CN108022194A - Law-enforcing recorder and its data safety processing method, server and system - Google Patents

Law-enforcing recorder and its data safety processing method, server and system Download PDF

Info

Publication number
CN108022194A
CN108022194A CN201711231839.6A CN201711231839A CN108022194A CN 108022194 A CN108022194 A CN 108022194A CN 201711231839 A CN201711231839 A CN 201711231839A CN 108022194 A CN108022194 A CN 108022194A
Authority
CN
China
Prior art keywords
law
enforcing recorder
certificate
file
digital certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711231839.6A
Other languages
Chinese (zh)
Inventor
明家万
周伟明
袁绪龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HUADEAN TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN HUADEAN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN HUADEAN TECHNOLOGY Co Ltd filed Critical SHENZHEN HUADEAN TECHNOLOGY Co Ltd
Priority to CN201711231839.6A priority Critical patent/CN108022194A/en
Publication of CN108022194A publication Critical patent/CN108022194A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

This application discloses a kind of law-enforcing recorder and its data safety processing method, server and system, it is related to field of terminal technology, the file that can to record in law-enforcing recorder for the file such as legal effect, the audio and video being signed after digital signature by more having non repudiation.Wherein method includes:Obtain the corresponding law-executor's information of law-enforcing recorder;According to law-executor's information, Generate Certificate demand file;The digital certificate for carrying the certificate request file is issued into request and is sent to server, so that the server is digitally signed according to the certificate request file and issues digital certificate;Receive the digital certificate that the server is sent;According to the digital certificate, the record file for needing to sign in the law-enforcing recorder is signed.The application is suitable for the data safe processing of law-enforcing recorder.

Description

Law-enforcing recorder and its data safety processing method, server and system
Technical field
This application involves field of terminal technology, particularly with regard to a kind of law-enforcing recorder and its data safe processing side Method, server and system.
Background technology
With the fast development of mobile Internet and mobile media, the uncivil law enforcement of law enforcement agency individual worker shows As often being disclosed for out, ill effect is caused to regular law enforcement.In this context, society appeals transparent law enforcement, enforces the law in a civilized manner Cry it is higher and higher, also obtained the response of national associated mechanisms, and with approval of the line law enfrocement official to enforcing the law in a civilized manner, Law-enforcing recorder (abbreviation crime scene investigation device) market will enter the developing stage of blowout.
At present, on the market law-enforcing recorder brand is also more and more, uneven.Therefore, law enfrocement official was enforcing the law Seem particularly significant by the legal sense of the files such as the audio of law-enforcing recorder record, video, picture in journey.However, sometimes Law enfrocement official does not recognize the situation of the file recorded on law-enforcing recorder, and the file recorded on law-enforcing recorder is easily by people To distort, and then the problem of legal argument can be caused not rigorous.
The content of the invention
In view of this, this application provides a kind of law-enforcing recorder and its data safety processing method, server and system, Main purpose is to solve at present law enfrocement official sometimes and does not recognize the situation of the file recorded on law-enforcing recorder, and note of enforcing the law The problem of recording the file recorded on instrument easily artificially to be distorted, and then legal argument being caused not rigorous.
According to the one side of the application, there is provided a kind of data safety processing method of law-enforcing recorder, applied to holding Method recorder side, this method include:
Obtain the corresponding law-executor's information of law-enforcing recorder;
According to law-executor's information, Generate Certificate demand file;
The digital certificate for carrying the certificate request file is issued into request and is sent to server, so that the service Device is digitally signed according to the certificate request file and issues digital certificate;
Receive the digital certificate that the server is sent;
According to the digital certificate, the record file for needing to sign in the law-enforcing recorder is signed.
According to the another aspect of the application, there is provided a kind of data safety processing method of law-enforcing recorder, applied to clothes Business device side, this method include:
Receive the digital certificate that law-enforcing recorder is sent and issue request, the digital certificate is issued in request and carries certificate Demand file;
Obtain included in the certificate request file with the corresponding law-executor's information of the law-enforcing recorder;
Correspondence between law-executor's information, and law-executor's information and the law-enforcing recorder is carried out Preserve;
It is digitally signed according to the certificate request file and is that the law-enforcing recorder issues digital certificate, so that The law-enforcing recorder signs the record file for needing to sign in the law-enforcing recorder according to the digital certificate.
According to the another aspect of the application, there is provided a kind of data safe processing device of law-enforcing recorder, applied to holding Method recorder side, the device include:
Acquiring unit, for obtaining the corresponding law-executor's information of law-enforcing recorder;
Generation unit, for the law-executor's information obtained according to the acquiring unit, Generate Certificate demand file;
Transmitting element, server is sent to for the digital certificate for carrying the certificate request file to be issued request, So that the server is digitally signed according to the certificate request file and issues digital certificate;
Receiving unit, the digital certificate sent for receiving the server;
Unit is signed, for the digital certificate received according to, to the note for needing to sign in the law-enforcing recorder Record file is signed.
According to the another further aspect of the application, there is provided a kind of data safe processing device of law-enforcing recorder, applied to clothes Business device side, the device include:
Receiving unit, the digital certificate for receiving law-enforcing recorder transmission issue request, and the digital certificate is issued please Certificate request file is carried in asking;
Acquiring unit, for obtain included in the certificate request file with the corresponding law enforcement of the law-enforcing recorder Person's information;
Storage unit, for the law-executor's information for obtaining the acquiring unit, and law-executor's information with it is described Correspondence between law-enforcing recorder is preserved;
Unit is issued, for being digitally signed according to the certificate request file and being that the law-enforcing recorder issues number Word certificate, so that the law-enforcing recorder is according to the digital certificate, to the record for needing to sign in the law-enforcing recorder File is signed.
According to the application another aspect, there is provided a kind of storage medium, is stored thereon with computer program, described program Realize above application in the data safety processing method of law-enforcing recorder when being executed by processor.
According to the application another aspect, there is provided a kind of law-enforcing recorder, including storage medium, processor and be stored in On storage medium and the computer program that can run on a processor, the processor realize above application when performing described program In the data safety processing method of law-enforcing recorder.
According to the application another aspect, there is provided a kind of storage medium, is stored thereon with computer program, described program Realize above application in the data safety processing method of the law-enforcing recorder of server side when being executed by processor.
According to the application another aspect, there is provided a kind of server, including storage medium, processor and it is stored in storage On medium and the computer program that can run on a processor, the processor realize above application in clothes when performing described program The data safety processing method of the law-enforcing recorder of business device side.
According to the application another aspect, there is provided a kind of data safe processing system of law-enforcing recorder, including client End, server and law-enforcing recorder;
Law-enforcing recorder, for obtaining the corresponding law-executor's information of law-enforcing recorder;It is raw according to law-executor's information Into certificate request file;The digital certificate for carrying the certificate request file is issued into request service is sent to by client Device;
Server, request is issued for receiving law-enforcing recorder by the digital certificate that client is sent;Obtain the card Included in book demand file with the corresponding law-executor's information of the law-enforcing recorder;By law-executor's information, Yi Jisuo The correspondence stated between law-executor's information and the law-enforcing recorder is preserved;According to the certificate request file into line number Word signs and is that the law-enforcing recorder issues digital certificate;Digital certificate is sent to by law-enforcing recorder by client;
Law-enforcing recorder, is additionally operable to the digital certificate for receiving server by client and sending;According to the digital certificate, The record file for needing to sign in the law-enforcing recorder is signed.
By above-mentioned technical proposal, a kind of law-enforcing recorder and its data safety processing method of the application offer, service Device and system, the application is according to the corresponding law-executor's information of law-enforcing recorder, and Generate Certificate demand file, with this to server Digital certificate request, then signs the record file for needing to sign in law-enforcing recorder using digital certificate, that is, utilizes Digital certificate is digitally signed to the audio that is recorded in law-enforcing recorder, video, the file such as picture, and then can hold use Law-executor's information of method recorder carries out corresponding with the file recorded on law-enforcing recorder so that the text recorded in law-enforcing recorder Part for the file such as legal effect, the audio and video being signed after digital signature by more having non repudiation.At the same time by adopting With this digital signature technology, encryption method also has been used to record file, has also solved and file appearance is recorded in law-enforcing recorder The problem of easily artificially being distorted, so as to improve the preciseness of legal argument.
Described above is only the general introduction of technical scheme, in order to better understand the technological means of the application, And can be practiced according to the content of specification, and in order to allow above and other objects, features and advantages of the application can Become apparent, below especially exemplified by the embodiment of the application.
Brief description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 shows a kind of flow signal of the data safety processing method of law-enforcing recorder provided by the embodiments of the present application Figure;
Fig. 2 shows the relationship example schematic diagram between digital certificate provided by the embodiments of the present application;
Fig. 3 shows a kind of data safe processing of the law-enforcing recorder provided by the embodiments of the present application in this one end of server The flow diagram of method;
Fig. 4 shows whole system examples of architectures schematic diagram provided by the embodiments of the present application;
Fig. 5 shows that law-enforcing recorder provided by the embodiments of the present application includes the structure diagram of module;
Fig. 6 shows that client provided by the embodiments of the present application includes the structure diagram of module;
Fig. 7 shows that server provided by the embodiments of the present application includes the structure diagram of module;
Fig. 8 shows a kind of structural representation of the data safe processing device of law-enforcing recorder provided by the embodiments of the present application Figure;
Fig. 9 shows that the structure of the data safe processing device of another law-enforcing recorder provided by the embodiments of the present application is shown It is intended to;
Figure 10 shows the structure of the data safe processing device of another law-enforcing recorder provided by the embodiments of the present application Schematic diagram.
Embodiment
Describe the application in detail below with reference to attached drawing and in conjunction with the embodiments.It should be noted that do not conflicting In the case of, the feature in embodiment and embodiment in the application can be mutually combined.
A kind of data safety processing method of law-enforcing recorder is provided in the present embodiment, can be applied to law enforcement record Instrument side, the file that can to record in law-enforcing recorder is by the way that, more for legal effect, the sound being signed regards after digital signature The files such as frequency have non repudiation, as shown in Figure 1, this method includes:
101st, law-enforcing recorder obtains the corresponding law-executor's information of law-enforcing recorder.
Wherein, identity information of law-executor's information comprising law enfrocement official, unit one belongs to's information, place urban information etc.;Body Part information can include the information such as the policeman's numbering, ID number, name of law enfrocement official.
In the present embodiment, law enfrocement official needs before the operations such as law-enforcing recorder record audio, video are used for the first time Personal information is registered, the identity information such as inputted according to law enfrocement official, unit one belongs to's information are registered.And for this reality The executive agent for applying example can be the data safe processing device applied to law-enforcing recorder, specifically can be only fitted to law enforcement record Instrument side, when receiving data safe processing instruction, first according to the log-on message of law enfrocement official, it is opposite to obtain law-enforcing recorder The law-executor's information answered, then performs the process described in step 102 to 105.
102nd, according to law-executor's information of acquisition, Generate Certificate demand file.
Wherein, certificate request file (CSR, Cerificate Signing Request) can be the original of digital certificate File, contains server info and law-executor's information, is issued using the certificate request file request server certificate center of issuing Send out digital certificate corresponding.
For example, extracted from law-executor's information of acquisition the organization of law enfrocement official unit one belongs to, department of unit one belongs to, City name where name or state name, unit are saved where unit belonging country name, unit, and obtain the server network of application digital certificate Domain name of standing or procotol (IP, Internet Protocol) address etc., be then based on these information Generate Certificate request text Part.
103rd, the digital certificate for carrying certificate request file is issued into request and is sent to server.
Further, so that server is digitally signed according to certificate request file and issues digital certificate.For example, Server just generates CertPubKey file using its root certificate private key signature, i.e., in order to which law-enforcing recorder issues digital certificate.
Wherein, digital certificate is the e-file for public-key cryptography infrastructure, for proving public-key cryptography owner Identity.This file contains public key information, owner's identity information (main body) and digital certificate authentication mechanism (publisher) To the digital signature of this part of file, to ensure that the entire content of this file is correct., can such as owner relies on this file Show identity to computer system or other users, so that other side is trusted and authorizes access or taken using some sensitive computers Business.Computer system or other users can verify the content on digital certificate by certain program, including digital certificate whether Whether expired, digital signature is effective, if trusting the mechanism signed and issued, it is possible to the key on digital certificate is trusted, with the key Encryption is reliably communicated with owner.
The main benefit of one of them of digital certificate is the sensitivity number of owner during certification owner's identity It can't be transmitted to according to (such as date of birth, ID card No.) in the computer system for asking for data person.Handed over by this data Mold changing formula, the identity of owner's both susceptible of proof oneself, does not also have to excessively disclose personal data, to ensureing that computer service accesses both sides It is all beneficial.People are by trusting the root certificate of digital certificate authentication mechanism and its making digital signature using public key encryption The public key certificate of core hair, forms trust chain framework, in safe transmission layer protocol (TLS, Transport Layer Security) realize and WWW hypertext transfer protocol (HTTP, Hypertext Transfer Protocol) and Hyper text transfer security protocol (HTTPS, Hypertext Transfer Protocol Secure), in the simple of Email Mail Transfer protocol (SMTP, Simple Mail Transfer Protocol) and the extension of plain text communication protocol (STARTTLS) simultaneously extensive use is introduced.
Digital signature (also known as public key digital signature, English:Digital Signature) it is a kind of similar write on paper Common physical signature, but used the technology in public key encryption field to realize, the method for differentiating digital information.One tricks Word signature usually define two kinds of complementary computings, one be used for sign, another be used for verify, but the Electronic Signature in law article with Digital signature, the meaning of representative simultaneously differ, and Electronic Signature is recognizing and confirm e-file signer identity, qualification and electricity Subfile true and false person.And digital signature is then that it is encrypted with mathematical algorithm or other modes computing, Electronic Signature, meaning are just formed Electronic Signature is just createed using digital signature.
Digital signature does not refer to signature being scanned into digital picture, or the signature obtained with touch pad, is less inscription. The integrality of the file of digital signature is it is easily verified that (seal on the perforation, junction of the edges of two sheets of paper signature is not required, it is not required that person's handwriting reflects It is fixed), and digital signature has non repudiation (i.e. non-repudiation), it is not necessary to which handwriting expert is verified.Digital signature should The one-way function principle used with public key cryptography field.One-way function refers to that positive operation is very simple, and contrary operation Extremely difficult function, such as large integer multiplication.This function often provides a kind of mathematical problem for being difficult to resolve or suspecting and be difficult to resolve.Mesh Before, three suspection double linear problems of difficulty for solving that public key cryptography field possesses practicality are:Prime factorization, discrete logarithm and elliptic curve are asked Topic.
104th, the digital certificate issued that server is sent is received.
Wherein, the content field of digital certificate, generally defers to the certificate of X.509 format specification, has following content, bag Include:Version, sequence number, main body, publisher, the term of validity time started, the term of validity end time, public-key cryptography purposes, public-key cryptography, Public-key cryptography fingerprint, digital signature, Digital Signature Algorithm, main body alias etc..
105th, according to the digital certificate received, the record file for needing to sign in law-enforcing recorder is signed.
Wherein, the files such as audio, word, video, picture can be included by recording file.
For example, to recorded in law-enforcing recorder audio, video, the signature of the needs such as picture file content summary info It is digitally signed.
For the present embodiment, the audio that is recorded in law-enforcing recorder, video, the file such as picture are carried out using digital certificate Digital signature, shows the corresponding law-executor's information of the law-enforcing recorder for recording these files, and then can will use law enforcement record Law-executor's information of instrument carries out corresponding with the file recorded on law-enforcing recorder so that the file recorded in law-enforcing recorder passes through More there is non repudiation for the file such as legal effect, the audio and video being signed after digital signature.At the same time by using this Digital signature technology, has also used encryption method to record file, also solves and file is recorded in law-enforcing recorder easily by people The problem of to distort, so as to improve the preciseness of legal argument.
Further, the refinement and extension as above-described embodiment embodiment, in order to illustrate above-mentioned implementation The specific implementation process of example, the above method further include:While demand file is Generated Certificate, adding in preset algorithm storehouse is utilized Decipherment algorithm, generates the local private key of law-enforcing recorder;Obtain the corresponding summary info of record file in law-enforcing recorder;Phase Answer, step 105 can specifically include:According to the local private key of generation, the summary info got and the numeral card received Book, the record file signed to needs are signed.
Wherein, can be provided in preset algorithm storehouse encryption, decryption, summary scheduling algorithm, specifically can by technical staff according to Configuration is write in actual demand in advance.It is to use different keys to encrypt and decrypt in modern password system, that is, asymmetric Cipher key cryptographic system, each communication party are required to two keys, i.e. public key and private key, this two keys can encryption and decryption each other. Public key is disclosed, it is not necessary to maintains secrecy, and private key oneself is held by individual, and must keep properly and pay attention to maintaining secrecy.
For example, using the enciphering and deciphering algorithm in preset algorithm storehouse, while demand file is Generated Certificate, generation is corresponding The local private key of law-enforcing recorder, the local private key need to back up after generation, to return to the numeral card issued in server During book, it can be decrypted using the local private key and the digital certificate is installed, if local private key does not back up, server The digital certificate issued cannot be installed successfully, it is necessary to regenerate local private key and certificate request file, then re-started Digital certificate request flow.After the digital certificate successfully issued is installed, the digital certificate and local private key pair can be utilized The summary info of the file content of the needs such as the audio that is recorded in law-enforcing recorder, video, picture signature is digitally signed, with Just signature operation is realized.
It is right according to local private key, the summary info got and the digital certificate received of generation based on such scheme The step of record file for needing to sign is signed, can specifically include:Will record file and summary info utilization Local private key carries out private key encryption calculating, obtains the finger print information of record file;Referring next in finger print information and digital certificate Public key, and combine law-executor's information and record the relevant information of file, the corresponding certificate signature file of output record file.
For the present embodiment, the fingerprint that digital certificate signs documents is to carry out private by recording file and its informative abstract Key computations are drawn, and law-enforcing recorder private key and public key are locally to export and be stored in local, anyone does not know private key Content, therefore, the local Summary file by private key signature of law-enforcing recorder can be with by the public key in the digital certificate issued Prove that the record file is the file that law-enforcing recorder locally exports, anyone non-repudiation, and then law-enforcing recorder passes through The certificate files such as the audio and video of this method signature provided in this embodiment have legal effect.
For the present embodiment, as the species of conceptual illustration, illustratively digital certificate, can specifically include:From label Certificate, root certificate, intermediary's certificate, the certificate of authority, end entity certificate, TLS server certificates, asterisk wildcard certificate, TLS clients Certificate etc., is specifically described below every class certificate concrete concept.
When self signed certificate for small range test the purpose of, user can also oneself generation digital certificate, but do not have There is any reliable people signature, this self-signed certificate will not usually be trusted extensively, and it is soft that when use can be potentially encountered computer The safety warning of part.
Root certificate is also a kind of self signed certificate, but is widely recognized as, be usually pre-installed in various softwares (including Operating system, browser, email software etc.), as the starting point of trust chain, come from generally acknowledged reliable government bodies, software public affairs Department etc., recognizes program just in different software widespread deployments from major software business man by rigorous core.Since deployment program complexity is taken When, it is necessary to the mandate of administrative personnel and the core of mechanism status of a legal person are recognized, a root certificate term of validity may be up to more than 10 years. Some enterprises, it is also possible to which voluntarily installation enterprises are from the root certificate signed in internal computer, to support the enterprise software of in-house network; But these certificates may be widely recognized as, only it is applicable in enterprises.
It is client's grant a certificate that one vital task of intermediary's certificate, which is exactly, although the certification authority being widely recognized as all has gathered around There is root certificate, corresponding private key can be used to sign other certificates, but because key management and administrative consideration, can generally sign in advance Intermediary's certificate is sent out, just makees digital signing for client.The term of validity of intermediary's certificate can be short compared with root certificate, and may be to different classes of Client there are different intermediary's certificates to make to divide the work.
The certificate of authority is also known as Attribute certificate, itself does not have public key, it is necessary to which being attached on an effective digital certificate just has Meaning, its use are to confer to the power that related possessor signs and issues end entity certificate;In some cases, if only awarded in a short time Give certificate agency to sign and issue power, the term of validity for the certificate that (shortening) mechanism holds in itself can not be changed.Such case, class It is similar to someone and holds passport up to decade, and only by signing and issuing short-term entry visa, assign passport bearer's volume individually Outer power.
End entity certificate, other will not be used as signing and issuing other certificates, end entity certificate all be can be described as, in reality Disposed in software, to create encrypted tunnel when is applied.
TLS server certificates, server usually provide service on the internet in the form of domain name, main body in server certificate Adopted name will be corresponding domain name, associated mechanisms title is then write on one column of tissue or unit.Server certificate (including Public key) and private key can be installed on server (such as Apache), agreement encryption details when waiting client connection.Client it is soft Part (such as browser) can run certification path verification algorithm to ensure safety, failing to the whether safe (example of encrypted tunnel certainly As the principal name on certificate does not correspond to website domain name, server has used self signed certificate or Encryption Algorithm is not strong enough), may User can be alerted.
Asterisk wildcard certificate, if before adopted name (or main body alias) column of main body is with asterisk wildcard in server certificate Sew, then the certificate can be used under all subdomain names, be particularly suitable for compared with tool scale or the mechanism one equipped with multiple subnet stations Secondary cross claims, and set is used for multiple servers;Even if future creates new subdomain name, can also apply mechanically.But asterisk wildcard is unavailable In on extended authentication certificate.
TLS client certificates, sometimes, some TLS servers may be when creating encrypted tunnel, it is desirable to which client carries For client certificate, to verify identity and control access rights.Client certificate includes e-mail address or personal name, and It is not host name.But client certificate compare it is uncommon, since it is considered that technical threshold and cost factor, are usually all by servicing Supplier verifies client identity, rather than relies on Third Party Authentication mechanism.It is often necessary to use the service of client certificate all It is the enterprise software of in-house network, they can set up the inside root certificate of oneself, by the technical staff of enterprise in enterprises Computer installs relative clients end certificate to use.In disclosed internet, most of websites be all using login password and Cookie verifies user, rather than client certificate.
Wherein, the relation of root certificate (self signed certificate), intermediary's certificate and end entity (TLS server/customer ends) certificate Figure can be as shown in Figure 2.
It is further, specific as the alternative embodiment of the application, step 103 based on above-mentioned per class digital certificate It can include:According to the local condition of law-enforcing recorder, the type of the definite digital certificate for needing to ask;Then according to the needs The type of the digital certificate of request, issues request by the digital certificate for carrying certificate request file and is sent to server, so that Server is obtained to be digitally signed according to certificate request file and issue digital certificate corresponding with request type.And then it can examine Consider the local condition of law-enforcing recorder, ask the digital certificate for being adapted to law-enforcing recorder itself usage type, and then can be real The record file now accurately signed to needs is signed.
Above-mentioned implementation process is illustrated in law-enforcing recorder side, in order to illustrate the service interacted with law-enforcing recorder Device side operates, and further, the embodiment of the present application provides the data safety processing method of another law-enforcing recorder, Ke Yiying For server side, as shown in figure 3, this method includes:
201st, server receives the digital certificate that law-enforcing recorder is sent and issues request.
Wherein, digital certificate is issued in request and carries certificate request file.In the present embodiment, the certificate in server Issue center, it is believed that be the issuer of authority, be known trust authority in system.
202nd, obtain certificate request file in include with the corresponding law-executor's information of law-enforcing recorder.
203rd, the law-executor's information that will be got, and the correspondence progress between law-executor's information and law-enforcing recorder Preserve.
For the present embodiment, the digital certificate of all law-enforcing recorders in system all must be in server certificate be issued The heart is issued, and server also will preserve the digital certificate of each law-enforcing recorder in the database, while records corresponding unit, gathers around The relevant informations such as the person of having.In this way to provide solid reference during subsequent query legal argument.
204th, it is digitally signed according to certificate request file and is that law-enforcing recorder issues digital certificate.
Further, so that law-enforcing recorder is according to digital certificate, to the record text for needing to sign in law-enforcing recorder Part is signed.Server to law-enforcing recorder by signing and issuing and being implanted into indirectly digital certificate so that law-enforcing recorder and law enforcement Bind together to the relation " non-repudiation " of the owner of recorder.
By X.509 exemplified by the certificate of format specification, digital certificate is represented in a manner of field as follows:
Version:Existing general version is V3;
Sequence number:It is especially useful when certificate revocation to recognize each certificate;
Main body:Possess legal person or natural person's identity or the machine of this certificate, including:National (C, Country), state/province (S, State), region/city (L, Location), tissue/unit (O, Organization), adopted name (CN, Common Name):In TLS using upper, this field is usually domain;
Publisher:The digital certificate authentication mechanism of this certificate is signed in the form of digital signature;
The term of validity time started:Effective time started of this certificate, in the certificate before this and Pending The Entry Into Force;
The term of validity end time:Effective end time of this certificate, thereafter certificate calcellation;
Public-key cryptography purposes:Specify the purposes of public key on certificate, such as digital signature, server authentication, client validation Deng;
Public-key cryptography;
Public-key cryptography fingerprint;
Digital signature;
Digital Signature Algorithm;
Main body alias.
By the technical solution of application the present embodiment, the file that can to record in law-enforcing recorder passes through digital signature More there is non repudiation for the file such as legal effect, the audio and video being signed afterwards.At the same time by using this digital signature Technology, has also used encryption method to record file, also solves in the law-enforcing recorder that tradition does not possess digital signature technology, The problem of record file is easily artificially distorted, and legal argument is not rigorous.
Further, the refinement and extension as above-described embodiment embodiment, after step 204, can be with Including:The digital certificate issued is subjected to corresponding preserve with the law-enforcing recorder;When receiving to signed record file During authentication request, the corresponding digital certificate of law-enforcing recorder of preservation is obtained;Using the public key in the digital certificate to The record file of signature is decrypted, and obtains corresponding signing messages;Authentication is carried out according to the signing messages, determines output The corresponding law-enforcing recorder information of signed record file.
Wherein, law-enforcing recorder information can include the model of law-enforcing recorder, MAC Address, unique mark etc., each hold Method recorder information all each corresponds to law-executor's information, and then can lock the law enfrocement official using the law-enforcing recorder. It can verify that the file of law-enforcing recorder record is exported by which law-enforcing recorder through the above way, for example, if needing Prove whether signed record file is that law-enforcing recorder A is exported, can be in the digital certificate by law-enforcing recorder A The signed record file is decrypted in public key, obtains corresponding signing messages, then carries out body using the signing messages Part verification, determines whether the signed record file is that law-enforcing recorder A is exported.
By above-mentioned this mode, it can accurately prove that law-enforcing recorder records the source of file, there is provided very rigorous Legal argument.
It can be realized for method provided in this embodiment by interactive communication between law-enforcing recorder and server, it is necessary to say It is bright, realize the interactive communication process in order to easier, can realize law enforcement record using specific client Communication between instrument and server.For example, as shown in Figure 4, there is provided whole system configuration diagram, here client can recognize To be crime scene investigation device assistant, server corresponds to Certificate Authority.Client can ask binding law enforcement according to instruction to crime scene investigation device Instrument and policeman's information, then crime scene investigation device locally generation private key key and the demand file that Generates Certificate return;User end to server is sent out Send certificate request documentation requirements server signature and issue digital certificate;Then the digital certificate that server return is issued, and by Client is transmitted to crime scene investigation device;Last crime scene investigation device is according to the document such as local key and digital certificate, audio and video, to needing The file of signature is signed.
The related function module that law-enforcing recorder, server, client each section are included is further illustrated below.Example Such as, as shown in figure 5, law-enforcing recorder includes:Algorithms library, signature blocks, key production module, certificate output module.Wherein calculate Faku County is used to provide encryption, decryption, summary scheduling algorithm;Signature blocks are used for the summary of the file content to the signature of the needs such as video Information is signed;Key production module is used for the algorithm according to definition, generates corresponding key;Certificate output module is used for root Numbered according to the relevant information of input, such as policeman, video name, and the information output certificate file such as fingerprint of signature.
As shown in fig. 6, client includes:Crime scene investigation device communication module, crime scene investigation device message and request processing module, server lead to Interrogate module, server message and request processing module.Wherein crime scene investigation device communication module is mainly used for being responsible for establishing with crime scene investigation device pacifying Complete reliable communication;Crime scene investigation device message and request processing module are mainly for the treatment of crime scene investigation device input output request, for example ask Write service device certificate etc.;Server communication module is used to be responsible for the reliable data transfer with server construction safety;Service Device message is used to handle the input and output instruction with server communication, including request certificate with request processing module, registers policeman Information etc. operates.
As shown in fig. 7, server includes:Client message processing module, certificate database, certificate query module, certificate Issue module, documentary evidence module.Wherein client message processing module is used to handle from the request such as client, and according to please Ask and be distributed to modules processing;Certificate database is used to store the relevant data of crime scene investigation device, such as certificate file, policeman's information Deng;Certificate query module is used for the service for being supplied to client query certificate;Certificate authority module is used for the card according to client Book demand file, exports certificate file and returns to client;Documentary evidence module is used to verify the files such as the audio and video of record Whether be crime scene investigation device output file.
For the present embodiment, it is related to digital signature, enciphering and deciphering algorithm, crime scene investigation device system, client and server etc. Technology, by the certificate by issuing in the server, successively to client, crime scene investigation device, carries out the files such as the audio and video of record Digital signing operations, while digital signature technology is implanted into crime scene investigation device system, so that efficiently user and the number of unit Word signature unified management is got up, and the files such as audio and video and signature file are corresponded.It can cause law-enforcing recorder The file of middle record for the file such as legal effect, the audio and video being signed after digital signature by more having non repudiation.
Further, the specific implementation as Fig. 1 methods, the embodiment of the present application provide a kind of data of law-enforcing recorder Secure processing device, applied to law-enforcing recorder side, as shown in figure 8, the device includes:Acquiring unit 31, generation unit 32, hair Send unit 33, receiving unit 34, signature unit 35.
Acquiring unit 31, can be used for obtaining the corresponding law-executor's information of law-enforcing recorder;
Generation unit 32, can be used for the law-executor's information obtained according to the acquiring unit 31, and Generate Certificate request text Part;
Transmitting element 33, can be used for the digital certificate for carrying the certificate request file issuing request and is sent to clothes Business device.
Further, so that the server is digitally signed according to the certificate request file and issues digital card Book;
Receiving unit 34, can be used for receiving the digital certificate that the server is sent;
Unit 35 is signed, can be used for the digital certificate received according to, to needing to sign in the law-enforcing recorder The record file of administration is signed.
In specific application scenarios, generation unit 32, can be also used for while demand file is Generated Certificate, and utilize Enciphering and deciphering algorithm in preset algorithm storehouse, generates the local private key of the law-enforcing recorder;
Acquiring unit 31, can be also used for obtaining the corresponding summary info of record file in the law-enforcing recorder;
Unit 35 is signed, specifically can be used for according to local private key, the summary info and the digital certificate, it is right The record file for needing to sign is signed.
In specific application scenarios, unit 35 is signed, specifically can be also used for the record file and described pluck Want local private key described in Information Pull to carry out private key encryption calculating, obtain the finger print information of the record file;With reference to the finger Public key in line information and the digital certificate, and with reference to law-executor's information and the relevant information of the record file, it is defeated Go out the corresponding certificate signature file of the record file.
It should be noted that involved by a kind of data safe processing device of law-enforcing recorder provided by the embodiments of the present application Other corresponding descriptions of each functional unit, may be referred to the corresponding description in Fig. 1, details are not described herein.
Based on above-mentioned method as shown in Figure 1, correspondingly, the embodiment of the present application additionally provides a kind of storage medium, deposit thereon Computer program is contained, which realizes when being executed by processor at the data safety of above-mentioned law-enforcing recorder as shown in Figure 1 Reason method.
Based on above-mentioned embodiment as illustrated in figures 1 and 8, to achieve these goals, the embodiment of the present application additionally provides A kind of law-enforcing recorder, the entity structure of the law-enforcing recorder include storage medium and processor;Storage medium, based on storing Calculation machine program;Processor, for performing computer program to realize at the data safety of above-mentioned law-enforcing recorder as shown in Figure 1 Reason method.
Further, the specific implementation as Fig. 3 methods, the embodiment of the present application provide a kind of data of law-enforcing recorder Secure processing device, applied to server side, as shown in figure 9, the device includes:Receiving unit 41, acquiring unit 42, preserve list Member 43, issue unit 44.
Receiving unit 41, the digital certificate that can be used for receiving law-enforcing recorder transmission issue request, the digital certificate Issue in request and carry certificate request file;
Acquiring unit 42, can be used for obtaining included in the certificate request file it is corresponding with the law-enforcing recorder Law-executor's information;
Storage unit 43, can be used for the law-executor's information for obtaining the acquiring unit 42, and law-executor letter Correspondence between breath and the law-enforcing recorder is preserved;
Unit 44 is issued, for being digitally signed according to the certificate request file and being that the law-enforcing recorder is issued Digital certificate.
Further, so that the law-enforcing recorder is according to the digital certificate, to being needed in the law-enforcing recorder The record file of signature is signed.
In specific application scenarios, as shown in Figure 10, device further includes:Decryption unit 45, authentication unit 46.
Storage unit 43, can be also used for the digital certificate carrying out corresponding preserve with the law-enforcing recorder;
Acquiring unit 42, can be also used for, when receiving the authentication request to signed record file, obtaining The corresponding digital certificate of law-enforcing recorder of preservation;
Decryption unit 45, for being solved using the public key in the digital certificate to the signed record file It is close, obtain corresponding signing messages;
Authentication unit 46, for carrying out authentication according to the signing messages, determines the output signed record The corresponding law-enforcing recorder information of file.
It should be noted that involved by a kind of data safe processing device of law-enforcing recorder provided by the embodiments of the present application Other corresponding descriptions of each functional unit, may be referred to the corresponding description in Fig. 3, details are not described herein.
Based on above-mentioned method as shown in Figure 3, correspondingly, the embodiment of the present application additionally provides a kind of storage medium, deposit thereon Computer program is contained, which realizes when being executed by processor at the data safety of above-mentioned law-enforcing recorder as shown in Figure 3 Reason method.
Based on the above-mentioned embodiment as shown in Fig. 3 and Fig. 9, Figure 10, to achieve these goals, the embodiment of the present application also carries A kind of server is supplied, the entity structure of the server includes storage medium and processor;Storage medium, for storing computer Program;Processor, for performing computer program to realize the data safe processing side of above-mentioned law-enforcing recorder as shown in Figure 3 Method.
Based on such scheme, further, the embodiment of the present application is additionally provided at a kind of data safety of law-enforcing recorder Reason system, including client 51, server 52 and law-enforcing recorder 53;
Law-enforcing recorder 53, can be used for obtaining the corresponding law-executor's information of law-enforcing recorder;According to the law-executor Information, Generate Certificate demand file;The digital certificate for carrying the certificate request file is issued into request and passes through client 51 It is sent to server 52;
Server 52, can be used for reception law-enforcing recorder 53 and issues request by the digital certificate that client 51 is sent; Obtain included in the certificate request file with the corresponding law-executor's information of the law-enforcing recorder;The law-executor is believed Cease, and the correspondence between law-executor's information and the law-enforcing recorder is preserved;According to the certificate request File is digitally signed and is that the law-enforcing recorder issues digital certificate;Digital certificate is sent to by client 51 and is held Method recorder 53;
Law-enforcing recorder 53, can be also used for the digital certificate for receiving server 52 by client 51 and sending;According to institute Digital certificate is stated, the record file for needing to sign in the law-enforcing recorder is signed.
By the technical solution of application the application, the certificate by issuing in the server successively to client, is enforced the law Instrument, is digitally signed the files such as the audio and video of record operation, while is implanted into digital signature technology in crime scene investigation device system, from And efficiently the unified management of the digital signature of user and unit is got up, and cause file and the signature files one such as audio and video One corresponds to.The file that can to record in law-enforcing recorder by after digital signature more for legal effect, the sound being signed The files such as video have non repudiation.
Through the above description of the embodiments, those skilled in the art can be understood that the application can lead to Hardware realization is crossed, the mode of necessary general hardware platform can also be added by software to realize.Based on such understanding, this Shen Technical solution please can be embodied in the form of software product, which can be stored in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are used so that a computer equipment (can be Personal computer, server, or network equipment etc.) perform each implement scene of the application described in method.
It will be appreciated by those skilled in the art that attached drawing is a schematic diagram for being preferable to carry out scene, module in attached drawing or Flow is not necessarily implemented necessary to the application.
It will be appreciated by those skilled in the art that the module in device in implement scene can be described according to implement scene into Row is distributed in the device of implement scene, can also carry out one or more dresses that respective change is disposed other than this implement scene In putting.The module of above-mentioned implement scene can be merged into a module, can also be further split into multiple submodule.
Above-mentioned the application sequence number is for illustration only, does not represent the quality of implement scene.
Disclosed above is only several specific implementation scenes of the application, and still, the application is not limited to this, Ren Heben What the technical staff in field can think change should all fall into the protection domain of the application.

Claims (10)

  1. A kind of 1. data safety processing method of law-enforcing recorder, applied to law-enforcing recorder side, it is characterised in that including:
    Obtain the corresponding law-executor's information of law-enforcing recorder;
    According to law-executor's information, Generate Certificate demand file;
    The digital certificate for carrying the certificate request file is issued into request and is sent to server, so that the server root It is digitally signed according to the certificate request file and issues digital certificate;
    Receive the digital certificate that the server is sent;
    According to the digital certificate, the record file for needing to sign in the law-enforcing recorder is signed.
  2. 2. according to the method described in claim 1, it is characterized in that, the method further includes:
    While demand file is Generated Certificate, using the enciphering and deciphering algorithm in preset algorithm storehouse, the law-enforcing recorder is generated Local private key;
    Obtain the corresponding summary info of record file in the law-enforcing recorder;
    According to the digital certificate, the record file for needing to sign in law-enforcing recorder is signed, is specifically included:
    According to local private key, the summary info and the digital certificate, the record file that needs are signed is carried out Signature.
  3. 3. according to the method described in claim 2, it is characterized in that, according to the local private key, the summary info and described Digital certificate, the record file signed to needs are signed, specifically included:
    The record file and the summary info are subjected to private key encryption calculating using the local private key, obtain the note Record the finger print information of file;
    With reference to the public key in the finger print information and the digital certificate, and with reference to law-executor's information and the record file Relevant information, export the corresponding certificate signature file of the record file.
  4. A kind of 4. data safety processing method of law-enforcing recorder, applied to server side, it is characterised in that including:
    Receive the digital certificate that law-enforcing recorder is sent and issue request, the digital certificate is issued in request and carries certificate request File;
    Obtain included in the certificate request file with the corresponding law-executor's information of the law-enforcing recorder;
    Correspondence between law-executor's information, and law-executor's information and the law-enforcing recorder is protected Deposit;
    It is digitally signed according to the certificate request file and is that the law-enforcing recorder issues digital certificate, so that described Law-enforcing recorder signs the record file for needing to sign in the law-enforcing recorder according to the digital certificate.
  5. 5. according to the method described in claim 4, it is characterized in that, it is digitally signed according to the certificate request file and is After the law-enforcing recorder issues digital certificate, the method further includes:
    The digital certificate is subjected to corresponding preserve with the law-enforcing recorder;
    When receiving the authentication request to signed record file, the corresponding numeral of law-enforcing recorder of preservation is obtained Certificate;
    The signed record file is decrypted using the public key in the digital certificate, obtains corresponding A.L.S. Breath;
    Authentication is carried out according to the signing messages, determines to export the corresponding law-enforcing recorder of the signed record file Information.
  6. 6. a kind of storage medium, is stored thereon with computer program, it is characterised in that is realized when described program is executed by processor The data safety processing method of law-enforcing recorder any one of claims 1 to 3.
  7. 7. a kind of law-enforcing recorder, including storage medium, processor and storage can be run on a storage medium and on a processor Computer program, it is characterised in that the processor is realized any one of claims 1 to 3 when performing described program Law-enforcing recorder data safety processing method.
  8. 8. a kind of storage medium, is stored thereon with computer program, it is characterised in that is realized when described program is executed by processor The data safety processing method of law-enforcing recorder any one of claim 4 to 5.
  9. 9. a kind of server, including storage medium, processor and storage are on a storage medium and the meter that can run on a processor Calculation machine program, it is characterised in that the processor realizes holding any one of claim 4 to 5 when performing described program The data safety processing method of method recorder.
  10. 10. the data safe processing system of a kind of law-enforcing recorder, it is characterised in that including described in client, claim 7 Server described in law-enforcing recorder and claim 9;
    The client, the communication being used for realization between the law-enforcing recorder and the server.
CN201711231839.6A 2017-11-28 2017-11-28 Law-enforcing recorder and its data safety processing method, server and system Pending CN108022194A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711231839.6A CN108022194A (en) 2017-11-28 2017-11-28 Law-enforcing recorder and its data safety processing method, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711231839.6A CN108022194A (en) 2017-11-28 2017-11-28 Law-enforcing recorder and its data safety processing method, server and system

Publications (1)

Publication Number Publication Date
CN108022194A true CN108022194A (en) 2018-05-11

Family

ID=62077447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711231839.6A Pending CN108022194A (en) 2017-11-28 2017-11-28 Law-enforcing recorder and its data safety processing method, server and system

Country Status (1)

Country Link
CN (1) CN108022194A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833431A (en) * 2018-06-29 2018-11-16 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the storage medium of password resetting
CN109005376A (en) * 2018-08-10 2018-12-14 深圳警翼智能科技股份有限公司 A kind of law-enforcing recorder network uploaded videos data method for anti-counterfeit
CN109145649A (en) * 2018-08-03 2019-01-04 金联汇通信息技术有限公司 Method for processing video frequency, certificates constructing method and related device based on law enforcement terminal
CN110213273A (en) * 2019-06-05 2019-09-06 南阳市公安局交通管理支队 The information transferring method and system of anti-privacy leakage for traffic police's mobile law enforcement system
CN110276588A (en) * 2019-05-21 2019-09-24 平安国际智慧城市科技股份有限公司 Electron underwriting authentication method, apparatus and computer readable storage medium
CN110337010A (en) * 2019-05-22 2019-10-15 深圳警圣技术股份有限公司 Video/audio processing method, law-enforcing recorder, management server and enforcement system
WO2019223310A1 (en) * 2018-05-21 2019-11-28 南京森林警察学院 Digital crime scene investigation record trusted model system
CN111181893A (en) * 2018-11-09 2020-05-19 航天信息股份有限公司 Law enforcement evidence processing method, device and system
CN113691365A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Cloud private key generation and use method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1989731A (en) * 2004-07-23 2007-06-27 数码安信有限公司 System and method for implementing digital signature using one time private keys
CN102131189A (en) * 2010-12-28 2011-07-20 中国电信股份有限公司 Acquisition instrument, mobile supervision method and system
CN102143176A (en) * 2011-03-28 2011-08-03 河北华烨冀科信息技术有限责任公司 Remote evidence obtaining system during trail in court
CN203217592U (en) * 2013-04-07 2013-09-25 广州宇洋智能科技有限公司 Fingerprint identity authentication and signature semiconductor device of a police mobile law enforcement terminal
CN103560889A (en) * 2013-11-05 2014-02-05 江苏先安科技有限公司 Precision identity authentication method between X509 digital certificate and certificate application
CN104517203A (en) * 2013-09-26 2015-04-15 天津书生软件技术有限公司 Stamping method, apparatus and system of electronic stamp
CN106104549A (en) * 2014-03-07 2016-11-09 诺基亚技术有限公司 Method and apparatus for the data of verification process
CN205693800U (en) * 2016-06-13 2016-11-16 成都荣为信息技术有限公司 Scene evidence taking based on mobile Internet and enforcement system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1989731A (en) * 2004-07-23 2007-06-27 数码安信有限公司 System and method for implementing digital signature using one time private keys
CN102131189A (en) * 2010-12-28 2011-07-20 中国电信股份有限公司 Acquisition instrument, mobile supervision method and system
CN102143176A (en) * 2011-03-28 2011-08-03 河北华烨冀科信息技术有限责任公司 Remote evidence obtaining system during trail in court
CN203217592U (en) * 2013-04-07 2013-09-25 广州宇洋智能科技有限公司 Fingerprint identity authentication and signature semiconductor device of a police mobile law enforcement terminal
CN104517203A (en) * 2013-09-26 2015-04-15 天津书生软件技术有限公司 Stamping method, apparatus and system of electronic stamp
CN103560889A (en) * 2013-11-05 2014-02-05 江苏先安科技有限公司 Precision identity authentication method between X509 digital certificate and certificate application
CN106104549A (en) * 2014-03-07 2016-11-09 诺基亚技术有限公司 Method and apparatus for the data of verification process
CN205693800U (en) * 2016-06-13 2016-11-16 成都荣为信息技术有限公司 Scene evidence taking based on mobile Internet and enforcement system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019223310A1 (en) * 2018-05-21 2019-11-28 南京森林警察学院 Digital crime scene investigation record trusted model system
CN108833431A (en) * 2018-06-29 2018-11-16 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the storage medium of password resetting
CN109145649A (en) * 2018-08-03 2019-01-04 金联汇通信息技术有限公司 Method for processing video frequency, certificates constructing method and related device based on law enforcement terminal
CN109005376A (en) * 2018-08-10 2018-12-14 深圳警翼智能科技股份有限公司 A kind of law-enforcing recorder network uploaded videos data method for anti-counterfeit
CN109005376B (en) * 2018-08-10 2020-12-15 深圳警翼智能科技股份有限公司 Anti-counterfeiting method for uploading video data on law enforcement recorder network
CN111181893A (en) * 2018-11-09 2020-05-19 航天信息股份有限公司 Law enforcement evidence processing method, device and system
CN110276588A (en) * 2019-05-21 2019-09-24 平安国际智慧城市科技股份有限公司 Electron underwriting authentication method, apparatus and computer readable storage medium
CN110337010A (en) * 2019-05-22 2019-10-15 深圳警圣技术股份有限公司 Video/audio processing method, law-enforcing recorder, management server and enforcement system
CN110213273A (en) * 2019-06-05 2019-09-06 南阳市公安局交通管理支队 The information transferring method and system of anti-privacy leakage for traffic police's mobile law enforcement system
CN110213273B (en) * 2019-06-05 2021-09-14 南阳市公安局交通管理支队 Privacy disclosure prevention information transmission method and system for traffic police mobile law enforcement system
CN113691365A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Cloud private key generation and use method

Similar Documents

Publication Publication Date Title
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US11082221B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
CN108022194A (en) Law-enforcing recorder and its data safety processing method, server and system
US20210319132A1 (en) Methods and Devices For Managing User Identity Authentication Data
Adams et al. Understanding PKI: concepts, standards, and deployment considerations
US10559049B2 (en) Digital passport country entry stamp
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
US20050132201A1 (en) Server-based digital signature
US9160535B2 (en) Truly anonymous cloud key broker
CN108092779A (en) A kind of method and device for realizing electronic signature
CN102769623B (en) Two-factor authentication method based on digital certificate and biological identification information
JP2015154491A (en) System and method for remote access and remote digital signature
CN109981287A (en) A kind of code signature method and its storage medium
Yildiz et al. A tutorial on the interoperability of self-sovereign identities
CN113569298A (en) Identity generation method and identity system based on block chain
JP2006221566A (en) Caring service support system using network
US11888997B1 (en) Certificate manager
CN106254341A (en) Data fingerprint extracting method and system for centralized electronic data safety system
Thompson et al. Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
Verma et al. Applications of Data Security and Blockchain in Smart City Identity Management
WO2024014017A1 (en) Message presentation system, presentation device, and message presentation method
CN110490003B (en) User trusted data generation method, user trusted data acquisition method, device and system
US20220393882A1 (en) Secured private credential certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180511

RJ01 Rejection of invention patent application after publication