CN110490773A - A kind of record screen evidence collecting method, device and electronic equipment based on block chain - Google Patents

A kind of record screen evidence collecting method, device and electronic equipment based on block chain Download PDF

Info

Publication number
CN110490773A
CN110490773A CN201910683464.XA CN201910683464A CN110490773A CN 110490773 A CN110490773 A CN 110490773A CN 201910683464 A CN201910683464 A CN 201910683464A CN 110490773 A CN110490773 A CN 110490773A
Authority
CN
China
Prior art keywords
destination host
address
file
resource
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910683464.XA
Other languages
Chinese (zh)
Other versions
CN110490773B (en
Inventor
黄凯明
侯章军
蒋海滔
杨磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910683464.XA priority Critical patent/CN110490773B/en
Publication of CN110490773A publication Critical patent/CN110490773A/en
Application granted granted Critical
Publication of CN110490773B publication Critical patent/CN110490773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

This application discloses a kind of record screen evidence collecting method, device and electronic equipment based on block chain starts screen recording function this method comprises: requesting in response to the starting for shielding evidence obtaining software to record on destination host;The operating status of the destination host is obtained, the operating status includes safe condition;After the operating status for obtaining the destination host, the address of the target infringement resource carried in the starting request is accessed;After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen file;The Hash information of the record screen file is uploaded in block chain.

Description

A kind of record screen evidence collecting method, device and electronic equipment based on block chain
Technical field
This application involves field of computer technology more particularly to a kind of record screen evidence collecting method based on block chain, device and Electronic equipment.
Background technique
With the fast development of development of Mobile Internet technology, the cost that content is plagiarized is also lower and lower, this is allowed for increasingly More internet original contents can be brought huge economic loss by illegal infringement to authorship.Therefore, in order to tie up The interests of internet authorship are protected, how internet abuse are effectively collected evidence and be deposited card also gradually by internet The attention of authorship and evidence obtaining department.
Existing internet infringement evidence obtaining mode, is often operated by the way of artificial, for example can pass through notarization Personnel record the mode of screen with camera to prove the confidence level of local operation behavior.This mode is needed using related notary public The mode of artificial record screen is handled, time-consuming and laborious and with high costs.And how to simplify the process of internet infringement evidence obtaining, it reduces The cost of internet infringement evidence obtaining, and guarantee the confidence level of internet infringement evidence, become technical problem urgently to be resolved.
Summary of the invention
The embodiment of the present application provides a kind of record screen evidence collecting method, device and electronic equipment based on block chain, to solve Existing internet infringement evidence obtaining scheme implements, and needs notary public to participate in, time-consuming and laborious problem with high costs.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, proposing a kind of record screen evidence collecting method based on block chain, comprising:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the target infringement resource carried in the starting request is accessed Address;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen text Part;
The Hash information of the record screen file is uploaded in block chain.
Second aspect proposes and a kind of deposits card device based on block chain, comprising:
Start unit requests in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
Acquiring unit, obtains the operating status of the destination host, and the operating status includes safe condition;
Access unit accesses the mesh carried in the starting request after the operating status for obtaining the destination host The address of mark infringement resource;
Generation unit after the completion of the resource in the address of target infringement resource loads, terminates screen recording, and raw Cheng Luping file;
The Hash information of the record screen file is uploaded in block chain by uploading unit.
The third aspect proposes a kind of electronic equipment, which includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the target infringement resource carried in the starting request is accessed Address;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen text Part;
The Hash information of the record screen file is uploaded in block chain.
Fourth aspect proposes a kind of computer readable storage medium, the computer-readable recording medium storage one Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity Sub- equipment executes following operation:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the target infringement resource carried in the starting request is accessed Address;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen text Part;
The Hash information of the record screen file is uploaded in block chain.
The embodiment of the present application at least can achieve following technical effects by adopting the above technical scheme:
When carrying out record screen evidence obtaining, it is able to respond and is requested in the starting for shielding evidence obtaining software to record, started on destination host The operating statuses such as screen recording function, then the safe condition that obtains destination host, the operating status for obtaining destination host it Afterwards, the address of the target infringement resource carried in access starting request, and can be in the resource in the address that target encroaches right resource After the completion of load, terminate screen recording, generates record screen file, the Hash information of the record screen file is finally uploaded to block chain In.
On the one hand, the generation method of the feature and Hash information that can not be distorted based on the information recorded in block chain is not It is authentic and valid can to verify its by its Hash information when using the record screen file as infringement evidence in the later period for reversible feature Property, improve the confidence level of the infringement evidence of acquisition;On the other hand, record screen file also carries out the operating status of destination host Record, if the bright destination host of the Running Status Table be it is safe and reliable, can further increase record screen file confidence level, thus Reliability of the record screen file as infringement evidence can be realized independent of notary public, while also greatly simplifying evidence obtaining stream Journey reduces evidence obtaining cost.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is that a kind of implementation process for record screen evidence collecting method based on block chain that this specification one embodiment provides is shown It is intended to;
Fig. 2 is that the record screen evidence collecting method based on block chain that this specification one embodiment provides is applied in actual scene Schematic diagram;
Fig. 3 is a kind of structural representation for record screen apparatus for obtaining evidence based on block chain that this specification one embodiment provides Figure;
Fig. 4 is the structural schematic diagram for a kind of electronic equipment that this specification one embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
It is implemented to solve existing internet infringement evidence obtaining scheme, notary public is needed to participate in, it is time-consuming and laborious Problem with high costs, this specification embodiment provide a kind of record screen evidence collecting method based on block chain.This specification embodiment The executing subject of the method for offer can be, but not limited to record screen evidence obtaining software etc. and can be configured as executing the embodiment of the present invention mention At least one of party's subtraction unit of confession.
For ease of description, hereafter executing subject in this way is to be able to carry out for the record screen evidence obtaining software of this method, The embodiment of this method is introduced.It is appreciated that it is that one kind is shown that the executing subject of this method, which is record screen evidence obtaining software, The explanation of example property, is not construed as the restriction to this method.
Specifically, a kind of reality for record screen evidence collecting method based on block chain that this specification one or more embodiment provides Existing flow diagram is as shown in Figure 1, comprising:
Step 110, it is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
Optionally, the starting for shielding evidence obtaining software to record is requested, and can be by the infringed or the personnel of judiciary etc. What the evidence obtaining personnel of infringement evidence initiated.In order to guarantee record screen evidence obtaining process not by the interference of other factors, this specification is implemented It is executed in the virtual machine that record screen evidence obtaining process in example can create in cloud platform, that is to say, that destination host can be cloud The virtual machine created in platform.
Step 120, the operating status of destination host is obtained, which includes safe condition;
Optionally, in order to improve the confidence level that file is shielded in record, this specification embodiment is loaded in the address to infringement resource Resource carry out record screen before, the safe condition of destination host can also be obtained, it can pass through the peace on operational objective host Total inspection software, such as antivirus software, determine whether destination host invades the insecurity factors such as wooden horse, virus and lead to recording Record screen file trust reduces.Specifically, the operating status of destination host is obtained, comprising:
Search for the safety inspection software in destination host;
Start the security check function in the safety inspection software in destination host, to obtain the safe shape of destination host State.
It should be understood that the security check function in the safety inspection software in starting destination host, and complete safety inspection After looking into, it will usually show safety inspection result in the display interface of the safety inspection software of destination host.If destination host In there is no insecurity factor, then can prompt the printed words such as " safety " or " security level is higher ";And if occurring not in destination host Safety factor can then prompt the printed words such as " danger " or " security level is lower ".In order to accurately obtain the safety inspection of destination host The safety inspection of software is looked into as a result, can judge that this is aobvious by the display interface of image recognition technology poll safety inspection software Show in interface with the presence or absence of printed words such as " safety ", " security level is higher ", " danger " and " security level is higher ".
Optionally, in order to guarantee that destination host can normally access the address of infringement resource, to obtain infringement evidence, this theory Operating status in bright book embodiment further includes network connection state, obtains the operating status of destination host, comprising:
Start the host file of destination host, whether there is infringement resource in the host file of the determination destination host Address and ip mapping relations, it is described infringement resource address by the starting request carrying;
If obtaining target master there is no the mapping relations of the address of infringement resource and ip in the host file of destination host The network connection state of machine.
It should be understood that the mapping for being typically stored with the higher domain name addresses of destination host visitation frequency and ip in host file is closed System, to improve the domain name mapping speed of the higher domain name addresses of these visitation frequencies, and since the infringement address of infringement resource is logical It is often to be accessed in destination host for the first time, address and the ip of infringement resource will not be then preserved in the host file of the destination host Mapping relations.It therefore, can be by starting the host file of destination host, to determine in the host file whether existing invade The address of resource and the mapping relations of ip are weighed, if the address of infringement resource and the mapping relations of ip are not present in the host file, Then show that the destination host not over the mapping relations for the address and ip for adding infringement resource in host file, provides infringement It is forged the address in source.
It, can be by starting cmd.exe, and in the window of pop-up if the host file of destination host is normally started The domain name addresses for inputting ipconfig and tracert+ infringement resource determines the address ip and the target master of destination host respectively The address ip of machine to infringement resource domain name addresses between routing condition.In practical applications, it is inputted in the window of pop-up After the domain name addresses of ipconfig and tracert+ infringement resource, the content shown in the window of pop-up can be intercepted, is passed through Image recognition technology come obtain destination host the address ip and destination host the address ip to infringement resource domain name addresses it Between routing condition.
Optionally, in order to further confirm that destination host operating status confidence level, operating status further includes time shape State obtains the operating status of destination host, comprising:
Access the address at time calibration in network center;
On the corresponding page in address at time calibration in network center, the time state of destination host is obtained.
Specifically, it may search for and open the browser of destination host, and input time calibration in network center in a browser Address, for example can be the address at China national time service center, and on the corresponding page in the address at time calibration in network center, it intercepts The temporal information of display obtains the time state of destination host finally by image recognition technology.
Step 130, after the operating status for obtaining destination host, access starts the target infringement resource carried in request Address;
After the operating status for obtaining destination host, it can input in starting request and take in the browser of destination host The address of the target infringement resource of band, the resource in address to load target infringement resource.
Step 140, after the completion of the resource in the address of target infringement resource loads, terminate screen recording, and generate record Shield file;
Optionally, since the resource type in webpage includes a variety of, for example the formats such as picture, video, voice, text is interior Hold, in order to ensure the resource in the address of the infringement resource in the recorded file of acquisition can be by completely typing, this specification Record screen evidence obtaining software in embodiment can detecte the load progress of the resource in the address of infringement resource, and in infringement resource When the load progress of resource in address is completed, terminate screen recording.By taking video resource as an example, if the address of target infringement resource In resource include video resource, after the completion of resource load in the address of target infringement resource, terminate screen recording, and raw Cheng Luping file, comprising:
When the playback progress of video resource in the address of target infringement resource is completed, terminate screen recording, and generate Record screen file.
It should be understood that video resource is when playing, it will usually playing progress bar is shown, in order to protect in the record screen file of generation Complete video resource is stayed, the record screen evidence obtaining software in this specification embodiment can be in the address for detecting target infringement resource In video resource playback progress complete when, terminate screen recording, and generate record screen file.
Step 150, the Hash information of record screen file is uploaded in block chain.
It should be understood that the Hash information of record screen file, refers to and passes through the cryptographic Hash that keyed Hash function obtains to record screen file. Keyed Hash function, for example, the SHA-256HASH algorithm in bit coin, the KECCAK-256HASH algorithm in ether mill, etc..
It should be understood that the Hash information of file is shielded in record in the embodiment of the present application, it can be and a Hash is carried out to record screen file The cryptographic Hash that operation obtains, or pass through the cryptographic Hash that twice or repeatedly Hash operation obtains.
Optionally, in order to improve the confidence level that file is shielded in record, the Hash information that will record screen file is uploaded in block chain, is wrapped It includes:
Obtain at the time of the Hash information, the information of destination host, starting screen recording function of file are shielded in record and terminate screen At the time of curtain recording function;Wherein, the information of destination host includes the hardware device of the IP address of destination host, destination host Identifier;
Will the record screen Hash information of file, the information of destination host, starting screen recording function at the time of and terminate screen It is packaged at the time of recording, to obtain the file after being packaged;
File after packing is uploaded in block chain.
It optionally, is the Hash information convenient for quickly searching record screen file from block chain, in the Hash that will record screen file After information is uploaded in block chain, the method also includes:
Obtain the block address of the Hash information for the storage record screen file that block chain returns.
Optionally, in order to block chain return storage record screen file Hash information block address and record screen file into Row backup, after obtaining the block address of Hash information for the storage record screen file that block chain returns, the method is also Include:
Block address and record screen file are associated;
Block address after association is stored with record screen file into default cloud storage space.
It should be understood that this is default for the ease of obtaining the block address being stored in default cloud storage space and record screen file Cloud storage space also produces and returns based on after storage association after storing the block address after association and record screen file Block address and record screen file storage address generate access address.
As shown in Fig. 2, applying the schematic diagram in actual scene for the method that this specification embodiment provides, comprising:
S21, infringer starts record screen evidence obtaining software on the destination host of cloud platform, and submits the network address of infringement resource, So that record screen evidence obtaining software starts screen recording function;
S22, record screen evidence obtaining software obtain the operating status of destination host, specifically include:
S221, the safety inspection software that record screen is collected evidence on software search destination host, and start the safety inspection software Security check function passes through after the security check function of the safety inspection software is completed to the safety inspection of destination host Image recognition technology obtain the safety inspection of the safety inspection software as a result, the i.e. destination host safe condition;
S222, the host file in evidence obtaining software search destination host is shielded in record, and opens the host file, if the host is literary There is no the mapping relations of the address of infringement resource and ip in part, then show the network address of infringement resource not in destination host Host file addition domain name and ip pairs of mode be maliciously tampered, at this point, record screen evidence obtaining software opened in destination host Cmd.exe executes ipconfig and tracert respectively to obtain the road of the address ip of destination host and the network address to infringement resource By situation;
S223, record screen evidence obtaining software starts the browser in destination host, and inputs the address at time calibration in network center, such as China national time service center, to obtain the trusted time information for recording screen evidence obtaining;
S23, the network address of record screen evidence obtaining software input infringement resource in the browser in destination host;
S24, record screen evidence obtaining software then terminate to shield after the corresponding resource load of network address for detecting infringement resource is completed Curtain is recorded, and generates record screen file;
S25, record screen evidence obtaining software calculate record screen file cryptographic Hash, and by the cryptographic Hash of the record screen file, record screen the time, (wherein, which can be stored in preset cloud storage space, the storage of the record screen file for the storage position of record screen file Address can be returned to obtain by preset cloud storage space) and the address destination host ip be packaged, then will be on the file after packing It reaches in block chain.
Cryptographic Hash and its relevant information (such as the record screen time, record screen file of record screen file are searched for the ease of the later period Storage position and destination host ip), record shield evidence obtaining software the file after packing is uploaded in block chain after, the record screen Evidence obtaining software can also receive the block address of block chain return.It should be understood that the corresponding area of block address that the block chain returns Block is used to store the cryptographic Hash and its relevant information of record screen file.
When carrying out record screen evidence obtaining, it is able to respond and is requested in the starting for shielding evidence obtaining software to record, started on destination host The operating statuses such as screen recording function, then the safe condition that obtains destination host, the operating status for obtaining destination host it Afterwards, the address of the target infringement resource carried in access starting request, and can be in the resource in the address that target encroaches right resource After the completion of load, terminate screen recording, generates record screen file, the Hash information of the record screen file is finally uploaded to block chain In.
On the one hand, the generation method of the feature and Hash information that can not be distorted based on the information recorded in block chain is not It is authentic and valid can to verify its by its Hash information when using the record screen file as infringement evidence in the later period for reversible feature Property, improve the confidence level of the infringement evidence of acquisition;On the other hand, record screen file also carries out the operating status of destination host Record, if the bright destination host of the Running Status Table be it is safe and reliable, can further increase record screen file confidence level, thus Reliability of the record screen file as infringement evidence can be realized independent of notary public, while also greatly simplifying evidence obtaining stream Journey reduces evidence obtaining cost.
Fig. 3 is the structural schematic diagram for the record screen apparatus for obtaining evidence 300 based on block chain that this specification embodiment provides.It please join Fig. 3 is examined, in a kind of Software Implementation, the record screen apparatus for obtaining evidence 300 based on block chain may include start unit 301, obtain Unit 302, access unit 303, generation unit 304 and uploading unit 305, in which:
Start unit 301 requests in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host Energy;
Acquiring unit 302, obtains the operating status of the destination host, and the operating status includes safe condition;
Access unit 303 carries in the access starting request after the operating status for obtaining the destination host The address of target infringement resource;
Generation unit 304 terminates screen recording after the completion of the resource in the address of target infringement resource loads, And generate record screen file;
The Hash information of the record screen file is uploaded in block chain by uploading unit 305.
The record screen apparatus for obtaining evidence based on block chain provided using this specification embodiment, on the one hand, based in block chain The irreversible feature of generation method for the feature and Hash information that the information of record can not distort, can use in the later period should Its real effectiveness verified by its Hash information when record screen file is as infringement evidence, improve the infringement evidence of acquisition can Reliability;On the other hand, record screen file also records the operating status of destination host, if Running Status Table improving eyesight mark master Machine be it is safe and reliable, then can further increase record screen file confidence level, so as to independent of notary public realize record Shield reliability of the file as infringement evidence, while also greatly simplifying forensics process, reduces evidence obtaining cost.
Optionally, in one embodiment, the acquiring unit 302, is used for:
Search for the safety inspection software in the destination host;
Start the security check function in the safety inspection software in the destination host, to obtain the destination host Safe condition.
Optionally, in one embodiment, the operating status further includes network connection state, the acquiring unit 302, it is used for:
Start the host file of the destination host, whether there is infringement in the host file of the determination destination host It requests to carry by the starting in the address of the address of resource and the mapping relations of ip, the infringement resource;
If obtaining institute there is no the mapping relations of the address of infringement resource and ip in the host file of the destination host State the network connection state of destination host.
Optionally, in one embodiment, the operating status further includes time state, the acquiring unit 302, is used In:
Access the address at time calibration in network center;
On the corresponding page in address at the time calibration in network center, the time state of the destination host is obtained.
Optionally, in one embodiment, the uploading unit 305, is used for:
It obtains the Hash information of the record screen file, the information of the destination host, start the screen recording function At the time of moment and the end screen recording;Wherein, the information of the destination host include the destination host IP address, The identifier of the hardware device of the destination host;
By the record screen Hash information of file, the information of the destination host, the starting screen recording function when It carves and terminates to be packaged at the time of the screen recording, to obtain the file after being packaged;
File after the packing is uploaded in block chain.
Optionally, in one embodiment, if the resource in the address of target infringement resource includes video resource, The generation unit 304, is used for:
When the playback progress of video resource in the address of target infringement resource is completed, terminate screen recording, and Generate record screen file.
Optionally, in one embodiment, the Hash information of the record screen file is uploaded to area in uploading unit 305 After in block chain, described device further include:
Address acquisition unit 306 obtains the block of the Hash information for the storage record screen file that the block chain returns Address.
Optionally, in one embodiment, the storage that the block chain returns is obtained in the address acquisition unit 306 After the block address of the Hash information of the record screen file, described device further include:
The block address and record screen file are associated by associative cell 307;
Storage unit 308, by after the association the block address and the record screen file store to default cloud storage In space.
The method that record screen apparatus for obtaining evidence 300 based on block chain can be realized the embodiment of the method for FIG. 1 to FIG. 2, specifically may be used With reference to the record screen evidence collecting method based on block chain of FIG. 1 to FIG. 2 illustrated embodiment, repeat no more.
Fig. 4 is the structural schematic diagram for the electronic equipment that one embodiment of this specification provides.Referring to FIG. 4, in hardware Level, the electronic equipment include processor, optionally further comprising internal bus, network interface, memory.Wherein, memory can It can include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-easy The property lost memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible to Including hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 4, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer The record screen apparatus for obtaining evidence based on block chain is formed on face.Processor executes the program that memory is stored, and is specifically used for executing It operates below:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the target infringement resource carried in the starting request is accessed Address;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen text Part;
The Hash information of the record screen file is uploaded in block chain.
When carrying out record screen evidence obtaining, it is able to respond and is requested in the starting for shielding evidence obtaining software to record, started on destination host The operating statuses such as screen recording function, then the safe condition that obtains destination host, the operating status for obtaining destination host it Afterwards, the address of the target infringement resource carried in access starting request, and can be in the resource in the address that target encroaches right resource After the completion of load, terminate screen recording, generates record screen file, the Hash information of the record screen file is finally uploaded to block chain In.
On the one hand, the generation method of the feature and Hash information that can not be distorted based on the information recorded in block chain is not It is authentic and valid can to verify its by its Hash information when using the record screen file as infringement evidence in the later period for reversible feature Property, improve the confidence level of the infringement evidence of acquisition;On the other hand, record screen file also carries out the operating status of destination host Record, if the bright destination host of the Running Status Table be it is safe and reliable, can further increase record screen file confidence level, thus Reliability of the record screen file as infringement evidence can be realized independent of notary public, while also greatly simplifying evidence obtaining stream Journey reduces evidence obtaining cost.
The record screen evidence collecting method based on block chain disclosed in the above-mentioned FIG. 1 to FIG. 2 illustrated embodiment such as this specification can answer It is realized in processor, or by processor.Processor may be a kind of IC chip, the processing energy with signal Power.During realization, each step of the above method can pass through the integrated logic circuit or software of the hardware in processor The instruction of form is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute this specification one or more Disclosed each method, step and logic diagram in embodiment.General processor can be microprocessor or the processor It can be any conventional processor etc..The step of method in conjunction with disclosed in this specification one or more embodiment, can be straight Connect and be presented as that hardware decoding processor executes completion, or in decoding processor hardware and software module combination executed At.Software module can be located at random access memory, and flash memory, read-only memory, programmable read only memory or electrically-erasable can In the storage medium of this fields such as programmable memory, register maturation.The storage medium is located at memory, and processor reads storage Information in device, in conjunction with the step of its hardware completion above method.
The electronic equipment can also carry out the record screen evidence collecting method based on block chain of FIG. 1 to FIG. 2, and this specification is herein no longer It repeats.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each Logic unit is also possible to hardware or logical device.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, and the instruction is when by the portable electronic including multiple application programs When equipment executes, the portable electronic device can be made to execute the record screen evidence collecting method of embodiment illustrated in fig. 1, and be specifically used for holding The following operation of row:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the target infringement resource carried in the starting request is accessed Address;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen text Part;
The Hash information of the record screen file is uploaded in block chain.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification Range.With within principle, made any modification, changes equivalent replacement all spirit in this specification one or more embodiment Into etc., it should be included within the protection scope of this specification one or more embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.

Claims (11)

1. a kind of record screen evidence collecting method based on block chain, comprising:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the ground of the target infringement resource carried in the starting request is accessed Location;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen file;
The Hash information of the record screen file is uploaded in block chain.
2. the method as described in claim 1 obtains the operating status of the destination host, comprising:
Search for the safety inspection software in the destination host;
Start the security check function in the safety inspection software in the destination host, to obtain the safety of the destination host State.
3. the method as described in claim 1, the operating status further includes network connection state, obtains the destination host Operating status, comprising:
Start the host file of the destination host, whether there is infringement resource in the host file of the determination destination host Address and ip mapping relations, it is described infringement resource address by the starting request carrying;
If obtaining the mesh there is no the mapping relations of the address of infringement resource and ip in the host file of the destination host Mark the network connection state of host.
4. method as claimed in claim 1 or 3, the operating status further includes time state, obtains the destination host Operating status, comprising:
Access the address at time calibration in network center;
On the corresponding page in address at the time calibration in network center, the time state of the destination host is obtained.
5. the Hash information of the record screen file is uploaded in block chain by the method as described in claim 1, comprising:
At the time of obtaining the Hash information, the information of the destination host, the starting screen recording function of the record screen file At the time of with the screen recording is terminated;Wherein, the information of the destination host includes the IP address, described of the destination host The identifier of the hardware device of destination host;
By the record screen Hash information of file, the information of the destination host, start the screen recording function at the time of and Terminate to be packaged at the time of the screen recording, to obtain the file after being packaged;
File after the packing is uploaded in block chain.
6. the method as described in claim 1, if the resource in the address of target infringement resource includes video resource, in institute After the completion of stating the resource load in the address of target infringement resource, terminate screen recording, and generate record screen file, comprising:
When the playback progress of video resource in the address of target infringement resource is completed, terminate screen recording, and generate File is shielded in the record.
7. method as claimed in claim 1 or 5, after the Hash information of the record screen file is uploaded in block chain, The method also includes:
Obtain the block address of the Hash information for the storage record screen file that the block chain returns.
8. the method for claim 7, in the Hash information for obtaining the storage record screen file that the block chain returns Block address after, the method also includes:
The block address and record screen file are associated;
By after the association the block address and the record screen file store into default cloud storage space.
9. a kind of record screen apparatus for obtaining evidence based on block chain, comprising:
Start unit requests in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
Acquiring unit, obtains the operating status of the destination host, and the operating status includes safe condition;
Access unit accesses the target carried in the starting request and invades after the operating status for obtaining the destination host Weigh the address of resource;
Generation unit terminates screen recording, and generate record after the completion of the resource in the address of target infringement resource loads Shield file;
The Hash information of the record screen file is uploaded in block chain by uploading unit.
10. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the ground of the target infringement resource carried in the starting request is accessed Location;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen file;
The Hash information of the record screen file is uploaded in block chain.
11. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
It is requested in response to the starting for shielding evidence obtaining software to record, starts screen recording function on destination host;
The operating status of the destination host is obtained, the operating status includes safe condition;
After the operating status for obtaining the destination host, the ground of the target infringement resource carried in the starting request is accessed Location;
After the completion of resource in the address of target infringement resource loads, terminate screen recording, and generates record screen file;
The Hash information of the record screen file is uploaded in block chain.
CN201910683464.XA 2019-07-26 2019-07-26 Block chain-based screen recording evidence obtaining method and device and electronic equipment Active CN110490773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910683464.XA CN110490773B (en) 2019-07-26 2019-07-26 Block chain-based screen recording evidence obtaining method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910683464.XA CN110490773B (en) 2019-07-26 2019-07-26 Block chain-based screen recording evidence obtaining method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110490773A true CN110490773A (en) 2019-11-22
CN110490773B CN110490773B (en) 2023-06-02

Family

ID=68548548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910683464.XA Active CN110490773B (en) 2019-07-26 2019-07-26 Block chain-based screen recording evidence obtaining method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110490773B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191240A (en) * 2019-12-30 2020-05-22 支付宝(杭州)信息技术有限公司 Method, device and equipment for collecting Internet electronic evidence
CN111814141A (en) * 2020-09-15 2020-10-23 浙江数秦科技有限公司 Off-line process evidence obtaining and storing method based on block chain
CN111930750A (en) * 2020-08-28 2020-11-13 支付宝(杭州)信息技术有限公司 Method and device for carrying out evidence storage on evidence obtaining process video clip
CN112181447A (en) * 2020-10-20 2021-01-05 深圳市大恒数据安全科技有限责任公司 Certificate adjusting method and device convenient for judicial verification
CN112711741A (en) * 2021-01-05 2021-04-27 天津证好在数据科技有限公司 Method for solidifying infringement evidence of live broadcasting
CN112784285A (en) * 2020-12-29 2021-05-11 上海律桐智能信息科技有限公司 Evidence obtaining system
CN114500497A (en) * 2021-12-28 2022-05-13 盘石软件(上海)有限公司 Method and system for obtaining evidence of cloud mobile phone
CN114979751A (en) * 2022-04-29 2022-08-30 深圳法政信息技术有限公司 Mobile phone screen recording evidence collecting system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040260733A1 (en) * 2003-06-23 2004-12-23 Adelstein Frank N. Remote collection of computer forensic evidence
CN110032880A (en) * 2018-12-13 2019-07-19 阿里巴巴集团控股有限公司 Record screen evidence collecting method, system and electronic equipment based on block chain
CN110035105A (en) * 2018-12-13 2019-07-19 阿里巴巴集团控股有限公司 Record screen evidence collecting method, system and electronic equipment based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040260733A1 (en) * 2003-06-23 2004-12-23 Adelstein Frank N. Remote collection of computer forensic evidence
CN110032880A (en) * 2018-12-13 2019-07-19 阿里巴巴集团控股有限公司 Record screen evidence collecting method, system and electronic equipment based on block chain
CN110035105A (en) * 2018-12-13 2019-07-19 阿里巴巴集团控股有限公司 Record screen evidence collecting method, system and electronic equipment based on block chain

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111191240A (en) * 2019-12-30 2020-05-22 支付宝(杭州)信息技术有限公司 Method, device and equipment for collecting Internet electronic evidence
CN111930750A (en) * 2020-08-28 2020-11-13 支付宝(杭州)信息技术有限公司 Method and device for carrying out evidence storage on evidence obtaining process video clip
CN111814141A (en) * 2020-09-15 2020-10-23 浙江数秦科技有限公司 Off-line process evidence obtaining and storing method based on block chain
CN111814141B (en) * 2020-09-15 2020-12-18 浙江数秦科技有限公司 Off-line process evidence obtaining and storing method based on block chain
CN112181447A (en) * 2020-10-20 2021-01-05 深圳市大恒数据安全科技有限责任公司 Certificate adjusting method and device convenient for judicial verification
CN112784285A (en) * 2020-12-29 2021-05-11 上海律桐智能信息科技有限公司 Evidence obtaining system
CN112711741A (en) * 2021-01-05 2021-04-27 天津证好在数据科技有限公司 Method for solidifying infringement evidence of live broadcasting
CN114500497A (en) * 2021-12-28 2022-05-13 盘石软件(上海)有限公司 Method and system for obtaining evidence of cloud mobile phone
CN114979751A (en) * 2022-04-29 2022-08-30 深圳法政信息技术有限公司 Mobile phone screen recording evidence collecting system

Also Published As

Publication number Publication date
CN110490773B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN110490773A (en) A kind of record screen evidence collecting method, device and electronic equipment based on block chain
WO2020233140A1 (en) Infringement evidence storage method and apparatus based on blockchain, and electronic device
US11138345B2 (en) Method, apparatus, and electronic device for blockchain-based infringement evidence storage
WO2020215827A1 (en) Block chain-based advertisement playback monitoring method and apparatus, and electronic device
US11113412B2 (en) System and method for monitoring and verifying software behavior
CN105453102B (en) The system and method for the private cipher key leaked for identification
CN107852412B (en) System and method, computer readable medium for phishing and brand protection
US10936727B2 (en) Detection of second order vulnerabilities in web services
CA3087297A1 (en) Blockchain-based data verification method and apparatus, and electronic device
CN101755269A (en) Equipment with secure virtual machine
CN108280144A (en) Information displaying method, device and electronic equipment
CN110334542B (en) Network evidence preservation and network evidence preservation verification method and device
CN111046346A (en) Book copyright protection platform based on block chain, equipment and medium
TW202020713A (en) Evidence collecting and recording method and device and electronic device
CN110309669A (en) A kind of data mask method, device and equipment
CN110445768A (en) A kind of login method, device and electronic equipment
CN105978911A (en) Malicious code detection method and device based on virtual execution technology
CN110008747A (en) A kind of guard method, device and the electronic equipment of the private data based on block chain
CN110009353A (en) A kind of account register method, device and electronic equipment based on block chain
EP3547182A1 (en) Method and apparatus for publishing works on network
CN105574724B (en) Safety payment protection method, safety application client, safety server and system
CN106155940A (en) The System on Chip/SoC of code and the code protection method of System on Chip/SoC can be protected
CN111046440B (en) Tamper verification method and system for secure area content
CN112561679A (en) Credit investigation system, credit investigation method, electronic device and storage medium
CN111835706A (en) Method and device for detecting malicious extension of browser and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40017572

Country of ref document: HK

TA01 Transfer of patent application right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant