CN106254078A - The Internet evidence collecting method, device and the Internet safety system - Google Patents

The Internet evidence collecting method, device and the Internet safety system Download PDF

Info

Publication number
CN106254078A
CN106254078A CN201610624505.4A CN201610624505A CN106254078A CN 106254078 A CN106254078 A CN 106254078A CN 201610624505 A CN201610624505 A CN 201610624505A CN 106254078 A CN106254078 A CN 106254078A
Authority
CN
China
Prior art keywords
module
damage
internet
compressed package
evidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610624505.4A
Other languages
Chinese (zh)
Inventor
冯颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610624505.4A priority Critical patent/CN106254078A/en
Publication of CN106254078A publication Critical patent/CN106254078A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to Internet technical field, disclose a kind of the Internet evidence collecting method, including step: S1: obtain the target evidence obtaining network address and the evidence obtaining network level of user side input;S2: extract the relevant information of target evidence obtaining network address corresponding server, and real-time interception relates to the content of infringement;S3: by real-time encrypted for the content of described relevant information and intercepting and be packaged into the compressed package of reference format, be delivered to compressed package save center from damage as the preservation of evidence.The Internet evidence collecting method of the present invention, device and the Internet safety system, from the server that the target evidence obtaining network address is corresponding, directly obtain relevant information and the infringing content of server, owing to the safety of the webserver is high relative to the safety of client browser, thus avoid and be easily tampered at client browser acquisition evidence, the problem that credibility is the highest.

Description

The Internet evidence collecting method, device and the Internet safety system
Technical field
The present invention relates to Internet technical field, save from damage particularly to a kind of the Internet evidence collecting method, device and the Internet System.
Background technology
Along with the Internet, the emergence of mobile Internet, the advertisement information of Web realease gets more and more, and online transaction the most more comes The most frequent, increasing original works pours in network, and the authorship for large quantities of New Times brings income.
Online promotional messages is probably what falseness deceived people, and user is difficult to the page before finding, i.e. after being once taken in Save the publicity page before being allowed to, due to network security cause distort, the easy characteristic such as fraud, preserve at browser end before The page be also not enough to become strong evidence.
In like manner, the JICQ of the webpage version chat record when online transaction is utilized to be likely to be faked or usurp Change, be also not enough to prove the dealing agreement that both sides reach before transaction.
And the Internet infringement has also become a great problem of puzzlement authorship.Works in the Internet are made with electronic data For carrier, once encroaching right, difficulty of not only collecting evidence, evidence is the most easily obliterated amendment, as infringing party is denied, in judicial decision again Lacking objective evidence, authorship is difficult to safeguard number one.
Therefore, prior art occurs in that some save center from damage for the Internet saving e-file from damage, for by electronics literary composition Part encryption security, but only saved this e-file from damage.For the e-file as the preservation of evidence, just having before saving from damage can Can be tampered, or itself is untrue, such as: when browsing webpage, find the message of false propaganda, then pass through QQ screenshotss or Screen print screenshotss are as evidence, but due to characteristics such as internet security is the highest, Webpage easily frauds, it is impossible to ensure electricity Subfile, as the true and false property of evidence, causes Certainty Factor low, it is impossible to be used for evidence.
Summary of the invention
The present invention proposes a kind of the Internet evidence collecting method, device and the Internet safety system, solves network in prior art Collect evidence problem with a low credibility.
A kind of the Internet evidence collecting method of the present invention, including step:
S1: obtain the target evidence obtaining network address and the evidence obtaining network level of user side input;
S2: extract the relevant information of target evidence obtaining network address corresponding server, and the network address of in real time target being collected evidence And the page screenshot that under this address, each level is corresponding;
S3: by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, by compressed package to saving from damage Center is as the preservation of evidence.
Wherein, also include after described step S2: by the relevant information of described target evidence obtaining network address corresponding server It is back to user side.
Wherein, in described step S3, by the content of described relevant information and intercepting in internal memory real-time encrypted and be packaged into The compressed package of reference format.
Present invention also offers a kind of internet pick card device, including:
Address acquisition module, for obtaining the target evidence obtaining network address and the evidence obtaining network level of user side input;
Evidence obtaining module, for extracting the relevant information of target evidence obtaining network address corresponding server, and takes target in real time The page screenshot that under the card network address and this address, each level is corresponding;
Sending module, for by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, will pressure Contracting bag is to saving center from damage as the preservation of evidence.
Wherein, also include that information returns module: for the relevant letter by described target evidence obtaining network address corresponding server Breath is back to user side.
Wherein, described sending module is when encryption and encapsulation, specifically by the content of described relevant information and intercepting at internal memory In real-time encrypted and be packaged into the compressed package of reference format.
Present invention also offers a kind of the Internet safety system, including: user side, save from damage described in center and any of the above-described item Internet pick card device, described internet pick card device connects described user side and save center from damage;Described user side is by user The target evidence obtaining network address of input and evidence obtaining network level transmission are to described internet pick card device, described the Internet evidence obtaining dress Put the relevant information extracting target evidence obtaining network address corresponding server, and real-time interception relates to the content of infringement, by described phase The content of pass information and intercepting is real-time encrypted and sends after being packaged into the compressed package of reference format to saving center from damage and saves from damage, described use Family end is used for making user log in and saves hub head end interface from damage.
Wherein, save center described in from damage to include: go up transmission module, save module, account management module, authentication module, card from damage Book module, authentication module, supervision module, the administration of justice are come to testify module, data memory module and auditing module of coming to testify;
Described upper transmission module connects described sending module, for receiving the compressed package that described sending module sends over, and Described compressed package is reached and saves module from damage;
Described module of saving from damage receives the compressed package that upper transmission module is transmitted through, and obtains the identity saving people from damage from account management module Information, and calculate described compressed package for parameter by hashing algorithm with the data including standard time and described identity information Overall situation supervision summary, by described overall situation supervision summary, described identity information synchronization distribution to data memory module and notary machine Structure, judicial expertise mechanism, Arbitration Committee and the server of law court;
Described account management module is for saving the identity information registration of people, accounts information setting, security set, Assets Reorganization Taking from damage Reason, managing bill, third party's account are bound, are freezed and nullify, and send registration and the information arranged to data memory module Storage;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, face are known Fu Wu be with the Third-party payment service for checking credentials, so that the identity information saving people from damage is verified;
Described certificate module is for the compressed package according to data memory module storage, overall situation supervision summary and the body saving people from damage Part information generates, updates or nullifies and save certificate from damage, and will save certificate transmission from damage to data memory module storage, is additionally operable to described Save certificate from damage to send to saving people from damage;
Described authentication module is used for verifying whether compressed package passes through and saves from damage, or user downloads institute at user side from saving center from damage After stating compressed package, whether the compressed package of checking this locality is consistent with the compressed package saved from damage being stored in data memory module;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and is existed by described overall situation supervision summary Save the official website real-time release of center, notary organization, judicial expertise mechanism, Arbitration Committee and law court from damage;
Described administration of justice module of coming to testify includes notarial certificate and judicial expertise report for receiving providing of saving that people proposes online from damage The request of coming to testify accused, and the described request of coming to testify is committed to auditing module of coming to testify;
Described auditing module of coming to testify is for asking providing when saving people from damage of artificial described data memory module storage in judgement Including taking the evidence that notarial certificate and judicial expertise are reported, and come to testify module return claimant by the described administration of justice;
Described data memory module is used for encrypting storage described overall situation supervision summary and compressed package, and by the overall situation after encryption Supervision summary synchronized transmission stores to the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court, and compresses Bag, overall situation supervision summary, identity information and accounts information store on different media.
Wherein, the overall situation saving the SHA-512 hashing algorithm described compressed package of calculating that module uses described in from damage supervises summary, institute State data memory module to include for the DEA encrypting overall situation supervision summary employing: SHA-512 hashing algorithm, data Any one in AES DES and message digest algorithm MD5.
Wherein, described data memory module is additionally operable to the overall situation supervision summary of current point in time in notary organization, the administration of justice Announce on the website of appraisal organization, Arbitration Committee and law court.
The Internet evidence collecting method of the present invention, device and the Internet safety system, directly from the target evidence obtaining network address pair The server answered obtains relevant information and the infringing content of server, owing to the safety of the webserver is relative to client The safety of browser is high, thus avoids and be easily tampered at client browser acquisition evidence, the problem that credibility is the highest.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, also may be used To obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of the Internet evidence obtaining method flow diagram of the present invention;
Fig. 2 is a kind of internet pick card device structural representation of the present invention;
Fig. 3 is a kind of the Internet safety system structural representation of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
A kind of the Internet evidence collecting method of the present embodiment is as it is shown in figure 1, include:
Step S1, obtains the target evidence obtaining network address and the evidence obtaining network level of user side input.Such as: network works (novel or micro-film etc.) authorship finds that certain website uploads oneself network works without permission, or someone finds pornographic Website or the advertisement of substantially false propaganda, side inputs the network address and the evidence obtaining network level of this website at user side.Wherein set Put different evidence obtaining network level can when evidence obtaining in addition to capturing page content corresponding to this target evidence obtaining network address, The content of the Webpage of N number of level under homepage can also be captured.
Step S2, extracts the relevant information of target evidence obtaining network address corresponding server, and network of collecting evidence target in real time The page screenshot that under address and this address, each level is corresponding.Wherein relevant information includes: IP address, routing iinformation, WEB application version This information, serve port, Webpage element (CSS style, JS script) and source file (picture, video, audio frequency).To page The sectional drawing in face have recorded page state at that time on the whole, wherein includes infringing content.Webpage is used by the present embodiment Webpage element (CSS style, JS script) and source file are individually recorded, simultaneously to webpage entirety sectional drawing, it is ensured that evidence obtaining Verity.
Step S3, by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, compressed package is arrived Save center from damage as the preservation of evidence.Wherein, user side can be the front end browser saving center from damage.
In the Internet evidence collecting method of the present embodiment, directly from the server that the target evidence obtaining network address is corresponding, obtain clothes The relevant information of business device and infringing content, owing to the safety of the webserver is high relative to the safety of client browser, Thus avoid and be easily tampered at client browser acquisition evidence, the problem that credibility is the highest.
In the present embodiment, also include after step S2: the relevant information of network address corresponding server of target being collected evidence is returned Being back to user side, user obtains these relevant informations to save center inquiry correspondence from damage subsequently through these relevant informations Save file from damage.
In order to make the evidence more credibility saved from damage, in step S3, by the content of relevant information and intercepting reality in internal memory Shi Jiami is also packaged into the compressed package of reference format.Directly encrypt in internal memory, will not be by malice or artificial amendment, it is ensured that adopt The original objectivity of collection data and accuracy.
Present invention also offers a kind of internet pick card device, as in figure 2 it is shown, include:
Address acquisition module 101, for obtaining the target evidence obtaining network address and the evidence obtaining network level of user side input;
Evidence obtaining module 102, for extracting the relevant information of target evidence obtaining network address corresponding server, and in real time to target The page screenshot that under the evidence obtaining network address and this address, each level is corresponding;
Sending module 103, for by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, Using compressed package to saving center from damage as the preservation of evidence.
Wherein, also include that information returns module: for the relevant letter by described target evidence obtaining network address corresponding server Breath is back to user side.
Wherein, described sending module is when encryption and encapsulation, specifically by the content of described relevant information and intercepting at internal memory In real-time encrypted and be packaged into the compressed package of reference format.
Present invention also offers a kind of the Internet safety system as it is shown on figure 3, include: user side 2, save from damage center 3 and on The internet pick card device 1 stated, internet pick card device 1 connects user side 2 and saves center 3 from damage.User is inputted by user side 2 The target evidence obtaining network address and evidence obtaining network level are transmitted to internet pick card device 1, and internet pick card device 1 extracts target and takes Demonstrate,prove the relevant information of network address corresponding server, and real-time interception relates to the content of infringement, by described relevant information and intercepting Content real-time encrypted and send after being packaged into the compressed package of reference format to saving center from damage and save 3 from damage.Wherein, user side 2 is for using Save hub head end interface in making user log in from damage, be front end browser
In the present embodiment, save center 3 from damage and include: go up transmission module 301, save module 302, account management module 303, identity from damage Authentication module 304, certificate module 305, authentication module 306, supervision module 307, the administration of justice are come to testify module 308, data memory module 309 and come to testify auditing module 310.
Upper transmission module 301 connects the sending module of internet pick card device 1, for receiving the pressure that sending module sends over Contracting bag, and compressed package is reached save module 302 from damage.Identity information is transmitted directly to transmission module 301, saves center from damage to log in, I.e. internet pick card device 1 is associated by the identity information of registration with saving center 3 from damage, can redirect from internet pick card device 1 Center 3 is saved in login from damage, without repeat logon.
Save module 302 from damage and receive video evidence obtaining file and the Hash digest value thereof that upper transmission module 301 is transmitted through, from account pipe Reason module 303 obtains the identity information saving people from damage, and leads to the data including Hash digest value and described identity information for parameter Cross hashing algorithm and calculate the overall situation supervision summary of described video evidence obtaining file, described video evidence obtaining file, overall situation supervision are plucked , described identity information synchronization distribution is to data memory module 309 and notary organization, judicial expertise mechanism, Arbitration Committee and method The server of institute, the server being sent to notary organization, judicial expertise mechanism, Arbitration Committee and law court preserves, to play just work With, improve the legitimacy of evidence.
Described account management module 303 is for saving the identity information registration of people, accounts information setting, security set, money from damage Produce management, managing bill, the binding of third party's account, freeze and nullify, and registration and the information transmission arranged are stored to data Module 309 stores.
Described authentication module 304 is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, face Identify service and the Third-party payment service for checking credentials, so that the identity information saving people from damage to be verified.Upper transmission module after being verified 301 just start to upload file (i.e. video evidence obtaining file) to be saved from damage.
Described certificate module 305 is for the video evidence obtaining file according to data memory module 309 storage, overall situation supervision summary Generate with the identity information saving people from damage, update or nullifies and save certificate from damage, and certificate transmission will be saved from damage deposit to data memory module 309 Storage, is additionally operable to send to saving people from damage described certificate of saving from damage.
Described authentication module 306 be used for verifying compressed package whether through saving from damage, or user at user side from saving center from damage 3 After carrying described compressed package, the local compressed package of checking with whether be stored in the compressed package saved from damage of data memory module 309 It is consistent.In case saving from damage, content that error in operation causes saving from damage is different or leakage is protected.
Supervision module 307 real-time reception saves the overall situation supervision summary that module 302 sends from damage, and by described overall situation supervision summary In the official website real-time release saving center 3, notary organization, judicial expertise mechanism, Arbitration Committee and law court from damage.
Administration of justice module 308 of coming to testify includes notarial certificate and judicial expertise report for receiving providing of saving that people proposes online from damage The request of coming to testify, and the described request of coming to testify is committed to auditing module 310 of coming to testify.
Auditing module of coming to testify 310 is for asking going out when saving people from damage of artificial described data memory module 309 storage in judgement Tool includes taking the evidence of notarial certificate and judicial expertise report, and returns claimant by described administration of justice module 308 of coming to testify.Go out Card auditing module 310 is for providing interface to audit card for the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court According to, thus it is effective to ensure to provide evidence.
Data memory module 309 is used for encrypting storage described overall situation supervision summary and video evidence obtaining file, and will be after encryption Overall situation supervision summary synchronized transmission store to the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court, and And video evidence obtaining file, overall situation supervision summary, identity information and accounts information store on different media.
Wherein, also include: law aid module 311, for receiving the online law request saving people from damage, and store from data Module 309 obtains and saves certificate from damage to make legal argument.
Wherein, save the overall situation supervision summary of the SHA-512 hashing algorithm calculating video evidence obtaining file that module 302 uses from damage, To ensure safety.
Wherein, the DEA that data memory module 309 uses for encrypting overall situation supervision summary includes: SHA- Any one in 512 hashing algorithms, DEA DES and message digest algorithm MD5.
Wherein, data memory module 309 is additionally operable to the overall situation supervision summary of current point in time at notary organization, judicial mirror Determine to announce on the website of mechanism, Arbitration Committee and law court.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (10)

1. a Internet evidence collecting method, it is characterised in that include step:
S1: obtain the target evidence obtaining network address and the evidence obtaining network level of user side input;
S2: extract the relevant information of target evidence obtaining network address corresponding server, and in real time to the target evidence obtaining network address and should The page screenshot that under address, each level is corresponding;
S3: by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, by compressed package to saving center from damage As the preservation of evidence.
2. the Internet as claimed in claim 1 evidence collecting method, it is characterised in that also include after described step S2: by described The relevant information of target evidence obtaining network address corresponding server is back to user side.
3. the Internet as claimed in claim 1 or 2 evidence collecting method, it is characterised in that in described step S3, by described relevant letter Breath and the content that intercepts are real-time encrypted and be packaged into the compressed package of reference format in internal memory.
4. an internet pick card device, it is characterised in that including:
Address acquisition module, for obtaining the target evidence obtaining network address and the evidence obtaining network level of user side input;
Evidence obtaining module, for extracting the relevant information of target evidence obtaining network address corresponding server, and net of in real time target being collected evidence The page screenshot that under network address and this address, each level is corresponding;
Sending module, for by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, by compressed package To saving center from damage as the preservation of evidence.
5. internet pick card device as claimed in claim 4, it is characterised in that also include that information returns module: for by institute The relevant information stating target evidence obtaining network address corresponding server is back to user side.
6. the internet pick card device as described in claim 4 or 5, it is characterised in that described sending module is in encryption and encapsulation Time, specifically by the content of described relevant information and intercepting in internal memory real-time encrypted and be packaged into the compressed package of reference format.
7. a Internet safety system, it is characterised in that including: user side, save from damage center and as in claim 4~6 appoint One described internet pick card device, described internet pick card device connects described user side and saves center from damage;Described user Hold target evidence obtaining network address user inputted and evidence obtaining network level transmission to described internet pick card device, described interconnection Net apparatus for obtaining evidence extracts the relevant information of target evidence obtaining network address corresponding server, and real-time interception relates to the content of infringement, By real-time encrypted for the content of described relevant information and intercepting and send after being packaged into the compressed package of reference format to saving center from damage and protect Entirely, described user side is used for making user log in and saves hub head end interface from damage.
8. the Internet as claimed in claim 7 safety system, it is characterised in that described in save center from damage and include: upper transmission module, guarantor Full module, account management module, authentication module, certificate module, authentication module, supervision module, the administration of justice are come to testify module, data Memory module and auditing module of coming to testify;
Described upper transmission module connects described sending module, for receiving the compressed package that described sending module sends over, and by institute State compressed package to reach and save module from damage;
Described module of saving from damage receives the compressed package that upper transmission module is transmitted through, and obtains the identity letter saving people from damage from account management module Breath, and calculate described compressed package complete for parameter by hashing algorithm with the data including standard time and described identity information Office's supervision summary, by described overall situation supervision summary, described identity information synchronization distribution to data memory module and notary organization, The server of judicial expertise mechanism, Arbitration Committee and law court;
Described account management module for save from damage the identity information registration of people, accounts information setting, security set, asset management, Managing bill, third party's account are bound, are freezed and nullify, and registration and the information transmission arranged are deposited to data memory module Storage;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, recognition of face clothes Business and the Third-party payment service for checking credentials, to verify the identity information saving people from damage;
Described certificate module is for the compressed package according to data memory module storage, overall situation supervision summary and the identity letter saving people from damage Breath generate, update or nullify and save certificate from damage, and will save from damage certificate transmission to data memory module storage, be additionally operable to save from damage described Certificate sends to saving people from damage;
Described authentication module is used for verifying whether compressed package passes through and saves from damage, or user downloads described pressure at user side from saving center from damage After contracting bag, whether the compressed package of checking this locality is consistent with the compressed package saved from damage being stored in data memory module;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and is being saved from damage by described overall situation supervision summary The official website real-time release of center, notary organization, judicial expertise mechanism, Arbitration Committee and law court;
Described administration of justice module of coming to testify includes notarial certificate and judicial expertise report for receiving providing of saving that people proposes online from damage The request of coming to testify, and the described request of coming to testify is committed to auditing module of coming to testify;
Described auditing module of coming to testify is for asking providing when saving people from damage of artificial described data memory module storage to include in judgement Notarial certificate and judicial expertise report take the evidence, and by the described administration of justice come to testify module return claimant;
Described data memory module is used for encrypting storage described overall situation supervision summary and compressed package, and by the overall situation supervision after encryption Summary synchronized transmission stores to the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court, and compressed package, Overall situation supervision summary, identity information and accounts information store on different media.
9. the Internet as claimed in claim 7 safety system, it is characterised in that described in save the SHA-512 that module uses from damage and dissipate Row algorithm calculates the overall situation supervision summary of described compressed package, and described data memory module is for encrypting what overall situation supervision summary used DEA includes: any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5.
10. the Internet as claimed in claim 7 safety system, it is characterised in that described data memory module is additionally operable to ought The overall situation supervision summary of front time point is announced on the website of notary organization, judicial expertise mechanism, Arbitration Committee and law court.
CN201610624505.4A 2016-08-02 2016-08-02 The Internet evidence collecting method, device and the Internet safety system Pending CN106254078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610624505.4A CN106254078A (en) 2016-08-02 2016-08-02 The Internet evidence collecting method, device and the Internet safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610624505.4A CN106254078A (en) 2016-08-02 2016-08-02 The Internet evidence collecting method, device and the Internet safety system

Publications (1)

Publication Number Publication Date
CN106254078A true CN106254078A (en) 2016-12-21

Family

ID=57606236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610624505.4A Pending CN106254078A (en) 2016-08-02 2016-08-02 The Internet evidence collecting method, device and the Internet safety system

Country Status (1)

Country Link
CN (1) CN106254078A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124281A (en) * 2017-05-05 2017-09-01 国信嘉宁数据技术有限公司 A kind of data security method and related system
CN107577729A (en) * 2017-08-23 2018-01-12 公安部第三研究所 One kind is based on twin-channel web data evidence collecting method and system
CN108470066A (en) * 2018-03-27 2018-08-31 芜湖乐锐思信息咨询有限公司 A kind of mobile Internet terminal evidence obtaining platform
CN108521362A (en) * 2018-04-05 2018-09-11 法信公证云(厦门)科技有限公司 A kind of network architecture and its access method based on P2P-VPN
CN108665243A (en) * 2018-05-09 2018-10-16 杭州安存网络科技有限公司 A kind of polymorphic type process flow automotive engine system of internet law court electronic evidence
CN109471993A (en) * 2018-10-09 2019-03-15 重庆易保全网络科技有限公司 Online webpage evidence collecting method, device, storage medium and equipment in real time
CN109816344A (en) * 2019-01-10 2019-05-28 法信公证云(厦门)科技有限公司 A kind of cooperating forensic method and terminal
CN111464778A (en) * 2020-02-25 2020-07-28 小卖科技有限公司 Method and device for data processing evidence obtaining with private protocol
WO2020233140A1 (en) * 2019-05-17 2020-11-26 创新先进技术有限公司 Infringement evidence storage method and apparatus based on blockchain, and electronic device
US10929570B2 (en) 2019-05-17 2021-02-23 Advanced New Technologies Co., Ltd. Method, apparatus, and electronic device for blockchain-based infringement evidence storage
CN114022117A (en) * 2021-11-04 2022-02-08 深圳市大恒数据安全科技有限责任公司 Method for online calling electronic evidence based on Hongmon cooperative cloud platform
CN114257408A (en) * 2021-11-18 2022-03-29 珠海金智维信息科技有限公司 Network space data acquisition method, system and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021349A (en) * 2014-04-03 2014-09-03 福建伊时代信息科技股份有限公司 Network evidence beforehand preservation method and preservation device
CN104199962A (en) * 2014-09-19 2014-12-10 合肥工业大学 Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
CN104580242A (en) * 2015-01-22 2015-04-29 杭州安存网络科技有限公司 Web page evidence preservation method and device
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021349A (en) * 2014-04-03 2014-09-03 福建伊时代信息科技股份有限公司 Network evidence beforehand preservation method and preservation device
CN104199962A (en) * 2014-09-19 2014-12-10 合肥工业大学 Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
CN104580242A (en) * 2015-01-22 2015-04-29 杭州安存网络科技有限公司 Web page evidence preservation method and device
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124281A (en) * 2017-05-05 2017-09-01 国信嘉宁数据技术有限公司 A kind of data security method and related system
CN107577729A (en) * 2017-08-23 2018-01-12 公安部第三研究所 One kind is based on twin-channel web data evidence collecting method and system
CN107577729B (en) * 2017-08-23 2021-06-15 公安部第三研究所 Webpage data evidence obtaining method and system based on two channels
CN108470066A (en) * 2018-03-27 2018-08-31 芜湖乐锐思信息咨询有限公司 A kind of mobile Internet terminal evidence obtaining platform
CN108521362B (en) * 2018-04-05 2020-11-24 法信公证云(厦门)科技有限公司 Network architecture based on P2P-VPN and access method thereof
CN108521362A (en) * 2018-04-05 2018-09-11 法信公证云(厦门)科技有限公司 A kind of network architecture and its access method based on P2P-VPN
CN108665243A (en) * 2018-05-09 2018-10-16 杭州安存网络科技有限公司 A kind of polymorphic type process flow automotive engine system of internet law court electronic evidence
CN109471993A (en) * 2018-10-09 2019-03-15 重庆易保全网络科技有限公司 Online webpage evidence collecting method, device, storage medium and equipment in real time
CN109816344A (en) * 2019-01-10 2019-05-28 法信公证云(厦门)科技有限公司 A kind of cooperating forensic method and terminal
US10929570B2 (en) 2019-05-17 2021-02-23 Advanced New Technologies Co., Ltd. Method, apparatus, and electronic device for blockchain-based infringement evidence storage
CN112199738A (en) * 2019-05-17 2021-01-08 创新先进技术有限公司 Method and device for infringement and evidence preservation based on block chain and electronic equipment
WO2020233140A1 (en) * 2019-05-17 2020-11-26 创新先进技术有限公司 Infringement evidence storage method and apparatus based on blockchain, and electronic device
US11138345B2 (en) 2019-05-17 2021-10-05 Advanced New Technologies Co., Ltd. Method, apparatus, and electronic device for blockchain-based infringement evidence storage
CN112199738B (en) * 2019-05-17 2024-03-08 创新先进技术有限公司 Infringement evidence method and device based on blockchain and electronic equipment
CN111464778A (en) * 2020-02-25 2020-07-28 小卖科技有限公司 Method and device for data processing evidence obtaining with private protocol
CN111464778B (en) * 2020-02-25 2022-03-04 小卖科技有限公司 Method and device for data processing evidence obtaining with private protocol
CN114022117A (en) * 2021-11-04 2022-02-08 深圳市大恒数据安全科技有限责任公司 Method for online calling electronic evidence based on Hongmon cooperative cloud platform
CN114257408A (en) * 2021-11-18 2022-03-29 珠海金智维信息科技有限公司 Network space data acquisition method, system and medium

Similar Documents

Publication Publication Date Title
CN106254078A (en) The Internet evidence collecting method, device and the Internet safety system
CN106130987B (en) Internet evidence collecting method, device and internet safety system
CN105046168A (en) Network electron evidence processing system and processing method
CN106792267B (en) A kind of picture and video information authenticity mark and the system and method that identify
CN107888375A (en) A kind of electronic evidence safety system and method based on block chain technology
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN106682457A (en) Picture copyright protection method and picture copyright protection system based on blockchain technology
CN101075866B (en) Method and system for loading message on Internet
CN105635169A (en) Electronic contract signing method based on the internet
CN105591744A (en) Network real-name authentication method and system
CN102325139A (en) Electronic document processing method, processing system and verification system
CN105007301A (en) Electronic evidence processing system and method based on social platform
CN110868300A (en) Block chain evidence storage method and system
CN104580240A (en) Chat evidence fixing method and device
CN113672998B (en) Anti-counterfeiting method and system for data in construction process of constructional engineering
CN104539636B (en) video evidence service system
CN109447809A (en) A kind of video active identification method of combination block chain
CN108701308A (en) System for issuing public certificate based on block chain and the method for issuing public certificate based on block chain using the system
CN110689348B (en) Revenue verification method, device, terminal and medium based on alliance chain
CN108900472B (en) Information transmission method and device
US20190164201A1 (en) Trustworthy review system and method for legitimizing a review
CN106713297A (en) Electronic data fixing platform based on cloud service
CN110472128A (en) Webpage evidence collecting method, device, storage medium and server based on image recognition
US11621977B2 (en) Network forensic system for performing transmission metadata tracking and analysis
CN102004874A (en) Digital resource monitoring and early warning method based on synthetic characteristics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161221