CN114117554B - Law enforcement data credibility verification method, processing method and system and law enforcement instrument - Google Patents

Law enforcement data credibility verification method, processing method and system and law enforcement instrument Download PDF

Info

Publication number
CN114117554B
CN114117554B CN202210104882.0A CN202210104882A CN114117554B CN 114117554 B CN114117554 B CN 114117554B CN 202210104882 A CN202210104882 A CN 202210104882A CN 114117554 B CN114117554 B CN 114117554B
Authority
CN
China
Prior art keywords
data
law enforcement
instrument
enforcement instrument
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210104882.0A
Other languages
Chinese (zh)
Other versions
CN114117554A (en
Inventor
尹可挺
方雯璟
汤泉
崔照阳
王平
马振军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Liancheng Digital Technology Co ltd
Original Assignee
Hangzhou Liancheng Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Liancheng Digital Technology Co ltd filed Critical Hangzhou Liancheng Digital Technology Co ltd
Priority to CN202210104882.0A priority Critical patent/CN114117554B/en
Publication of CN114117554A publication Critical patent/CN114117554A/en
Application granted granted Critical
Publication of CN114117554B publication Critical patent/CN114117554B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to the field of data processing, in particular to a method, a processing method and a system for credible verification of law enforcement data and a law enforcement instrument, wherein the method comprises the following steps: acquiring first data uploaded by a first law enforcement instrument and second data uploaded by a second law enforcement instrument; the first data comprises first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by a first law enforcement instrument, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument; and determining whether the law enforcement data to be verified is credible or not based on the first data, the second data and the master-slave pairing networking relationship. The method and the device determine whether the law enforcement data to be verified is credible or not based on the first data, the second data and the master-slave pairing networking relationship, thereby realizing the judgment of whether the law enforcement data is tampered or not.

Description

Law enforcement data credibility verification method, processing method and system and law enforcement instrument
Technical Field
The application relates to the field of data processing, in particular to a method, a processing method and a system for credible verification of law enforcement data and a law enforcement instrument.
Background
In the law enforcement process, law enforcement data of a law enforcement site are collected by a law enforcement instrument, and then the law enforcement instrument uploads the law enforcement data to a connected management server for storage.
The legal significance of files such as audio, video, pictures and the like recorded by a law enforcement instrument is very important in the law enforcement process of law enforcement personnel. Since the law enforcement data recorded on the law enforcement instrument can be tampered with by a person, it is difficult to determine whether the law enforcement data is authentic.
Disclosure of Invention
In view of the above, there is a need to provide a law enforcement data credibility verification method, processing method, system and law enforcement instrument.
In a first aspect, an embodiment of the present invention provides a law enforcement data trust verification method, which is applied to a blockchain platform, where the blockchain platform is in communication with a first law enforcement instrument and a second law enforcement instrument, and the method includes the following steps:
acquiring first data uploaded by the first law enforcement instrument and second data uploaded by the second law enforcement instrument; the first data comprises first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by the first law enforcement instrument, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument;
determining whether the law enforcement data to be verified is authentic based on the first data, the second data and the master-slave pairing networking relationship.
In an embodiment, the determining whether the law enforcement data to be authenticated is authentic based on the first data, the second data, and the master-slave pairing-networking relationship comprises:
decrypting first encrypted data in the first data to obtain a first hash value, and decrypting second encrypted data in the second data to obtain a second hash value;
based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
In one embodiment, the master-slave pairing networking relationship is determined by:
under the condition of no network, the first law enforcement instrument broadcasts a networking message to a second law enforcement instrument in a local area network; wherein the networking message includes a device ID of the first law enforcement instrument;
the second law enforcement instrument receives the networking message, inquires whether the equipment ID of the first law enforcement instrument exists in a first pairing table of the second law enforcement instrument, if not, determines the master-slave pairing networking relationship with the first law enforcement instrument, updates the first pairing table and responds to a pairing success message;
and the first law enforcement instrument determines the master-slave pairing networking relationship with the second law enforcement instrument based on the pairing success message, and updates the second pairing table of the first law enforcement instrument.
In an embodiment, the first encrypted data is obtained by fragmenting the to-be-verified law enforcement data by the first law enforcement instrument to obtain at least two fragment data, and encrypting after hash calculation; the second encrypted data is obtained by fragmenting the original law enforcement data by the first law enforcement instrument to obtain at least two fragment data, and encrypting after hash calculation; the determining whether the law enforcement data to be verified is authentic based on the first data, the second data, and the master-slave pairing networking relationship comprises:
decrypting the first encrypted data to obtain at least two first hash values, and decrypting the second encrypted data to obtain at least two second hash values;
based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash values are respectively the same as the corresponding second hash values, the law enforcement data to be verified is credible; and if the first hash value different from the corresponding second hash value exists, the law enforcement data to be verified is not credible, and the tampering position of the law enforcement data to be verified is determined based on the first hash value.
In an embodiment, the method further comprises:
receiving registration requests of the first law enforcement instrument and a second law enforcement instrument, wherein the registration requests comprise device IDs;
updating the ID list after successful registration, and sending a platform public key Pk to the first law enforcement instrument and the second law enforcement instrument0The ID list includes successfully registered device ID and platform public key Pk0And the authentication module is used for encrypting the hash value of the law enforcement data to be authenticated and encrypting the hash value of the original law enforcement data.
In one embodiment, the first data further comprises a device ID of the first law enforcement instrument, the second data further comprises a device ID of the second law enforcement instrument, and prior to the determining whether the law enforcement data to be verified is authentic, the method further comprises:
and carrying out validity check on the first law enforcement instrument and the second law enforcement instrument based on the ID list, the equipment ID of the first law enforcement instrument and the equipment ID of the second law enforcement instrument, and determining whether the law enforcement data to be verified is credible under the condition that the check is passed.
In a second aspect, an embodiment of the present invention provides a law enforcement data processing method, applied to a first law enforcement instrument, where the first law enforcement instrument communicates with a second law enforcement instrument and a blockchain platform, and the method includes the following steps:
carrying out hash calculation on the stored law enforcement data to be verified and then encrypting to obtain first encrypted data; and
carrying out hash calculation on the stored original law enforcement data and then encrypting to obtain second encrypted data;
generating first data based on the first encrypted data, and uploading to the blockchain platform; and
and generating backup data based on the second encrypted data, and sending the backup data to a second law enforcement instrument with master-slave pairing networking relation.
In a third aspect, an embodiment of the present invention provides a law enforcement data processing method, which is applied to a second law enforcement instrument, where the second law enforcement instrument is in communication with a first law enforcement instrument and a blockchain platform, and the method includes the following steps:
receiving backup data sent by the first law enforcement instrument, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after the first law enforcement instrument with master-slave pairing networking relation performs hash calculation;
second data is generated based on the second encrypted data and uploaded to the blockchain platform.
In a fourth aspect, an embodiment of the present invention provides a law enforcement data trust verification system, which is applied to a blockchain platform, where the blockchain platform is in communication with a first law enforcement instrument and a second law enforcement instrument, and the system includes:
the acquisition module is used for acquiring first data uploaded by the first law enforcement instrument and second data uploaded by the second law enforcement instrument; the first data comprises first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by the first law enforcement instrument, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument;
and the determining module is used for determining whether the law enforcement data to be verified is credible or not based on the first data, the second data and the master-slave pairing networking relationship.
In a fifth aspect, an embodiment of the present invention provides a law enforcement instrument, including a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the method according to the second aspect or the third aspect when executing the computer program.
According to the embodiment, whether the law enforcement data to be verified is credible or not is determined based on the first data, the second data and the master-slave pairing networking relationship, so that whether the law enforcement data is tampered or not is judged.
Drawings
FIG. 1 is a diagram of an application environment of a method for trusted verification of law enforcement data according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for trusted verification of law enforcement data in accordance with an embodiment of the present invention;
FIG. 3 is a flow diagram of a method for determining whether law enforcement data to be authenticated is authentic in one embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for determining a master-slave pairing networking relationship according to an embodiment of the present invention;
FIG. 5 is a flow chart of a method of determining whether law enforcement data to be authenticated is authentic in another embodiment of the present invention;
FIG. 6 is a flowchart of a registration method according to an embodiment of the present invention;
FIG. 7 is a flow chart of a method of law enforcement data processing in accordance with an embodiment of the present invention;
FIG. 8 is a flow chart of a law enforcement data processing method according to another embodiment of the present invention;
FIG. 9 is a block diagram of a trusted validation system for law enforcement data, in accordance with an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for authenticating the trust of the law enforcement data provided by the present application can be applied to a blockchain platform as shown in fig. 1, where a blockchain platform 101 is in communication with a first law enforcement instrument 102 and a second law enforcement instrument 103. The block chain platform 101 acquires first data uploaded by the first law enforcement instrument 102 and second data uploaded by the second law enforcement instrument 103; the first data comprises first encrypted data obtained by encrypting the stored law enforcement data to be verified after hash calculation by the first law enforcement instrument 102, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument 103 with a master-slave pairing networking relationship, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument 102; determining whether the law enforcement data to be verified is authentic based on the first data, the second data and the master-slave pairing networking relationship.
In one embodiment, as shown in fig. 2, a method for verifying trust of law enforcement data is provided, which can be applied to the application environment shown in fig. 1, and comprises the following steps:
s201: and acquiring first data uploaded by the first law enforcement instrument and second data uploaded by the second law enforcement instrument.
The first data comprises first encrypted data obtained by encrypting the stored law enforcement data to be verified after the hash calculation is carried out on the first law enforcement instrument, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship. The backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after the hash calculation of the first law enforcement instrument.
And under the condition that the law enforcement data to be verified is not tampered, the law enforcement data to be verified is the same as the original law enforcement data, and if the law enforcement data to be verified is sent and tampered, the law enforcement data to be verified is different from the original law enforcement data.
The backup data may include, in addition to the second encrypted data, a task ID: a TaskID; device ID: a DevSID; first encrypted data EncData; one or more items of signed first encrypted data SigData. When the backup data includes all the above information, the data format is [ TaskID, DevSID, EncData, SigData ]. It will be appreciated that the data format of the backup data may be adjusted based on the information contained.
It should be noted that, in this embodiment, the hash calculation may be performed on the law enforcement data to be verified as a whole to obtain a first encrypted data, or the hash calculation may be performed on the fragmented data to be verified respectively to obtain the first encrypted data. The same is true for the second encrypted data, which is not described in detail.
And under the condition of a network, the first law enforcement instrument uploads the first data, and the second law enforcement instrument uploads the second data. The first data may include, in addition to the first encrypted data, a task ID: a TaskID; device ID: a DevSID; first encrypted data EncData; the signed first encrypted data SigData; one or more of a master-slave paired networking relationship. When the first data includes all the above information, the data format is [ task ID, DevSID, EncData, SigData, 0], indicating that the first encrypted data is data backed up by the current law enforcement instrument as the master of the ID-numbered law enforcement instrument. It will be appreciated that the data format of the first data may be adapted according to the information contained. The same is true for the second data, which is not described in detail.
The master-slave pairing networking relationship is used for determining a master law enforcement instrument and a slave law enforcement instrument, the master law enforcement instrument refers to the law enforcement instrument for collecting law enforcement data, and the slave law enforcement instrument refers to the law enforcement instrument for data backup. In this embodiment, the master law enforcement instrument is defined as a first law enforcement instrument, and the slave law enforcement instrument is defined as a second law enforcement instrument. The blockchain may communicate with other law enforcement instruments in addition to the first law enforcement instrument and the second law enforcement instrument.
The second encrypted data is obtained by encrypting the stored original law enforcement data after the hash calculation is carried out on the original law enforcement data by the first law enforcement instrument, so that the second law enforcement instrument cannot modify the backup data, and authenticity of the backup data is guaranteed.
S202: determining whether the law enforcement data to be verified is authentic based on the first data, the second data and the master-slave pairing networking relationship.
In this embodiment, whether the law enforcement data to be verified is trusted is determined based on the first data, the second data and the master-slave pairing networking relationship, so that whether the law enforcement data is tampered is judged.
In one embodiment, as shown in fig. 3, determining whether the law enforcement data to be verified is trusted based on the first data, the second data and the master-slave pairing networking relationship comprises the following steps:
s301: decrypting first encrypted data in the first data to obtain a first hash value, and decrypting second encrypted data in the second data to obtain a second hash value;
s302: based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
In the present embodiment, the master law enforcement instrument and the slave law enforcement instrument are determined by a master-slave pairing networking relationship. The second law enforcement instrument cannot modify the backup data, so that the second hash value is used as a reference, and the law enforcement data to be verified is credible under the condition that the first hash value is the same as the second hash value; and under the condition that the first hash value is different from the second hash value, the law enforcement data to be verified is tampered, and the law enforcement data to be verified is not credible.
In one embodiment, as shown in fig. 4, the master-slave paired networking relationship is determined by the following method:
s401: in the absence of a network, the first law enforcement instrument broadcasts a networking message to a second law enforcement instrument in a local area network;
wherein the networking message includes a device ID of the first law enforcement instrument.
S402: the second law enforcement instrument receives the networking message, inquires whether the equipment ID of the first law enforcement instrument exists in a first pairing table of the second law enforcement instrument, if not, determines the master-slave pairing networking relationship with the first law enforcement instrument, updates the first pairing table and responds to a pairing success message;
s403: and the first law enforcement instrument determines the master-slave pairing networking relationship with the second law enforcement instrument based on the pairing success message, and updates the second pairing table of the first law enforcement instrument.
It should be noted that, the method described above is directed to determining the master-slave pairing networking relationship under the network-free condition, so as to solve the technical problem that the master-slave pairing networking relationship cannot be determined under the network-free condition, and achieve that the master-slave pairing networking relationship can also be determined under the network-free condition.
In this embodiment, each law enforcement instrument device maintains a matching table T therein, which has a structure [ law enforcement instrument device ID matched therewith, current master-slave status of the law enforcement instrument device ], 0 represents a master device, and 1 represents a slave device, so that each law enforcement instrument device can be used as both a master device and a slave device.
In an example embodiment, a first law enforcement instrument A broadcasts a paired networking message to neighboring law enforcement instruments over Bluetooth, the networking message including a device IDA. Second Law enforcement agent B queries its pairing table T for device IDAIf not, adding a new record in the pairing table T of the second law enforcement instrument B: [ ID ]A,1]I.e. the present device is a slave law enforcement instrument of the first law enforcement instrument a. The second law enforcement instrument B sends a pairing success message to the first law enforcement instrument A, and the first law enforcement instrument A adds a record in the pairing table: [ ID ]B,0]I.e. the present device is the master law enforcement instrument of the second law enforcement instrument B. Thus far, law enforcement A, B forms a master-slave paired networking relationship.
In some other application scenarios, there are at least two second law enforcement instruments in addition to the first law enforcement instrument in the local area network. In this case, the second law enforcement instrument sends a pairing success message to the first law enforcement instrument, and the first law enforcement instrument determines which second law enforcement instrument is the slave law enforcement instrument according to the time of the received pairing success message, and establishes a master-slave pairing networking relationship with the second law enforcement instrument.
In one embodiment, in order to determine which part of the law enforcement data to be verified is tampered, a first law enforcement instrument processes fragments of the law enforcement data to be verified to obtain at least two fragment data, and encrypts the fragment data after hash calculation to obtain first encrypted data; meanwhile, the first law enforcement instrument processes the original law enforcement data in a fragmenting mode to obtain at least two fragment data, and the fragment data are encrypted after hash calculation to obtain second encrypted data. It should be noted that the time intervals of the sliced data after the two slicing processes are the same.
After the fragmentation processing and encryption of the data, as shown in fig. 5, determining whether the law enforcement data to be verified is trusted based on the first data, the second data and the master-slave pairing networking relationship includes the following steps:
s501: decrypting the first encrypted data to obtain at least two first hash values, and decrypting the second encrypted data to obtain at least two second hash values;
s502: based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash values are respectively the same as the corresponding second hash values, the law enforcement data to be verified is credible; and if the first hash value different from the corresponding second hash value exists, the law enforcement data to be verified is not credible, and the tampering position of the law enforcement data to be verified is determined based on the first hash value.
If the first hash value different from the corresponding second hash value exists, besides the fact that the law enforcement data to be verified is not credible can be determined, the fragment data after fragment processing can be corresponding according to the first hash value, the position of the fragment data in the law enforcement data to be verified can be determined, and therefore the fact that the part of the law enforcement data to be verified is tampered can be determined.
In one embodiment, as shown in fig. 6, before determining whether the law enforcement data to be verified is authentic, registration of the first law enforcement instrument and the second law enforcement instrument is further required, and the specific registration method includes the following steps:
s601: receiving registration requests for the first and second law enforcement instruments, the registration requests including device IDs.
The registration request may also include a device type, a device public key Pk, and the like.
S602: updating the ID list after successful registration, and sending a platform public key Pk to the first law enforcement instrument and the second law enforcement instrument0
The ID list includes the device ID that successfully registered.
Platform public key Pk0And the authentication module is used for encrypting the hash value of the law enforcement data to be authenticated and encrypting the hash value of the original law enforcement data.
In one embodiment, the first data further includes a device ID of the first law enforcement instrument, the second data further includes a device ID of the second law enforcement instrument, and before determining whether the law enforcement data to be verified is authentic, the method further includes the following steps:
and performing validity verification on the first law enforcement instrument and the second law enforcement instrument based on the ID list, the equipment ID of the first law enforcement instrument and the equipment ID of the second law enforcement instrument, and determining whether the law enforcement data to be verified is credible under the condition that the verification is passed.
In the case where the first law enforcement instrument and the second law enforcement instrument are registered, the corresponding device ID can be searched in the ID list, and the validity check is passed. If the corresponding equipment ID is not searched in the ID list, the law enforcement instrument corresponding to the equipment ID is not registered, and the validity check is not passed.
In one embodiment, as shown in fig. 7, a law enforcement data processing method is provided for a first law enforcement instrument in communication with a second law enforcement instrument, a blockchain platform, the method comprising the steps of:
s701: carrying out hash calculation on the stored law enforcement data to be verified and then encrypting to obtain first encrypted data; performing hash calculation on the stored original law enforcement data and encrypting the calculated original law enforcement data to obtain second encrypted data;
s702: generating the first data based on the first encrypted data, and uploading to the blockchain platform; and generating backup data based on the second encrypted data, and sending the backup data to a second law enforcement instrument with master-slave pairing networking relation.
The specific definition of the law enforcement data processing method of the first law enforcement instrument can be referred to the related definition above, and is not described herein again.
In one embodiment, as shown in fig. 8, a law enforcement data processing method is provided for a second law enforcement instrument, the second law enforcement instrument being in communication with a first law enforcement instrument, a blockchain platform, the method comprising the steps of:
s801: receiving backup data sent by the first law enforcement instrument, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after the first law enforcement instrument with master-slave pairing networking relation performs hash calculation;
s802: and generating the second data based on the second encrypted data, and uploading the second data to the blockchain platform.
The specific definition of the law enforcement data processing method of the second law enforcement instrument can be referred to the related definition above, and is not described in detail here.
In one embodiment, as shown in fig. 9, a system for trusted verification of enforcement data is provided, which is applied to a blockchain platform, the blockchain platform being in communication with a first enforcement instrument and a second enforcement instrument, the system comprising:
an obtaining module 901, configured to obtain first data uploaded by the first law enforcement instrument and second data uploaded by the second law enforcement instrument; the first data comprises first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by the first law enforcement instrument, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument;
a determining module 902, configured to determine whether the law enforcement data to be verified is trusted based on the first data, the second data, and the master-slave pairing-networking relationship.
In one embodiment, the determining module includes:
the first decryption module is used for decrypting first encrypted data in the first data to obtain a first hash value and decrypting second encrypted data in the second data to obtain a second hash value;
the second verification module is used for taking the second hash value as a reference based on the master-slave pairing networking relationship, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
In one embodiment, the master-slave pairing networking relationship is determined by:
in the absence of a network, the first law enforcement instrument broadcasts a networking message to a second law enforcement instrument in a local area network; wherein the networking message includes a device ID of the first law enforcement instrument;
the second law enforcement instrument receives the networking message, inquires whether the equipment ID of the first law enforcement instrument exists in a first pairing table of the second law enforcement instrument, determines the master-slave pairing networking relationship with the first law enforcement instrument if the equipment ID does not exist, updates the first pairing table and responds to a pairing success message;
and the first law enforcement instrument determines the master-slave pairing networking relationship with the second law enforcement instrument based on the pairing success message, and updates the second pairing table of the first law enforcement instrument.
In an embodiment, the first encrypted data is obtained by fragmenting the to-be-verified law enforcement data by the first law enforcement instrument, performing hash calculation respectively, and encrypting the to-be-verified law enforcement data; and the second encrypted data is obtained by the first law enforcement instrument by processing the original law enforcement data in a fragmentation way, respectively performing hash calculation and then encrypting. The determining module comprises:
the second decryption module is used for decrypting the first encrypted data to obtain at least two first hash values and decrypting the second encrypted data to obtain at least two second hash values;
the second verification module is used for taking the second hash value as a reference based on the master-slave pairing networking relationship, and if the first hash values are respectively the same as the corresponding second hash values, the law enforcement data to be verified is credible; and if the first hash value different from the corresponding second hash value exists, the law enforcement data to be verified is not credible, and the tampering position of the law enforcement data to be verified is determined based on the first hash value.
In one embodiment, the system further comprises a registration module configured to: receiving registration requests of the first law enforcement instrument and a second law enforcement instrument, the registration requests including device IDs; updating the ID list after successful registration, and sending a platform public key Pk to the first law enforcement instrument and the second law enforcement instrument0The ID list includes successfully registered device ID and platform public key Pk0And the authentication module is used for encrypting the hash value of the law enforcement data to be authenticated and encrypting the hash value of the original law enforcement data.
In one embodiment, the first data further includes a device ID of the first law enforcement instrument, the second data further includes a device ID of the second law enforcement instrument, and further comprising:
and the verification module is used for verifying the legality of the first law enforcement instrument and the legality of the second law enforcement instrument based on the ID list, the equipment ID of the first law enforcement instrument and the equipment ID of the second law enforcement instrument, and determining whether the law enforcement data to be verified is credible or not under the condition that the verification is passed.
For specific limitations of the trusted verification system for law enforcement data, reference may be made to the above limitations of the trusted verification method for law enforcement data, which are not described in detail herein. The various modules of the above-described enforcement data trust verification system may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In an embodiment, a law enforcement instrument is provided, comprising a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of any one of the law enforcement data processing methods when executing the computer program.
The specific definitions of the law enforcement instruments can be referred to the definitions of the first law enforcement instrument and the second law enforcement instrument, and the detailed description is omitted here.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile memory may include Read-only memory (ROM), magnetic tape, floppy disk, flash memory, optical storage, or the like. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. A law enforcement data credibility verification method is applied to a blockchain platform, and the blockchain platform is communicated with a first law enforcement instrument and a second law enforcement instrument, and is characterized by comprising the following steps of:
acquiring first data uploaded by the first law enforcement instrument and second data uploaded by the second law enforcement instrument; the first data comprises first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by the first law enforcement instrument, and the second data is obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument;
determining whether the law enforcement data to be verified is authentic based on the first data, the second data and the master-slave pairing networking relationship; wherein said determining whether the law enforcement data to be verified is authentic based on the first data, the second data, and the master-slave paired networking relationship comprises:
decrypting first encrypted data in the first data to obtain a first hash value, and decrypting second encrypted data in the second data to obtain a second hash value;
based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
2. The method of claim 1, wherein the master-slave paired networking relationship is determined by:
in the absence of a network, the first law enforcement instrument broadcasts a networking message to a second law enforcement instrument in a local area network; wherein the networking message includes a device ID of the first law enforcement instrument;
the second law enforcement instrument receives the networking message, inquires whether the equipment ID of the first law enforcement instrument exists in a first pairing table of the second law enforcement instrument, determines the master-slave pairing networking relationship with the first law enforcement instrument if the equipment ID does not exist, updates the first pairing table and responds to a pairing success message;
and the first law enforcement instrument determines the master-slave pairing networking relationship with the second law enforcement instrument based on the pairing success message, and updates the second pairing table of the first law enforcement instrument.
3. The method according to claim 1, wherein the first encrypted data is obtained by the first law enforcement instrument by fragmenting the law enforcement data to be verified to obtain at least two fragment data, and performing hash calculation and encryption respectively; the second encrypted data is obtained by fragmenting the original law enforcement data by the first law enforcement instrument to obtain at least two fragment data, and encrypting after hash calculation; the determining whether the law enforcement data to be verified is authentic based on the first data, the second data, and the master-slave pairing networking relationship comprises:
decrypting the first encrypted data to obtain at least two first hash values, and decrypting the second encrypted data to obtain at least two second hash values;
based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash values are respectively the same as the corresponding second hash values, the law enforcement data to be verified is credible; and if the first hash value different from the corresponding second hash value exists, the law enforcement data to be verified is not credible, and the tampering position of the law enforcement data to be verified is determined based on the first hash value.
4. The method of claim 1, further comprising:
receiving registration requests of the first law enforcement instrument and a second law enforcement instrument, the registration requests including device IDs;
updating the ID list after successful registration, and sending a platform public key Pk to the first law enforcement instrument and the second law enforcement instrument0The ID list includes successfully registered device ID and platform public key Pk0And the authentication module is used for encrypting the hash value of the law enforcement data to be authenticated and encrypting the hash value of the original law enforcement data.
5. The method of claim 4, wherein the first data further comprises a device ID of the first law enforcement instrument, wherein the second data further comprises a device ID of the second law enforcement instrument, and wherein prior to said determining whether the law enforcement data to be verified is authentic, the method further comprises:
and carrying out validity check on the first law enforcement instrument and the second law enforcement instrument based on the ID list, the equipment ID of the first law enforcement instrument and the equipment ID of the second law enforcement instrument, and determining whether the law enforcement data to be verified is credible under the condition that the check is passed.
6. A law enforcement data processing method is applied to a first law enforcement instrument, the first law enforcement instrument is communicated with a second law enforcement instrument and a blockchain platform, the second law enforcement instrument is used for uploading second data, and the second data is obtained based on backup data sent by the first law enforcement instrument to the second law enforcement instrument with master-slave pairing networking relationship; characterized in that the method comprises the following steps:
carrying out hash calculation on the stored law enforcement data to be verified and then encrypting to obtain first encrypted data; and
carrying out hash calculation on the stored original law enforcement data and then encrypting to obtain second encrypted data;
generating first data based on the first encrypted data, and uploading to the blockchain platform; and
generating backup data based on the second encrypted data, and sending the backup data to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the first data, the second data and the master-slave pairing networking relationship are used for determining whether the law enforcement data to be verified is credible; wherein the determining whether the law enforcement data to be verified is authentic comprises:
decrypting first encrypted data in the first data to obtain a first hash value, and decrypting second encrypted data in the second data to obtain a second hash value;
based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
7. A law enforcement data processing method is applied to a second law enforcement instrument, the second law enforcement instrument is communicated with a first law enforcement instrument and a blockchain platform, the first law enforcement instrument is used for uploading first data, the first data comprises first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by the first law enforcement instrument, and the method is characterized by comprising the following steps:
receiving backup data sent by the first law enforcement instrument, wherein the backup data comprises second encrypted data obtained by encrypting the stored original law enforcement data after the first law enforcement instrument with master-slave pairing networking relation performs hash calculation;
generating second data based on the second encrypted data, and uploading to the blockchain platform; the first data, the second data and the master-slave pairing networking relationship are used for determining whether the law enforcement data to be verified is credible or not; wherein the determining whether the law enforcement data to be verified is authentic comprises:
decrypting first encrypted data in the first data to obtain a first hash value, and decrypting second encrypted data in the second data to obtain a second hash value;
based on the master-slave pairing networking relationship, taking the second hash value as a reference, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
8. A system for trusted verification of enforcement data for use with a blockchain platform in communication with a first enforcement instrument and a second enforcement instrument, the system comprising:
the acquisition module is used for acquiring first data uploaded by the first law enforcement instrument and second data uploaded by the second law enforcement instrument; the first data comprise first encrypted data obtained by encrypting stored law enforcement data to be verified after hash calculation by the first law enforcement instrument, and the second data are obtained based on backup data sent by the first law enforcement instrument to a second law enforcement instrument with a master-slave pairing networking relationship, wherein the backup data comprise second encrypted data obtained by encrypting the stored original law enforcement data after hash calculation by the first law enforcement instrument;
the determining module is used for decrypting first encrypted data in the first data to obtain a first hash value and decrypting second encrypted data in the second data to obtain a second hash value; based on the master-slave pairing networking relationship, the second hash value is used as a reference, and if the first hash value is the same as the second hash value, the law enforcement data to be verified is credible; and if the first hash value is different from the second hash value, the law enforcement data to be verified is not credible.
9. Law enforcement instrument comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, realizes the steps of the method of claim 6 or claim 7.
CN202210104882.0A 2022-01-28 2022-01-28 Law enforcement data credibility verification method, processing method and system and law enforcement instrument Active CN114117554B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210104882.0A CN114117554B (en) 2022-01-28 2022-01-28 Law enforcement data credibility verification method, processing method and system and law enforcement instrument

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210104882.0A CN114117554B (en) 2022-01-28 2022-01-28 Law enforcement data credibility verification method, processing method and system and law enforcement instrument

Publications (2)

Publication Number Publication Date
CN114117554A CN114117554A (en) 2022-03-01
CN114117554B true CN114117554B (en) 2022-05-24

Family

ID=80362055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210104882.0A Active CN114117554B (en) 2022-01-28 2022-01-28 Law enforcement data credibility verification method, processing method and system and law enforcement instrument

Country Status (1)

Country Link
CN (1) CN114117554B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464980A (en) * 2020-04-08 2020-07-28 南通大学 Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN112911018A (en) * 2021-03-10 2021-06-04 杭州宇链科技有限公司 Block chain-based network community credit investigation management method
CN113079026A (en) * 2021-04-15 2021-07-06 无锡全面互链科技有限公司 Block chain system and block chain network resource management method
CN113595741A (en) * 2021-08-02 2021-11-02 杭州叙简科技股份有限公司 Credible data chain generation system and method based on 5G law enforcement recorder
CN113961908A (en) * 2021-12-23 2022-01-21 杭州链城数字科技有限公司 Data storage method and device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015013440A1 (en) * 2013-07-23 2015-01-29 Battelle Memorial Institute Systems and methods for securing real-time messages
US20170017954A1 (en) * 2015-07-14 2017-01-19 Fmr Llc Point-to-Point Transaction Guidance Apparatuses, Methods and Systems
CN110213359B (en) * 2019-05-24 2021-09-03 南京邮电大学 Internet of vehicles networking data pushing system and method based on D2D
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
CN112214780B (en) * 2020-08-26 2021-06-25 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464980A (en) * 2020-04-08 2020-07-28 南通大学 Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN112911018A (en) * 2021-03-10 2021-06-04 杭州宇链科技有限公司 Block chain-based network community credit investigation management method
CN113079026A (en) * 2021-04-15 2021-07-06 无锡全面互链科技有限公司 Block chain system and block chain network resource management method
CN113595741A (en) * 2021-08-02 2021-11-02 杭州叙简科技股份有限公司 Credible data chain generation system and method based on 5G law enforcement recorder
CN113961908A (en) * 2021-12-23 2022-01-21 杭州链城数字科技有限公司 Data storage method and device, computer equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
using blockchain for improved video integrity verification;Sarala Ghimire等;《IEEE Transactions on Multimedia》;20190701;第22卷(第1期);全文 *
区块链技术应用的安全与监管问题;王俊生等;《计算机科学》;20180815;第45卷(第z1期);全文 *
基于区块链技术的互联网在线取证系统设计;贾朋飞等;《现代计算机》;20190915;第2019卷(第26期);全文 *

Also Published As

Publication number Publication date
CN114117554A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
US11128477B2 (en) Electronic certification system
CN111708991B (en) Service authorization method, device, computer equipment and storage medium
KR100823738B1 (en) Method for integrity attestation of a computing platform hiding its configuration information
US8458455B2 (en) Techniques for handling SSL certificate expiration and renewal
CN109344631B (en) Data modification and block verification method, device, equipment and medium for block chain
US11729175B2 (en) Blockchain folding
US20190354694A1 (en) Verification of data captured by a consumer electronic device
CN113472790B (en) Information transmission method, client and server based on HTTPS protocol
CN106790045B (en) distributed virtual machine agent device based on cloud environment and data integrity guarantee method
CN109754226B (en) Data management method, device and storage medium
US20230074748A1 (en) Digital forensic image verification system
CN106470103B (en) Method and system for sending encrypted URL request by client
US9910998B2 (en) Deleting information to maintain security level
CN114637987A (en) Security chip firmware downloading method and system based on platform verification
US11683301B2 (en) Automatically obtaining a signed digital certificate from a trusted certificate authority
CN108540447B (en) Block chain-based certificate verification method and system
CN110597820B (en) Information processing method, device, storage medium and equipment based on block chain
CN110598452B (en) Evidence information processing method, device, storage medium and equipment based on blockchain
JP2002297540A (en) Log collection system, server for use in log collection system and medium recorded with server control program
EP3210158B1 (en) Secure transmission
CN116415227A (en) Key updating method, server, client and storage medium
Feng et al. Autonomous vehicles' forensics in smart cities
CN110955909B (en) Personal data protection method and block link point
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN114117554B (en) Law enforcement data credibility verification method, processing method and system and law enforcement instrument

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant