CN113672876A - OTG-based method and device for quickly obtaining evidence of mobile phone - Google Patents

OTG-based method and device for quickly obtaining evidence of mobile phone Download PDF

Info

Publication number
CN113672876A
CN113672876A CN202111223790.6A CN202111223790A CN113672876A CN 113672876 A CN113672876 A CN 113672876A CN 202111223790 A CN202111223790 A CN 202111223790A CN 113672876 A CN113672876 A CN 113672876A
Authority
CN
China
Prior art keywords
data
media file
mobile phone
encrypted
thread
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111223790.6A
Other languages
Chinese (zh)
Other versions
CN113672876B (en
Inventor
丁兆锟
王丹
华同乐
张静文
谢波
田文郁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING TUOJIE INFORMATION TECHNOLOGY CO LTD
Original Assignee
NANJING TUOJIE INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING TUOJIE INFORMATION TECHNOLOGY CO LTD filed Critical NANJING TUOJIE INFORMATION TECHNOLOGY CO LTD
Priority to CN202111223790.6A priority Critical patent/CN113672876B/en
Publication of CN113672876A publication Critical patent/CN113672876A/en
Application granted granted Critical
Publication of CN113672876B publication Critical patent/CN113672876B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a mobile phone rapid evidence obtaining method based on OTG, belonging to the technical field of mobile phone data processing, comprising the following steps: the OTG device copies the mobile phone data stored in the internal storage medium of the mobile phone, and creates three threads: a thread, B thread and C thread; starting a thread C, traversing a file list to be copied, putting traversal data into the file list, starting a thread A after the thread C has data, reading the file list, starting to read the data, putting the read data into a blocking queue, monitoring after the thread B is started, starting to write the data into a compressed file in a compression mode, and setting the compression ratio to be 0; reading a serial number of a USB memory of the OTG device, and encrypting mobile phone data based on the serial number of the USB memory; the invention can completely copy the data, the application and the application accessories of the mobile phone without considering the condition of insufficient internal storage space of the mobile phone.

Description

OTG-based method and device for quickly obtaining evidence of mobile phone
Technical Field
The invention relates to the technical field of mobile phone data processing, in particular to a mobile phone rapid evidence obtaining method based on OTG.
Background
At present, there are two common methods for mobile phone evidence collection: 1. the mobile phone evidence obtaining method is characterized in that a computer is connected through a data line, and mobile phone evidence obtaining software is used for obtaining the evidence, but the problem that the evidence cannot be obtained when the space of a mobile phone is insufficient exists in the obtaining mode. 2. The mobile phone accessory is connected with a computer through a data line, and the mobile phone data is acquired by using tools such as a mobile phone assistant, so that the problem that the application accessory cannot be acquired exists.
Disclosure of Invention
The invention provides a method for rapidly obtaining evidence of a mobile phone based on an OTG (on-the-go) and solves the technical problems that data obtained by mobile phone evidence obtaining software is limited by a mobile phone space and application accessories cannot be obtained when data obtained by a computer program in the related art.
According to one aspect of the invention, the invention provides a method for rapidly obtaining evidence of a mobile phone based on OTG, which comprises the following steps:
step S1, the OTG device copies the mobile phone data stored in the internal storage medium of the mobile phone, and the mobile phone data at least comprises a media file and an application file;
the method for acquiring the application file comprises the following steps:
acquiring information of all applications installed on the mobile phone, establishing an application list, traversing the application list to acquire application accessories, acquiring a directory list of the application accessories, and then traversing to acquire all files under the directory list of the application accessories;
three threads are created: a thread, B thread and C thread;
starting a thread C, traversing a file list to be copied, placing traversal data into a file list _ A, starting a thread A after the thread C has data, reading the file list _ A, starting to read the data, placing the read data into a blocking queue BlockingQueue, monitoring the BlockingQueue after the thread B is started, starting to write the compressed file by a ZipOutStream compression mode when the data exists, setting the compression ratio to be 0, setting a traversal completion identifier after the thread C is finished, reading the data by the thread A, writing the data by the thread B, waiting for the BlockingQueue overtime, judging that the traversal identifier is also finished, and finishing the thread B and the thread A;
step S2, the serial number of the USB memory of the OTG device is read, and the original media file is encrypted based on the serial number of the USB memory.
The encryption of the original media file based on the serial number of the USB memory comprises the following steps:
step S21, reading the data size of the original media file, and dividing the original media file into data blocks based on the data size of the original media file and the set capacity value;
step S22, calling the divided first data block, processing the serial number of the USB memory by XOR operation to obtain the first encryption value;
step S23, calling the divided second data block, and processing the first encrypted value of the first data block through XOR operation to obtain a second encrypted value;
step S24, calling the divided (N + 1) th data block, and processing the encrypted value of the nth data block through XOR operation to obtain an (N + 1) th encrypted value, wherein N > 1;
in step S25, the step S24 is repeated to encrypt all data blocks.
The dividing of the original media file into data blocks is performed sequentially based on the data size of the original media file and a set capacity value, the divided data blocks are generated one by one, and the data blocks are encrypted according to the sequence of the data blocks.
The data blocks of the encrypted media file are identified in the encrypted order.
Furthermore, the data blocks of the encrypted media file are identified based on the serial number of the USB memory, the serial number of the USB memory is intercepted from front to back into a plurality of sections, the number of the intercepted sections is the same as the number of the data blocks of the encrypted media file, and the intercepted serial number of the USB memory is marked on the data blocks of the encrypted media file according to the sequence. Any two sections of characters are not the same in the multiple sections of characters obtained when the serial number of the USB memory is intercepted.
When decrypting, the data blocks of the encrypted media file are sequenced based on the read serial number of the USB memory and the mark of the data block of the encrypted media file, and then the encrypted value obtained by decryption can be corresponded to the data blocks of the encrypted media file according to the sequence.
According to an aspect of the present invention, there is provided a method of decrypting an encrypted media file, comprising:
the mobile phone downloads the playing program;
the mobile phone is connected with the OTG device, reads the serial number of the USB storage equipment, decrypts the encrypted media file based on the serial number of the USB storage equipment to obtain a readable media file, and plays the readable media file;
decrypting the encrypted media file based on the serial number of the USB storage device to obtain a readable media file specifically includes:
processing the serial number of the USB memory through XOR operation to obtain a first encryption value of a first data block;
processing the first cryptographic value of the first data block by an exclusive-or operation to obtain a second cryptographic value;
processing the encrypted value of the Nth data block through an exclusive-or operation to obtain an N +1 encrypted value, wherein N is more than 1;
repeating the previous step to obtain the encrypted values of all the data blocks, and decrypting the data blocks based on the obtained encrypted values of all the data blocks;
the encrypted media file can be copied from the universal storage area of the USB storage device to the internal storage medium of the handset before being played.
The mobile phone can read a file list of a universal storage area of the USB storage device, wherein one file of the file list of the universal storage area of the USB storage device corresponds to an original media file and comprises all divided data blocks of the original media file.
According to one aspect of the invention, the device for rapidly obtaining the evidence of the mobile phone based on the OTG comprises a processing module and a USB memory, wherein the processing module divides the storage space of the USB memory into a general storage area and an unreadable storage area, the content stored in the unreadable storage area cannot be copied, and the unreadable storage area is used for recording a security program required by encryption;
the processing module comprises a processor and is suitable for realizing instructions;
and the storage medium is suitable for storing a plurality of instructions, and the instructions are suitable for being loaded by the processor and executing the OTG-based mobile phone rapid evidence obtaining method.
The invention has the beneficial effects that: the invention solves the technical problems that the data acquired by mobile phone forensics software is limited in the space of a mobile phone and the data acquired by a computer program cannot be acquired by an application accessory;
in addition, the invention encrypts the acquired data through layer-by-layer feedback, thereby enhancing the stability and the safety, fundamentally inhibiting the illegal copying process, preventing the file from being played even if being copied, and more stably protecting the acquired mobile phone data.
Drawings
Fig. 1 is a flowchart of a method for quickly obtaining evidence of an OTG-based mobile phone according to an embodiment of the present invention;
FIG. 2 is a flow chart of encrypting an original media file based on a serial number of a USB memory according to an embodiment of the present invention.
Detailed Description
The subject matter described herein will now be discussed with reference to example embodiments. It should be understood that these embodiments are discussed only to enable those skilled in the art to better understand and thereby implement the subject matter described herein, and are not intended to limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as needed. In addition, features described with respect to some examples may also be combined in other examples.
As shown in fig. 1, the OTG-based method for rapidly obtaining evidence of a mobile phone includes the following steps:
step S1, the OTG device copies the mobile phone data stored in the internal storage medium of the mobile phone, and the mobile phone data at least comprises a media file and an application file;
the acquired media files can be directly acquired from an image storage directory and a video storage directory of the mobile phone;
the method for acquiring the application file comprises the following steps:
the method comprises the steps of obtaining information of all application packages installed on the mobile phone, establishing an application list, traversing the application list to obtain application attachments, obtaining a directory list of the application attachments, and then traversing to obtain all files under the directory list of the application attachments.
Three threads are created: an A thread (read thread), a B thread (write thread), and a C thread (traverse thread);
starting a thread C, traversing a file list to be copied, placing traversal data into a file list _ A, starting a thread A after the thread C has data, reading the file list _ A, starting to read the data, placing the read data into a blocking queue BlockingQueue, monitoring the BlockingQueue after the thread B is started, and starting to write the compressed file in a ZipOutputStream compression mode when data exists, wherein the compression ratio is set to be 0, so that the writing can be omitted, and the speed is higher. And C, setting a traversal completion identifier after the thread A is finished, reading data by the thread A, writing data by the thread B, waiting for the BlockingQueue to be overtime, judging that the traversal identifier is also finished, and finishing the thread B and the thread A.
The general OTG writing methods include the following three types:
a. direct write
The method comprises the following steps: using storagemanager. class. getclasdedmethoded ("getVolumes");
acquiring a mobile phone disk list, further acquiring a path of an external OTG (on-the-go) through keyword filtering, trying to create an offlineMode folder, if the path can be successfully created, saving the path, and writing the OTG by using the method;
b. selective writing
The method comprises the following steps: utilizing a self-contained 'document' program of the mobile phone to create a broadcast:
the method comprises the steps of realizing a broadcast function by self, receiving the broadcast, obtaining Uri of a U disk path through the sent Intent, and then operating the obtained Uri by using DocumentFile operation so as to operate OTG;
c. USB mode write
The method comprises the following steps: re-mounting OTG using third party library libraries
After the application is initiated, a user clicks authorization, a code obtains a mounted path through a service, and then OTG is operated through a third-party library UsbFile;
the sequence of selecting the OTG writing mode is that a-b-c select in turn:
for example:
(1) the mobile phone supports 'document' but meizu M045 does not select a button and cannot select a path;
meizu m2 does not display the U disk path and cannot select;
3608681-A01 shows no path and is not selectable;
so the USB mode is used for writing;
(2) user selection
And supporting 'document' but the user does not select the directory, directly clicking back to cause that the OTG directory is empty, and selecting a USB mode for writing.
Step S2, reading the serial number of the USB memory of the OTG device, and encrypting the original media file based on the serial number of the USB memory;
as shown in fig. 2, encrypting the original media file based on the serial number of the USB memory includes the following steps:
step S21, reading the data size of the original media file, and dividing the original media file into data blocks based on the data size of the original media file and the set capacity value;
step S22, calling the divided first data block, processing the serial number of the USB memory by XOR operation to obtain the first encryption value;
step S23, calling the divided second data block, and processing the first encrypted value of the first data block through XOR operation to obtain a second encrypted value;
step S24, calling the divided (N + 1) th data block, and processing the encrypted value of the nth data block through XOR operation to obtain an (N + 1) th encrypted value, wherein N > 1;
in step S25, the step S24 is repeated to encrypt all data blocks.
Based on the OTG-based method for rapidly obtaining the evidence of the mobile phone, the invention provides an OTG-based device for rapidly obtaining the evidence of the mobile phone, which comprises a processing module and a USB memory, wherein the processing module divides the storage space of the USB memory into a general storage area and an unreadable storage area, the contents stored in the unreadable storage area cannot be copied, the unreadable storage area is used for recording a security program required by encryption, and a user can play and view an encrypted file;
the processing module comprises a processor and is suitable for realizing instructions;
the storage medium is suitable for storing a plurality of instructions, and the instructions are suitable for being loaded by the processor and executing the OTG-based mobile phone rapid evidence obtaining method;
the encryption process of the OTG-based mobile phone rapid evidence obtaining device is as follows:
loading an original media file to a processing module, wherein a USB memory is connected to a port of the processing module;
the processing module reads the serial number of the USB memory and takes the serial number of the USB memory as a secret key value in the encryption process;
reading the data size of an original media file, and dividing the original media file into data blocks based on the data size of the original media file and a set capacity value;
dividing the original media file into data blocks in sequence based on the data size of the original media file and a set capacity value, wherein the divided data blocks are generated one by one, and the data blocks are encrypted according to the sequence of the data blocks;
calling the divided first data block, and processing the serial number of the USB memory through an exclusive OR operation to obtain a first encryption value;
calling the divided second data block, and processing the first encryption value of the first data block through XOR operation to obtain a second encryption value;
calling the divided (N + 1) th data block, and processing the encrypted value of the Nth data block through XOR operation to obtain an (N + 1) th encrypted value, wherein N is more than 1;
repeating the previous step to encrypt all the data blocks, and storing the encrypted media file in a universal storage area of the USB memory;
for the above playing of the encrypted media file obtained by encryption, the present invention provides a decryption playing method applied to a mobile phone:
the mobile phone downloads the playing program;
the mobile phone is connected with the OTG device, reads the serial number of the USB storage equipment, decrypts the encrypted media file based on the serial number of the USB storage equipment to obtain a readable media file, and plays the readable media file;
the mobile phone can read a file list of a universal storage area of the USB storage equipment, wherein one file of the file list of the universal storage area of the USB storage equipment corresponds to an original media file and comprises all divided data blocks of the original media file;
decrypting the encrypted media file based on the serial number of the USB storage device to obtain a readable media file specifically includes:
processing the serial number of the USB memory through XOR operation to obtain a first encryption value of a first data block;
processing the first cryptographic value of the first data block by an exclusive-or operation to obtain a second cryptographic value;
processing the encrypted value of the Nth data block through an exclusive-or operation to obtain an N +1 encrypted value, wherein N is more than 1;
repeating the previous step to obtain the encrypted values of all the data blocks, and decrypting the data blocks based on the obtained encrypted values of all the data blocks;
before playing the encrypted media file, copying the encrypted media file from the universal storage area of the USB storage device to the internal storage medium of the mobile phone;
further, in the above embodiment, the data blocks of the encrypted media file are based on numbers or letters to identify serial numbers, and in order to further improve data security, the data blocks of the encrypted media file are identified based on the serial numbers of the USB memory, the serial numbers of the USB memory are intercepted from front to back into multiple segments, the number of the intercepted segments is the same as the number of the data blocks of the encrypted media file, and the intercepted serial numbers of the USB memory are sequentially marked on the data blocks of the encrypted media file;
during decryption, the data blocks of the encrypted media file need to be sequenced based on the read serial number of the USB memory and the marks of the data blocks of the encrypted media file, and then the encrypted value obtained by decryption can be corresponded to the data blocks of the encrypted media file according to the sequence;
for example, the serial number of the USB memory is N135YC9L420 JKF;
intercepting six segments, namely N13, 5YC,9L4,20J and KF, which are correspondingly marked on six data blocks, wherein the six data blocks can be marked by a serial number N135YC9L420JKF corresponding to the USB memory;
it should be noted that, none of the multiple segments of characters obtained when the serial number of the USB memory is intercepted is the same as any two segments of characters.
The embodiments of the present invention have been described with reference to the drawings, but the present invention is not limited to the above-mentioned specific embodiments, which are only illustrative and not restrictive, and those skilled in the art can make many forms without departing from the spirit and scope of the present invention and the protection scope of the claims.

Claims (10)

1. The OTG-based method for rapidly obtaining evidence of the mobile phone is characterized by comprising the following steps:
step S1, the OTG device copies the mobile phone data stored in the internal storage medium of the mobile phone, and the mobile phone data at least comprises a media file and an application file;
the method for acquiring the application file comprises the following steps:
acquiring information of all applications installed on the mobile phone, establishing an application list, traversing the application list to acquire application accessories, acquiring a directory list of the application accessories, and then traversing to acquire all files under the directory list of the application accessories;
three threads are created: a thread, B thread and C thread;
starting a thread C, traversing a file list to be copied, placing traversal data into a file list _ A, starting a thread A after the thread C has data, reading the file list _ A, starting to read the data, placing the read data into a blocking queue BlockingQueue, monitoring the BlockingQueue after the thread B is started, starting to write the compressed file by a ZipOutStream compression mode when the data exists, setting the compression ratio to be 0, setting a traversal completion identifier after the thread C is finished, reading the data by the thread A, writing the data by the thread B, waiting for the BlockingQueue overtime, judging that the traversal identifier is also finished, and finishing the thread B and the thread A;
step S2, the serial number of the USB memory of the OTG device is read, and the original media file is encrypted based on the serial number of the USB memory.
2. The OTG-based handset fast forensics method according to claim 1, wherein the encrypting the original media file based on the serial number of the USB memory comprises the following steps:
step S21, reading the data size of the original media file, and dividing the original media file into data blocks based on the data size of the original media file and the set capacity value;
step S22, calling the divided first data block, processing the serial number of the USB memory by XOR operation to obtain the first encryption value;
step S23, calling the divided second data block, and processing the first encrypted value of the first data block through XOR operation to obtain a second encrypted value;
step S24, calling the divided (N + 1) th data block, and processing the encrypted value of the nth data block through XOR operation to obtain an (N + 1) th encrypted value, wherein N > 1;
in step S25, the step S24 is repeated to encrypt all data blocks.
3. The OTG-based fast evidence obtaining method for mobile phone according to claim 2, wherein the dividing of the original media file into data blocks based on the data size of the original media file and the set capacity value is performed sequentially, the divided data blocks are generated one by one, and the data blocks are encrypted according to the order of the data blocks.
4. The OTG-based method for rapid forensics of mobile phones according to claim 2, wherein the data blocks of the media file are identified in an encrypted order.
5. The OTG-based fast evidence obtaining method for mobile phone according to claim 2, wherein the data block of the encrypted media file is identified based on the serial number of the USB memory, the serial number of the USB memory is intercepted from front to back as multiple segments, the number of the intercepted segments is the same as the number of the data blocks of the encrypted media file, and the intercepted serial number of the USB memory is sequentially marked on the data blocks of the encrypted media file.
6. The OTG-based fast evidence obtaining method for mobile phone according to claim 5, wherein during decryption, the data blocks of the encrypted media file are sorted based on the read serial number of the USB memory and the tag of the data block of the encrypted media file, and then the encrypted value obtained by decryption can be sequentially corresponded to the data block of the encrypted media file.
7. The OTG-based method for rapidly forensics on mobile phones according to claim 5, wherein no two arbitrary segments of characters are the same in the multiple segments of characters obtained by intercepting the serial number of the USB memory.
8. The OTG-based mobile phone rapid forensics method according to claim 2, wherein the method for decrypting the encrypted media file obtained by encrypting the original media file based on the serial number of the USB memory comprises:
the mobile phone downloads the playing program;
the mobile phone is connected with the OTG device, reads the serial number of the USB storage equipment, decrypts the encrypted media file based on the serial number of the USB storage equipment to obtain a readable media file, and plays the readable media file;
decrypting the encrypted media file based on the serial number of the USB storage device to obtain a readable media file specifically includes:
processing the serial number of the USB memory through XOR operation to obtain a first encryption value of a first data block;
processing the first cryptographic value of the first data block by an exclusive-or operation to obtain a second cryptographic value;
processing the encrypted value of the Nth data block through an exclusive-or operation to obtain an N +1 encrypted value, wherein N is more than 1;
repeating the previous step to obtain the encrypted values of all the data blocks, and decrypting the data blocks based on the obtained encrypted values of all the data blocks;
the encrypted media file can be copied from the universal storage area of the USB storage device to the internal storage medium of the handset before being played.
9. The OTG-based method for rapidly forensics of a mobile phone according to claim 8, wherein the mobile phone is capable of reading a file list of the universal storage area of the USB storage device, and a file of the file list of the universal storage area of the USB storage device corresponds to an original media file and contains all divided data blocks of the original media file.
10. A mobile phone rapid evidence obtaining device based on OTG is characterized by comprising a processing module and a USB memory, wherein the processing module divides the storage space of the USB memory into a general storage area and an unreadable storage area, the content stored in the unreadable storage area cannot be copied, and the unreadable storage area is used for recording security programs required by encryption;
the processing module comprises a processor and is suitable for realizing instructions;
and a storage medium adapted to store a plurality of instructions, the instructions being adapted to be loaded by a processor and to perform the OTG-based handset fast forensics method according to any one of claims 1 to 7.
CN202111223790.6A 2021-10-21 2021-10-21 OTG-based method and device for quickly obtaining evidence of mobile phone Active CN113672876B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111223790.6A CN113672876B (en) 2021-10-21 2021-10-21 OTG-based method and device for quickly obtaining evidence of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111223790.6A CN113672876B (en) 2021-10-21 2021-10-21 OTG-based method and device for quickly obtaining evidence of mobile phone

Publications (2)

Publication Number Publication Date
CN113672876A true CN113672876A (en) 2021-11-19
CN113672876B CN113672876B (en) 2022-02-01

Family

ID=78550648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111223790.6A Active CN113672876B (en) 2021-10-21 2021-10-21 OTG-based method and device for quickly obtaining evidence of mobile phone

Country Status (1)

Country Link
CN (1) CN113672876B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1831800A (en) * 2005-03-08 2006-09-13 英济股份有限公司 Method and system for duplicating between USB devices
CN103559020A (en) * 2013-11-07 2014-02-05 中国科学院软件研究所 Method for realizing parallel compression and parallel decompression on FASTQ file containing DNA (deoxyribonucleic acid) sequence read data
CN103777906A (en) * 2014-02-14 2014-05-07 罗冬林 Equipment based on mobile phone directory and information sharing and working method of equipment
WO2014205788A1 (en) * 2013-06-28 2014-12-31 深圳市掌讯通讯设备有限公司 Method for automatically synchronizing data between android intelligent devices
KR101558914B1 (en) * 2014-09-30 2015-10-13 (주) 이모텔리 How multimedia source files generated by the usb otg memory not applied anti-piracy system and to play
CN105005474A (en) * 2015-07-02 2015-10-28 盘石软件(上海)有限公司 Microdevice for secretly extracting information of Android mobile phone and extraction method
CN106357402A (en) * 2016-11-11 2017-01-25 武汉斗鱼网络科技有限公司 Data encryption-decryption processing method and device
CN109309631A (en) * 2018-08-15 2019-02-05 新华三技术有限公司成都分公司 A kind of method and device based on universal network file system write-in data
CN110569308A (en) * 2019-09-10 2019-12-13 深圳乐信软件技术有限公司 Data file assembling method, device, equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1831800A (en) * 2005-03-08 2006-09-13 英济股份有限公司 Method and system for duplicating between USB devices
WO2014205788A1 (en) * 2013-06-28 2014-12-31 深圳市掌讯通讯设备有限公司 Method for automatically synchronizing data between android intelligent devices
CN103559020A (en) * 2013-11-07 2014-02-05 中国科学院软件研究所 Method for realizing parallel compression and parallel decompression on FASTQ file containing DNA (deoxyribonucleic acid) sequence read data
CN103777906A (en) * 2014-02-14 2014-05-07 罗冬林 Equipment based on mobile phone directory and information sharing and working method of equipment
KR101558914B1 (en) * 2014-09-30 2015-10-13 (주) 이모텔리 How multimedia source files generated by the usb otg memory not applied anti-piracy system and to play
CN105005474A (en) * 2015-07-02 2015-10-28 盘石软件(上海)有限公司 Microdevice for secretly extracting information of Android mobile phone and extraction method
CN106357402A (en) * 2016-11-11 2017-01-25 武汉斗鱼网络科技有限公司 Data encryption-decryption processing method and device
CN109309631A (en) * 2018-08-15 2019-02-05 新华三技术有限公司成都分公司 A kind of method and device based on universal network file system write-in data
CN110569308A (en) * 2019-09-10 2019-12-13 深圳乐信软件技术有限公司 Data file assembling method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张毅: "《基于数据挖掘技术的涉毒嫌犯手机信息提取及分析系统》", 《中国优秀硕士学位论文全文数据库(社会科学I辑)》 *

Also Published As

Publication number Publication date
CN113672876B (en) 2022-02-01

Similar Documents

Publication Publication Date Title
US11238165B2 (en) File encryption method, file decryption method, electronic device, and storage medium
JP4060271B2 (en) Content processing apparatus and content protection program
US8233624B2 (en) Method and apparatus for securing data in a memory device
US7770227B2 (en) Right information management method and right information management device
KR101597930B1 (en) A video file encryption and decryption method, device, and mobile terminal
US20160306992A1 (en) Content item encryption on mobile devices
US20060069925A1 (en) Content processing device, content accumulation medium, content processing method and content processing program
US7869595B2 (en) Content copying device and content copying method
US9208333B2 (en) Secure data recorder
US20080270792A1 (en) System and method of encrypting and decrypting digital files produced by digital still devices
CN1767032A (en) Use the multithread equipment and the multithread method of temporary transient storage medium
CN110221990B (en) Data storage method and device, storage medium and computer equipment
KR101036701B1 (en) System for binding secrets to a computer system having tolerance for hardware changes
CN108769807A (en) A kind of video encryption method based on Android platform
JP2000228060A (en) Data recording/reproducing device using portable storage medium
CN113672876B (en) OTG-based method and device for quickly obtaining evidence of mobile phone
CN112395627A (en) Encryption and decryption method, device and storage medium
CN1890915A (en) Method and apparatus for decrypting encrypted data by suing copy control information and computer readable recording medium for storing program for implementing the apparatus and method
JP5403708B2 (en) Information processing apparatus, data processing method, and program
JP5175494B2 (en) Encrypted content editing method and content management apparatus
JP7412445B2 (en) Content duplication device, access control device and access control program
JP4778798B2 (en) Data management device
US20090307503A1 (en) Digital content management systems and methods
CN116527616A (en) Method and device for monitoring instant messaging data, electronic equipment and storage medium
CN117714034A (en) Management method, storage medium and equipment for transaction log key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant