KR20170027442A - Portable system for extracting hash of digital file - Google Patents
Portable system for extracting hash of digital file Download PDFInfo
- Publication number
- KR20170027442A KR20170027442A KR1020150124039A KR20150124039A KR20170027442A KR 20170027442 A KR20170027442 A KR 20170027442A KR 1020150124039 A KR1020150124039 A KR 1020150124039A KR 20150124039 A KR20150124039 A KR 20150124039A KR 20170027442 A KR20170027442 A KR 20170027442A
- Authority
- KR
- South Korea
- Prior art keywords
- digital file
- hash value
- encrypted
- file
- identification information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
Description
The present invention relates to a portable hash detection system for a digital file, and more particularly, to a portable hash detection system for a digital file that improves the integrity of on-site evidence by ensuring consistency in collecting image files as evidence during on-the-spot investigation.
A scene photograph is a case in which a photograph taken at the time of a crime and after and after a crime is used as independent evidence, and a representative example of a scene photograph is a video file recorded on a bank CCTV (Closed Circuit TeleVision) There is a digital file such as.
On the other hand, the evidence refers to the data on which the facts are based, in order to guarantee the objectivity and rationality of the trial, and the evidence ability refers to the qualification that evidence can be used as evidence of guilt. Means the substantive value of the evidence for the evidence, including the strength of the evidence itself, indicating the likelihood that it is true, and the impromptu force, capable of confirming the fact that the evidence is true.
In the case of digital files such as video files, there is no provision on the testimony of the evidence in the Criminal Procedure Law. If evidence is submitted to the court, So that the user can view the accurate situation of the site.
However, if a digital file is collected in the form of arbitrary submission and submitted to the court as in the past, and there is a possibility of an artificial manipulation, and a copy other than the original of the digital file is submitted, It is difficult to prove the identity of such a copy.
SUMMARY OF THE INVENTION In order to solve the above problems, the present invention has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a hash value generation apparatus, And to provide a portable hash detection system of a digital file which can guarantee the identity between the original and the copy and enhance the integrity of the on-site evidence.
According to an aspect of the present invention, there is provided an information processing apparatus comprising: a file input unit receiving a digital file; A first storage unit for storing the digital file inputted through the file input unit; A first identification information input unit for receiving identification information for encryption; A first controller for extracting a hash value of the digital file and generating an encrypted digital file by encrypting the digital file using the identification information; And an encrypted file output unit for receiving and outputting the encrypted digital file and the hash value from the first control unit.
Here, the first control unit generates an encrypted hash value by encrypting the hash value using the identification information, and the encrypted file output unit receives the encrypted hash value from the first control unit and outputs the encrypted hash value .
Further, the identification information may be a password.
Meanwhile, the identification information may be biometric information of the user.
According to another aspect of the present invention, there is provided an encryption apparatus comprising: an encrypted file input unit receiving an encrypted digital file and a hash value of the encrypted digital file; A second storage unit for storing the encrypted digital file and the hash value input through the encryption file input unit; A second identification information input unit for receiving identification information for decryption; Decrypts the encrypted digital file using the identification information, extracts a hash value of the decrypted digital file, determines whether the extracted hash value matches the hash value stored in the second storage unit, A second controller for generating integrity guarantee information according to the hash value and the stored hash value being identical; And a file output unit for receiving and outputting the decrypted digital file and the integrity guarantee information from the second control unit.
Here, the encrypted file input unit receives the encrypted hash value, and the second control unit decrypts the encrypted hash value using the identification information, and stores the decrypted hash value in the second storage unit have.
The identification information may be a password.
Meanwhile, the identification information may be biometric information of the user.
According to the present invention described above, when a digital file is collected as evidence during an on-the-spot investigation, a hash value is directly generated in the field, and the generated hash value is added to the encrypted digital file. And the integrity of the on-site evidence can be improved.
Further, by using various identification information for encrypting the digital file or the hash value, it is possible to simplify the evidence collection procedure because the evidence collector does not need to provide a device for generating the identification information while enhancing security.
FIG. 1 is a diagram showing a proof-of-charge part of a portable hash detection system of a digital file according to an embodiment of the present invention.
FIG. 2 is a diagram illustrating a proof analysis part of a portable hash detection system of a digital file according to an embodiment of the present invention.
3 is a diagram illustrating a portable hash detection system for a digital file according to an embodiment of the present invention.
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings. However, the embodiments of the present invention can be modified into various other forms, and the scope of the present invention is not limited to the embodiments described below. The shape and the size of the elements in the drawings may be exaggerated for clarity and the same elements are denoted by the same reference numerals in the drawings.
Meanwhile, the meaning of the terms described in the present application should be understood as follows.
The terms "first "," second ", and the like are used to distinguish one element from another and should not be limited by these terms. For example, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
And throughout the specification, when a part is referred to as being "connected" to another part, it includes not only "directly connected" but also "electrically connected" with another part in between. Also, when a component is referred to as " comprising "or" comprising ", it does not exclude other components unless specifically stated to the contrary .
FIG. 1 is a block diagram illustrating a portable hash detection system of a digital file according to an exemplary embodiment of the present invention. Referring to FIG. 1, a portable hash detection system for a digital file according to the present invention includes: A
The
The
On the other hand, the first identification
The
Here, the
The encryption method of the
The encrypted
FIG. 2 is a diagram illustrating an apparatus used in a proof analysis part of a portable hash detection system of a digital file according to an exemplary embodiment of the present invention, that is, an apparatus used in an analysis room for analyzing evidence. The system includes an encryption
The encryption
The
On the other hand, the second identification
Also, the
Here, the
The decryption method corresponding to the
On the other hand, the
FIG. 3 is a diagram illustrating a portable hash detection system for a digital file according to an embodiment of the present invention. Referring to FIGS. 1 to 3, an operation of a portable hash detection system for a digital file according to an embodiment of the present invention As follows.
First, a
Thereafter, the digital file is backed up to the
Next, the
Thereafter, the
On the other hand, an encrypted digital file and the hash value, the encrypted digital file, and the encrypted hash value transferred to the evidence analysis room are connected to the encryption
Thereafter, the encrypted digital file and the hash value or the encrypted digital file and the encrypted hash value are stored in the
Next, the
Thereafter, the
Next, the
While the present invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, It will be clear to those who have.
100: File input section
200: First storage unit
300: first identification information input section
400: first control section
500: Encrypted file output unit
600: encrypted file storage unit
700: second storage unit
800: Second identification information input part
900: second control section
1000: File output section
Claims (8)
A first storage unit for storing the digital file inputted through the file input unit;
A first identification information input unit for receiving identification information for encryption;
A first controller for extracting a hash value of the digital file and generating an encrypted digital file by encrypting the digital file using the identification information; And
And an encrypted file output unit for receiving and outputting the encrypted digital file and the hash value from the first control unit.
Wherein the first control unit generates an encrypted hash value by encrypting the hash value using the identification information,
Wherein the encrypted file output unit receives the encrypted hash value from the first control unit and outputs the encrypted hash value.
Wherein the identification information is a password.
Wherein the identification information is biometric information of a user.
A second storage unit for storing the encrypted digital file and the hash value input through the encryption file input unit;
A second identification information input unit for receiving identification information for decryption;
Decrypts the encrypted digital file using the identification information, extracts a hash value of the decrypted digital file, determines whether the extracted hash value matches the hash value stored in the second storage unit, A second controller for generating integrity guarantee information according to the hash value and the stored hash value being identical; And
And a file output unit for receiving and outputting the decrypted digital file and the integrity guarantee information from the second control unit.
The encrypted file input unit receives the encrypted hash value,
Wherein the second control unit decrypts the encrypted hash value using the identification information and stores the decrypted hash value in the second storage unit.
Wherein the identification information is a password.
Wherein the identification information is biometric information of a user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150124039A KR20170027442A (en) | 2015-09-02 | 2015-09-02 | Portable system for extracting hash of digital file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150124039A KR20170027442A (en) | 2015-09-02 | 2015-09-02 | Portable system for extracting hash of digital file |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170027442A true KR20170027442A (en) | 2017-03-10 |
Family
ID=58411004
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150124039A KR20170027442A (en) | 2015-09-02 | 2015-09-02 | Portable system for extracting hash of digital file |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170027442A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114884672A (en) * | 2022-04-29 | 2022-08-09 | 华控清交信息科技(北京)有限公司 | Data flow network system, data flow message transmission method and device |
-
2015
- 2015-09-02 KR KR1020150124039A patent/KR20170027442A/en active Search and Examination
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114884672A (en) * | 2022-04-29 | 2022-08-09 | 华控清交信息科技(北京)有限公司 | Data flow network system, data flow message transmission method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4097773B2 (en) | Digital image editing system | |
JP4602931B2 (en) | How to ensure image set integrity | |
CN201181472Y (en) | Hardware key device and movable memory system | |
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
US20160269178A1 (en) | Privacy-Enhanced Biometrics-Secret Binding Scheme | |
KR101105205B1 (en) | An apparatus and a method of processing data for guaranteeing data integrity and confidentiality in real time, and black box system using thereof | |
WO2018165811A1 (en) | Method for saving and verifying biometric template, and biometric recognition apparatus and terminal | |
US9734346B2 (en) | Device and method for providing security in remote digital forensic environment | |
CN104239820A (en) | Secure storage device | |
US7840817B2 (en) | Data processing apparatus and method | |
CN105337742B (en) | LFSR file encryption and decryption method based on facial image feature and GPS information | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
US10783278B2 (en) | Signature generation device, signature verification device, signature generation method, and signature verification method | |
KR101967855B1 (en) | Method and system for verifying electronic document security using 2D barcode block division | |
CN101226507A (en) | Security method and system as well as correlative pairing enciphering system thereof | |
KR101485968B1 (en) | Method for accessing to encoded files | |
KR20170027442A (en) | Portable system for extracting hash of digital file | |
Subhasri et al. | Enhancing the security of dicom content using modified vigenere cipher | |
KR102236897B1 (en) | Video data protection system and method | |
KR102083415B1 (en) | Apparatus and method for decrypting encrypted files | |
GB2540138A (en) | Method of exchanging digital content | |
JP5718757B2 (en) | Image management apparatus, image management program, and image management method | |
CN104615944A (en) | Method and device for encrypting and decrypting files | |
KR102101557B1 (en) | Image authentication method and apparatus based on object detection | |
KR102311996B1 (en) | Device and method for anti-forensic unlocking for media files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
N231 | Notification of change of applicant | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment |