CN106254078A - The Internet evidence collecting method, device and the Internet safety system - Google Patents
The Internet evidence collecting method, device and the Internet safety system Download PDFInfo
- Publication number
- CN106254078A CN106254078A CN201610624505.4A CN201610624505A CN106254078A CN 106254078 A CN106254078 A CN 106254078A CN 201610624505 A CN201610624505 A CN 201610624505A CN 106254078 A CN106254078 A CN 106254078A
- Authority
- CN
- China
- Prior art keywords
- module
- damage
- internet
- compressed package
- evidence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to Internet technical field, disclose a kind of the Internet evidence collecting method, including step: S1: obtain the target evidence obtaining network address and the evidence obtaining network level of user side input;S2: extract the relevant information of target evidence obtaining network address corresponding server, and real-time interception relates to the content of infringement;S3: by real-time encrypted for the content of described relevant information and intercepting and be packaged into the compressed package of reference format, be delivered to compressed package save center from damage as the preservation of evidence.The Internet evidence collecting method of the present invention, device and the Internet safety system, from the server that the target evidence obtaining network address is corresponding, directly obtain relevant information and the infringing content of server, owing to the safety of the webserver is high relative to the safety of client browser, thus avoid and be easily tampered at client browser acquisition evidence, the problem that credibility is the highest.
Description
Technical field
The present invention relates to Internet technical field, save from damage particularly to a kind of the Internet evidence collecting method, device and the Internet
System.
Background technology
Along with the Internet, the emergence of mobile Internet, the advertisement information of Web realease gets more and more, and online transaction the most more comes
The most frequent, increasing original works pours in network, and the authorship for large quantities of New Times brings income.
Online promotional messages is probably what falseness deceived people, and user is difficult to the page before finding, i.e. after being once taken in
Save the publicity page before being allowed to, due to network security cause distort, the easy characteristic such as fraud, preserve at browser end before
The page be also not enough to become strong evidence.
In like manner, the JICQ of the webpage version chat record when online transaction is utilized to be likely to be faked or usurp
Change, be also not enough to prove the dealing agreement that both sides reach before transaction.
And the Internet infringement has also become a great problem of puzzlement authorship.Works in the Internet are made with electronic data
For carrier, once encroaching right, difficulty of not only collecting evidence, evidence is the most easily obliterated amendment, as infringing party is denied, in judicial decision again
Lacking objective evidence, authorship is difficult to safeguard number one.
Therefore, prior art occurs in that some save center from damage for the Internet saving e-file from damage, for by electronics literary composition
Part encryption security, but only saved this e-file from damage.For the e-file as the preservation of evidence, just having before saving from damage can
Can be tampered, or itself is untrue, such as: when browsing webpage, find the message of false propaganda, then pass through QQ screenshotss or
Screen print screenshotss are as evidence, but due to characteristics such as internet security is the highest, Webpage easily frauds, it is impossible to ensure electricity
Subfile, as the true and false property of evidence, causes Certainty Factor low, it is impossible to be used for evidence.
Summary of the invention
The present invention proposes a kind of the Internet evidence collecting method, device and the Internet safety system, solves network in prior art
Collect evidence problem with a low credibility.
A kind of the Internet evidence collecting method of the present invention, including step:
S1: obtain the target evidence obtaining network address and the evidence obtaining network level of user side input;
S2: extract the relevant information of target evidence obtaining network address corresponding server, and the network address of in real time target being collected evidence
And the page screenshot that under this address, each level is corresponding;
S3: by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, by compressed package to saving from damage
Center is as the preservation of evidence.
Wherein, also include after described step S2: by the relevant information of described target evidence obtaining network address corresponding server
It is back to user side.
Wherein, in described step S3, by the content of described relevant information and intercepting in internal memory real-time encrypted and be packaged into
The compressed package of reference format.
Present invention also offers a kind of internet pick card device, including:
Address acquisition module, for obtaining the target evidence obtaining network address and the evidence obtaining network level of user side input;
Evidence obtaining module, for extracting the relevant information of target evidence obtaining network address corresponding server, and takes target in real time
The page screenshot that under the card network address and this address, each level is corresponding;
Sending module, for by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, will pressure
Contracting bag is to saving center from damage as the preservation of evidence.
Wherein, also include that information returns module: for the relevant letter by described target evidence obtaining network address corresponding server
Breath is back to user side.
Wherein, described sending module is when encryption and encapsulation, specifically by the content of described relevant information and intercepting at internal memory
In real-time encrypted and be packaged into the compressed package of reference format.
Present invention also offers a kind of the Internet safety system, including: user side, save from damage described in center and any of the above-described item
Internet pick card device, described internet pick card device connects described user side and save center from damage;Described user side is by user
The target evidence obtaining network address of input and evidence obtaining network level transmission are to described internet pick card device, described the Internet evidence obtaining dress
Put the relevant information extracting target evidence obtaining network address corresponding server, and real-time interception relates to the content of infringement, by described phase
The content of pass information and intercepting is real-time encrypted and sends after being packaged into the compressed package of reference format to saving center from damage and saves from damage, described use
Family end is used for making user log in and saves hub head end interface from damage.
Wherein, save center described in from damage to include: go up transmission module, save module, account management module, authentication module, card from damage
Book module, authentication module, supervision module, the administration of justice are come to testify module, data memory module and auditing module of coming to testify;
Described upper transmission module connects described sending module, for receiving the compressed package that described sending module sends over, and
Described compressed package is reached and saves module from damage;
Described module of saving from damage receives the compressed package that upper transmission module is transmitted through, and obtains the identity saving people from damage from account management module
Information, and calculate described compressed package for parameter by hashing algorithm with the data including standard time and described identity information
Overall situation supervision summary, by described overall situation supervision summary, described identity information synchronization distribution to data memory module and notary machine
Structure, judicial expertise mechanism, Arbitration Committee and the server of law court;
Described account management module is for saving the identity information registration of people, accounts information setting, security set, Assets Reorganization Taking from damage
Reason, managing bill, third party's account are bound, are freezed and nullify, and send registration and the information arranged to data memory module
Storage;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, face are known
Fu Wu be with the Third-party payment service for checking credentials, so that the identity information saving people from damage is verified;
Described certificate module is for the compressed package according to data memory module storage, overall situation supervision summary and the body saving people from damage
Part information generates, updates or nullifies and save certificate from damage, and will save certificate transmission from damage to data memory module storage, is additionally operable to described
Save certificate from damage to send to saving people from damage;
Described authentication module is used for verifying whether compressed package passes through and saves from damage, or user downloads institute at user side from saving center from damage
After stating compressed package, whether the compressed package of checking this locality is consistent with the compressed package saved from damage being stored in data memory module;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and is existed by described overall situation supervision summary
Save the official website real-time release of center, notary organization, judicial expertise mechanism, Arbitration Committee and law court from damage;
Described administration of justice module of coming to testify includes notarial certificate and judicial expertise report for receiving providing of saving that people proposes online from damage
The request of coming to testify accused, and the described request of coming to testify is committed to auditing module of coming to testify;
Described auditing module of coming to testify is for asking providing when saving people from damage of artificial described data memory module storage in judgement
Including taking the evidence that notarial certificate and judicial expertise are reported, and come to testify module return claimant by the described administration of justice;
Described data memory module is used for encrypting storage described overall situation supervision summary and compressed package, and by the overall situation after encryption
Supervision summary synchronized transmission stores to the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court, and compresses
Bag, overall situation supervision summary, identity information and accounts information store on different media.
Wherein, the overall situation saving the SHA-512 hashing algorithm described compressed package of calculating that module uses described in from damage supervises summary, institute
State data memory module to include for the DEA encrypting overall situation supervision summary employing: SHA-512 hashing algorithm, data
Any one in AES DES and message digest algorithm MD5.
Wherein, described data memory module is additionally operable to the overall situation supervision summary of current point in time in notary organization, the administration of justice
Announce on the website of appraisal organization, Arbitration Committee and law court.
The Internet evidence collecting method of the present invention, device and the Internet safety system, directly from the target evidence obtaining network address pair
The server answered obtains relevant information and the infringing content of server, owing to the safety of the webserver is relative to client
The safety of browser is high, thus avoids and be easily tampered at client browser acquisition evidence, the problem that credibility is the highest.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, also may be used
To obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of the Internet evidence obtaining method flow diagram of the present invention;
Fig. 2 is a kind of internet pick card device structural representation of the present invention;
Fig. 3 is a kind of the Internet safety system structural representation of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
A kind of the Internet evidence collecting method of the present embodiment is as it is shown in figure 1, include:
Step S1, obtains the target evidence obtaining network address and the evidence obtaining network level of user side input.Such as: network works
(novel or micro-film etc.) authorship finds that certain website uploads oneself network works without permission, or someone finds pornographic
Website or the advertisement of substantially false propaganda, side inputs the network address and the evidence obtaining network level of this website at user side.Wherein set
Put different evidence obtaining network level can when evidence obtaining in addition to capturing page content corresponding to this target evidence obtaining network address,
The content of the Webpage of N number of level under homepage can also be captured.
Step S2, extracts the relevant information of target evidence obtaining network address corresponding server, and network of collecting evidence target in real time
The page screenshot that under address and this address, each level is corresponding.Wherein relevant information includes: IP address, routing iinformation, WEB application version
This information, serve port, Webpage element (CSS style, JS script) and source file (picture, video, audio frequency).To page
The sectional drawing in face have recorded page state at that time on the whole, wherein includes infringing content.Webpage is used by the present embodiment
Webpage element (CSS style, JS script) and source file are individually recorded, simultaneously to webpage entirety sectional drawing, it is ensured that evidence obtaining
Verity.
Step S3, by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, compressed package is arrived
Save center from damage as the preservation of evidence.Wherein, user side can be the front end browser saving center from damage.
In the Internet evidence collecting method of the present embodiment, directly from the server that the target evidence obtaining network address is corresponding, obtain clothes
The relevant information of business device and infringing content, owing to the safety of the webserver is high relative to the safety of client browser,
Thus avoid and be easily tampered at client browser acquisition evidence, the problem that credibility is the highest.
In the present embodiment, also include after step S2: the relevant information of network address corresponding server of target being collected evidence is returned
Being back to user side, user obtains these relevant informations to save center inquiry correspondence from damage subsequently through these relevant informations
Save file from damage.
In order to make the evidence more credibility saved from damage, in step S3, by the content of relevant information and intercepting reality in internal memory
Shi Jiami is also packaged into the compressed package of reference format.Directly encrypt in internal memory, will not be by malice or artificial amendment, it is ensured that adopt
The original objectivity of collection data and accuracy.
Present invention also offers a kind of internet pick card device, as in figure 2 it is shown, include:
Address acquisition module 101, for obtaining the target evidence obtaining network address and the evidence obtaining network level of user side input;
Evidence obtaining module 102, for extracting the relevant information of target evidence obtaining network address corresponding server, and in real time to target
The page screenshot that under the evidence obtaining network address and this address, each level is corresponding;
Sending module 103, for by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format,
Using compressed package to saving center from damage as the preservation of evidence.
Wherein, also include that information returns module: for the relevant letter by described target evidence obtaining network address corresponding server
Breath is back to user side.
Wherein, described sending module is when encryption and encapsulation, specifically by the content of described relevant information and intercepting at internal memory
In real-time encrypted and be packaged into the compressed package of reference format.
Present invention also offers a kind of the Internet safety system as it is shown on figure 3, include: user side 2, save from damage center 3 and on
The internet pick card device 1 stated, internet pick card device 1 connects user side 2 and saves center 3 from damage.User is inputted by user side 2
The target evidence obtaining network address and evidence obtaining network level are transmitted to internet pick card device 1, and internet pick card device 1 extracts target and takes
Demonstrate,prove the relevant information of network address corresponding server, and real-time interception relates to the content of infringement, by described relevant information and intercepting
Content real-time encrypted and send after being packaged into the compressed package of reference format to saving center from damage and save 3 from damage.Wherein, user side 2 is for using
Save hub head end interface in making user log in from damage, be front end browser
In the present embodiment, save center 3 from damage and include: go up transmission module 301, save module 302, account management module 303, identity from damage
Authentication module 304, certificate module 305, authentication module 306, supervision module 307, the administration of justice are come to testify module 308, data memory module
309 and come to testify auditing module 310.
Upper transmission module 301 connects the sending module of internet pick card device 1, for receiving the pressure that sending module sends over
Contracting bag, and compressed package is reached save module 302 from damage.Identity information is transmitted directly to transmission module 301, saves center from damage to log in,
I.e. internet pick card device 1 is associated by the identity information of registration with saving center 3 from damage, can redirect from internet pick card device 1
Center 3 is saved in login from damage, without repeat logon.
Save module 302 from damage and receive video evidence obtaining file and the Hash digest value thereof that upper transmission module 301 is transmitted through, from account pipe
Reason module 303 obtains the identity information saving people from damage, and leads to the data including Hash digest value and described identity information for parameter
Cross hashing algorithm and calculate the overall situation supervision summary of described video evidence obtaining file, described video evidence obtaining file, overall situation supervision are plucked
, described identity information synchronization distribution is to data memory module 309 and notary organization, judicial expertise mechanism, Arbitration Committee and method
The server of institute, the server being sent to notary organization, judicial expertise mechanism, Arbitration Committee and law court preserves, to play just work
With, improve the legitimacy of evidence.
Described account management module 303 is for saving the identity information registration of people, accounts information setting, security set, money from damage
Produce management, managing bill, the binding of third party's account, freeze and nullify, and registration and the information transmission arranged are stored to data
Module 309 stores.
Described authentication module 304 is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, face
Identify service and the Third-party payment service for checking credentials, so that the identity information saving people from damage to be verified.Upper transmission module after being verified
301 just start to upload file (i.e. video evidence obtaining file) to be saved from damage.
Described certificate module 305 is for the video evidence obtaining file according to data memory module 309 storage, overall situation supervision summary
Generate with the identity information saving people from damage, update or nullifies and save certificate from damage, and certificate transmission will be saved from damage deposit to data memory module 309
Storage, is additionally operable to send to saving people from damage described certificate of saving from damage.
Described authentication module 306 be used for verifying compressed package whether through saving from damage, or user at user side from saving center from damage 3
After carrying described compressed package, the local compressed package of checking with whether be stored in the compressed package saved from damage of data memory module 309
It is consistent.In case saving from damage, content that error in operation causes saving from damage is different or leakage is protected.
Supervision module 307 real-time reception saves the overall situation supervision summary that module 302 sends from damage, and by described overall situation supervision summary
In the official website real-time release saving center 3, notary organization, judicial expertise mechanism, Arbitration Committee and law court from damage.
Administration of justice module 308 of coming to testify includes notarial certificate and judicial expertise report for receiving providing of saving that people proposes online from damage
The request of coming to testify, and the described request of coming to testify is committed to auditing module 310 of coming to testify.
Auditing module of coming to testify 310 is for asking going out when saving people from damage of artificial described data memory module 309 storage in judgement
Tool includes taking the evidence of notarial certificate and judicial expertise report, and returns claimant by described administration of justice module 308 of coming to testify.Go out
Card auditing module 310 is for providing interface to audit card for the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court
According to, thus it is effective to ensure to provide evidence.
Data memory module 309 is used for encrypting storage described overall situation supervision summary and video evidence obtaining file, and will be after encryption
Overall situation supervision summary synchronized transmission store to the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court, and
And video evidence obtaining file, overall situation supervision summary, identity information and accounts information store on different media.
Wherein, also include: law aid module 311, for receiving the online law request saving people from damage, and store from data
Module 309 obtains and saves certificate from damage to make legal argument.
Wherein, save the overall situation supervision summary of the SHA-512 hashing algorithm calculating video evidence obtaining file that module 302 uses from damage,
To ensure safety.
Wherein, the DEA that data memory module 309 uses for encrypting overall situation supervision summary includes: SHA-
Any one in 512 hashing algorithms, DEA DES and message digest algorithm MD5.
Wherein, data memory module 309 is additionally operable to the overall situation supervision summary of current point in time at notary organization, judicial mirror
Determine to announce on the website of mechanism, Arbitration Committee and law court.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (10)
1. a Internet evidence collecting method, it is characterised in that include step:
S1: obtain the target evidence obtaining network address and the evidence obtaining network level of user side input;
S2: extract the relevant information of target evidence obtaining network address corresponding server, and in real time to the target evidence obtaining network address and should
The page screenshot that under address, each level is corresponding;
S3: by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, by compressed package to saving center from damage
As the preservation of evidence.
2. the Internet as claimed in claim 1 evidence collecting method, it is characterised in that also include after described step S2: by described
The relevant information of target evidence obtaining network address corresponding server is back to user side.
3. the Internet as claimed in claim 1 or 2 evidence collecting method, it is characterised in that in described step S3, by described relevant letter
Breath and the content that intercepts are real-time encrypted and be packaged into the compressed package of reference format in internal memory.
4. an internet pick card device, it is characterised in that including:
Address acquisition module, for obtaining the target evidence obtaining network address and the evidence obtaining network level of user side input;
Evidence obtaining module, for extracting the relevant information of target evidence obtaining network address corresponding server, and net of in real time target being collected evidence
The page screenshot that under network address and this address, each level is corresponding;
Sending module, for by real-time encrypted to described relevant information and sectional drawing, be packaged into the compressed package of reference format, by compressed package
To saving center from damage as the preservation of evidence.
5. internet pick card device as claimed in claim 4, it is characterised in that also include that information returns module: for by institute
The relevant information stating target evidence obtaining network address corresponding server is back to user side.
6. the internet pick card device as described in claim 4 or 5, it is characterised in that described sending module is in encryption and encapsulation
Time, specifically by the content of described relevant information and intercepting in internal memory real-time encrypted and be packaged into the compressed package of reference format.
7. a Internet safety system, it is characterised in that including: user side, save from damage center and as in claim 4~6 appoint
One described internet pick card device, described internet pick card device connects described user side and saves center from damage;Described user
Hold target evidence obtaining network address user inputted and evidence obtaining network level transmission to described internet pick card device, described interconnection
Net apparatus for obtaining evidence extracts the relevant information of target evidence obtaining network address corresponding server, and real-time interception relates to the content of infringement,
By real-time encrypted for the content of described relevant information and intercepting and send after being packaged into the compressed package of reference format to saving center from damage and protect
Entirely, described user side is used for making user log in and saves hub head end interface from damage.
8. the Internet as claimed in claim 7 safety system, it is characterised in that described in save center from damage and include: upper transmission module, guarantor
Full module, account management module, authentication module, certificate module, authentication module, supervision module, the administration of justice are come to testify module, data
Memory module and auditing module of coming to testify;
Described upper transmission module connects described sending module, for receiving the compressed package that described sending module sends over, and by institute
State compressed package to reach and save module from damage;
Described module of saving from damage receives the compressed package that upper transmission module is transmitted through, and obtains the identity letter saving people from damage from account management module
Breath, and calculate described compressed package complete for parameter by hashing algorithm with the data including standard time and described identity information
Office's supervision summary, by described overall situation supervision summary, described identity information synchronization distribution to data memory module and notary organization,
The server of judicial expertise mechanism, Arbitration Committee and law court;
Described account management module for save from damage the identity information registration of people, accounts information setting, security set, asset management,
Managing bill, third party's account are bound, are freezed and nullify, and registration and the information transmission arranged are deposited to data memory module
Storage;
Described authentication module is used for accessing the service of CA digital certificate authentication, authentication four Feature Service, recognition of face clothes
Business and the Third-party payment service for checking credentials, to verify the identity information saving people from damage;
Described certificate module is for the compressed package according to data memory module storage, overall situation supervision summary and the identity letter saving people from damage
Breath generate, update or nullify and save certificate from damage, and will save from damage certificate transmission to data memory module storage, be additionally operable to save from damage described
Certificate sends to saving people from damage;
Described authentication module is used for verifying whether compressed package passes through and saves from damage, or user downloads described pressure at user side from saving center from damage
After contracting bag, whether the compressed package of checking this locality is consistent with the compressed package saved from damage being stored in data memory module;
Described supervision module real-time reception saves the overall situation supervision summary that module sends from damage, and is being saved from damage by described overall situation supervision summary
The official website real-time release of center, notary organization, judicial expertise mechanism, Arbitration Committee and law court;
Described administration of justice module of coming to testify includes notarial certificate and judicial expertise report for receiving providing of saving that people proposes online from damage
The request of coming to testify, and the described request of coming to testify is committed to auditing module of coming to testify;
Described auditing module of coming to testify is for asking providing when saving people from damage of artificial described data memory module storage to include in judgement
Notarial certificate and judicial expertise report take the evidence, and by the described administration of justice come to testify module return claimant;
Described data memory module is used for encrypting storage described overall situation supervision summary and compressed package, and by the overall situation supervision after encryption
Summary synchronized transmission stores to the server of notary organization, judicial expertise mechanism, Arbitration Committee and law court, and compressed package,
Overall situation supervision summary, identity information and accounts information store on different media.
9. the Internet as claimed in claim 7 safety system, it is characterised in that described in save the SHA-512 that module uses from damage and dissipate
Row algorithm calculates the overall situation supervision summary of described compressed package, and described data memory module is for encrypting what overall situation supervision summary used
DEA includes: any one in SHA-512 hashing algorithm, DEA DES and message digest algorithm MD5.
10. the Internet as claimed in claim 7 safety system, it is characterised in that described data memory module is additionally operable to ought
The overall situation supervision summary of front time point is announced on the website of notary organization, judicial expertise mechanism, Arbitration Committee and law court.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610624505.4A CN106254078A (en) | 2016-08-02 | 2016-08-02 | The Internet evidence collecting method, device and the Internet safety system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610624505.4A CN106254078A (en) | 2016-08-02 | 2016-08-02 | The Internet evidence collecting method, device and the Internet safety system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106254078A true CN106254078A (en) | 2016-12-21 |
Family
ID=57606236
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610624505.4A Pending CN106254078A (en) | 2016-08-02 | 2016-08-02 | The Internet evidence collecting method, device and the Internet safety system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106254078A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124281A (en) * | 2017-05-05 | 2017-09-01 | 国信嘉宁数据技术有限公司 | A kind of data security method and related system |
CN107577729A (en) * | 2017-08-23 | 2018-01-12 | 公安部第三研究所 | One kind is based on twin-channel web data evidence collecting method and system |
CN108470066A (en) * | 2018-03-27 | 2018-08-31 | 芜湖乐锐思信息咨询有限公司 | A kind of mobile Internet terminal evidence obtaining platform |
CN108521362A (en) * | 2018-04-05 | 2018-09-11 | 法信公证云(厦门)科技有限公司 | A kind of network architecture and its access method based on P2P-VPN |
CN108665243A (en) * | 2018-05-09 | 2018-10-16 | 杭州安存网络科技有限公司 | A kind of polymorphic type process flow automotive engine system of internet law court electronic evidence |
CN109471993A (en) * | 2018-10-09 | 2019-03-15 | 重庆易保全网络科技有限公司 | Online webpage evidence collecting method, device, storage medium and equipment in real time |
CN109816344A (en) * | 2019-01-10 | 2019-05-28 | 法信公证云(厦门)科技有限公司 | A kind of cooperating forensic method and terminal |
CN111464778A (en) * | 2020-02-25 | 2020-07-28 | 小卖科技有限公司 | Method and device for data processing evidence obtaining with private protocol |
WO2020233140A1 (en) * | 2019-05-17 | 2020-11-26 | 创新先进技术有限公司 | Infringement evidence storage method and apparatus based on blockchain, and electronic device |
US10929570B2 (en) | 2019-05-17 | 2021-02-23 | Advanced New Technologies Co., Ltd. | Method, apparatus, and electronic device for blockchain-based infringement evidence storage |
CN114022117A (en) * | 2021-11-04 | 2022-02-08 | 深圳市大恒数据安全科技有限责任公司 | Method for online calling electronic evidence based on Hongmon cooperative cloud platform |
CN114257408A (en) * | 2021-11-18 | 2022-03-29 | 珠海金智维信息科技有限公司 | Network space data acquisition method, system and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021349A (en) * | 2014-04-03 | 2014-09-03 | 福建伊时代信息科技股份有限公司 | Network evidence beforehand preservation method and preservation device |
CN104199962A (en) * | 2014-09-19 | 2014-12-10 | 合肥工业大学 | Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model |
CN104580242A (en) * | 2015-01-22 | 2015-04-29 | 杭州安存网络科技有限公司 | Web page evidence preservation method and device |
CN105701367A (en) * | 2016-03-21 | 2016-06-22 | 冯颖 | Security system for Internet original commercial works |
-
2016
- 2016-08-02 CN CN201610624505.4A patent/CN106254078A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021349A (en) * | 2014-04-03 | 2014-09-03 | 福建伊时代信息科技股份有限公司 | Network evidence beforehand preservation method and preservation device |
CN104199962A (en) * | 2014-09-19 | 2014-12-10 | 合肥工业大学 | Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model |
CN104580242A (en) * | 2015-01-22 | 2015-04-29 | 杭州安存网络科技有限公司 | Web page evidence preservation method and device |
CN105701367A (en) * | 2016-03-21 | 2016-06-22 | 冯颖 | Security system for Internet original commercial works |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124281A (en) * | 2017-05-05 | 2017-09-01 | 国信嘉宁数据技术有限公司 | A kind of data security method and related system |
CN107577729A (en) * | 2017-08-23 | 2018-01-12 | 公安部第三研究所 | One kind is based on twin-channel web data evidence collecting method and system |
CN107577729B (en) * | 2017-08-23 | 2021-06-15 | 公安部第三研究所 | Webpage data evidence obtaining method and system based on two channels |
CN108470066A (en) * | 2018-03-27 | 2018-08-31 | 芜湖乐锐思信息咨询有限公司 | A kind of mobile Internet terminal evidence obtaining platform |
CN108521362B (en) * | 2018-04-05 | 2020-11-24 | 法信公证云(厦门)科技有限公司 | Network architecture based on P2P-VPN and access method thereof |
CN108521362A (en) * | 2018-04-05 | 2018-09-11 | 法信公证云(厦门)科技有限公司 | A kind of network architecture and its access method based on P2P-VPN |
CN108665243A (en) * | 2018-05-09 | 2018-10-16 | 杭州安存网络科技有限公司 | A kind of polymorphic type process flow automotive engine system of internet law court electronic evidence |
CN109471993A (en) * | 2018-10-09 | 2019-03-15 | 重庆易保全网络科技有限公司 | Online webpage evidence collecting method, device, storage medium and equipment in real time |
CN109816344A (en) * | 2019-01-10 | 2019-05-28 | 法信公证云(厦门)科技有限公司 | A kind of cooperating forensic method and terminal |
US10929570B2 (en) | 2019-05-17 | 2021-02-23 | Advanced New Technologies Co., Ltd. | Method, apparatus, and electronic device for blockchain-based infringement evidence storage |
CN112199738A (en) * | 2019-05-17 | 2021-01-08 | 创新先进技术有限公司 | Method and device for infringement and evidence preservation based on block chain and electronic equipment |
WO2020233140A1 (en) * | 2019-05-17 | 2020-11-26 | 创新先进技术有限公司 | Infringement evidence storage method and apparatus based on blockchain, and electronic device |
US11138345B2 (en) | 2019-05-17 | 2021-10-05 | Advanced New Technologies Co., Ltd. | Method, apparatus, and electronic device for blockchain-based infringement evidence storage |
CN112199738B (en) * | 2019-05-17 | 2024-03-08 | 创新先进技术有限公司 | Infringement evidence method and device based on blockchain and electronic equipment |
CN111464778A (en) * | 2020-02-25 | 2020-07-28 | 小卖科技有限公司 | Method and device for data processing evidence obtaining with private protocol |
CN111464778B (en) * | 2020-02-25 | 2022-03-04 | 小卖科技有限公司 | Method and device for data processing evidence obtaining with private protocol |
CN114022117A (en) * | 2021-11-04 | 2022-02-08 | 深圳市大恒数据安全科技有限责任公司 | Method for online calling electronic evidence based on Hongmon cooperative cloud platform |
CN114257408A (en) * | 2021-11-18 | 2022-03-29 | 珠海金智维信息科技有限公司 | Network space data acquisition method, system and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106254078A (en) | The Internet evidence collecting method, device and the Internet safety system | |
CN106130987B (en) | Internet evidence collecting method, device and internet safety system | |
CN105046168A (en) | Network electron evidence processing system and processing method | |
CN106792267B (en) | A kind of picture and video information authenticity mark and the system and method that identify | |
CN107888375A (en) | A kind of electronic evidence safety system and method based on block chain technology | |
CN108537046A (en) | A kind of online contract signature system and method based on block chain technology | |
CN106682457A (en) | Picture copyright protection method and picture copyright protection system based on blockchain technology | |
CN101075866B (en) | Method and system for loading message on Internet | |
CN105635169A (en) | Electronic contract signing method based on the internet | |
CN105591744A (en) | Network real-name authentication method and system | |
CN102325139A (en) | Electronic document processing method, processing system and verification system | |
CN105007301A (en) | Electronic evidence processing system and method based on social platform | |
CN110868300A (en) | Block chain evidence storage method and system | |
CN104580240A (en) | Chat evidence fixing method and device | |
CN113672998B (en) | Anti-counterfeiting method and system for data in construction process of constructional engineering | |
CN104539636B (en) | video evidence service system | |
CN109447809A (en) | A kind of video active identification method of combination block chain | |
CN108701308A (en) | System for issuing public certificate based on block chain and the method for issuing public certificate based on block chain using the system | |
CN110689348B (en) | Revenue verification method, device, terminal and medium based on alliance chain | |
CN108900472B (en) | Information transmission method and device | |
US20190164201A1 (en) | Trustworthy review system and method for legitimizing a review | |
CN106713297A (en) | Electronic data fixing platform based on cloud service | |
CN110472128A (en) | Webpage evidence collecting method, device, storage medium and server based on image recognition | |
US11621977B2 (en) | Network forensic system for performing transmission metadata tracking and analysis | |
CN102004874A (en) | Digital resource monitoring and early warning method based on synthetic characteristics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |