CN101110982A - Method for acquiring evidence using wireless terminal and server - Google Patents

Method for acquiring evidence using wireless terminal and server Download PDF

Info

Publication number
CN101110982A
CN101110982A CNA2007100244792A CN200710024479A CN101110982A CN 101110982 A CN101110982 A CN 101110982A CN A2007100244792 A CNA2007100244792 A CN A2007100244792A CN 200710024479 A CN200710024479 A CN 200710024479A CN 101110982 A CN101110982 A CN 101110982A
Authority
CN
China
Prior art keywords
server
wireless terminal
electrical type
data
type data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100244792A
Other languages
Chinese (zh)
Inventor
李儒耕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2007100244792A priority Critical patent/CN101110982A/en
Publication of CN101110982A publication Critical patent/CN101110982A/en
Pending legal-status Critical Current

Links

Images

Abstract

A method for obtaining the evidence by a wireless terminal and a server. A special purpose server is arranged, and the wireless terminal communicates with the server; the wireless terminal obtains the electronic multi-media data and the corresponding position at the same time and\or time information union which is\are integrated together, and immediately sends to the server, and the server records and preserves the electronic data from the terminal and preserves the corresponding position and\or time information. The wireless terminal obtains the electronic data; the electronic data is encrypted and\or verified immediately; and the encrypted electronic data is sent to the server immediately, and the server adopts the corresponding verifying algorithm and other methods to examine the reality of the encrypted electronic data and preserve the encrypted and\or verified electronic data.

Description

A kind of method of utilizing wireless terminal and server to obtain evidence
Technical field
The present invention relates to utilize wireless terminal and server to obtain the method for evidence.Especially in real time obtain and the fixing method of evidence.
Background technology
When certain behavior takes place, in commercial affairs, current transaction, daily social management even criminal offense process, literal, sound or image are the evidences of the behavior of reflex action main body, though video and audio recordings etc. may be as evidence, but the authenticity of evidence often needs through complicated demonstration, and, because lacking can be to the function of webserver transmission backup, the evidence that terminal is obtained is also as easy as rolling off a log to be on the hazard, especially when criminal offense occurring, the evidence that the victim obtained is easier to be destroyed by the offender; Therefore, comparatively speaking, find and a kind ofly convenient use, approved easily and can go in the technological means of far-end server backup in time that fixedly evidence is just very meaningful.
Can reaching of recognizing at present obtain or fixedly the technology of evidence two classes are arranged: the one class is that the electrical type medium are encrypted or cured, forms can be identified the file of whether having revised after other people can't revise or revise.As Adobe Reader software electronic document, photo etc. is prevented that by manual encryption other people from revising, but this technology is because its real-time and mobility (this software is mainly used in PC) of encrypting back file generation is bad, and it is not most suitable to be used for obtaining of evidence; Its two class is that mobility ground can obtain evidence, and report to the police automatically, 00132181.1) or the patent warning system of mobile video telephone " the use " (patent No.: 02145455.8) such as patent " the automatic sound recorder for radio comm terminal " (patent No.:, the emphasis of such patent is automatic warning, obtaining corresponding multimedia messages when reporting to the police presents as evidence, but this class evidence is because its unsteadiness, and probative effect is may give a discount or need complicated evaluation program.Method by the method for encrypting glue file is a lot:
1, adopts the DES symmetric encipherment algorithm, encrypt for executable program to be upgraded and software version.DES algorithm and key are kept at program issue end and terminal.
In conventional password, the destination uses identical key with originator, and promptly encryption key is identical or of equal value with decruption key, and promptly symmetric encipherment algorithm calculates.DES and various distortion thereof are the algorithms of using always, and DES is a block encryption, will expressly be divided into the piece of 64bits.Terminal reads the encrypted program piecemeal, and uses secret key decryption.Terminal reads deciphering with the encrypted program piecemeal.
2, adopt hash function such as MD5, carry out extract message mapping, be verified sign indicating number for the file after encrypting.This hash function is kept at program issue end and terminal simultaneously.
3, the data encryption product HDLOCK of Authenex company, the method that it adopts USB softdog (being called for short USB-KEY) and software cryptography core to combine realizes the encryption to the fixed disk file data.Its realization technology is based on the file filter technology of operating system, promptly tackle all read-write operations to file, in the interception core, carry out the encrypting and decrypting conversion, this conversion is only when corresponding USB-KEY exists, just can carry out, as not existing, the file data crossed of reading encrypted correctly then, thus promptly realized encryption to data.
4, hard disk encryption card: a kind of card that is inserted on the computer, it with hard disk between have data wire to link to each other, exchanges data all between CPU and the hard disk all can be passed through this card, are sent to the recipient after this card is done encrypting and decrypting work with data.As do not have card, the data on the hard disk can not be decrypted, so, when not having card, the data on can't the correct understanding hard disk, thus realized data encryption feature.
5, Chinese patent 96111260.3 discloses a data stream encryption method that is made of the data flow of a string continuous data stream unit, and data stream element comprises that one first data flow and one are positioned at second data flow after first data flow.This encryption method is to use a randomizer to second traffic encryption, and promptly to each second data flow to be encrypted, encryption method presets the underrange data to one that comprises in first data flow, offers randomizer as initial value.Decryption method and decryption device are open.
6, Chinese patent 02823349.2 provides a kind of method and apparatus of carrying out data encryption/decryption on large-capacity storage media.The multiple different encryption/decryption algorithm of using association key can be applied to the different memory areas of medium,, improve safety of data thus greatly as the piece/sector on the hard disk drive.The electronic data that can be used for encrypt/decrypt Email, Network etc. and other type.In addition, from the hard disk boot computer time, described device provides authen session, even can be used for selecting and a certain cipher key carrier associated operating system and/or environment by the MBR of change disk system.
7, PKI safe practice, it is by public-key cipher technology, digital certificate, certificate issuing authority (CA) and form jointly about the bases such as security strategy of public-key cryptography.PKI utilizes public-key technology to realize a kind of system of e-commerce security, is a kind of infrastructure, and it is safe that network communication, online transaction utilize it to guarantee.The PKI more complicated has comprised security certification system, and promptly security certification system-CA/RA system is the obligato part of PKI.PKI (Public Key Infrastructure) PKIX provides the system or the platform of public key encryption and digital signature service, and purpose is for managing keys and certificate.A mechanism can set up the network environment of a safety by adopting PKI framework managing keys and certificate.X.509 the certificate of form and certificate revocation tabulation (CRL); The CA/RA operating protocol; The CA management agreement; The CA policy making.
8, CN01120260.2 is applicable to network configuration and its implementation that mobile communication system terminal is encrypted, this network configuration is divided into two big planes in vertical direction: user plane U-Plane and control plane C-Plane, wherein the hierarchy of control plane C-Plane has: as the application layer of Non-Access Stratum, call out control and mobile management layer, and as RRM key-course RRC, data link layer RLC and media access layer MAC, the physical layer PHY of Access Layer; And the hierarchy of user plane U-Plane has: application layer, data link layer RLC, media access layer MAC, physical layer PHY; Set up a Secure Application layer SAL that application layer user profile is encrypted under the application layer of user plane, and this Secure Application layer SAL only be applicable to user side, the hierarchy of network terminal remains unchanged.
9, CN200310105363.3 portable terminal method of encrypting may further comprise the steps: the legitimacy of portable terminal checking security module; Carry out SIP registration and authentication to sip server; Portable terminal is initiated or responds SIP request, sets up communication; Set up communication between portable terminal and the security module, the voice-and-data business is carried out encryption and decryption; Finish conversation, the respective resources of release busy is returned the terminal initial state.Enciphered data transmits and adopts the mode of RTP/UDP/IP packing to transmit, the present invention can be not to existing C DMA network signal system make amendment just can transmit in real time some encrypt peculiar and essential data, guarantee the safety requirements of special dimension personnel to information communication.
10, CN200510024847.4 portable terminal, subscriber identify module card and the verification method that is used for them, comprise: a factor deriving means, obtain the factor that the subscriber identify module card from be installed in this portable terminal transmits, a terminal key storage device is stored one group of alternative key; A terminal encryption device utilizes a key in this terminal key storage device that this factor is encrypted generation terminal ciphertext.The invention also discloses a kind of above-mentioned mobile terminal user identification module card that is used for, comprising: a factor generating apparatus, it generates the factor, and they are passed to this portable terminal; A key storage device; An encryption device; A ciphertext demo plant, ciphertext and this terminal ciphertext that this encryption device is generated compare.
11, the anonymous calling method in the CN200510034162.8 next generation network makes the user to initiate anonymity call by any NGN terminal, by authentification of user and obtain business service.Among the present invention, deliver by anonymity call is judged, realize that by Signalling exchange encrypted transmission identity validation the user initiates the business model that anonymity call is accepted service by terminal in the NGN network; Server comes the judgment processing card number service to call out according to calling user information and in conjunction with called number prefix; The method that sends key, terminal encryption and " return " key" and ciphertext by server is finished authentication and is guaranteed the fail safe of Signalling exchange; Also automatic calling, the checking that realizes by the data configuration of terminal.
Summary of the invention
The present invention seeks to: solve at present the electrical type data obtained by wireless terminal or medium (as number recording, digital photo and the digital DV that records etc., also comprise short message literal (SMS) or multimedia message) easily modified, poor stability, being difficult to become strong evidence maybe will become the problem that evidence need pass through complicated evaluation program; Make the electrical type medium can obtain stability preferably, and can be almost when obtaining its authenticity just verified and preserve by far-end server, very easily become to legal effectively (even may not need judicial authority further to identify) and have the evidence of strong evidential effect.The preliminary application object may be lawyer, law enfrocement official, and can expand to ordinary populace future.
Technical solution of the present invention is: utilize wireless terminal and server to obtain the method for evidence, be provided with private server and wireless terminal communication; Obtain corresponding position and or temporal information when wireless terminal obtains the electrical type multi-medium data simultaneously and integrate, and mail to server immediately, by server record and preserve the electrical type data that terminal sends and preserve corresponding position and or temporal information.Wireless terminal of the present invention is the intelligent terminal (as GSM, CDMA or various 3G mobiles etc.) of mobile communication terminal or other Tape movement communication terminal especially; Server is the server that network is provided with.
Wireless terminal obtains the electrical type data; After obtaining immediately to these electrical type data encrypt with or checking treatment; The electrical type data that to carry out encryption mail to server immediately, server adopt corresponding checking algorithm and other method the authenticity (or not being modified property) of the electrical type data of encryption is tested and preserve obtained through encryption and or the electrical type data of checking treatment.
Described server is the server of preserving data and calculation function that has of network side, this server can be located at cable network or be located at wireless network, the electrical type multi-medium data that described wireless terminal obtained can comprise literal, audio frequency, figure, image, video etc., concrete form such as number recording, digital photo and the digital DV that records etc. also comprise short message literal (SMS) or multimedia message (MMS) etc.; The acquisition of described electrical type data can be passed through the function of wireless terminal self, also can be by having the auxilliary accessory of corresponding electron gain class data function.The described time and or the acquisition of positional information can be to receive locating module by the global position system in the wireless terminal, also can be to receive the auxilliary accessory in location by the outer global position system of wireless terminal, can also be the corresponding information of determining by Radio Network System; Described global position system is meant that system via satellite determines the system of the position of ground receiver, as GPS of USA, and Muscovite Glonass, the Big Dipper communication system of the Galileo in Europe and China.
Described wireless terminal with the time and or positional information integrated with the electrical type multi-medium data that obtained, if the electrical type multi-medium data is moment to finish acquisition, then the corresponding time of integrated this time point of wireless terminal and or positional information; If the acquisition of electrical type multi-medium data through sometime the section, then choose a certain suitable time period S, every through the S time, then in the corresponding electrical type multi-medium data of this period S integrated once should be in the period defined specific time point time and or positional information.
The electrical type data that described wireless terminal obtained can comprise literal, audio frequency, figure, image, video, time and or position etc., concrete form such as number recording, digital photo and the digital DV that records etc., also comprise short message literal (SMS) or multimedia message (MMS) etc., the information of time and position can be embedded in these electrical type multimedia messagess.
Described encryption is the processing that makes the electrical type data become and can not be modified or be very difficult to be modified.Can be by setting and modifying password (no password then can't be revised), and the method for the password very large random cipher that to be system automatically generate makes other people will revise the electrical type data very difficulty that becomes, also can be to use public key encryption algorithm such as RSA or ECC or symmetric encipherment algorithms such as DES or AES that the electrical type data are carried out encryption and make other people will revise the electrical type data very difficulty that becomes, perhaps other can reach and make other people to the unusual cipher processing method of difficulty of electrical type data modification.
Described checking algorithm is after wireless terminal uses certain algorithm to the electrical type data processing, the algorithm that promptly can verify out with corresponding algorithm process the electrical type data that obtain or can the sure electrical type data that obtained in height probability ground whether be modified by server.Can be MD2, MD4, MD5 algorithm, also can be the CRC serial algorithm, can also be the SHA serial algorithm, can also be RIPEMD, PANAMA, TIGER, ADLER32 scheduling algorithm, and other can reach the algorithm of described purpose.
Described other method can be the comparison wireless terminal obtain and time of reporting and or positional information and system by wireless network and or time of being obtained of self global position system receiver module and or the validity check of relatively carrying out the electrical type data of terminal positional information, also can be the multimedia messages that obtains of integrated terminal, time and or positional information carry out the validity check of electrical type data.
The present invention can be provided with automatic alert program, sets danger button on wireless terminal, and when pressing danger button, wireless terminal is issued server with previously described electrical type data, and notifies the second information transmission end (as the police simultaneously; ) or by corresponding indication (when as can set pressing danger button server should the notify) notice of server according to terminal; Corresponding electrical type data can be transferred to police's corresponding apparatus in the lump when contacting the police.
The present invention includes and to obtain the wireless terminal of electrical type data and to be located at the server of preserving data and calculation function that has of network side by self or its auxilliary accessory, obtain the electrical type data by wireless terminal; Obtain simultaneously during electrical type data that wireless terminal obtains the corresponding time with or positional information and be in the same place with the electrical type data integration, embed or adhere to, and mail to server immediately, server preserve the electrical type data and preserve the corresponding time and or positional information.After wireless terminal obtained the electrical type data, wireless terminal carried out encryption to these electrical type data immediately, made these electrical type data through encryption can't or be difficult to be modified; The electrical type data that wireless terminal will carry out encryption immediately mail to server, and server is preserved, and with the electrical type data together preserve the corresponding time and or positional information.Also can be, obtain the back wireless terminal and with checking algorithm these electrical type data are carried out encryption immediately, make these electrical type data in a single day be modified promptly and can be found through encryption; The electrical type data that wireless terminal will carry out encryption immediately mail to server, server adopt corresponding checking algorithm and or other method to testing through the authenticity (or not being modified property) of the electrical type data of encryption and preserve, and with the electrical type data together preserve the corresponding time and or positional information.
After that electrical type data and time or location information carry out is integrated (comprise embed or additional), cryptographic calculation be can carry out, the residual value or the valuation of file after the computing obtained; Information is transmitted through the network to server and carries out identical operation, and server obtains the residual value or the valuation of file after the computing; With the two relatively, if the residual value of file or valuation difference after the computing, then information or the file that obtains at the beginning was modified; Server obtains corresponding temporal information, server from system or the GPS that carries and reports from the GPS of system or terminal and obtain the relevant terminal positional information, through comparing, if in reasonable range, then can be near assert that utterly the information or the file that obtain are not revise; If exceeding reasonable range, then need further to analyze and assert whether electronic information was modified.
Time and or positional information be wireless terminal from self global position system receiver module or the information that obtains of its auxilliary accessory or the corresponding information that obtains from the system of wireless network with global position system receiving function.After that electrical type data and time and or location information carry out is integrated (comprise embed or additional), can carry out cryptographic calculation, obtain the residual value or the valuation of file after the computing with checking algorithm; Information is transmitted through the network to server and carries out identical operation, and server obtains the residual value or the valuation of file after the computing; With the two relatively, if the residual value of file or valuation difference after the computing, then the information or the file that obtain of server was modified; If residual value after the computing or valuation are identical, then the information or the file of server acquisition very likely were not modified.Server with self from system or the global position system receiver module that carries obtain corresponding temporal information and from system or other method obtain the relevant terminal positional information with time of terminal to report and or positional information relatively, if in reasonable range, then can be almost utterly the information or the file that obtain of qualifying server be not revise; If exceeding reasonable range, then need further to analyze and assert whether electronic information was modified.
Typical checking algorithm can adopt MD2, MD4, MD5 algorithm, also can adopt the CRC serial algorithm, can also adopt the SHA serial algorithm, can also adopt RIPEMD, PANAMA, TIGER, ADLER32 scheduling algorithm; Can also adopt other can reach the checking algorithm of described purpose.
Relatively wireless terminal obtain and time of reporting and or positional information and system by wireless network and or time of being obtained of self global position system receiver module and or the validity check of relatively carrying out the electrical type data of terminal positional information, or the multimedia messages that obtains of integrated terminal, time and or positional information carry out the validity check of electrical type data.
Be provided with automatic alert program, set danger button on wireless terminal, when pressing danger button, wireless terminal is issued server with previously described electrical type data, and notifies the second information transmission end simultaneously or by the corresponding indication notice of server according to terminal; Or corresponding electrical type data are transferred in the lump the equipment of the second information transmission end.
Obtain the electrical type data by wireless terminal; Obtain simultaneously during electrical type data that wireless terminal obtains the corresponding time with or positional information and be in the same place with the electrical type data integration, embed or adhere to, and mail to server immediately, server preserve the electrical type data and preserve the corresponding time and or positional information.And can report to the police automatically by set danger button on wireless terminal, terminal or server will contact the police when danger button is pressed, and the corresponding electrical type data that will obtain send to the relevant device of the police.
The server of described network is the data of the third-party authentication and the preservation of network side; Can adopt special have special intermediary or notary organization's store electricity subclass data or medium.The electrical type data that described wireless terminal obtains are modified stability or encryption constitutes the stable electronic evidence that is difficult for modification, and through checking and preservation.In sum, prior art does not have and directly relates to the method that wireless terminal and server obtain evidence.Especially in real time obtain and the fixing method of evidence.These technology and the main distinction of the present invention are as follows:
1) be not to obtain promptly to encrypt automatically or curing, through manual encryption, the file after being difficult to like this guarantee to encrypt is an original document after need obtaining;
2) above-mentioned prior art is owing to be primarily aimed at PC, thus the mobility deficiency, and be not suitable for investigating and collecting evidence;
3) third party who generally lacks network side verifies and preservation immediately;
4) being limited in scope of electrical type medium, what have only has an audio frequency, and lacks the video class media article, is unfavorable for the one party who produces evidence; The information that embodies on the electrical type medium is also limited, and electrical type medium itself are often only arranged, and do not have the corresponding time, information such as place, what can illustrate is limited in scope, and is not suitable for becoming strong evidence;
5) after obtaining, can not instantaneous transmission also preserve,, just be difficult to preserve corresponding evidence if terminal is damaged.
Characteristics of the present invention are: in electronic medium information, make information more comprehensively and easier reviewing information integrations such as time, place.By integrated and/or cryptographic algorithm electronic medium information is formed the data (or whether being easy to checking for being modified) that are difficult to revise immediately automatically when obtaining, stability (not modifiability) is good.By immediately the authenticity (promptly whether being modified) of electronic medium information being verified and being preserved of the webserver, improved electronic medium class data validity and guaranteed its not destroyed and destroyed because of terminal.
Main feature of the present invention also is: obtain corresponding position and temporal information during electrical type data that wireless terminal obtains simultaneously, and handle, improved the stability and the authenticity of the electrical type media data that wireless terminal obtains, the strong means of obtaining vaild evidence are provided.Especially the method for producing evidence to combine by technological means and third party is carried out, and use the present invention has purposes widely in daily social management.
Description of drawings
Fig. 1 is that the acquisition of electrical type multi-medium data is through integrated time of segment data and or position idiographic flow schematic diagram sometime
Fig. 2 is a checking process
Fig. 3 is another flow chart.
Embodiment
Such as a possible application scenarios (be used to strengthen this technology understanding):
The user of 3G mobile who possesses this function is under attack, recorded one section DV that the suspect attacks immediately with mobile phone, simultaneously owing to contain the GPS receiving chip (if do not have in the mobile phone, communication network also can provide corresponding Position Approximate and time), so mobile phone can obtain on-site information and can obtain temporal information, when taking DV, mobile phone will take on-site latitude and longitude information by certain cryptographic algorithm automatically and temporal information is incorporated among this section DV that records, even this section DV is exported in the PC, also be difficult to the DV of this section shooting is made amendment, and, setting according to the machine master, mobile phone also in real time by 3G transmittability at a high speed with these transfer of data in server, server is by detecting the sub-district at the also comprehensive mobile phone place of encryption mechanism wherein, the comparison of aspects such as base station time, confirm the authenticity (promptly not through the property revised) of this section DV, server is stored in it in corresponding database simultaneously.Simultaneously, according to machine master's setting, this mobile phone sends the request of reporting to the police automatically, and then server is also from being dynamically connected 110 alarm stations, and corresponding information is offered the police service center.Rescue and investigation work are launched according to corresponding information in the police service center.
Use the inventive method in the daily social management: to handing over rule violator's evidence obtaining, city management division management person is to city management rule person's evidence obtaining in violation of rules and regulations as the traffic police.
Concrete scheme flow process following (being example) to use the MD5 algorithm, as shown in Figure 1, 2:
When obtaining A, obtain S pairing temporal information B and positional information C in the time, A, B, C carried out integrated, form A ', A ' is carried out the MD5 computing, MD5 value m, A ' and m together are transmitted through the network to server F, F obtains A " and m.F is to A " carry out the MD5 computing, obtain m ',, then A ' and A if m is identical with m ' " the identical A of being ' may not be modified; If m is different with m ', then A ' and A " different, promptly A ' was modified.Server obtains corresponding temporal information B ' from system or the GPS that carries, server reports acquisition relevant terminal positional information C ' from the GPS of system or terminal, through the comparison of same B, C, if in reasonable range, then can be near assert that A ' did not revise utterly; If exceeding reasonable range, then need further to analyze and assert whether A ' was modified.
Server obtains corresponding temporal information B ', server from system or the GPS that carries and reports from the GPS of system or terminal and obtain relevant terminal positional information C ' if in reasonable range, then can then need further to analyze and assert whether A ' was modified near assert A ' if be not revise exceeding reasonable range utterly
For encryption class algorithm (in fact can be called as checking algorithm) mentioned above, at present commonly used as MD5, the RSA scheduling algorithm.Use such algorithm can be undertaken whether the electrical type media file that corresponding verification computing confirms that terminal is obtained is original document (being modified) by the server of local side.
About the flow process of automatic warning,, no longer further give unnecessary details at this because very simple.
The algorithm characteristic introduction of MD5:
MD5 is a kind of checking algorithm commonly used, and any e-file can draw a unique MD5 value by this algorithm computation, and is if promptly original document is carried out any modification, then identical scarcely with source file by the MD5 value that amended file calculated.As long as source file and the MD5 value of calculating gained are together sent, the side after then receiving also carries out MD5 to the file of receiving and calculates in use, if gained MD5 value is identical with the MD5 value of receiving, the file of then receiving is the file of not revising.
Judge the reliability diagram that is not modified after the electrical type data encryption to using this kind method:
Because under this kind method situation, electrical type data A if former data are modified, then must can not get same m through after the same computing through obtaining after the computing and former data summary data m one to one.So if through comparing, if different, then the data that obtain after the transmission necessarily were modified m with m '.For caution's sake, if more corresponding again position temporal informations etc. then can obtain being close to absolute conclusion.
So all can be made a summary or the algorithm of verification to data, all can use in this way, as MD2, MD4, MD5 serial algorithm, HASH serial algorithm, CRC series checking algorithm etc.
Also can use other algorithms (being example) with RSA Algorithm, as shown in Figure 3: when obtaining a, obtain S pairing temporal information b and positional information c in the time, carry out integrated to a, b, c, form a ', with the PKI m of RSA Algorithm to a ' encrypt a "; with a " and m together be transmitted through the network to server F, F obtains A and m.F is decrypted computing with corresponding RSA private key n to A, obtains A '.Server obtains corresponding temporal information b ' from system or the GPS that carries, server reports acquisition relevant terminal positional information c ' from the GPS of system or terminal, relatively appended time location information b, the c of A ' if in reasonable range, can assert tentatively that then A ' did not revise; If exceeding reasonable range, then A ' was modified probably.Need comprehensively to do further to analyze in conjunction with other information that A ' provided, as the continuity of image, sound, the continuity of literal semanteme etc.If judge that through comprehensive the information of A ' expression is reasonable, then can assert that A ' was not modified in highly probable property ground; If judge that through comprehensive the information of A ' expression is unreasonable, then can assert that A ' was modified in highly probable property ground.
Judge the reliability diagram that is not modified after the electrical type data encryption to using this kind method: because under this kind method situation, if the electrical type data do not have private key n through encrypting the back, then can't decipher and know the electrical type data of being encrypted, therefore the modification of encrypting back information is very likely caused the non-reasonable change of encrypted file, so after deciphering, will be easy to be discovered.Therefore, this kind method can be highly probable the property ground data that determine to obtain through transmission whether for being modified.
So the algorithm that all can be encrypted data as long as decrypted difficulty is enough, all can use in this way, as being the symmetric encipherment algorithm of representative with EDS, AES, or RSA, asymmetrical public key algorithm such as ECC etc.

Claims (10)

1. a method of utilizing wireless terminal and server to obtain evidence is characterized in that, be provided with private server, wireless terminal is communication with it; Obtain corresponding position and or temporal information when wireless terminal obtains the electrical type multi-medium data simultaneously and integrate, and mail to server immediately, by server record and preserve the electrical type data that terminal sends and preserve corresponding position and or temporal information.
2. the method for utilizing wireless terminal and server to obtain evidence according to claim 1 is characterized in that wireless terminal obtains the electrical type data; After obtaining immediately to these electrical type data encrypt with or checking treatment; The electrical type data that to carry out encryption mail to server immediately, server adopt corresponding checking algorithm and other method the authenticity of the electrical type data of encryption is tested and preserve obtained through encryption and or the electrical type data of checking treatment.
3. the method for utilizing wireless terminal and server to obtain evidence according to claim 1 and 2 is characterized in that, described server is the server of preserving data and calculation function that has of network side, and this server can be located at cable network or wireless network.
4. the method for utilizing wireless terminal and server to obtain evidence according to claim 1 and 2, it is characterized in that, the electrical type multi-medium data that described wireless terminal obtained can comprise literal, audio frequency, figure, image, video etc., the DV that concrete form such as number recording, digital photo, number are recorded, short message literal (SMS) or multimedia message (MMS).
5. the method for utilizing wireless terminal and server to obtain evidence according to claim 1 and 2 is characterized in that, the function of wireless terminal self is passed through in the acquisition of described electrical type data, or by having the auxilliary accessory of corresponding electron gain class data function; The described time and or the acquisition of positional information can be to receive locating module, receive the auxilliary accessory in location by the outer global position system of wireless terminal by the global position system in the wireless terminal, or the corresponding information of determining by Radio Network System.
6. the method for utilizing wireless terminal and server to obtain evidence according to claim 1 and 2, it is characterized in that, described wireless terminal with the time and or positional information integrated with the electrical type multi-medium data that obtained, if the electrical type multi-medium data is moment to finish acquisition, then the corresponding time of integrated this time point of wireless terminal and or positional information; If the acquisition of electrical type multi-medium data through sometime the section, then choose a certain suitable time period S, every through the S time, then in the corresponding electrical type multi-medium data of this period S integrated once should be in the period defined specific time point time and or positional information.
7. the method for utilizing wireless terminal and server to obtain evidence according to claim 1 and 2, it is characterized in that described encryption is the processing that makes the electrical type data become and can not be modified or be difficult to be modified: the electrical type data are carried out encryption by setting and modifying password, use RSA, ECC public key encryption algorithm, DES, AES symmetric encipherment algorithm or checking algorithm.
8. according to claim 1 or the 3 described methods of utilizing wireless terminal and server to obtain evidence, it is characterized in that, relatively wireless terminal obtain and time of reporting and or positional information and system by wireless network and or time of being obtained of self global position system receiver module and or the validity check of relatively carrying out the electrical type data of terminal positional information, or the multimedia messages that obtains of integrated terminal, time and or positional information carry out the validity check of electrical type data.
9. according to claim 1 or the 3 described methods of utilizing wireless terminal and server to obtain evidence, it is characterized in that, be provided with automatic alert program, on wireless terminal, set danger button, when pressing danger button, wireless terminal is issued server with previously described electrical type data, and notifies the second information transmission end simultaneously or by the corresponding indication notice of server according to terminal; Or corresponding electrical type data are transferred in the lump the equipment of the second information transmission end.
10. the method for utilizing wireless terminal and server to obtain evidence according to claim 3 is characterized in that, obtains the electrical type data by wireless terminal; Obtain simultaneously during electrical type data that wireless terminal obtains the corresponding time with or positional information and be in the same place with the electrical type data integration, embed or adhere to, and mail to server immediately, server preserve the electrical type data and preserve the corresponding time and or positional information; Typical checking algorithm adopts MD2, MD4, MD5 algorithm, CRC serial algorithm, SHA serial algorithm, RIPEMD, PANAMA, TIGER or ADLER32 algorithm.
CNA2007100244792A 2007-06-19 2007-06-19 Method for acquiring evidence using wireless terminal and server Pending CN101110982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100244792A CN101110982A (en) 2007-06-19 2007-06-19 Method for acquiring evidence using wireless terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100244792A CN101110982A (en) 2007-06-19 2007-06-19 Method for acquiring evidence using wireless terminal and server

Publications (1)

Publication Number Publication Date
CN101110982A true CN101110982A (en) 2008-01-23

Family

ID=39042840

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100244792A Pending CN101110982A (en) 2007-06-19 2007-06-19 Method for acquiring evidence using wireless terminal and server

Country Status (1)

Country Link
CN (1) CN101110982A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534296A (en) * 2009-03-24 2009-09-16 王琳 Public network information integrity and time point existence proof method and system
CN102325139A (en) * 2011-09-14 2012-01-18 福建伊时代信息科技股份有限公司 Electronic document processing method, processing system and verification system
CN102332980A (en) * 2011-09-14 2012-01-25 福建伊时代信息科技股份有限公司 Method and system for managing electronic file
CN102339370A (en) * 2011-09-14 2012-02-01 福建伊时代信息科技股份有限公司 Preservation method for electronic file, preservation system and verification system thereof
CN102780693A (en) * 2012-06-13 2012-11-14 兰州大学 Authentication system and method based on GPS (Global Positioning System) and image acquisition technology
CN103198258A (en) * 2012-01-05 2013-07-10 株式会社理光 Composite system and data transfer method
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android
CN103535055A (en) * 2011-05-04 2014-01-22 高通股份有限公司 Method and apparatus for transmitting encrypted location information
CN103593618A (en) * 2013-10-28 2014-02-19 北京实数科技有限公司 Verification method and system for adoptability of electronic data evidence
CN103686239A (en) * 2013-12-11 2014-03-26 深圳先进技术研究院 Network sharing crime evidence obtaining system and method based on location videos
CN104346471A (en) * 2014-11-18 2015-02-11 北京奇虎科技有限公司 Method, device and system for determining to-be-pushed application based on geological position information
CN104378325A (en) * 2013-08-12 2015-02-25 魏钢 Network electronic data collecting, curing, verifying and restoring method and system
CN104537312A (en) * 2015-01-22 2015-04-22 杭州安存网络科技有限公司 Network communication data preservation method and device
CN104717208A (en) * 2015-02-10 2015-06-17 重庆市互联网新闻研究中心 Method, equipment and system for fixing electronic data in real time by means of terminal feature information
CN106936816A (en) * 2017-02-15 2017-07-07 海尔优家智能科技(北京)有限公司 A kind of method and system of Query Location
CN109075978A (en) * 2016-04-28 2018-12-21 托雷迈卡有限责任公司 For generating the computer system of certified data
CN110366174A (en) * 2019-08-26 2019-10-22 山东浪潮通软信息科技有限公司 A kind of information collection anti-cheating method and system applied to mobile App

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534296A (en) * 2009-03-24 2009-09-16 王琳 Public network information integrity and time point existence proof method and system
CN101534296B (en) * 2009-03-24 2014-12-31 王琳 Public network information integrity and time point existence proof method and system
CN103535055A (en) * 2011-05-04 2014-01-22 高通股份有限公司 Method and apparatus for transmitting encrypted location information
CN102325139B (en) * 2011-09-14 2014-07-09 福建伊时代信息科技股份有限公司 Electronic document processing method, processing system and verification system
CN102325139A (en) * 2011-09-14 2012-01-18 福建伊时代信息科技股份有限公司 Electronic document processing method, processing system and verification system
CN102332980A (en) * 2011-09-14 2012-01-25 福建伊时代信息科技股份有限公司 Method and system for managing electronic file
CN102339370A (en) * 2011-09-14 2012-02-01 福建伊时代信息科技股份有限公司 Preservation method for electronic file, preservation system and verification system thereof
CN102332980B (en) * 2011-09-14 2014-09-03 福建伊时代信息科技股份有限公司 Method and system for managing electronic file
CN103198258B (en) * 2012-01-05 2016-01-20 株式会社理光 The method of compound system and transmission data
CN103198258A (en) * 2012-01-05 2013-07-10 株式会社理光 Composite system and data transfer method
US9401809B2 (en) 2012-01-05 2016-07-26 Ricoh Company, Ltd. Composite system, method, and storage medium
CN102780693B (en) * 2012-06-13 2015-04-08 兰州大学 Authentication system and method based on GPS (Global Positioning System) and image acquisition technology
CN102780693A (en) * 2012-06-13 2012-11-14 兰州大学 Authentication system and method based on GPS (Global Positioning System) and image acquisition technology
CN104378325A (en) * 2013-08-12 2015-02-25 魏钢 Network electronic data collecting, curing, verifying and restoring method and system
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android
CN103475664B (en) * 2013-09-18 2017-02-15 北京工业大学 Credible extraction method for digital evidence of Android
CN103593618A (en) * 2013-10-28 2014-02-19 北京实数科技有限公司 Verification method and system for adoptability of electronic data evidence
CN103686239A (en) * 2013-12-11 2014-03-26 深圳先进技术研究院 Network sharing crime evidence obtaining system and method based on location videos
CN104346471A (en) * 2014-11-18 2015-02-11 北京奇虎科技有限公司 Method, device and system for determining to-be-pushed application based on geological position information
CN104537312B (en) * 2015-01-22 2018-10-12 杭州安存网络科技有限公司 Network communication data security method and device
CN104537312A (en) * 2015-01-22 2015-04-22 杭州安存网络科技有限公司 Network communication data preservation method and device
CN104717208A (en) * 2015-02-10 2015-06-17 重庆市互联网新闻研究中心 Method, equipment and system for fixing electronic data in real time by means of terminal feature information
CN104717208B (en) * 2015-02-10 2018-10-30 重庆市互联网新闻研究中心 Fix method, equipment and the system of electronic data in real time using terminal characteristic information
CN109075978A (en) * 2016-04-28 2018-12-21 托雷迈卡有限责任公司 For generating the computer system of certified data
CN109075978B (en) * 2016-04-28 2022-04-01 托雷迈卡有限责任公司 Computer system for generating authenticated data
CN106936816A (en) * 2017-02-15 2017-07-07 海尔优家智能科技(北京)有限公司 A kind of method and system of Query Location
CN110366174A (en) * 2019-08-26 2019-10-22 山东浪潮通软信息科技有限公司 A kind of information collection anti-cheating method and system applied to mobile App

Similar Documents

Publication Publication Date Title
CN101110982A (en) Method for acquiring evidence using wireless terminal and server
CN107888560B (en) Mail safe transmission system and method for mobile intelligent terminal
KR100724935B1 (en) Apparatus and method of interlock between entities for protecting contents, and the system thereof
CN102857911B (en) Positioning method, terminal and server
CA2860866C (en) System and method of lawful access to secure communications
US7752449B1 (en) System and method for generating a non-repudiatable record of a data stream
CN101296148B (en) Verification method, system and device for validity of multimedia contents
US20080150753A1 (en) Secure Data Transfer In A Communication System Including Portable Meters
CN104424446A (en) Safety verification and transmission method and system
KR100826522B1 (en) Apparatus and method for dynamic ciphering in mobile communication system
CN103974255B (en) A kind of vehicle access system and method
CN102355663A (en) Credible inter-domain rapid authentication method on basis of separation mechanism network
CN110544101A (en) SM 9-based alliance chain identity authentication method
CN102740239A (en) Method and system for secure transmission of media information
CN112671710A (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
US9762554B2 (en) Handling of performance monitoring data
CN101860433A (en) Method and device for receiving broadcast content
CN105407479A (en) Information recognition method, information gateway, SIM card, and system
CN107426521A (en) A kind of video call method and terminal
CN105471657B (en) inter-domain communication log management method, device and system for virtual machine
KR100858975B1 (en) Method and system for protection of lawful interception
CN107645500B (en) Broadcast data interaction method and device
CN101742229A (en) Method, system and device for improving safety of monitoring data
CN111132155A (en) 5G secure communication method, equipment and storage medium
TW200803357A (en) Method of registering a network, mobile station and communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080123