A kind of computer crime prospecting evidence obtaining special machine
Technical field
The utility model belongs to field of computer technology, particularly relates to a kind of computer crime prospecting evidence obtaining special machine.
Background technology
Fast development along with Chinese national economy, the significantly raising of living standards of the people, the particularly fast development of Computer Applied Technology, computing machine has become one of widely known common tool, the big computing machine that uses to network is as bank's banking procedure where deposits and withdrawals are processed at any branch bank network, stock jobbery stock network etc., the little LAN (Local Area Network) of using to unit, even the home computer that the individual uses etc., the use of computing machine has been quite universal.Yet along with a large amount of of computer utility popularize, incident is the appearance of computer crime phenomenon, as implementing stealing to computer information data, the computing machine significant data is implemented to destroy or distort, utilize computer manufacture, propagate harmful information, by computing machine manufacturing, transmitted virus, or implement " hacker " physical sabotage network order or the like.The consequence that this computer crime behavior is brought, the development of the development of the national economy and the safety and stablization of society have seriously been influenced, computer crime collected evidence reconnoitred important means into present strike and prevention computer crime behavior, at present, in prospecting that the computer crime behavior is collected evidence, the desk-top computer that the computing machine that uses is used as the pocket computer or the desktop of notebook type, in two kinds of types, when adopting notebook to be used for the evidence obtaining prospecting, the one, lack proprietary evidence obtaining interface, it does not have the port of direct connection ID E hard disk, can only connect various types of hard disks or evidence media in the other side's computing machine by the mode of Extended Capabilities Port process conversion, not meet the cardinal rule of computer forensics; The 2nd, speed is slow, during owing to evidence medias such as notebook connection ID E hard disk, SCSI hard disks, can only realize by external converter, so data traffic is low, causes the evidence obtaining working time long; The 3rd, self capacity is very little, has both caused forensics analysis work can only adopt substep to carry out, and causes efficient to become very low, even can't finish the work at all; Be not easy to expansion again, need expanding hard-disk capacity can only connect External memory equipment by the switching device of external-connected port, makes the speed of forensics analysis can be lower; The 4th, interface function is incomplete, lacks corresponding card reader, is unfavorable for that the user carries out high efficiency work; The 5th, the ability of opposing rugged surroundings is relatively poor.When adopting desk-top computer to be used for the evidence obtaining prospecting, the one, be not easy to carry, do not meet the basic demand of evidence obtaining work; The 2nd, interface function is incomplete, and various evidence media interfaces all need the case analysis personnel to assemble in addition according to need of work, have brought the inconvenience in many work; The 3rd, there is not proprietary evidence obtaining interface, can't guarantee effectively that in the forensics analysis process evidence data can not be modified, do not meet the basic demand of computer forensics; The 4th, the opposing rugged surroundings ability relatively poor, non-watertight, not antidetonation, cause device damage extremely easily, causing can't operate as normal.
The utility model content
The purpose of this utility model is to overcome the deficiency of prior art, provides a kind of and is easy to carry, and is provided with proprietary evidence obtaining interface, and the evidence obtaining port is complete, and forensics analysis is handled fast, computer crime prospecting evidence obtaining special machine simple to operate.
The technical scheme that its technical matters that solves the utility model adopts is: a kind of computer crime prospecting evidence obtaining special machine, and it comprises:
One main frame, main frame is made up of cpu central processing unit, internal storage, input/output end port, system bus, its role is to provide the control of analysis, processing and Information Access to information, main frame is provided with the second hard disk controller Second IDE data-interface, the first hard disk controller Primary IDE data-interface, USB interface;
The read-only protection lock of one evidence the port that provides one to be connected with the evidence hard disk is provided, and makes this connectivity port have write-protect, after the evidence hard disk inserts, can guarantee the primitiveness of evidence;
The six directions one card reader, the interface that provides one can read various storing card data information such as CF card, SM card, mmc card, SONY memory stick very easily is provided, and the function by the various recovery softwares in the special machine realizes reading the information such as historical summary that the other side has deleted, and can be the user more strong means are provided;
The interface that provides one can read data in mobile phone information very easily is provided the SIM card reader, and reads out all information in the other side's GSM mobile handset card easily by the various special softwares in the special machine, as yellow pages information, SMS etc.;
The input of the read-only protection lock of evidence is connected to the evidence hard disk; the output of the read-only protection lock of evidence is connected with the second hard disk controller Second IDE data-interface on the main frame by the IDE data channel; the first hard disk controller Primary IDE data-interface on the main frame by the IDE data channel with duplicate hard disk and join, the six directions one card reader, SIM card reader are connected with USB interface on the main frame by the USB connecting line respectively.
Also can comprise on the described special machine and be provided with scsi adapter, correspondingly be provided with pci expansion slot the computing machine Your Majesty, scsi adapter is connected with pci expansion slot on the main frame by system's pci bus, and scsi adapter can join with SCSI evidence hard disk by the scsi data passage.
Can comprise also on the described special machine being provided with wireless network card that wireless network card is connected with USB interface on the main frame.
Can comprise also on the described special machine being provided with universal serial bus networks concentrator USBHUB expansion interface that universal serial bus networks concentrator USB HUB expansion interface is connected with USB interface on the main frame by the USB connecting line.
Also can comprise on the described special machine being provided with the 1000M network port, this port is directly connected in the gigabit networking port on the main frame, and this port can be connected with the peripheral hardware network switch by network connection.
Also can comprise on the described special machine being provided with serial port, this port is directly connected on the COM port on the main frame, and this serial port can be connected with peripheral hardware serial communication equipment by the serial communication line.
Also can comprise on the described special machine being provided with parallel port, this port is directly connected on the parallel communication port on the main frame, and this parallel port can be connected with peripheral hardware parallel port communication equipment by the parallel communication line.
The read-only protection lock of described evidence includes write-protect equipment, and write-protect equipment mainly is made of the high-speed figure chip.
In use, evidence and corresponding ports are joined, to the reading in of evidence, can carry out data by the evidence-taking and analysis system in the special machine and obtain or analyze by port; When evidence is the IDE hard disk, the read-only protection lock of IDE hard disk and evidence is connected, then the data in the IDE hard disk are read in the main frame via the second hard disk controller Second IDE data-interface by the IDE data channel, and carry out data by the evidence-taking and analysis system in the special machine and collect evidence and analysis, because the IDE hard disk reads in by the read-only protection lock of evidence, any incident that this hard disk is revised all can be forbidden by above-mentioned interface in operating process; For the evidence obtaining of IDE hard disk, both be applicable to the IDE hard disk of desktop computer, also be applicable to the evidence obtaining of notebook IDE hard disk; Main frame is being analyzed in the evidence obtaining process the IDE hard disk that reads in, and also simultaneously data is copied to by the IDE data channel by the first hard disk controller Primary IDE data-interface and duplicates on the hard disk.When evidence is floppy disk, earlier floppy disk is placed under the write-protect state, open computing machine, floppy disk is inserted corresponding socket, then same as described above, enter the forensics analysis duty.When evidence is the SCSI hard disk, the SCSI hard disk is connected with scsi adapter by the scsi data passage, then the data in the SCSI hard disk are read in the main frame via scsi adapter by the scsi data passage, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is various storage card, various storage cards such as CF card, SM card, mmc card, SONY memory stick etc. are inserted in the respective socket of the six directions one card reader, then the data in the storage card are read in the main frame by the six directions one card reader, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is the SIM card of mobile phone, SIM card is inserted in the socket of SIM card reader, then the data in the SIM card are read in the main frame by the SIM card reader, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.
The beneficial effects of the utility model are, owing to adopted special machine to be provided with the interface arrangement that the read-only protection lock of evidence reads in as evidence, make evidence the read protection equipment of special machine by means of special use, can directly connect the evidence hard disk and carry out forensics analysis work, and do not worry in analytic process revising any data in original hard disk, avoided all operations in the past to carry out the drawback that to carry out evidence analysis work after evidence duplicates, improved the response speed of case effectively by means of external evidence obtaining specific purpose tool; Owing on special machine, be provided with various evidence obtaining ports such as IDE hard-disk interface, SCSI hard disk expansion card interface, the six directions one card reading interface, SIM card reading interface, make the case investigator in the investigation and evidence collection process, at different evidence medias, can use different evidence fetch interfaces, and attaching in addition is very easy to case investigator's operation; Owing to can install jumbo disk in the inside of special machine, when running into the suspect and may use many computing machines to participate in crime, case investigator can comprehensively compare, analyze under the situation of data compression the data in a plurality of hard disks all being copied in this special purpose computer fully, searching is concealed in evidence chain relation wherein, thereby has greatly improved work efficiency; Because all functions equipment is all concentrated in the special machine, improved portability of equipment greatly, make when the case investigator goes out to investigate and collect evidence, only need carry a chest that this special machine is housed and get final product.The utility model is a kind ofly to be easy to carry, movably, is provided with proprietary evidence obtaining interface and the evidence obtaining port is complete, meets that computing machine case evidence obtaining cardinal rule requires, and forensics analysis is handled fast, computer crime prospecting evidence obtaining special machine simple to operate.
Description of drawings
Below in conjunction with drawings and Examples the utility model is described in further detail; But a kind of computer crime prospecting evidence obtaining special machine of the present utility model is not limited to embodiment.
Fig. 1 is a structural principle block diagram of the present utility model;
Fig. 2 is the synoptic diagram that is electrically connected of the present utility model;
Fig. 3 is the structural representation one of the read-only protection lock of the utility model evidence;
Fig. 4 is the structural representation two of the read-only protection lock of the utility model evidence.
Embodiment
Shown in accompanying drawing, a kind of computer crime prospecting evidence obtaining special machine of the present utility model, it comprises:
One main frame 1, main frame 1 is made up of cpu central processing unit, internal storage, input/output end port, system bus, the effect of main frame 1 is to provide the control of analysis, processing and Information Access to information, on main frame 1, be provided with the second hard disk controller Second IDE data-interface 11, be provided with the first hard disk controller Primary IDE data-interface 12, be provided with usb 16, be provided with parallel port 13, be provided with serial port 14, be provided with the 1000M network port 15, be provided with pci expansion slot 17;
The port that provides one to be connected with the evidence hard disk is provided for the read-only protection lock 2 of one evidence, the effect of the read-only protection lock 2 of evidence, and makes this connectivity port have write-protect, after the evidence hard disk inserts, can guarantee the primitiveness of evidence; As shown in Figure 3, Figure 4, the read-only protection lock 2 of evidence is made up of computing machine output input device 101, write-protect equipment 102, and write-protect equipment 102 mainly is made of the high-speed figure chip; In the disk operating process, operating system 111 is carried out read-write operation by 101 pairs of disks of basic output input device 103 of computing machine; In writing the disk process, system sends write command and transfers data to the data-interface of hard disk 103 to hard disk 103, and the control circuit of hard disk 103 is replied to system feedback after receiving look-at-me, and both sides begin to carry out data transmit-receive; Hard disk 103 is done the data verification in write operation, and gives system with the information feedback of write data, guarantees that so write operation normally carries out; If operating system can't obtain the feedback information of hard disk, will be considered as gross error and cause stopping problems such as response; Therefore, hard disk write-protecting equipment 102 will guarantee that data can not write hard disk 103 on the one hand, wants the anti-locking system of analog feedback signal to make mistakes on the other hand; Hard disk write-protecting equipment 103 utilizes the high-speed figure chip, on the one hand, and the write control signal of equipment 103 shielding hard disks; On the other hand, the built-in buffer memory of equipment utilization is accepted the data that system transmits, and the analog hard disk circuit is beamed back feedback signal " deception " operating system according to data to system, prevents that operating system from makeing mistakes; When system during to the hard disk write data, write command signal activates hard disk write-protecting equipment, and equipment is according to above-mentioned principle work; When system to hard disk 103 reading of data the time, write-protect equipment 102 becomes the equipment of one " transparent ";
The six directions one card reader 3, the interface that provides one can read various storing card data information such as CF card, SM card, mmc card, SONY memory stick very easily is provided in the effect of the six directions one card reader 3, and the function by the various recovery softwares in the special machine realizes reading the information such as historical summary that the other side has deleted, and can be the user more strong means are provided;
SIM card reader 5, the interface that provides one can read data in mobile phone information very easily is provided in the effect of SIM card reader 5, and read out all information in the other side's GSM mobile handset card easily by the various special softwares in the special machine, as yellow pages information, SMS etc.;
The read-only protection lock 2 of evidence is used for connection ID E evidence hard disk; the output of the read-only protection lock 2 of evidence is connected with the second hard disk controller Second IDE data-interface 11 on the main frame 1 by the IDE data channel; the first hard disk controller Primary IDE data-interface 12 on the main frame 1 by the IDE data channel with duplicate hard disk and join, the six directions one card reader 3, SIM card reader 5 are connected with usb 16 on the main frame 1 by the USB connecting line respectively.
On special machine, also can be provided with scsi adapter 4, scsi adapter 4 is connected by 1 pci expansion slot 17 on system's pci bus and the main frame, scsi adapter 4 can join with SCSI evidence hard disk by the scsi data passage, promptly, connect the scsi device access interface that scsi device adapter 4 provides the 68PIN of standard by the pci expansion slot on the main frame 1 that is installed in special machine inside 17, like this, can make things convenient for the user to connect various scsi devices; Actually rare in view of the use of scsi device in real work, therefore, improve the availability of integral device for reducing failure rate, scsi adapter 4 is a selectable unit, can not connect this scsi adapter 4 when needing scsi device at ordinary times.
On special machine, be provided with wireless network card, wireless network card is connected with usb 16 on the main frame 1,, connects wireless network card by the USB2.0 standard data communications port that is installed on the special machine internal host 1 that is, this network interface card is integrated in cabinet inside, adopts built-in antenna; This network interface card wireless transmit frequency is 2.4GHZ, and communication protocol is that 802.11B belongs to standard computer wireless network communication equipment; Like this, because special machine has had the wireless network communication function, when going out to handle official business, the work of on-the-spot scouting evidence obtaining is transportable to be connected with scouting command car or on-the-spot LAN temporarily, and do not need to carry out specially the work that network connects, can be the user and bring great convenience.
USB port one on main frame 1 has 4, contain two types of USB1.1 standard and USB2.0 standards etc., 2 USB2.0 ports are directly connected on the main frame 1, and two other USB1.1 port is expanded by the USB1.1HUB that connects main frame 1; Because the outside various memory devices of present computing machine, the more use USB plug and play port of communication apparatus; therefore two USB2.0 ports providing of special machine can be better, the evidence fetch equipment with various USB interface carries out data communication faster; two other USB1.1 port also can be realized above-mentioned functions, but main function is to connect various software protective locks by this port.
Connect the six directions one card reader 3 by the USB2.0 standard data communications port that is installed on the main frame 1, the user of service can read the data message in the various storage cards such as CF card, SM card, mmc card, SONY memory stick very easily; Because the card reader of the inner integrated various storage cards of special machine, therefore run at work when need from the other side's various storage cards, read relevant information and just can directly read, and realize reading the information such as historical summary that the other side has deleted by the function of the various recovery softwares in the special machine; For the user provides more strong means.
By being installed in the mobile phone SIM card reader 5 of the USB2.0 standard data communications port connection USB interface on the main frame 1, can read out all information in the other side's GSM mobile handset card (for example yellow pages information, written notes note etc.) easily by special software by inner integrated SIM card reader 5 users of service of special machine.
On special machine, be provided with the 1000M network port, this port is directly connected in the gigabit networking port one 5 on the main frame, this port can be connected with the peripheral hardware network switch by network connection, and can carry out rapid data transmission and exchanges data with other computing machines by the network switch of gigabit.As: reconnoitre command car by express network port and computing machine and be connected the various data that special purpose computer can be gathered at the scene and import to fast on the vehicle-mounted case overall treatment platform and carry out unified Analysis, processing.
Be provided with serial port on special machine, this port is directly connected on the COM port 14 on the main frame, and this serial port can be connected with peripheral hardware serial communication equipment by the serial communication line.
On special machine, be provided with parallel port, this port is directly connected on the parallel communication port one 3 on the main frame, this parallel port can be connected with peripheral hardware parallel port communication equipment by the parallel communication line, as connecting various printers, cooperate special machine to carry out providing various data reports and carrying out file printout after the data analysis by this port connection printer.
In use, evidence and corresponding ports are joined, to the reading in of evidence, can carry out data by the evidence-taking and analysis system in the special machine and obtain or analyze by port; When evidence is the IDE hard disk, the read-only protection lock 2 of IDE hard disk and evidence is connected, then the data in the IDE hard disk are read in the main frame 1 via the second hard disk controller Second IDE data-interface 11 by the IDE data channel, and carry out data by the evidence-taking and analysis system in the special machine and collect evidence and analysis, because the IDE hard disk reads in by the read-only protection lock of evidence, any incident that this hard disk is revised all can be forbidden by above-mentioned interface in operating process; For the evidence obtaining of IDE hard disk, both be applicable to the IDE hard disk of desktop computer, also be applicable to the evidence obtaining of notebook IDE hard disk; Main frame 1 is being analyzed in the evidence obtaining process the IDE hard disk that reads in, and also simultaneously data is copied to by the IDE data channel by the first hard disk controller Primary IDE data-interface 12 and duplicates on the hard disk.When evidence is floppy disk, earlier floppy disk is placed under the write-protect state, open computing machine, floppy disk is inserted corresponding socket, then same as described above, enter the forensics analysis duty.When evidence is the SCSI hard disk, the SCSI hard disk is connected with scsi adapter 4 by the scsi data passage, then the data in the SCSI hard disk are read in the main frame 1 via scsi adapter 4 by the scsi data passage, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is various storage card, various storage cards such as CF card, SM card, mmc card, SONY memory stick etc. are inserted in the respective socket of the six directions one card reader 3, then the data in the storage card are read in the main frame 1 by the six directions one card reader 3, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is the SIM card of mobile phone, SIM card is inserted in the socket of SIM card reader 5, then the data in the SIM card are read in the main frame 1 by SIM card reader 5, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.