a private chain by using an Ethereum platform, andrealizing de-centralized cooperative operation thought of a honey pot host cluster through a mining way; constructing a topological structure consistent with the Ethereum platform starting from a P2Pnetworking model, and realizing the communication through web3J. Each host in the array executes the mining, the host acquiring an accounting charging right can holds the post of a honey pot serviceconversion task at one periodic time, conversion information is sent through an encryption mechanism, and other host receives and executes the corresponding conversion instruction. Furthermore, external port request access data is stored in the block chain by using the tamper resistance of the block chain information, thereby obtaining the digital evidence for implementing the attack by an attacker. Through the method disclosed by the invention, the cooperative operation of the array honey pot host cluster is guaranteed, thereby trapping the attacker by using the true-false service in dynamicconversion, and the network security active defense aim is realized.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Cross-chain anchored block chain heterogeneous system

The invention relates to the technical field of block chains, and discloses a cross-chain anchored block chain heterogeneous system. The system comprises a block chain anchoring chain and at least oneblock chain service chain, the blockchain service chain transmits and stores the evidence on a blockchain anchoring chain by creating a digital evidence for proving that the activity and data of theblockchain service chain cannot be tampered so as to complete evidence storage anchoring; wherein the blockchain anchoring chain uses a first consensus mechanism with high safety and high credibilityto perform consensus, and the consensus mechanism adopted by the blockchain service chain can be different from the first consensus mechanism. The consensus mechanism different from the anchoring chain is adopted in the blockchain service chain, so that each blockchain service chain selects a proper consensus mechanism according to own conditions, and the safety and credibility of the whole blockchain system are improved while each blockchain service chain maintains expandability and high operation efficiency. Evidence storage anchoring of credible evidences is completed, and meanwhile tampering invalidation of all transactions of a service chain is guaranteed.
Owner:成都九宽科技有限公司

Digital fingerprint system and method for piracy tracking and digital evidence obtaining

A digital fingerprint system used for piracy tracing and digital evidence-collecting comprises: a digital fingerprint generating module, a digital fingerprint storehouse, a digital fingerprint embedding module, a digital fingerprint blind-detection module, a digital fingerprint non-blind detection module and a digital evidence generating module; digital fingerprint method is that: (1) separately normally distributed Gauss signals are adopted as fingerprint signals to construct a digital fingerprint storehouse; (2) a spread spectrum embedding way is adopted to embed the fingerprints into an original copy, which generates a legal copy; (3) the legal copies are distributed and in the distribution process, the legal copies can experience a single copy illegal distribution or encounter a coalition attack, therefore a legal copy is formed; (4) the illegal copies are blindly detected to obtain a suspect copy in a lager scale; (5) the suspect copy obtained after being blindly detected is non-blindly detected; (6) the illegal copy and the original fingerprints obtained in procedure 3 and the coalition information obtained in procedure 5 are submitted as evidence to the court for trial. The digital fingerprint system has the advantages of higher detection efficiency and detection precision, thus can be widely applied in the tracing of multimedia content and piracy evidence-collecting.
Owner:BEIHANG UNIV

Regulation-violating behaviour evidence-obtaining system and method therefor

The invention relates to a regulation-violating behaviour evidence-obtaining method, comprising the following steps: initiating operation of the regulation-violating behaviour evidence-obtaining system when vehicle regulation-violating incident occurs; selecting at least one regulation-violating item from preset multiple vehicle regulation-violating items; initiating the camera to shot the regulation-violating site; obtaining detailed location and occurrence time position messaging of the regulation-violating site; generating a corresponding digital signature according to digital evidence input by traffic police affair-handling personnel; carrying out digital signature on the positioning information of the selected regulation-violating items, regulation-violating site photos, concrete locations of the regulation-violating sites and the occurrence time; transmitting the selected regulation-violating items, regulation-violating site photos and regulation-violating positioning information to the traffic police system to serve as evidence for giving a ticket. The invention further provides a regulation-violating behaviour evidence-obtaining system; the method and the system of the invention can be used to greatly improve efficiency of the traffic police affair-handling personnel.
Owner:SHENZHEN FUTAIHONG PRECISION IND CO LTD +1

Intelligent malicious code fragment evidence obtaining method and system

The invention belongs to the technical field of digital forensics, and particularly relates to a malicious code fragment intelligent forensics method and system, and the method comprises the steps: constructing a code fragment training set and a code fragment test set for training and testing through extracting the underlying data features of a storage medium; training the set full-connection neural network model by using the data in the code fragment training set, the input being a feature vector, and the output being a normal or malicious prediction result; for the code fragment test set, performing test output by utilizing the trained full-connection neural network model to judge whether model input is a malicious code fragment; and performing feature extraction on the target code snippets, and inputting the target code snippets into a fully-connected neural network model generated through training and testing to obtain an intelligent malicious code recognition result of the targetcode snippets. According to the method, malicious code fragments in storage media such as computers, mobile phones and tablets and evidence containers such as RAW, E01 and AFF can be recognized, and the method has a good application prospect in the field of digital evidence collection such as crime event evidence underlying data automatic analysis.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Multimedia digital watermark evidence taking mobile phone

The invention discloses a multimedia digital watermark evidence taking mobile phone. The multimedia digital watermark evidence taking mobile phone is an intelligent evidence taking mobile phone whichuses the unique stability, concealment, security and fragility of a fragile digital watermark to ensure the integrity, the authenticity, the stability, the reliability and the authority of photographed and recorded multimedia data based on an image, audio and video fragile digital watermark embedding and extraction technology. When a user uses the mobile phone, imperceptible and unmodifiable fragile digital watermark information with unique identity confirmation is embedded in real time in a photographed image, audio and video. The image or the audio or the video with the fragile watermark canbe normally used and distributed but can not be modified manually. The authenticity of a file can be identified according to whether the photographed digital file contains the digital watermark information. The evidence taking process is quick, efficient, accurate, safe and convenient. The evidence taking content has the uniqueness of a digital evidence and the legal authority of evidence use, and the multimedia digital watermark evidence taking mobile phone disclosed in the invention can be used for evidence taking and recording in fields such as judicature, law enforcement and claim.
Owner:CHENGDU YUFEI INFORMATION ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products