CN112733167A - Electronic evidence data processing method and device, electronic equipment and storage medium - Google Patents

Electronic evidence data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112733167A
CN112733167A CN202110042790.XA CN202110042790A CN112733167A CN 112733167 A CN112733167 A CN 112733167A CN 202110042790 A CN202110042790 A CN 202110042790A CN 112733167 A CN112733167 A CN 112733167A
Authority
CN
China
Prior art keywords
evidence
character string
data
storage
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110042790.XA
Other languages
Chinese (zh)
Other versions
CN112733167B (en
Inventor
周晓健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Jingdong Shuke Haiyi Information Technology Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Jingdong Shuke Haiyi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd, Jingdong Shuke Haiyi Information Technology Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202110042790.XA priority Critical patent/CN112733167B/en
Publication of CN112733167A publication Critical patent/CN112733167A/en
Application granted granted Critical
Publication of CN112733167B publication Critical patent/CN112733167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides a method and a device for processing electronic evidence data, electronic equipment and a storage medium, and relates to the technical field of block chains. The processing method of the electronic evidence data comprises the following steps: acquiring evidence information and evidence obtaining environment information of the evidence information; synthesizing evidence information and evidence obtaining environment information through an embedded software development kit to obtain evidence for evidence storage; carrying out character string conversion processing on evidence of evidence storage to obtain evidence storage data; and uploading the evidence storage data to the blockchain. Through the technical scheme, the probability that the certificate storing data is tampered or leaked is reduced, and the privacy and ownership relation of the certificate storing data are guaranteed.

Description

Electronic evidence data processing method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of block chain technologies, and in particular, to a method and an apparatus for processing electronic evidence data, an electronic device, and a storage medium.
Background
In the existing evidence storage technology, a data holder often submits electronic evidence data from an evidence obtaining service end, and after the electronic evidence data is submitted to an evidence storage service end, an evidence is stored and solidified by an evidence storage server and is written into a block chain.
In the related art, the evidence storing scheme of the electronic evidence data at least has the following technical problems:
(1) before the evidence obtaining service end submits the electronic evidence data, the electronic evidence data can be modified, and the possibility of being tampered or leaked exists.
(2) In the process of transmitting the electronic evidence data from the evidence obtaining service end to the evidence storing service end, the electronic evidence data may be stolen, tampered or leaked, so that the electronic evidence data acquired by the evidence storing service end is not original data.
(3) In the process of receiving and processing the electronic evidence data by the evidence storing service terminal, the electronic evidence data may be tampered before being linked due to system errors, hacking and the like.
(4) The electronic evidence data uplink is transmitted from the evidence storing service terminal, the non-data holder is directly uplink, the ownership relation of the electronic evidence data is not clear enough, and the authenticity is questioned.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure aims to provide a method, an apparatus, an electronic device and a storage medium for processing electronic evidence data, which overcome, at least to some extent, the problem of poor authenticity of the electronic evidence data in the related art.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to one aspect of the present disclosure, there is provided a method for processing electronic evidence data, including: acquiring evidence information and evidence obtaining environment information of the evidence information; synthesizing evidence information and evidence obtaining environment information through an embedded software development kit to obtain evidence for evidence storage; carrying out character string conversion processing on evidence of evidence storage to obtain evidence storage data; and uploading the evidence storage data to the blockchain.
In one embodiment of the present disclosure, performing a character string conversion process on the evidence of evidence: and converting the evidence storage data into a plurality of different character strings, and splicing the different character strings to obtain the evidence storage data.
In an embodiment of the present disclosure, converting the certificate storing data into a plurality of different character strings, and splicing the plurality of different character strings to obtain the certificate storing data includes: performing Hash calculation on the evidence for evidence storage to convert the evidence into a first character string; adding a timestamp to the evidence for evidence storage to convert the evidence into a second character string; adding the signature of the digital certificate to the evidence for storing the certificate so as to convert the evidence into a third character string; and splicing at least two character strings in the first character string, the second character string and the third character string to obtain the evidence storage data.
In an embodiment of the present disclosure, converting the certificate storing data into a plurality of different character strings, and splicing the plurality of different character strings to obtain the certificate storing data further includes: encrypting the certificate storing data and performing character string conversion processing of adding a timestamp to generate a fourth character string, performing string conversion processing of adding a digital certificate to the certificate storing data to generate a fifth character string, and splicing the fourth character string and the fifth character string to obtain the certificate storing data; or carrying out encrypted character string conversion processing on the certificate storing data to generate a sixth character string, carrying out string conversion processing of adding a digital certificate and adding a time stamp on the certificate storing data to generate a seventh character string, and splicing the sixth character string and the seventh character string to obtain the certificate storing data;
or carrying out character string conversion processing of adding a timestamp on the certificate storing data to generate an eighth character string, carrying out string conversion processing of encrypting the certificate storing data and adding a digital certificate to generate a ninth character string, and splicing the eighth character string and the ninth character string to obtain the certificate storing data.
In an embodiment of the present disclosure, performing a character string conversion process on the evidence of: and performing at least one of character string conversion processing of encrypting the certificate storing data, adding a time stamp and a digital certificate, and determining a character string generated by the conversion processing as the certificate storing data.
In one embodiment of the present disclosure, before obtaining the evidence information and the forensics environment information of the evidence information, the method further includes: acquiring a digital certificate sent by a evidence storage platform; and embedding a software development kit for storing the certificate according to the digital certificate.
In one embodiment of the present disclosure, the forensic environment information comprises at least one of an identification of the forensic device, a communication address, geolocation information, and an environmental image.
In one embodiment of the present disclosure, uploading the forensic data to the blockchain comprises: uploading the evidence storing data to a node of the block chain; and synchronizing the evidence storing data to the appointed node of the block chain through one node.
According to another aspect of the present disclosure, there is provided a method for processing electronic evidence data, including: acquiring the evidence storage data uploaded to the block chain according to any one of the technical schemes; analyzing the evidence storage data to determine a first character string, a second character string and a third character string, wherein the first character string is obtained by carrying out Hash calculation on evidence of evidence storage, the second character string is obtained by adding a time stamp to the evidence of evidence storage, and the third character string is obtained by adding a signature of a digital certificate to the evidence of storage; determining evidence storage attribute information of evidence according to the first character string, the second character string and the third character string; and verifying the authenticity of the evidence according to the attribute information of the evidence.
In one embodiment of the present disclosure, determining the evidence-keeping attribute information of the evidence-keeping according to the first character string, the second character string and the third character string includes: determining evidence of evidence storage according to the first character string; determining a timestamp for generating evidence of evidence according to the second character string; determining a signature of the digital certificate based on the third string.
In one embodiment of the present disclosure, verifying authenticity of the proof of possession based on the proof of possession attribute information includes: if the time stamp is determined to be consistent with the preset time stamp and the signature of the digital certificate is determined to be consistent with the preset signature, determining that the evidence of storing the certificate is a real evidence; and if the timestamp is determined to be inconsistent with the preset timestamp or the signature of the digital certificate is determined to be inconsistent with the preset signature, determining that the evidence of the certificate is the unreal evidence.
According to another aspect of the present disclosure, there is provided an apparatus for processing electronic evidence data, comprising: the acquisition module is used for acquiring evidence information and evidence obtaining environment information of the evidence information; the synthesis module is used for carrying out synthesis processing on evidence information and evidence obtaining environment information through an embedded software development kit so as to obtain evidence for evidence storage; the conversion module is used for carrying out character string conversion processing on evidence to obtain evidence data; and the communication module is used for uploading the evidence storage data to the block chain.
According to another aspect of the present disclosure, there is provided an apparatus for processing electronic evidence data, comprising: the acquisition module is used for acquiring the evidence storage data uploaded to the block chain according to any one of the technical schemes; the analysis module is used for analyzing the evidence storage data to determine a first character string, a second character string and a third character string, wherein the first character string is obtained by carrying out Hash calculation on evidence of evidence storage, the second character string is obtained by adding a time stamp to the evidence of evidence storage, and the third character string is obtained by adding a signature of a digital certificate to the evidence of evidence storage; the determining module is used for determining evidence storage attribute information of evidence storage according to the first character string, the second character string and the third character string; and the verification module is used for verifying the authenticity of the evidence according to the evidence storage attribute information.
According to still another aspect of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing executable instructions for the processor; wherein the processor is configured to perform the method of processing the electronic evidence data of any one of the above via execution of the executable instructions.
According to yet another aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method of processing electronic evidence data of any one of the above.
According to the processing scheme of the electronic evidence data, the evidence information and the evidence obtaining environment information are subjected to synthesis processing through the embedded software development kit to obtain evidence, character string conversion processing is carried out on the evidence to obtain evidence, authenticity of the electronic evidence data is improved, probability that the evidence is tampered or leaked is reduced, and privacy and ownership relation of the evidence data are guaranteed.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
FIG. 1 is a schematic diagram illustrating a method for processing electronic evidence data according to an embodiment of the disclosure;
FIG. 2 is a flow chart illustrating another method of processing electronic evidence data in an embodiment of the disclosure;
FIG. 3 is a flow chart of a method for processing electronic evidence data according to an embodiment of the disclosure;
FIG. 4 is a flow chart illustrating a method for processing electronic evidence data according to another embodiment of the disclosure;
FIG. 5 is a flow chart of a method for processing electronic evidence data according to an embodiment of the disclosure;
FIG. 6 is a flow chart of a method for processing electronic evidence data according to an embodiment of the disclosure;
FIG. 7 is a flow chart illustrating a method for processing electronic evidence data according to yet another embodiment of the disclosure;
FIG. 8 is a schematic diagram of an apparatus for processing electronic evidence data in an embodiment of the disclosure;
FIG. 9 is a schematic diagram of an apparatus for processing electronic evidence data according to an embodiment of the disclosure;
fig. 10 shows a schematic diagram of an electronic device in an embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
According to the scheme, the evidence information and the evidence obtaining environment information are subjected to synthesis processing through the embedded software development kit, evidence storing evidence is obtained, character string conversion processing is carried out on the evidence storing evidence to obtain the evidence storing data, authenticity of the electronic evidence data is improved, probability that the evidence storing data is tampered or leaked is reduced, and privacy and ownership relation of the evidence storing data are guaranteed.
The processing scheme of the electronic evidence data can be realized through interaction of a plurality of terminals and a server cluster.
The terminal may be a mobile terminal such as a mobile phone, a game console, a tablet Computer, an e-book reader, smart glasses, an MP4(Moving Picture Experts Group Audio Layer IV) player, an intelligent home device, an AR (Augmented Reality) device, a VR (Virtual Reality) device, or a Personal Computer (Personal Computer), such as a laptop Computer and a desktop Computer.
Among them, an application program for providing processing of electronic proof data may be installed in the terminal.
The terminal is connected with the server cluster through a communication network. Optionally, the communication network is a wired network or a wireless network.
The server cluster is a server, or consists of a plurality of servers, or is a virtualization platform, or is a cloud computing service center. The server cluster is used for providing background services for the application programs providing the processing of the electronic evidence data. Optionally, the server cluster undertakes primary computing work, and the terminal undertakes secondary computing work; or the server cluster bears secondary calculation work, and the terminal bears main calculation work; or, the terminal and the server cluster adopt a distributed computing architecture for cooperative computing.
Optionally, the clients of the applications installed in different terminals are the same, or the clients of the applications installed on two terminals are clients of the same type of application of different control system platforms. The specific form of the client of the application may also be different based on different terminal platforms, for example, the client of the application may be a mobile phone client, a PC client, or a global wide area network client.
Those skilled in the art will appreciate that the number of terminals described above may be greater or fewer. For example, the number of the terminals may be only one, or several tens or hundreds of the terminals, or more. The number of terminals and the type of the device are not limited in the embodiments of the present disclosure.
Optionally, the system may further include a management device, and the management device is connected to the server cluster through a communication network. Optionally, the communication network is a wired network or a wireless network.
Optionally, the wireless network or wired network described above uses standard communication techniques and/or protocols. The Network is typically the Internet, but may be any Network including, but not limited to, a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, wireline or wireless Network, a private Network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including Hypertext Mark-up Language (HTML), Extensible markup Language (XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as Secure Socket Layer (SSL), Transport Layer Security (TLS), Virtual Private Network (VPN), Internet protocol Security (IPsec). In other embodiments, custom and/or dedicated data communication techniques may also be used in place of, or in addition to, the data communication techniques described above.
Hereinafter, the steps of the method for processing electronic proof data in the exemplary embodiment will be described in more detail with reference to the drawings and examples.
Fig. 1 shows a flowchart of a method for processing electronic evidence data in an embodiment of the present disclosure. The method provided by the embodiment of the disclosure can be executed by any electronic equipment with computing processing capacity.
As shown in fig. 1, the electronic device executes a processing method of electronic evidence data, including the steps of:
step S102, evidence information and evidence obtaining environment information of the evidence information are obtained.
And step S104, synthesizing evidence information and evidence obtaining environment information through the embedded software development kit to obtain evidence for evidence storage.
In an embodiment of the present disclosure, the evidence information and the evidence obtaining environment information may be synthesized into evidence storing evidence in a JSON (JavaScript Object Notation) format through an embedded software development kit, the JSON has no additional tag, and can be processed as an Object in a JavaScript platform, which is beneficial to reducing the interaction pressure of electronic evidence data.
Step S106, the evidence of depositing evidence is processed by character string conversion to obtain the data of depositing evidence.
And step S108, uploading the evidence storage data to a block chain.
In one embodiment of the present disclosure, the evidence information and the evidence obtaining environment information are synthesized by the embedded software development kit to obtain evidence, and the authenticity of the evidence is improved by the evidence obtaining environment information.
Further, the evidence data is obtained by performing the character string conversion processing on the evidence, and measures such as encrypting the evidence, adding a timestamp or signing a digital certificate can be performed on the evidence through the character string, but not limited to this, so that the authenticity of the electronic evidence data is improved, the probability that the evidence data is tampered or leaked is reduced, and the privacy and ownership relation of the evidence data are guaranteed.
For example, the character string conversion processing of the evidence of evidence: and converting the evidence storage data into a plurality of different character strings, and splicing the different character strings to obtain the evidence storage data.
As shown in fig. 2, converting the evidence data into a plurality of different character strings, and splicing the plurality of different character strings to obtain the evidence data includes:
step S202, performing hash calculation on the evidence for evidence storage to convert the evidence for evidence storage into a first character string.
And step S204, adding a time stamp to the evidence for evidence storage to convert the evidence into a second character string.
Step S206, add the signature of the digital certificate to the evidence of certificate storage to convert into a third string.
Step S208, at least two character strings of the first character string, the second character string, and the third character string are spliced to obtain the evidence storage data.
In one embodiment of the disclosure, the evidence of evidence is converted into the first character string by performing hash calculation on the evidence of evidence, and after the evidence of evidence is collected by the evidence collecting device, the evidence of evidence is encrypted locally, so that the probability that the evidence of evidence is tampered or leaked is reduced.
In addition, a time stamp is added to the evidence for evidence storage to convert the evidence for evidence storage into a second character string, the evidence obtaining time of the evidence for evidence storage is recorded through the time stamp, and whether the evidence for evidence storage is modified or tampered is judged based on the evidence obtaining time.
Further, through the signature that adds the digital certificate to the evidence of depositing evidence to convert into the third string, locally deposit evidence at the equipment of collecting evidence and sign, can not only guarantee the legitimacy of evidence of depositing evidence, also be favorable to further improving the security and the privacy of depositing evidence, in addition, also increased the affiliation information between evidence of depositing evidence and the equipment of collecting evidence, make electronic evidence data form the evidence chain more easily in the application.
For example, the certificate storing data is encrypted and subjected to a string conversion process of adding a time stamp to generate a fourth string, the certificate storing data is subjected to a string conversion process of adding a digital certificate to generate a fifth string, and the fourth string and the fifth string are spliced to obtain the certificate storing data.
For example, the certificate storing data is subjected to encrypted character string conversion processing to generate a sixth character string, the certificate storing data is subjected to string conversion processing of adding a digital certificate and adding a time stamp to generate a seventh character string, and the sixth character string and the seventh character string are spliced to obtain the certificate storing data.
For example, the certification data is subjected to a character string conversion process of adding a time stamp to generate an eighth character string, the certification data is subjected to a string conversion process of encrypting and adding a digital certificate to generate a ninth character string, and the eighth character string and the ninth character string are spliced to obtain the certification data.
For example, the character string conversion processing of the evidence of: and performing at least one of character string conversion processing of encrypting the certificate storing data, adding a time stamp and a digital certificate, and determining a character string generated by the conversion processing as the certificate storing data.
The expression form of the electronic evidence data has diversity, the electronic evidence data can be embodied in a text form, and can also be presented in multimedia forms such as graphics, images, animation, audio and video, and the operation mode of the evidence is greatly changed by means of a computer with integration, interactivity and real-time performance and a network system thereof.
The evidence information may include, but is not limited to, notes, audiovisual material, electronic data, such as material evidence, book evidence, witness testimonial, statements of a victim, criminal suspects, confession and debates of a victim, appraisal opinions, surveys, examinations, recognitions, and investigation experiments, for example.
The forensic environment information may include, for example, but is not limited to, identification of the forensic device, communication address, geolocation information, environmental image, environmental temperature, environmental humidity, wind power, and brightness, and the like. The communication address comprises a unique IP address, the IP address comprises a unique identification of the evidence obtaining device accessing the network and a unique identification of the evidence obtaining device, and whether the evidence obtaining device is hacked or tampered by viruses or not can be determined based on the communication address, so that the authenticity of the electronic evidence data of the uplink is determined.
As shown in fig. 3, before obtaining the evidence information and the evidence obtaining environment information of the evidence information, the method further includes:
step S302, a digital certificate sent by the certificate storing platform is obtained.
And step S304, embedding a software development kit for storing the certificate according to the digital certificate.
In one embodiment of the disclosure, the digital certificate can guarantee the validity, the security and the reliability of the evidence obtaining device by registering on the evidence storing platform to obtain the unique digital certificate corresponding to the account.
Furthermore, the digital certificate is embedded into a software development kit for evidence storage, the character strings are spliced through the software development data package to obtain evidence storage data, the evidence storage data does not need to be transferred or transmitted, the signature of the digital certificate can be added to the evidence storage data at the evidence collection equipment, and the electronic evidence data is further prevented from being tampered or leaked.
Among them, a Software Development Kit (abbreviated as SDK) may be a collection of Development tools when creating application Software for a specific Software package, Software framework, hardware platform, operating system, and the like. Software development tools also include a collection of related documents, paradigms, and tools that broadly refer to assisting in the development of a certain class of software. The SDK may, for example, include example code, supporting technical notes, or supporting documents to clarify suspects for basic reference material.
In one embodiment of the present disclosure, the forensic environment information comprises at least one of an identification of the forensic device, a communication address, geolocation information, and an environmental image.
As shown in fig. 4, uploading the credential data to the blockchain includes:
step S402, uploading the evidence storage data to a node of the block chain.
Step S404, synchronizing the evidence storing data to the appointed node of the block chain through one node.
In one embodiment of the disclosure, the evidence storage data is uploaded to one node of the block chain, the evidence storage data is synchronized to the designated node of the block chain through the one node, if the designated node is all nodes of the block chain, the evidence storage data is full-network public data, and if the designated node is a plurality of specific nodes, the evidence storage data is private data and is only received, edited and consulted by the specific nodes.
Fig. 5 shows a flowchart of a method for processing electronic evidence data in an embodiment of the present disclosure. The method provided by the embodiment of the disclosure can be executed by any electronic equipment with computing processing capacity.
As shown in fig. 5, the electronic device executes a processing method of electronic evidence data, including the steps of:
step S502, obtaining the evidence storing data uploaded to the block chain according to any one of the above technical solutions.
Step S504, the evidence storage data is analyzed to determine a first character string, a second character string and a third character string, wherein the first character string is obtained by carrying out Hash calculation on evidence of evidence storage, the second character string is obtained by adding a time stamp to the evidence of evidence storage, and the third character string is obtained by adding a signature of a digital certificate to the evidence of storage.
Step S506, determining evidence storage attribute information of evidence according to the first character string, the second character string and the third character string.
And step S508, verifying the authenticity of the evidence according to the evidence attribute information.
In an embodiment of the present disclosure, by acquiring the forensic data uploaded to the blockchain according to any one of the above technical solutions, and parsing the forensic data to determine the first character string, the second character string, and the third character string, it is determined whether the encryption, the timestamp, and the signature of the digital certificate of the forensic data are secure, reliable, untampered, undisclosed, and the like.
As shown in fig. 6, determining the evidence-storing attribute information of the evidence based on the first character string, the second character string and the third character string includes:
step S602, determining evidence of evidence storage according to the first character string.
And step S604, determining a time stamp for generating evidence of evidence storage according to the second character string.
Step S606, determining the signature of the digital certificate according to the third string.
In one embodiment of the present disclosure, the evidence of evidence is determined by the first character string, that is, the evidence of evidence is obtained by decryption processing, the timestamp is determined by the second character string, the evidence obtaining time is determined by the timestamp, further, the signature of the digital certificate is determined by the third character string, so as to determine the affiliation between the evidence data and the evidence obtaining device, and in summary, the reliability, the privacy and the clarity of affiliation of the evidence data are improved based on the first character string, the second character string and the third character string.
As shown in fig. 7, verifying the authenticity of the proof of deposit based on the proof attribute information includes:
step S702, if it is determined that the timestamp is consistent with the preset timestamp and the signature of the digital certificate is consistent with the preset signature, determining that the evidence of storing the certificate is a real evidence.
In an embodiment of the disclosure, if it is determined that the timestamp is consistent with the preset timestamp and the signature of the digital certificate is consistent with the preset signature, it is determined that the evidence is a true evidence, and further, the evidence information and the evidence obtaining environment information in the evidence are analyzed, and the authenticity of the evidence information is judged through the evidence obtaining environment information.
Step S704, if it is determined that the timestamp is not consistent with the preset timestamp, or the signature of the digital certificate is not consistent with the preset signature, it is determined that the evidence of the certificate is the truthful evidence.
In an embodiment of the disclosure, if it is determined that the timestamp is inconsistent with the preset timestamp, it is determined that the evidence of evidence.
An apparatus 800 for processing electronic proof data according to this embodiment of the present disclosure is described below with reference to fig. 8. The electronic evidence data processing apparatus 800 shown in fig. 8 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 8, the processing device 800 of the electronic proof data is represented in the form of a hardware module. The components of the apparatus for processing of electronic evidence data 800 may include, but are not limited to: an acquisition module 802, a composition module 804, a conversion module 806, a concatenation module 808, and a communication module 810.
The obtaining module 802 is configured to obtain evidence information and evidence obtaining environment information of the evidence information.
And the synthesis module 804 is configured to perform synthesis processing on the evidence information and the evidence obtaining environment information through the embedded software development kit to obtain evidence for evidence collection.
And the conversion module 806 is configured to perform a character string conversion process on the evidence to obtain evidence storage data.
A communication module 808, configured to upload the credential data to the blockchain.
An electronic proof data processing apparatus 900 according to this embodiment of the present disclosure is described below with reference to fig. 9. The electronic evidence data processing apparatus 900 shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 9, the electronic proof data processing apparatus 900 is represented in the form of a hardware module. The components of the apparatus for processing of electronic evidence data 900 may include, but are not limited to: an acquisition module 902, a parsing module 904, a determination module 906, and a verification module 908.
An obtaining module 902, configured to obtain the evidence storing data uploaded to the blockchain according to any one of the above technical solutions.
The parsing module 904 is configured to parse the evidence-storing data to determine a first character string, a second character string, and a third character string, where the first character string is obtained by performing hash calculation on evidence-storing evidence, the second character string is obtained by adding a timestamp to the evidence-storing evidence, and the third character string is obtained by adding a signature of a digital certificate to the evidence-storing evidence.
A determining module 906, configured to determine, according to the first character string, the second character string, and the third character string, evidence storage attribute information of the evidence.
And the verification module 908 is used for verifying the authenticity of the evidence according to the evidence attribute information.
An electronic device 1000 according to this embodiment of the disclosure is described below with reference to fig. 10. The electronic device 1000 shown in fig. 10 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 10, the electronic device 1000 is embodied in the form of a general purpose computing device. The components of the electronic device 1000 may include, but are not limited to: the at least one processing unit 1010, the at least one memory unit 1020, and a bus 1030 that couples various system components including the memory unit 1020 and the processing unit 1010.
Where the storage unit stores program code that may be executed by the processing unit 1010 to cause the processing unit 1010 to perform the steps according to various exemplary embodiments of the present disclosure as described in the "exemplary methods" section above in this specification. For example, the processing unit 1010 may execute the steps defined in the method of processing electronic evidence data of the present disclosure.
The storage unit 1020 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)10201 and/or a cache memory unit 10202, and may further include a read-only memory unit (ROM) 10203.
The memory unit 1020 may also include a program/utility 10204 having a set (at least one) of program modules 10205, such program modules 10205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 1030 may be any one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, and a local bus using any of a variety of bus architectures.
The electronic device 1000 may also communicate with one or more external devices 1040 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 1000 to communicate with one or more other computing devices. Such communication may occur through input/output (I/O) interfaces 1050. Also, the electronic device 1000 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet) through the network adapter 1110, the network adapter 1110 communicating with other modules of the electronic device 1000 through the bus 1030. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RA identification systems, tape drives, and data backup storage systems, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, various aspects of the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the steps according to various exemplary embodiments of the disclosure described in the above-mentioned "exemplary methods" section of this specification, when the program product is run on the terminal device.
According to the program product for implementing the above method of the embodiments of the present disclosure, it may employ a portable compact disc read only memory (CD-ROM) and include program codes, and may be run on a terminal device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (14)

1. A method for processing electronic evidence data, comprising:
acquiring evidence information and evidence obtaining environment information of the evidence information;
synthesizing the evidence information and the evidence obtaining environment information through an embedded software development kit to obtain evidence for evidence storage;
carrying out character string conversion processing on the evidence to obtain evidence data;
and uploading the evidence storage data to a block chain.
2. The method for processing electronic evidence data according to claim 1, wherein the character string conversion processing of the evidence for evidence storage to obtain evidence for evidence storage comprises:
and converting the evidence storage data into a plurality of different character strings, and splicing the different character strings to obtain the evidence storage data.
3. The method for processing electronic evidence data according to claim 2, wherein converting the evidence data into a plurality of different character strings and splicing the plurality of different character strings to obtain the evidence data comprises:
performing Hash calculation on the evidence for evidence storage to convert the evidence into a first character string;
adding a timestamp to the evidence for evidence storage to convert the evidence into a second character string;
adding the signature of the digital certificate to the evidence for storing the certificate so as to convert the evidence into a third character string;
and splicing at least two character strings in the first character string, the second character string and the third character string to obtain the evidence storage data.
4. The method for processing electronic evidence data according to claim 2, wherein converting the evidence data into a plurality of different character strings and splicing the plurality of different character strings to obtain the evidence data further comprises:
encrypting the certificate storing data and performing character string conversion processing of adding a timestamp to generate a fourth character string, performing string conversion processing of adding a digital certificate to the certificate storing data to generate a fifth character string, and splicing the fourth character string and the fifth character string to obtain the certificate storing data;
or carrying out encrypted character string conversion processing on the certificate storing data to generate a sixth character string, carrying out string conversion processing of adding a digital certificate and adding a time stamp on the certificate storing data to generate a seventh character string, and splicing the sixth character string and the seventh character string to obtain the certificate storing data;
or carrying out character string conversion processing of adding a timestamp on the certificate storing data to generate an eighth character string, carrying out string conversion processing of encrypting the certificate storing data and adding a digital certificate to generate a ninth character string, and splicing the eighth character string and the ninth character string to obtain the certificate storing data.
5. The method for processing electronic evidence data according to claim 1, wherein the character string conversion processing of the evidence for evidence storage to obtain evidence for evidence storage further comprises:
and performing at least one of character string conversion processing of encrypting the certificate storing data, adding a time stamp and a digital certificate, and determining a character string generated by the conversion processing as the certificate storing data.
6. The method for processing electronic evidence data according to any one of claims 1 to 5, further comprising, before obtaining evidence information and forensics environment information of the evidence information:
acquiring a digital certificate sent by a evidence storage platform;
and embedding a software development kit for storing the certificate according to the digital certificate.
7. A method of processing electronic evidence data according to any of the claims 1 to 5 wherein uploading the evidence data to a blockchain comprises:
uploading the evidence storing data to a node of the block chain;
synchronizing the forensic data to a designated node of the blockchain via a node.
8. A method for processing electronic evidence data, comprising:
obtaining forensic data uploaded to a blockchain according to any of claims 1 to 7;
analyzing the evidence storing data to determine a first character string, a second character string and a third character string, wherein the first character string is obtained by carrying out Hash calculation on evidence storing evidence, the second character string is obtained by adding a time stamp to the evidence storing evidence, and the third character string is obtained by adding a signature of a digital certificate to the evidence storing evidence;
determining evidence storage attribute information of the evidence according to the first character string, the second character string and the third character string;
and verifying the authenticity of the evidence according to the evidence storing attribute information.
9. The method for processing electronic evidence data according to claim 8, wherein determining evidence-depositing attribute information of the evidence of:
determining the evidence of evidence storage according to the first character string;
determining a timestamp for generating the evidence of evidence according to the second character string;
and determining the signature of the digital certificate according to the third character string.
10. The method of processing electronic evidence data according to claim 9 wherein verifying the authenticity of the proof of deposit based on the proof property information comprises:
if the time stamp is determined to be consistent with the preset time stamp and the signature of the digital certificate is determined to be consistent with the preset signature, determining that the evidence of storing the certificate is a real evidence;
and if the time stamp is determined to be inconsistent with the preset time stamp or the signature of the digital certificate is determined to be inconsistent with the preset signature, determining that the evidence of evidence storage is the unreal evidence.
11. An apparatus for processing electronic evidence data, comprising:
the acquisition module is used for acquiring evidence information and evidence obtaining environment information of the evidence information;
the synthesis module is used for carrying out synthesis processing on the evidence information and the evidence obtaining environment information through an embedded software development kit so as to obtain evidence for evidence storage;
the conversion module is used for carrying out character string conversion processing on the evidence to obtain evidence data;
and the communication module is used for uploading the evidence storing data to the block chain.
12. An apparatus for processing electronic evidence data, comprising:
an acquisition module, configured to acquire the evidence storing data uploaded to the blockchain according to any one of claims 1 to 7;
the analysis module is used for analyzing the evidence storage data to determine a first character string, a second character string and a third character string, wherein the first character string is obtained by carrying out Hash calculation on evidence of evidence storage, the second character string is obtained by adding a time stamp to the evidence of evidence storage, and the third character string is obtained by adding a signature of a digital certificate to the evidence of evidence storage;
the determining module is used for determining evidence storage attribute information of the evidence according to the first character string, the second character string and the third character string;
and the verification module is used for verifying the authenticity of the evidence according to the evidence storing attribute information.
13. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of processing electronic evidence data of any one of claims 1-10 via execution of the executable instructions.
14. A computer-readable storage medium having stored thereon a computer program, characterized in that,
the computer program, when executed by a processor, implements a method of processing electronic evidence data according to any one of claims 1 to 10.
CN202110042790.XA 2021-01-13 2021-01-13 Electronic evidence data processing method and device, electronic equipment and storage medium Active CN112733167B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110042790.XA CN112733167B (en) 2021-01-13 2021-01-13 Electronic evidence data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110042790.XA CN112733167B (en) 2021-01-13 2021-01-13 Electronic evidence data processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112733167A true CN112733167A (en) 2021-04-30
CN112733167B CN112733167B (en) 2024-08-16

Family

ID=75591859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110042790.XA Active CN112733167B (en) 2021-01-13 2021-01-13 Electronic evidence data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112733167B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114693475A (en) * 2022-06-01 2022-07-01 四川证法科技有限公司 Method and system for realizing on-site supervision notarization based on AR glasses
CN117614739A (en) * 2024-01-16 2024-02-27 支付宝(杭州)信息技术有限公司 Evidence data storage method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101611A (en) * 2016-05-20 2016-11-09 青岛江盈自控装备制造有限公司 A kind of ambient scene evidence preserves system
US20180075028A1 (en) * 2015-04-20 2018-03-15 Ogy Docs, Inc. A method of distributed management of electronic documents of title (edt) and system thereof
US20190108482A1 (en) * 2017-10-06 2019-04-11 Sap Se Enablement of procurement processes with asset traceability using blockchain technology
CN109660356A (en) * 2018-12-18 2019-04-19 深圳前海微众银行股份有限公司 Data cochain method, apparatus, equipment and computer readable storage medium
CN109766724A (en) * 2018-12-19 2019-05-17 四川商通实业有限公司 Data evidence storing method based on block chain
CN110232749A (en) * 2019-06-17 2019-09-13 阿里巴巴集团控股有限公司 Card method, apparatus and electronic equipment are deposited in inspection based on block chain
CN112069465A (en) * 2020-09-23 2020-12-11 山东舜网传媒股份有限公司 Manuscript intellectual property protection method and system based on block chain
CN112116474A (en) * 2020-09-21 2020-12-22 北京海益同展信息科技有限公司 Electronic contract verification method and device, electronic equipment and storage medium
CN112214801A (en) * 2020-09-23 2021-01-12 湖南信达通信息技术有限公司 Electronic evidence obtaining management method, electronic evidence obtaining equipment and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180075028A1 (en) * 2015-04-20 2018-03-15 Ogy Docs, Inc. A method of distributed management of electronic documents of title (edt) and system thereof
CN106101611A (en) * 2016-05-20 2016-11-09 青岛江盈自控装备制造有限公司 A kind of ambient scene evidence preserves system
US20190108482A1 (en) * 2017-10-06 2019-04-11 Sap Se Enablement of procurement processes with asset traceability using blockchain technology
CN109660356A (en) * 2018-12-18 2019-04-19 深圳前海微众银行股份有限公司 Data cochain method, apparatus, equipment and computer readable storage medium
CN109766724A (en) * 2018-12-19 2019-05-17 四川商通实业有限公司 Data evidence storing method based on block chain
CN110232749A (en) * 2019-06-17 2019-09-13 阿里巴巴集团控股有限公司 Card method, apparatus and electronic equipment are deposited in inspection based on block chain
CN112116474A (en) * 2020-09-21 2020-12-22 北京海益同展信息科技有限公司 Electronic contract verification method and device, electronic equipment and storage medium
CN112069465A (en) * 2020-09-23 2020-12-11 山东舜网传媒股份有限公司 Manuscript intellectual property protection method and system based on block chain
CN112214801A (en) * 2020-09-23 2021-01-12 湖南信达通信息技术有限公司 Electronic evidence obtaining management method, electronic evidence obtaining equipment and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114693475A (en) * 2022-06-01 2022-07-01 四川证法科技有限公司 Method and system for realizing on-site supervision notarization based on AR glasses
CN117614739A (en) * 2024-01-16 2024-02-27 支付宝(杭州)信息技术有限公司 Evidence data storage method and device

Also Published As

Publication number Publication date
CN112733167B (en) 2024-08-16

Similar Documents

Publication Publication Date Title
CN110879903B (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification equipment and evidence verification medium
US11640474B2 (en) Method and apparatus for operating database
WO2021012574A1 (en) Multisignature method, signature center, medium and electronic device
JP2019220940A (en) Method and device for information exchange
CN101465848A (en) Secure digital signature system
CN112733167B (en) Electronic evidence data processing method and device, electronic equipment and storage medium
JP2022541835A (en) Methods and apparatus, electronic devices, storage media and computer programs for processing data requests
CN112435026B (en) Method and device for protecting file transaction information by using zero-knowledge proof and electronic equipment
CN115086958A (en) Equipment identity authentication method, device, terminal, authentication node and storage medium
CN112887080B (en) SM 2-based key generation method and system
CN114785524B (en) Electronic seal generation method, device, equipment and medium
CN104168117A (en) Voice digital signature method
CN114362955A (en) Software code cloud digital signature method, system, device and storage medium
CN112685022B (en) Picture processing interface generation method, device, equipment and storage medium
CN113129008A (en) Data processing method and device, computer readable medium and electronic equipment
CN113794553A (en) Data transmission method and device, electronic equipment and storage medium
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN114189331B (en) Key storage and reading method, device, equipment and storage medium
CN114676451B (en) Electronic document signing method and device, storage medium and electronic equipment
CN112767225A (en) Front-end image processing method and device, electronic equipment and readable storage medium
CN114626968A (en) Watermark embedding method, watermark extracting method and device
CN112541199A (en) Block chain-based electronic storage certificate integrity verification method and electronic equipment
CN112712428A (en) Block chain-based electronic certificate storage method and electronic equipment
CN113111283A (en) Forensic server, forensic method, storage medium, and program product
CN117014233B (en) Tamper-resistant contract data acquisition and generation method and tamper-resistant contract data acquisition and generation device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Information Technology Co.,Ltd.

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

GR01 Patent grant
GR01 Patent grant