CN110351369A - Electronic evidence security method and system - Google Patents

Electronic evidence security method and system Download PDF

Info

Publication number
CN110351369A
CN110351369A CN201910631613.8A CN201910631613A CN110351369A CN 110351369 A CN110351369 A CN 110351369A CN 201910631613 A CN201910631613 A CN 201910631613A CN 110351369 A CN110351369 A CN 110351369A
Authority
CN
China
Prior art keywords
client
virtual cloud
video file
instruction
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910631613.8A
Other languages
Chinese (zh)
Inventor
刁春飞
张昌利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing United Trust Technology Service Co Ltd
Original Assignee
Beijing United Trust Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing United Trust Technology Service Co Ltd filed Critical Beijing United Trust Technology Service Co Ltd
Priority to CN201910631613.8A priority Critical patent/CN110351369A/en
Publication of CN110351369A publication Critical patent/CN110351369A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention discloses a kind of electronic evidence security method and systems.Wherein preservation of evidence method includes the following steps: the instruction for receiving client, uses corresponding Remote Desktop Protocol to establish communication with client according to instruction and provides corresponding virtual cloud operation interface for client;Protocol data packet encoder is video file by the protocol data packet for obtaining virtual cloud operation interface, and obtains the real-time Hash digest mark of the video file generated in real time in cataloged procedure;The timestamp identified to the real-time Hash digest of server application of national authorization center is authenticated to obtain timestamp certificate;Verify the validity of video file.Electronic evidence security method provided by the invention, the virtual cloud desktop provided by Cloud Server carry out operation in Terminal Server Client and obtain electronic evidence, ensure that the safety for obtaining evidence environment, and the preservation of evidence of multiple terminal is realized by multiple kinds.

Description

Electronic evidence security method and system
Technical field
The present invention relates to network preservation of evidence technical field more particularly to a kind of electronic evidence security method and systems.
Background technique
With being continuously increased for online infringement case, reinforces the collection of internet electronic evidence, saves the key as lawsuit from damage Link.By analyzing electronic evidence feature, there are problems that saving means from damage exists in conjunction with existing, should from program, technology, Platform etc. is to promote electronic evidence to save effect from damage.Notarial office, judicial expertise center are relied on currently, still generalling use in the market Etc. public credibility webpage is saved from damage, the problems such as there are at high cost, the period is long, user experience is general.
Summary of the invention
The invention discloses a kind of electronic evidence security methods to solve above-mentioned technical problem, are provided by Cloud Server Virtual cloud desktop carry out operation in Terminal Server Client and obtain electronic evidence, ensure that the safety for obtaining evidence environment, and pass through The transformation of multiple kinds realizes the preservation of evidence of multiple terminal.
A kind of electronic evidence security method that purpose provides to realize the present invention, includes the following steps:
The first instruction and the second instruction for receiving client, according to the first instruction and the second instruction using corresponding long-range table Face agreement and client, which are established, to be communicated;
Receive the third instruction of client and instructed according to third to provide corresponding virtual cloud operation interface for client;
Protocol data packet encoder is video file, and is encoded by the protocol data packet for obtaining virtual cloud operation interface The real-time Hash digest of the video file generated in real time in the process identifies;
The timestamp certification identified to the real-time Hash digest of server application of national authorization center is to obtain timestamp card Book;
The validity for verifying video file, if video file effectively if generate and save certificate from damage, and certificate and video recording will be saved from damage File is sent to cloud storage end.
Above-mentioned electronic evidence security method, wherein using VNC Remote Desktop Protocol and visitor if the first instruction does not trigger Family end communication;
If the first instruction triggers, and the second instruction is that the end PC then uses rdp Remote Desktop Protocol and user client communication;
If the first instruction triggers, and the second instruction is that mobile terminal then uses spice Remote Desktop Protocol and user client communication.
Above-mentioned electronic evidence security method, when obtaining the protocol data packet of virtual cloud operation interface,
If the electronic evidence of form web page, the electronics that the included browser of virtual cloud operation interface is accessed is directly acquired The content of pages of evidence mark and browsing;
If the electronic evidence of APP form, the downloading request of virtual cloud operation interface is first received, is void according to downloading request Quasi- cloud operation interface provides corresponding third-party application download server;Then the operation content of the application after installation is obtained.
Above-mentioned electronic evidence security method, when obtaining the protocol data packet of virtual cloud operation interface, further includes:
Obtain the request of screenshot tool application, the page data of control screenshot tool crawl virtual cloud operation interface and to country The server application authentication of authorization center;
Screenshot after certification is saved in cloud storage end.
Above-mentioned electronic evidence security method, the validity for verifying video file include:
The Hash digest of complete video file after being recorded identifies;
It extracts all real-time Hash digest marks and is compared with the mark of Hash digest obtained in above-mentioned steps, if Unanimously then video file is effective for the two;
Video file is saved to cloud storage end.
Above-mentioned electronic evidence security method, client send to virtual cloud middleware and request, and virtual cloud middleware is to asking Ask and verified, if being verified cloud server receive the instruction of virtual cloud middleware for client provide virtual cloud operation Interface;
Recording function is saved in virtual cloud middleware starting at this time from damage, saves recording function from damage for obtaining virtual cloud operation interface Protocol data packet encoder is video file by protocol data packet, while virtual cloud middleware is obtained and generated in real time in cataloged procedure Video file real-time Hash digest mark.
Above-mentioned electronic evidence security method, virtual cloud middleware carry out verifying to request and include:
Virtual cloud middleware receives client password checking request, and receives request data;
It whether effective compares request data, provides virtual cloud operation interface if effectively for client.
The invention also discloses a kind of electronic evidence safety systems, including client and Cloud Server;
Cloud Server includes communication module, virtual cloud remote desktop, collects evidence and save module, authentication module, Effective judgement from damage Module and cloud memory;
The client is used to send instruction to communication module and virtual cloud remote desktop, communication module receive instruction with The client establishes communication using corresponding Remote Desktop Protocol;
Corresponding virtual cloud operation interface is provided after the instruction of virtual cloud desktop reception client for client;
Evidence obtaining saves module from damage for obtaining the protocol data packet of virtual cloud operation interface, is video recording by protocol data packet encoder File, and obtain the real-time Hash digest mark of the video file generated in real time in cataloged procedure;
The timestamp certification that authentication module is used to identify to the real-time Hash digest of server application of national authorization center with Obtain timestamp certificate;
Validity authentication module is used to verify the validity of video file;
The effective video file that cloud storage end is used to authenticate validity authentication module has generation to save certificate from damage, and will protect Full certificate and video file.
Above-mentioned electronic evidence safety system, the client are webpage, the end APP or PC software.
Above-mentioned electronic evidence security method further includes virtual cloud middleware, and virtual cloud middleware is for receiving client Request, and request is verified, sends instruction to virtual cloud desktop if being verified to provide accordingly for client Virtual cloud operation interface.
The beneficial effect comprise that
Electronic evidence security method provided by the invention, the virtual cloud desktop provided by Cloud Server is in remote client End carries out operation and obtains electronic evidence, ensure that the safety for obtaining evidence environment, and is realized by multiple kinds a variety of The preservation of evidence of terminal.
Electronic evidence security method provided by the invention realizes evidence by the way that protocol data is encoded to video file Record during saving from damage, and the authenticity of evidence is guaranteed by the acquisition that Hash digest identifies, and have provided with video file The verifying of effect property, avoids and distorts to video file.
Detailed description of the invention
Fig. 1 is the flow diagram of electronic evidence security method of the present invention;
Fig. 2 is the flow diagram that the validity of video file is demonstrate,proved in electronic evidence security method of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to of the invention real The specific embodiment for applying the electronic evidence security method of example is illustrated.It should be appreciated that specific embodiment described herein It is only used to explain the present invention, be not intended to limit the present invention.
As shown in Figs. 1-2, the electronic evidence security method of the embodiment of the present invention, includes the following steps:
Cloud Server receives the first instruction and the second instruction of client, according to the first instruction and the second instruction using corresponding Remote Desktop Protocol and client establish communicate;
Server receives the first instruction of client herein, and the first instruction will save content from damage for Tell server Type, and the type that save content from damage includes two kinds, the content of saving from damage of the first is based on text and picture;Second of guarantor Full content is based on picture and video.First instruction is defaulted as common-mode in the state of not triggering, and the first instruction exists It is then fine mode in the state of triggering, and common-mode is used to save from damage the content of saving from damage of the first, fine mode is for saving from damage Save content from damage second.It can select to communicate using VNC remote desktop in server when saving content from damage for saving the first from damage Agreement and client, which are established, to be communicated, and at this time server carries out remote access remote desktop by VNC remote desktop communications protocol. Because the characteristics of VNC remote desktop communications protocol is that bandwidth requirement is low, suitability is good, but streaming media support is poor, is more suitable for Type of webpage based on text and picture.VNC remote desktop communications protocol can support windows, Android, linux etc. Operating system cloud mirror image.But when saving content from damage comprising Streaming Media, VNC remote desktop communications protocol is just no longer applicable in, because It does not support 3D to accelerate, and the distortion of video is be easy to cause in communication process.
Can select using SPICE remote desktop communications protocol in server when saving content from damage for saving second from damage or RDP remote desktop communications protocol and client, which are established, to be communicated, at this time server by SPICE remote desktop communications protocol or RDP remote desktop communications protocol carries out remote access remote desktop.Because of SPICE remote desktop communications protocol or the long-range table of RDP Face communications protocol supports Streaming Media to support preferably, but network requirement is relatively high, is suitble to save video and audio from damage, both Agreement supports 3D to accelerate, therefore can ensure the reduction degree of Streaming Media.Wherein RDP remote desktop communications protocol is supported Windows operation, that is, support the end PC, SPICE remote desktop communications protocol supports Android and linux operating system, Exactly support end.
And the second instruction is then for providing the preservation of evidence or the end the PC visitor that obtain mobile terminal client for Cloud Server The preservation of evidence at family end.It is using SPICE remote desktop communications protocol according to the selection of the type of above-mentioned two different client Or RDP remote desktop communications protocol.After the first instruction triggers, then it represents that need to obtain the evidence of video class, and when the second finger Enable is that the end PC then uses rdp Remote Desktop Protocol and user client communication;And after the first instruction triggers and second instruction for movement End then uses spice Remote Desktop Protocol and user client communication.
Cloud Server receives the third instruction of client and is instructed according to third to provide corresponding virtual cloud behaviour for client Make interface;Third instruction is for sending specific operating system required for the evidence to be obtained, cloud service to Cloud Server Device provides corresponding operation system image according to the requirement that third instructs for client, is presented on client with virtual cloud operation interface End.Client user carries out evidence obtaining operation in virtual cloud operation interface.Such as when needing to obtain the evidence of page end, the Three instruct the request instruction that windows operating system is sent to Cloud Server, and Cloud Server transfers the void of windows operating system Quasi- cloud mirror image is sent to client.When that need to collect evidence is mobile terminal APP, Cloud Server transfers Android and linux The virtual cloud mirror image of operating system is sent to client, to create operating system for the APP of evidence obtaining.
It can guarantee the safety to take the evidence using Cloud Server, Cloud Server because being client service mistake every time Cheng Zhongjun is able to maintain init state, so that effectively preventing user distorts and forge electronic evidence, improves electronic evidence Reliability, ensure that fixed environment is clean.Cloud Server, which is realized, uses difference to the difference for saving content from damage according to user Telecommunication agreement and client establish communicate, a plurality of types of contents can be saved from damage in this way.
Cloud Server obtains the protocol data packet of virtual cloud operation interface, is video file by protocol data packet encoder, and Obtain the real-time Hash digest mark of the video file generated in real time in cataloged procedure.
When obtaining the protocol data packet of virtual cloud operation interface, if the electronic evidence of form web page, void is directly acquired The content of pages of electronic evidence mark and browsing that the included browser of quasi- cloud operation interface is accessed;
If the electronic evidence of APP form, the downloading request of virtual cloud operation interface is first received, is void according to downloading request Quasi- cloud operation interface provides corresponding third-party application download server;Then the operation content of the application after installation is obtained.
Client carries out evidence obtaining operation by cloud operation interface, opens the webpage to be collected evidence or journey in cloud operation interface Sequence or APP can be by having needed for included browser browsing if necessary to the data at intercepting page end in cloud operation interface The content of pages to be saved from damage, which can be completed, saves operation from damage.If necessary to obtain the evidence of corresponding software, then cloud operation interface is needed Upper included application shop downloads corresponding APP, and is installed on remote desktop, and artificial mode uses all need after installation The APP to be saved from damage, which can be completed, saves operation from damage.Client sends the operation in cloud operation interface in a manner of protocol data packet To Cloud Server, the data encoding in protocol data packet is video file by Cloud Server.Simultaneously to the video file got The calculating of Hash digest is carried out, to obtain the real-time Hash digest mark of the video file generated in real time in cataloged procedure, and will The real-time Hash digest obtained identifies the timestamp certification identified to the server of national authorization center request Hash digest, thus Obtain timestamp certificate.
Cloud Server verifies the validity of video file, if video file effectively if generate and save certificate from damage, and card will be saved from damage Book and video file are sent to cloud storage end.The verifying of validity has been carried out to the video file after saving from damage in this programme, has been kept away Exempt to distort video file after saving from damage.The process of the validity of specific verifying video file is as follows:
The Hash digest of complete video file after being recorded identifies;
It extracts all real-time Hash digest marks and is compared with the mark of Hash digest obtained in above-mentioned steps, if Unanimously then video file is effective for the two;
Video file is saved to cloud storage end.
The process of above-mentioned video file validation verification its be actually first to use to calculate Hash in record and pluck in video recording The method wanted.Then Hash operation calculating is carried out to final video again after forming final video after, and is compared in record The consistency of both Hash digests that the Hash digest and final video file being calculated are calculated, to effectively prevent A possibility that video file is tampered, enhances the non-repudiation of preservation of evidence result.
Further, in order to guarantee the safety of cloud server end, client by virtual cloud middleware to Cloud Server into Row requests verification is requested specifically, client is sent to virtual cloud middleware, and virtual cloud middleware verifies request, if It is verified, cloud server receives the instruction of virtual cloud middleware and provides virtual cloud operation interface for client;
Recording function is saved in virtual cloud middleware starting at this time from damage, saves recording function from damage for obtaining virtual cloud operation interface Protocol data packet encoder is video file by protocol data packet, while virtual cloud middleware is obtained and generated in real time in cataloged procedure Video file real-time Hash digest mark.
Client will send to virtual cloud middleware and request after selecting remote desktop communications protocol.Virtual cloud middleware After verifying Authority Verification information, virtual cloud mirror image is created for client and establishes communication connection.Using the mesh of aforesaid way Be that client is avoided directly to access to Cloud Server, to ensure that the safety of Cloud Server.When client issues When false request is to server, virtual cloud middleware can refuse it.
Specifically, it includes: that virtual cloud middleware receives client password verifying that virtual cloud middleware, which carries out verifying to request, Request, and receive request data;It whether effective compares request data, provides virtual cloud operation interface if effectively for client.
Based on the same inventive concept, also the invention also discloses a kind of electronic evidence safety systems, including client for offer And Cloud Server;
Cloud Server includes communication module, virtual cloud remote desktop, collects evidence and save module, authentication module, Effective judgement from damage Module and cloud memory;
The client is used to send instruction to communication module and virtual cloud remote desktop, communication module receive instruction with The client establishes communication using corresponding Remote Desktop Protocol;
Corresponding virtual cloud operation interface is provided after the instruction of virtual cloud desktop reception client for client;
Evidence obtaining saves module from damage for obtaining the protocol data packet of virtual cloud operation interface, is video recording by protocol data packet encoder File, and obtain the real-time Hash digest mark of the video file generated in real time in cataloged procedure;
The timestamp certification that authentication module is used to identify to the real-time Hash digest of server application of national authorization center with Obtain timestamp certificate;
Validity authentication module is used to verify the validity of video file;
The effective video file that cloud storage end is used to authenticate validity authentication module has generation to save certificate from damage, and will protect Full certificate and video file.
Specifically, the client is webpage, the end APP or PC software.Client can use various ways.
It further include virtual cloud middleware, virtual cloud middleware is used for further in order to guarantee the safety of Cloud Server Receive the request of client, and request is verified, sends instruction to virtual cloud desktop if being verified and think client Corresponding virtual cloud operation interface is provided.It ensure that the safety of Cloud Server by the setting of virtual cloud middleware.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of electronic evidence security method, which comprises the steps of:
The first instruction and the second instruction for receiving client are assisted according to the first instruction and the second instruction using corresponding remote desktop View is established with client and is communicated;
Receive the third instruction of client and instructed according to third to provide corresponding virtual cloud operation interface for client;
Protocol data packet encoder is video file, and obtains cataloged procedure by the protocol data packet for obtaining virtual cloud operation interface In generate in real time video file real-time Hash digest mark;
The timestamp identified to the real-time Hash digest of server application of national authorization center is authenticated to obtain timestamp certificate;
The validity for verifying video file, if video file effectively if generate and save certificate from damage, and certificate and video file will be saved from damage It is sent to cloud storage end.
2. electronic evidence security method according to claim 1, which is characterized in that wherein adopted if the first instruction does not trigger With VNC Remote Desktop Protocol and user client communication;
If the first instruction triggers, and the second instruction is that the end PC then uses rdp Remote Desktop Protocol and user client communication;
If the first instruction triggers, and the second instruction is that mobile terminal then uses spice Remote Desktop Protocol and user client communication.
3. electronic evidence security method according to claim 1, which is characterized in that in the association for obtaining virtual cloud operation interface When discussing data packet,
If the electronic evidence of form web page, the electronic evidence that the included browser of virtual cloud operation interface is accessed is directly acquired The content of pages of mark and browsing;
If the electronic evidence of APP form, the downloading request of virtual cloud operation interface is first received, is virtual cloud according to downloading request Operation interface provides corresponding third-party application download server;Then the operation content of the application after installation is obtained.
4. electronic evidence security method according to claim 3, which is characterized in that in the association for obtaining virtual cloud operation interface When discussing data packet, further includes:
The request of screenshot tool application is obtained, the page data of control screenshot tool crawl virtual cloud operation interface is simultaneously authorized to country The server application authentication at center;
Screenshot after certification is saved in cloud storage end.
5. electronic evidence security method according to claim 1, which is characterized in that verify the validity packet of video file It includes:
The Hash digest of complete video file after being recorded identifies;
It extracts all real-time Hash digest marks and is compared with the mark of Hash digest obtained in above-mentioned steps;
If the two unanimously if video file it is effective, video file is saved to cloud storage end.
6. electronic evidence security method according to claim 1, which is characterized in that client is sent to virtual cloud middleware Request, virtual cloud middleware verify request, and cloud server receives the instruction of virtual cloud middleware if being verified Virtual cloud operation interface is provided for client;
Recording function is saved in virtual cloud middleware starting at this time from damage, saves recording function from damage for obtaining the agreement of virtual cloud operation interface Protocol data packet encoder is video file by data packet, while virtual cloud middleware obtains the record generated in real time in cataloged procedure As the real-time Hash digest of file identifies.
7. electronic evidence security method according to claim 6, which is characterized in that virtual cloud middleware tests request Card includes:
Virtual cloud middleware receives client password checking request, and receives request data;
It whether effective compares request data, provides virtual cloud operation interface if effectively for client.
8. a kind of electronic evidence safety system, which is characterized in that including client and Cloud Server;
Cloud Server includes communication module, virtual cloud remote desktop, collects evidence and save module, authentication module, Effective judgement module from damage With cloud memory;
The client is used to send instruction to communication module and virtual cloud remote desktop, communication module receive instruction with it is described Client establishes communication using corresponding Remote Desktop Protocol;
Corresponding virtual cloud operation interface is provided after the instruction of virtual cloud desktop reception client for client;
Evidence obtaining saves module from damage for obtaining the protocol data packet of virtual cloud operation interface, is video recording text by protocol data packet encoder Part, and obtain the real-time Hash digest mark of the video file generated in real time in cataloged procedure;
Authentication module is used for the timestamp that the real-time Hash digest of server application to national authorization center identifies and authenticates to obtain Timestamp certificate;
Validity authentication module is used to verify the validity of video file;
The effective video file that cloud storage end is used to authenticate validity authentication module has generation to save certificate from damage, and will save card from damage Book and video file.
9. electronic evidence security method according to claim 8, which is characterized in that the client is webpage, APP or PC Hold software.
10. electronic evidence security method according to claim 8, which is characterized in that further include virtual cloud middleware, virtually Cloud middleware is used to receive the request of client, and verifies to request, refers to if being verified to the transmission of virtual cloud desktop It enables to provide corresponding virtual cloud operation interface for client.
CN201910631613.8A 2019-07-12 2019-07-12 Electronic evidence security method and system Pending CN110351369A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910631613.8A CN110351369A (en) 2019-07-12 2019-07-12 Electronic evidence security method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910631613.8A CN110351369A (en) 2019-07-12 2019-07-12 Electronic evidence security method and system

Publications (1)

Publication Number Publication Date
CN110351369A true CN110351369A (en) 2019-10-18

Family

ID=68175177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910631613.8A Pending CN110351369A (en) 2019-07-12 2019-07-12 Electronic evidence security method and system

Country Status (1)

Country Link
CN (1) CN110351369A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475866A (en) * 2020-05-09 2020-07-31 南京工程学院 Block chain electronic evidence preservation method and system
CN112003704A (en) * 2020-07-31 2020-11-27 中科扶云(杭州)科技有限公司 Electronic evidence processing method and device and computer equipment
CN113065168A (en) * 2021-04-08 2021-07-02 天地伟业技术有限公司 Method, device and storage medium for storing and verifying authenticity of video data
WO2022134160A1 (en) * 2020-12-23 2022-06-30 杭州趣链科技有限公司 Tamperproof evidence obtaining method, system and apparatus, storage medium, and electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223374A (en) * 2011-06-22 2011-10-19 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
US20150326618A1 (en) * 2014-05-09 2015-11-12 Electronics And Telecommunications Research Institute Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device
CN105338120A (en) * 2015-12-03 2016-02-17 厦门法信公证云科技有限公司 Electronic evidence fixing security method based on cloud storage
CN105338119A (en) * 2015-12-03 2016-02-17 厦门法信公证云科技有限公司 Electronic evidence fixing security system based on cloud storage
CN107733898A (en) * 2017-10-20 2018-02-23 国信嘉宁数据技术有限公司 A kind of data based on chain of evidence save implementation method, system and equipment from damage
CN108667835A (en) * 2018-05-04 2018-10-16 法信公证云(厦门)科技有限公司 A kind of control remote equipment carries out method, system and the storage medium of network forensics
CN110414274A (en) * 2019-07-01 2019-11-05 北京联合信任技术服务有限公司 Electronic evidence security method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223374A (en) * 2011-06-22 2011-10-19 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
US20150326618A1 (en) * 2014-05-09 2015-11-12 Electronics And Telecommunications Research Institute Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device
CN105338120A (en) * 2015-12-03 2016-02-17 厦门法信公证云科技有限公司 Electronic evidence fixing security method based on cloud storage
CN105338119A (en) * 2015-12-03 2016-02-17 厦门法信公证云科技有限公司 Electronic evidence fixing security system based on cloud storage
CN107733898A (en) * 2017-10-20 2018-02-23 国信嘉宁数据技术有限公司 A kind of data based on chain of evidence save implementation method, system and equipment from damage
CN108667835A (en) * 2018-05-04 2018-10-16 法信公证云(厦门)科技有限公司 A kind of control remote equipment carries out method, system and the storage medium of network forensics
CN110414274A (en) * 2019-07-01 2019-11-05 北京联合信任技术服务有限公司 Electronic evidence security method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
唐浩: ""基于Web的动态实时取证系统研究与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475866A (en) * 2020-05-09 2020-07-31 南京工程学院 Block chain electronic evidence preservation method and system
CN112003704A (en) * 2020-07-31 2020-11-27 中科扶云(杭州)科技有限公司 Electronic evidence processing method and device and computer equipment
WO2022134160A1 (en) * 2020-12-23 2022-06-30 杭州趣链科技有限公司 Tamperproof evidence obtaining method, system and apparatus, storage medium, and electronic device
CN113065168A (en) * 2021-04-08 2021-07-02 天地伟业技术有限公司 Method, device and storage medium for storing and verifying authenticity of video data
CN113065168B (en) * 2021-04-08 2023-09-19 天地伟业技术有限公司 Method, device and storage medium for storing and checking authenticity of video data

Similar Documents

Publication Publication Date Title
CN110351369A (en) Electronic evidence security method and system
CN102394887B (en) OAuth protocol-based safety certificate method of open platform and system thereof
CN107666460B (en) Remote intelligent evidence obtaining system and method based on mobile internet
CN106506668B (en) A method of object storage is realized based on distributed storage
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN110798471B (en) Air conditioner management method and related device
CN101635714B (en) Method and system for improving network application safety
CN104144163B (en) Auth method, apparatus and system
CN110414274A (en) Electronic evidence security method and system
CN102143129B (en) Method and system for realizing service protection in hyper text transmission protocol (HTTP) streaming transmission
CN108322416B (en) Security authentication implementation method, device and system
CN105025041A (en) File upload method, file upload apparatus and system
WO2014048749A1 (en) Inter-domain single sign-on
CN104954330A (en) Method of accessing data resources, device and system
CN103905194B (en) Identity traceability authentication method and system
CN113225351B (en) Request processing method and device, storage medium and electronic equipment
CN111262821A (en) Authentication method based on micro-service
CN108259457A (en) A kind of WEB authentication methods and device
CN106789987B (en) Method and system for single sign-on of multi-service interconnection APP (application) of mobile terminal
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN109067749A (en) A kind of information processing method, equipment and computer readable storage medium
CN112560102A (en) Resource sharing method, resource accessing method, resource sharing equipment and computer readable storage medium
CN109618194B (en) Authentication on-demand method and device based on-demand platform end
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN108989302B (en) OPC proxy connection system and connection method based on secret key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191018