WO2019223310A1 - Digital crime scene investigation record trusted model system - Google Patents

Digital crime scene investigation record trusted model system Download PDF

Info

Publication number
WO2019223310A1
WO2019223310A1 PCT/CN2018/123778 CN2018123778W WO2019223310A1 WO 2019223310 A1 WO2019223310 A1 WO 2019223310A1 CN 2018123778 W CN2018123778 W CN 2018123778W WO 2019223310 A1 WO2019223310 A1 WO 2019223310A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital
trusted
survey
sign
server
Prior art date
Application number
PCT/CN2018/123778
Other languages
French (fr)
Chinese (zh)
Inventor
杨一涛
李云
王新猛
吴育宝
Original Assignee
南京森林警察学院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南京森林警察学院 filed Critical 南京森林警察学院
Priority to JP2020520020A priority Critical patent/JP7026971B2/en
Publication of WO2019223310A1 publication Critical patent/WO2019223310A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the invention belongs to the technical field of protecting data integrity in digital data processing, and particularly relates to a trusted model system for digital field survey records.
  • the current survey record is a collection of documents and attachments formed after the site survey is completed. It mainly includes: field transcripts, photos, videos, audio, traces, various physical evidence, electronic data evidence, and drawings. Among these current survey records, photos, videos, and audio have been digitally collected.
  • the current survey records in the form of transcripts, drawings, etc. are manually entered into the on-site survey information system by the surveyors to realize digitization.
  • the invention with the application number CN201710140360.5 and the name "a method and system for fixing electronic evidence on the spot” discloses a method and system for fixing electronic evidence on the spot.
  • the method includes obtaining user login information, selecting user rights, and starting recording user operations; collecting on-site electronic evidence; stopping recording of user operations, and generating a recording result of a user operation log; performing integrity verification on the obtained electronic evidence; Generate electronic reports of electronic evidence, and add the integrity verification results of electronic evidence to electronic reports; upload electronic files, the above through the user login module, evidence collection module, integrity verification result module, report generation module and upload module All modules are implemented together.
  • the present invention proposes a digital reconnaissance record trusted model system.
  • the digital reconnaissance records can be trusted Operation to ensure that all digital survey information from the beginning of the record to the submission of the court, the recorded content, the person who recorded, the location, the recording time and other digital information is complete and has not been tampered with.
  • DR ⁇ dr i
  • Ci The information of DR is stored in Ci
  • TR is a set of trusted digital reconnaissance records
  • TR ⁇ tr i
  • tr i dr i + Sign (dr i ) ⁇
  • Sign is a credible operation
  • the date and time DT are input to the server S, GPS coordinate information of the current location C i input to C i.
  • the above-mentioned on-site survey terminal equipment C i is bound to the identity of the investigator using the equipment, and is dedicated to a specific person.
  • the above-mentioned survey terminal device C i is equipped with a high-definition camera, a GPS sensor, Wi-fi and 4G signal access capabilities.
  • the aforementioned cryptographic algorithm set includes an asymmetric key pair generation algorithm, a symmetric key algorithm, a signature algorithm, and a hash algorithm.
  • the invention further proposes a method for performing credible operation by using the above-mentioned digital reconnaissance record trusted model system, which specifically includes the following steps:
  • PK s is stored in the digital certificate, recorded as Cert s .
  • SK s applies the AES algorithm (AES, Advanced Encryption Standard) and strong encryption. The key is stored locally on server S;
  • the server issues a certificate for the surveying terminal equipment and sends the private key to the terminal in an encrypted manner. All the surveying terminal equipment and the public key of the server are stored on the server and Publicly accessible
  • Site survey terminal equipment C i collects site survey data dr n through the equipment
  • the survey terminal device C i obtains the geographic location coordinates of the survey data collected through its own GPS sensor, and records it as G n ;
  • the server returns the current time dt n to the current survey terminal device, and adds a digital signature to ensure the credibility of the time.
  • the field survey terminal equipment C i verifies the credibility of the time, and performs credible processing on the field survey data dr n as follows to obtain the credible field survey data tr n :
  • the above-described registration process comprises: i inspect the site terminal device C transmits a registration request to the server S i and Key, which is the password holder is provided its own terminal i, the server generates the key pair S i is C E and D are the encryption and decryption functions of the symmetric encryption algorithm AES, Sign uses the asymmetric cryptographic algorithm DSA (Digital Signature Algorithm) for signing, and H is the hash function of the SHA1 (Secure Hash Algorithm) algorithm.
  • DSA Digital Signature Algorithm
  • H is the hash function of the SHA1 (Secure Hash Algorithm) algorithm.
  • the survey data described in step 3 of the signature process may be text, pictures, audio, and video.
  • the process of verifying the trusted spot survey data tr n is as follows:
  • dt n Validate (PK s , Sign (SK s , dt n ))
  • the present invention has the following beneficial technical effects:
  • a digital record generated during a crime scene investigation is credibly processed to generate a credible current investigation digital record.
  • the record contains the current investigation data, the collection place, the collection time, and the person's information. information.
  • the trusted record uses the terminal's private key to sign the record, and the person who collected the record saves the record.
  • the credibility of the record is reflected in tamper resistance and non-repudiation, because the terminal is dedicated and the digital signature ensures that the data is collected
  • the terminal owner cannot deny which terminal.
  • Figure 1 is a structural diagram of a trusted model of digital survey records.
  • FIG. 2 is a flowchart of terminal registration.
  • Figure 3 is a flow chart of the credibility verification of the survey data.
  • FIG. 1 depicts the structure of a trusted model.
  • DR ⁇ dr i
  • PK s is stored in the digital certificate, recorded as Cert s .
  • SKs uses the AES algorithm and a strong key stored locally on the server.
  • FIG. 2 is a flowchart of terminal registration.
  • the terminal equipment C i is the hand-held device of the reconnaissance personnel.
  • the equipment is equipped with high-definition cameras, GPS sensors, Wi-fi and 4G signal access capabilities, and input functions.
  • the identities of one investigator are bound one by one, and they are used exclusively by one person. This registration process needs to be completed before using the terminal device for the first time.
  • Key i is a password set by the holder of terminal i.
  • the purpose is to protect the security of the private key.
  • E and D are the encryption and decryption functions of the symmetric encryption algorithm AES in cryptography, Sign uses the asymmetric cryptography algorithm DSA for signature, and H is the hash function of the SHA1 algorithm.
  • the purpose of this step is to let the server issue a certificate for the terminal and send the private key to the terminal in an encrypted manner. All public keys of the terminal and server are kept on the server and can be accessed publicly.
  • the terminal C i collects the current survey data dr n through the equipment, and the data can be text, pictures, audio, and video;
  • the terminal C i obtains the geographic location coordinates of the collected survey data through its own GPS sensor, and records it as G n ;
  • Timestamp n dt n + Sign (SK s , dt n )
  • the terminal Ci verifies the credibility of the time and performs credible processing on the survey data drn as follows to obtain the trusted survey data tr n :
  • Figure 3 is a flowchart of the credibility verification of the survey data, which describes the whole process of trn verification of a trusted survey record. If the recorded data is tampered, the verification will fail.
  • the terminal device uses the public key of the server certificate to decrypt Sign (PK s , dt) to verify the credibility of dt. If it is true and valid, it generates the trusted spot survey data tr by the following steps:
  • Step 2 The obtained hash value is 1 and G Timestatmp combined, and the terminal using a private key SK S arithmetic sign: Sign (SK s, H ( DC0017.JPG), G, Timestamp);
  • a digital record generated during the investigation of a crime scene is credibly processed to generate a credible digital record of the current investigation.
  • the record contains information of the current investigation data, the collection location, the collection time, and the collection person. And guarantee that this information cannot be tampered with, and at the same time non-repudiation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Disclosed in the present invention are a digital crime scene investigation record trusted model system and a method for performing a trusted operation using the system. The system records a digital crime scene investigation record trusted model as T, wherein T=(E,A,DR,TR,Sign), TR is a trusted digital crime scene investigation record set, TR={tr i|tr i=dr i+Sign(dr i)}, and Sign is a trusted operation. If the recorded data above is tampered with, a verification failure would be caused, and trusted crime scene investigation data tr n can be verified. The present invention is targeted at digital records generated in crime scene investigation, and can perform a trusted operation on the digital records to generate trusted crime scene investigation digital records. The credibility of the records is reflected in tamper resistance and non-repudiation. Since a terminal is specially used by a special person, the digital signature makes it clear which terminal the data comes from. Thus, the terminal holder cannot deny the fact. The present invention effectively solves the existing technical problem of easily tampering with photos and videos captured by mobile terminals, and solves the problem of how to add a signature later and sign on behalf.

Description

一种数字现勘记录可信模型系统Trusted model system of digital survey record 技术领域Technical field
本发明属于数字数据处理的保护数据的完整性技术领域,具体涉及一种数字现勘记录可信模型系统。The invention belongs to the technical field of protecting data integrity in digital data processing, and particularly relates to a trusted model system for digital field survey records.
背景技术Background technique
随着科技技术的进步,公安部门的各项警务工作也进入了数字化时代。犯罪现场勘查通常指刑事案件发生后,侦査人员为了査明犯罪事实,收集犯罪证据,揭露证实犯罪人,依法对与犯罪有关的人和事以及场所、物品、人身、尸体等所进行的现场访问和勘验检査工作,犯罪现场勘查必须依据国家法律、法规,运用刑事科学技术手段在特定空间领域内进行。现勘记录是现场勘查工作结束后形成的文档和附件的集合,主要包括:现场笔录、现场照片、现场视频、现场音频、痕迹、各类物证、各类电子数据证据、绘图等。在这些现勘记录中,照片、视频、音频目前已经做到数字化采集,笔录、绘图等形式的现勘记录由勘查人员事后手工录入现场勘验信息系统实现数字化。With the advancement of science and technology, various police work of the public security department has also entered the digital era. Crime scene investigation usually refers to the scene where investigators, in order to ascertain the facts of the crime, collect the evidence of the crime, and expose the corroborated criminals, according to law, on the people and events related to the crime, as well as places, objects, people, and corpses. For visits, investigations and inspections, crime scene investigations must be conducted in specific space areas in accordance with national laws and regulations, using criminal scientific and technological means. The current survey record is a collection of documents and attachments formed after the site survey is completed. It mainly includes: field transcripts, photos, videos, audio, traces, various physical evidence, electronic data evidence, and drawings. Among these current survey records, photos, videos, and audio have been digitally collected. The current survey records in the form of transcripts, drawings, etc. are manually entered into the on-site survey information system by the surveyors to realize digitization.
现场勘查是一项程序性很强的工作,工作流程出现任何一个小瑕疵,都会导致很严重的后果,比如证据采集不充分、痕迹物证损坏等。其中,现勘记录可信度失效是灾难性的结果,这将导致整个证据链的起点就不被采纳,进而致使整个现勘工作无效。现有的现勘记录可信机制是依靠“签名”,每份纸质形式现勘记录、痕迹物证收集清单均需要侦查人员亲笔签署姓名来保证记录的可信性,为了防止记录被篡改,一般需要两名以上的侦查人员签名。但是在实际的现场勘查工作中,“签名”这一规范存在很着很多的问题,主要体现在以下两点:一、补签名,部分侦查人员为了图方便,在现场勘查时未及时按要求在记录和清单上签名,事后补签;二、代签名,部分侦查人员并未参与现场勘查,为了程序性的需要签名或是代替他人签名。Site investigation is a highly procedural task. Any small flaw in the workflow will lead to serious consequences, such as insufficient evidence collection and damage to trace evidence. Among them, the failure of the credibility of the current survey records is a catastrophic result, which will cause the starting point of the entire evidence chain not to be adopted, thereby rendering the entire current survey work invalid. The existing credibility mechanism of current survey records is based on "signature". Each paper-based survey record and trace physical evidence collection list must be signed by the investigator to ensure the credibility of the record. In order to prevent the record from being tampered with, generally Requires signature of more than two investigators. However, in the actual site survey, there are many problems with the "signature" specification, which are mainly reflected in the following two points: 1. The signature is supplemented, and some investigators did not promptly request Records and checklists are signed and re-signed afterwards; Second, on behalf of the signatures, some investigators did not participate in the on-site investigation and signed for or on behalf of others for procedural needs.
上述任一种行为都会导致现勘记录可信性被质疑,给后续的司法证明工作埋下隐患。在数字化时代,即使规避了上述手工签名的风险,面对大量的数字化现勘记录,如何有效地保证其可信性也是一个亟需解决的重要课题。Any of the above acts will cause the credibility of the current investigation records to be questioned, which will lay hidden dangers for subsequent judicial certification work. In the digital age, even if the risks of manual signatures mentioned above are circumvented, how to effectively ensure their credibility is an important issue that needs to be solved in the face of a large number of digital current survey records.
现有专利文献中,申请号为CN201710140360.5、名称为“一种现场固定电子证据的方法及系统”的发明公开了一种现场固定电子证据的方法及系统。该方 法包括获取用户登录信息,进行用户权限选择并开始记录用户操作;采集现场电子证据;停止记录用户操作,并将记录结果生成用户操作日志;对获取的电子证据进行完整性校验;将获取的电子证据生成电子报告,并将电子证据的完整性校验结果添加到电子报告中;上传电子文件,以上通过用户登录模块、证据采集模块,完整性校验结果模块、报告生成模块和上传模块各模块共同实现。该发明虽然一定程度上解决了现有的移动终端拍摄的照片、录像易被篡改的技术问题,但仍然没有解决补签名和代签名的问题。In the existing patent documents, the invention with the application number CN201710140360.5 and the name "a method and system for fixing electronic evidence on the spot" discloses a method and system for fixing electronic evidence on the spot. The method includes obtaining user login information, selecting user rights, and starting recording user operations; collecting on-site electronic evidence; stopping recording of user operations, and generating a recording result of a user operation log; performing integrity verification on the obtained electronic evidence; Generate electronic reports of electronic evidence, and add the integrity verification results of electronic evidence to electronic reports; upload electronic files, the above through the user login module, evidence collection module, integrity verification result module, report generation module and upload module All modules are implemented together. Although the present invention solves the technical problem that the photos and videos taken by the existing mobile terminal are easy to be tampered to some extent, it still does not solve the problems of signature supplement and signature replacement.
发明内容Summary of the Invention
本发明针对上述现有技术中存在的上述问题,提出一种数字现勘记录可信模型系统,通过使用密码学中的数字签名、哈希等方法,可以针对数字化的现勘记录进行可信化操作,以保证所有的数字现勘记录从开始记录到呈递法庭的整个过程中,记录的内容、记录的人、记录地点、记录时间等数字化信息是完整的,未经过篡改。In view of the above problems in the prior art, the present invention proposes a digital reconnaissance record trusted model system. By using methods such as digital signatures and hashing in cryptography, the digital reconnaissance records can be trusted Operation to ensure that all digital survey information from the beginning of the record to the submission of the court, the recorded content, the person who recorded, the location, the recording time and other digital information is complete and has not been tampered with.
为实现上述目的,本发明采用的技术方案为一种数字现勘记录可信模型系统,该系统将数字现勘记录可信模型记作T,T=(E,A,DR,TR,Sign),其中,E是模型中的实体,E={S,C i},S为服务器,C i为现勘终端设备,S和C i之间通过无线通讯网络连接,A为可信模型中的密码算法集合,服务器S利用A中的非对称加密算法生成公私密钥,DR是所有数字现勘记录的集合,DR={dr i|dr i∈{数字照片,数字笔录,视频,音频}},DR的信息保存在C i中,TR是可信的数字现勘记录集合,TR={tr i|tr i=dr i+Sign(dr i)},Sign是可信化操作,该可信化操作使用了上述私密钥,DT是日期时间,输入到服务器S,GPS是C i的当前地理位置坐标信息,输入到C iIn order to achieve the above object, the technical solution adopted by the present invention is a digital reconnaissance record trusted model system, which records the digital reconnaissance record trusted model as T, T = (E, A, DR, TR, Sign) Among them, E is an entity in the model, E = {S, C i }, S is a server, C i is a terminal for current survey, S and C i are connected through a wireless communication network, and A is a trusted model. A set of cryptographic algorithms. Server S uses the asymmetric encryption algorithm in A to generate public and private keys. DR is a collection of all digital survey records. DR = {dr i | dr i ∈ {digital photo, digital record, video, audio}} The information of DR is stored in Ci , TR is a set of trusted digital reconnaissance records, TR = {tr i | tr i = dr i + Sign (dr i )}, Sign is a credible operation, and the credibility operation using the above private key, the date and time DT are input to the server S, GPS coordinate information of the current location C i input to C i.
进一步,上述现勘终端设备C i与使用该设备的侦查人员的身份绑定,专人专用。 Further, the above-mentioned on-site survey terminal equipment C i is bound to the identity of the investigator using the equipment, and is dedicated to a specific person.
作为优选,上述现勘终端设备C i配备高清摄像头、GPS传感器、Wi-fi和4G信号接入能力。 Preferably, the above-mentioned survey terminal device C i is equipped with a high-definition camera, a GPS sensor, Wi-fi and 4G signal access capabilities.
进一步,上述密码算法集合包括非对称密钥对生成算法、对称密钥算法、签名算法和哈希算法。Further, the aforementioned cryptographic algorithm set includes an asymmetric key pair generation algorithm, a symmetric key algorithm, a signature algorithm, and a hash algorithm.
本发明还进一步提出一种利用上述数字现勘记录可信模型系统进行可信化 操作的方法,具体包含以下步骤:The invention further proposes a method for performing credible operation by using the above-mentioned digital reconnaissance record trusted model system, which specifically includes the following steps:
一、初始化过程First, the initialization process
使用RSA算法为服务器S生成公私密钥,记作PK s和SK s,PK s存放在数字证书中,记作Cert s,SK s应用AES算法(AES,Advanced Encryption Standard,高级加密标准)和强密钥存储在服务器S本地; Use the RSA algorithm to generate the public and private keys for the server S, recorded as PK s and SK s . PK s is stored in the digital certificate, recorded as Cert s . SK s applies the AES algorithm (AES, Advanced Encryption Standard) and strong encryption. The key is stored locally on server S;
二、注册过程Second, the registration process
第一次使用现勘终端设备前需要完成注册,服务器为现勘终端设备发行证书,并通过加密的方式将私钥发送给终端,所有现勘终端设备及服务器的公钥都在服务器上保存并可公开访问;Registration needs to be completed before using the surveying terminal equipment for the first time. The server issues a certificate for the surveying terminal equipment and sends the private key to the terminal in an encrypted manner. All the surveying terminal equipment and the public key of the server are stored on the server and Publicly accessible
三、签名过程Third, the signature process
1.现勘终端设备C i通过设备采集到现勘数据dr n1. Site survey terminal equipment C i collects site survey data dr n through the equipment;
2.现勘终端设备C i通过自身的GPS传感器获取到采集现勘数据的地理位置坐标,记作G n2. The survey terminal device C i obtains the geographic location coordinates of the survey data collected through its own GPS sensor, and records it as G n ;
3.现勘终端设备C i向服务器请求可信时间戳; 3. Now survey terminal C i trusted timestamp request to a server;
4.服务器向现勘终端设备返回当前时间dt n,并加上数字签名,以保证时间的可信性,回复内容为:Timestamp n=dt n+Sign(SK s,dt n); 4. The server returns the current time dt n to the current survey terminal device, and adds a digital signature to ensure the credibility of the time. The reply content is: Timestamp n = dt n + Sign (SK s , dt n );
5.现勘终端设备C i验证时间的可信性,并按如下方式对现勘数据dr n作可信处理,得到可信现勘数据tr n5. The field survey terminal equipment C i verifies the credibility of the time, and performs credible processing on the field survey data dr n as follows to obtain the credible field survey data tr n :
Figure PCTCN2018123778-appb-000001
Figure PCTCN2018123778-appb-000001
进一步,上述注册过程具体包括:现勘终端设备C i向服务器S发送注册请求和Key i,后者是终端i的持有人自行设置的密码,服务器S为C i生成密钥对
Figure PCTCN2018123778-appb-000002
E和D分别是对称加密算法AES的加密与解密函数,Sign使用非对称密码算法DSA(Digital Signature Algorithm)进行签名,H是SHA1(Secure Hash Algorithm)算法的哈希函数。
Further, the above-described registration process comprises: i inspect the site terminal device C transmits a registration request to the server S i and Key, which is the password holder is provided its own terminal i, the server generates the key pair S i is C
Figure PCTCN2018123778-appb-000002
E and D are the encryption and decryption functions of the symmetric encryption algorithm AES, Sign uses the asymmetric cryptographic algorithm DSA (Digital Signature Algorithm) for signing, and H is the hash function of the SHA1 (Secure Hash Algorithm) algorithm.
进一步,上述签名过程的步骤三中所述现勘数据可以是文字、图片、音频、视频。Further, the survey data described in step 3 of the signature process may be text, pictures, audio, and video.
上述该记录的数据如果被篡改,会导致验证失败,可信现勘数据tr n被验证的过程如下: If the recorded data is tampered with, the verification will fail. The process of verifying the trusted spot survey data tr n is as follows:
S1:将tr n分解成原始数据O和验证数据V两个部分,O=dr n+G n+TimeStamp n,
Figure PCTCN2018123778-appb-000003
其中,TimeStamp n=dt n+Sign(SK s,dt n),
S1: decompose tr n into two parts of original data O and verification data V, O = dr n + G n + TimeStamp n ,
Figure PCTCN2018123778-appb-000003
Where TimeStamp n = dt n + Sign (SK s , dt n ),
O=dr n+G n+dt n+Sign(SK s,dt n); O = dr n + G n + dt n + Sign (SK s , dt n );
S2:验证原始数据O中的时间戳是否有效,检查下面的等式是否成立:S2: Verify that the timestamp in the original data O is valid, and check whether the following equation holds:
dt n=Validate(PK s,Sign(SK s,dt n)) dt n = Validate (PK s , Sign (SK s , dt n ))
若成立则继续下一步,若不成立则提示验证失败,并中止验证过程;If it is true, continue to the next step; if it is not true, it will prompt the verification failure and abort the verification process;
S3:验证原始数据O的可信性,检查下面的等式是否成立:S3: Verify the authenticity of the original data O, and check whether the following equation holds:
Figure PCTCN2018123778-appb-000004
Figure PCTCN2018123778-appb-000004
若成立则说明验证成功,若不成立则提示验证失败;If it is true, it means that the verification is successful; if it is not true, it indicates that the verification has failed;
S4:验证过程结束。S4: The verification process ends.
与现有技术相比,本发明具有以下的有益技术效果:Compared with the prior art, the present invention has the following beneficial technical effects:
1,本发明针对犯罪现场勘查中产生的数字记录,对其进行可信化处理进而生成一份可信的现勘数字记录,该记录中包含现勘数据、采集地点、采集时间和采集人的信息。1. According to the present invention, a digital record generated during a crime scene investigation is credibly processed to generate a credible current investigation digital record. The record contains the current investigation data, the collection place, the collection time, and the person's information. information.
2,可信记录使用终端私钥对记录签名,保存了该记录的采集记录人,该记录的可信度表现在防篡改和不可否认性,因为终端是专人专用,数字签名保证了数据采自于哪一台终端,终端持有人无法否认。2. The trusted record uses the terminal's private key to sign the record, and the person who collected the record saves the record. The credibility of the record is reflected in tamper resistance and non-repudiation, because the terminal is dedicated and the digital signature ensures that the data is collected The terminal owner cannot deny which terminal.
3,若现勘记录被篡改,通过验证过程就会被发现,即如果该记录的数据被篡改会导致验证失败,不仅有效解决了现有的移动终端拍摄的照片、录像易被篡改的技术问题,而且解决了如何防止补签名和代签名的问题。3. If the survey record is tampered, it will be found through the verification process, that is, if the recorded data is tampered, the verification will fail, which not only effectively solves the technical problem that the photos and videos taken by the existing mobile terminal are easy to be tampered with. , And solved the problem of how to prevent supplemental signatures and sub-signatures.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为数字现勘记录可信模型的结构图。Figure 1 is a structural diagram of a trusted model of digital survey records.
图2为终端注册流程图。FIG. 2 is a flowchart of terminal registration.
图3为现勘数据可信性验证流程图。Figure 3 is a flow chart of the credibility verification of the survey data.
具体实施方式Detailed ways
现结合附图对本发明作进一步详细的说明。The present invention will be further described in detail with reference to the accompanying drawings.
图1描述了可信模型的结构图。本发明将数字现勘记录可信模型记作T,T= (E,A,DR,TR,Sign),其中E是模型中的实体,E={S,C i},S为服务器,C i为现勘终端设备,S和C i之间通过无线通讯网络连接;A为模型中的密码算法集合;DR是所有数字现勘记录集合, Figure 1 depicts the structure of a trusted model. The present invention refers to the trusted model of digital reconnaissance records as T, T = (E, A, DR, TR, Sign), where E is an entity in the model, E = {S, C i }, S is the server, and C i is the surveying terminal equipment, S and Ci are connected through a wireless communication network; A is the set of cryptographic algorithms in the model; DR is the collection of all digital surveying records,
DR={dr i|dr i∈{数字照片,数字笔录,视频,音频}};TR是可信的数字现勘记录集合,TR={Sign(dr i)};Sign是可信化操作;DT是日期时间;GPS是C i的当前地理位置坐标。 DR = {dr i | dr i ∈ {digital photo, digital transcript, video, audio}}; TR is a trusted set of digital current survey records, TR = {Sign (dr i )}; Sign is a credible operation; DT is the date and time; GPS is the current geographic location coordinate of C i .
利用本系统进行可信操作的过程如下:The process of using this system for trusted operations is as follows:
(一)初始化过程(A) initialization process
使用RSA算法为服务器S生成公私密钥,记作PK s和SK s,PK s存放在数字证书中,记作Cert s,SKs应用AES算法和强密钥存储在服务器本地。 Use the RSA algorithm to generate the public and private keys for the server S, recorded as PK s and SK s . PK s is stored in the digital certificate, recorded as Cert s . SKs uses the AES algorithm and a strong key stored locally on the server.
(二)注册过程(B) the registration process
图2为终端注册的流程图,终端设备C i是侦查人员的现勘手持设备,该设备配备高清摄像头、GPS传感器、Wi-fi和4G信号接入能力、录入等功能,每台终端设备与一名侦查人员的身份一一绑定,专人专用。在第一次使用终端设备前需要完成本注册过程。 Figure 2 is a flowchart of terminal registration. The terminal equipment C i is the hand-held device of the reconnaissance personnel. The equipment is equipped with high-definition cameras, GPS sensors, Wi-fi and 4G signal access capabilities, and input functions. The identities of one investigator are bound one by one, and they are used exclusively by one person. This registration process needs to be completed before using the terminal device for the first time.
在图2中,Key i是终端i的持有人自行设置的密码,目的是为了保护私钥的安全。E和D是密码学中的对称加密算法AES的加密与解密函数,Sign使用非对称密码算法DSA进行签名,H是SHA1算法的哈希函数。此步骤的目的是让服务器为终端发行证书,并通过加密的方式将私钥发送给终端,所有终端及服务器的公钥都在服务器上保存并可公开访问。 In FIG. 2, Key i is a password set by the holder of terminal i. The purpose is to protect the security of the private key. E and D are the encryption and decryption functions of the symmetric encryption algorithm AES in cryptography, Sign uses the asymmetric cryptography algorithm DSA for signature, and H is the hash function of the SHA1 algorithm. The purpose of this step is to let the server issue a certificate for the terminal and send the private key to the terminal in an encrypted manner. All public keys of the terminal and server are kept on the server and can be accessed publicly.
(三)签名过程(Three) the signature process
3.1,终端C i通过设备采集到现勘数据dr n,该数据可以是文字、图片、音频、视频; 3.1. The terminal C i collects the current survey data dr n through the equipment, and the data can be text, pictures, audio, and video;
3.2,终端C i通过自身的GPS传感器获取到采集现勘数据的地理位置坐标,记作G n3.2. The terminal C i obtains the geographic location coordinates of the collected survey data through its own GPS sensor, and records it as G n ;
3.3,向服务器请求可信时间戳;3.3, request a trusted timestamp from the server;
3.4,服务器向终端返回当前时间dtn并加上数字签名保证时间的可信性,回复内容为:Timestamp n=dt n+Sign(SK s,dt n) 3.4. The server returns the current time dtn to the terminal and adds a digital signature to ensure the credibility of the time. The reply content is: Timestamp n = dt n + Sign (SK s , dt n )
3.5,终端Ci验证时间的可信性并按如下方式对现勘数据drn作可信处理, 得到可信现勘数据tr n3.5. The terminal Ci verifies the credibility of the time and performs credible processing on the survey data drn as follows to obtain the trusted survey data tr n :
Figure PCTCN2018123778-appb-000005
Figure PCTCN2018123778-appb-000005
图3为现勘数据可信性验证的流程图,其描述了一个可信现勘记录trn被验证的全过程,如果该记录的数据被篡改会导致验证失败。Figure 3 is a flowchart of the credibility verification of the survey data, which describes the whole process of trn verification of a trusted survey record. If the recorded data is tampered, the verification will fail.
为便于本领域的一般技术人员实施本发明,现提供一个具体实施例:To facilitate those skilled in the art to implement the present invention, a specific embodiment is provided:
假设服务器S已经完成初始化操作,PK s已对外公开,SK s已秘密保存;另有侦查人员A,配备一部与A的身份绑定在一起的现勘终端设备C,服务器已为其生成了一对公私密钥对,公钥PK c已对外公开,SK c已在终端C上秘密保存。 Assume that the server S has completed the initialization operation, PK s has been made public, and SK s has been kept secret; another investigator A is equipped with a site survey terminal C bound to A's identity and the server has generated it A public-private key pair, the public key PK c has been made public, and SK c has been kept secret on the terminal C.
假设侦查人员A在犯罪现场获取到一块电脑硬盘,使用自己的现勘终端设备C对该物证进行拍照取证,该物证数码照片的文件名为DC0017.JPG,在拍照保存照片的同时,终端设备采集自身GPS传感器上的地理位置值为G=(lat:22.5024,lng:113.9383),同时向服务器S发送可信时间戳的请求后,服务器返回当前的可信时间戳Timestamp为dt=“2018-03-10 18:09:22”以及服务器的签名Sign(PK s,dt)。 Suppose investigator A obtains a computer hard disk at the crime scene and uses his own current survey terminal equipment C to take pictures and evidence of this physical evidence. The digital photo file name of the physical evidence is DC0017.JPG. While the picture is being saved, the terminal equipment collects it. The geographic position value on its own GPS sensor is G = (lat: 22.5024, lng: 113.9383), and after sending a trusted time stamp request to the server S, the server returns the current trusted time stamp. Timestamp is dt = "2018-03 -10 18:09:22 "and the server's signature Sign (PK s , dt).
终端设备使用服务器证书的公钥对Sign(PK s,dt)解密来验证dt的可信性,若真实有效,则通过如下步骤生成可信现勘数据tr: The terminal device uses the public key of the server certificate to decrypt Sign (PK s , dt) to verify the credibility of dt. If it is true and valid, it generates the trusted spot survey data tr by the following steps:
1.计算DC0017.JPG的SHA1哈希值:H(DC0017.JPG);1. Calculate the SHA1 hash value of DC0017.JPG: H (DC0017.JPG);
2.将第1步得到的哈希值与G和Timestatmp合并在一起,并使用该终端的私钥SK S进行签名运算:Sign(SK s,H(DC0017.JPG),G,Timestamp); Step 2. The obtained hash value is 1 and G Timestatmp combined, and the terminal using a private key SK S arithmetic sign: Sign (SK s, H ( DC0017.JPG), G, Timestamp);
3.最终的可信现勘数据tr为下列数据合并而成:3. The final credible field survey data tr is a combination of the following data:
DC0017.JPG,G,Timestamp,Sign(SK s,H(DC0017.JPG),G,dt) DC0017.JPG, G, Timestamp, Sign (SK s , H (DC0017.JPG), G, dt)
接下来,对tr的可信验证过程如下:Next, the trusted verification process for tr is as follows:
1.先将tr分成原始数据部分O:DC0017.JPG,G,Timestam和验证数据部分V:Sign(SK s,H(DC0017.JPG),G,dt); 1. First divide tr into the original data part O: DC0017.JPG, G, Timestam and verification data part V: Sign (SK s , H (DC0017.JPG), G, dt);
2.使用服务器的公钥验证原始数据中Timestamp的可信性,检查dt是否等于Validate(PK s,Sign(PK s,dt)),若相等则说明该时间戳可信,继续下一步验证;否则中止验证过程,提示验证失败; 2. Use the server's public key to verify the credibility of Timestamp in the original data, check whether dt is equal to Validate (PK s , Sign (PK s , dt)), if they are equal, it means that the timestamp is credible, and continue to the next verification; Otherwise, the verification process is aborted, and the verification fails;
3.对tr原始数据部分的DC0017.JPG进行SHA1哈希运算并与G和Timestamp的dt合并形成如下数据:H(DC0017.jpg)+G+dt,记作O';3. Perform SHA1 hash operation on DC0017.JPG of the original data part of tr and combine it with dt of G and Timestamp to form the following data: H (DC0017.jpg) + G + dt, recorded as O ';
4.使用服务器的公钥解开tr的验证数据部分,即Validate(PK s,V),然后检查O'是否等于Validate(PK s,V),若不相等则提示验证失败,若相等则验证成功,该物证照片DC0017.JPG是可信的,即该物证照片的采集时间为2018-03-10 18:09:22,采集地的经纬坐标为(纬度:22.5024,经度:113.9383), 4. Use the server's public key to unlock the verification data part of tr, that is, Validate (PK s , V), and then check whether O 'is equal to Validate (PK s , V). If they are not equal, it will prompt verification failure, if they are equal, then verify Success, the physical evidence photo DC0017.JPG is credible, that is, the collection time of the physical evidence photo is 2018-03-10 18:09:22, and the latitude and longitude coordinates of the collection place are (latitude: 22.5024, longitude: 113.9383),
采集人为侦查人员A,照片内容未发现篡改,以上信息真实有效。The collection was conducted by investigator A. No tampering was found in the photo content. The above information is true and valid.
本发明针对犯罪现场勘查中产生的数字记录,对其进行可信化处理进而生成一份可信的现勘数字记录,该记录中有现勘数据、采集地点、采集时间和采集人的信息,并保证这些信息无法被篡改,同时具备不可否认性。According to the present invention, a digital record generated during the investigation of a crime scene is credibly processed to generate a credible digital record of the current investigation. The record contains information of the current investigation data, the collection location, the collection time, and the collection person. And guarantee that this information cannot be tampered with, and at the same time non-repudiation.
需要说明的是,以上具体实施方式的描述并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。It should be noted that the description of the above specific embodiments is not intended to limit the present invention, and any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. .

Claims (8)

  1. 一种数字现勘记录可信模型系统,其特征在于,该系统将数字现勘记录可信模型记作T,T=(E,A,DR,TR,Sign),其中,E是模型中的实体,E={S,C i},S为服务器,C i为现勘终端设备,S和C i之间通过无线通讯网络连接,A为可信模型中的密码算法集合,服务器S利用A中的非对称加密算法生成公私密钥,DR是所有数字现勘记录的集合,DR={dr i|dr i∈{数字照片,数字笔录,视频,音频}},DR的信息保存在C i中,TR是可信的数字现勘记录集合,TR={tr i|tr i=dr i+Sign(dr i)},Sign是可信化操作,该可信化操作使用了上述私密钥,DT是日期时间,输入到服务器S,GPS是C i的当前地理位置坐标信息,输入到C iA digital reconnaissance record trusted model system, characterized in that the system records the digital reconnaissance record trusted model as T, T = (E, A, DR, TR, Sign), where E is the model Entity, E = {S, C i }, S is the server, C i is the current survey terminal equipment, S and C i are connected through a wireless communication network, A is the set of cryptographic algorithms in the trusted model, and server S uses A The asymmetric encryption algorithm generates public and private keys. DR is a collection of all digital survey records, DR = {dr i | dr i ∈ {digital photo, digital transcript, video, audio}}, and DR information is stored in C i Here, TR is a set of trusted digital on-site survey records, TR = {tr i | tr i = dr i + Sign (dr i )}, Sign is a credible operation, which uses the above private key , date and time DT are input to the server S, GPS coordinate information of the current location C i input to C i.
  2. 根据权利要求1所述的数字现勘记录可信模型系统,其特征在于所述现勘终端设备C i与使用该设备的侦查人员的身份绑定。 The digital on-site survey record trusted model system according to claim 1, wherein the on-site survey terminal equipment C i is bound to the identity of the investigator using the equipment.
  3. 根据权利要求2所述的数字现勘记录可信模型系统,其特征在于所述现勘终端设备C i配备高清摄像头、GPS传感器、Wi-fi和4G信号接入能力。 The digital reconnaissance record trusted model system according to claim 2, characterized in that said reconnaissance terminal equipment Ci is equipped with a high-definition camera, a GPS sensor, Wi-fi and 4G signal access capabilities.
  4. 根据权利要求1所述的数字现勘记录可信模型系统,其特征在于所述密码算法集合包括非对称密钥对生成算法、对称密钥算法、签名算法和哈希算法。The digital on-site record trusted model system according to claim 1, wherein the cryptographic algorithm set includes an asymmetric key pair generation algorithm, a symmetric key algorithm, a signature algorithm, and a hash algorithm.
  5. 一种利用权利要求1所述的数字现勘记录可信模型系统进行可信化操作的方法,其特征在于包含以下步骤:A method for performing credible operation by using a trusted model system of digital on-site survey records according to claim 1, comprising the following steps:
    (一)初始化过程(A) initialization process
    使用RSA算法为服务器S生成公私密钥,记作PK s和SK s,PK s存放在数字证书中,记作Cert s并对外公开,SK s使用AES算法和强密钥存储在服务器S本地; Use the RSA algorithm to generate the public and private keys for the server S, recorded as PK s and SK s . PK s is stored in the digital certificate, recorded as Cert s and made public. SK s is stored locally on the server S using the AES algorithm and a strong key;
    (二)注册过程(B) the registration process
    第一次使用现勘终端设备前需要完成注册,服务器为现勘终端设备发行证书,并通过加密的方式将私钥发送给终端,所有现勘终端设备及服务器的公钥都在服务器上保存并可公开访问;Registration needs to be completed before using the surveying terminal equipment for the first time. The server issues a certificate for the surveying terminal equipment and sends the private key to the terminal in an encrypted manner. All the surveying terminal equipment and the public key of the server are stored on the server and Publicly accessible
    (三)签名过程(Three) the signature process
    a)现勘终端设备C i通过设备采集到现勘数据dr na) Site survey terminal equipment C i collects site survey data dr n through the equipment;
    b)现勘终端设备C i通过自身的GPS传感器获取到采集现勘数据的地理位置坐标,记作G nb) The survey terminal device C i obtains the geographic location coordinates of the survey data collected through its own GPS sensor, and records it as G n ;
    c)现勘终端设备C i向服务器请求可信时间戳; c) inspect the site terminal C i trusted timestamp request to a server;
    d)服务器向现勘终端设备返回当前时间dt n,并加上数字签名,以保证时间的可信性,回复内容为:TimeStamp  n=dt n+Sign(SK s,dt n); d) The server returns the current time dt n to the current survey terminal equipment, and adds a digital signature to ensure the credibility of the time. The reply content is: TimeStamp n = dt n + Sign (SK s , dt n );
    e)现勘终端设备C i验证时间的可信性,并按如下方式对现勘数据dr n作可信处 理,得到可信现勘数据tr ne) The current survey terminal equipment C i verifies the credibility of the time, and performs credible processing on the survey data dr n as follows to obtain the trusted survey data tr n :
    f)tr n=(dr n+G n+TimeStamp n)+Sign(SK ci,(H(dr n)+G n+dt n))。 f) tr n = (dr n + G n + TimeStamp n ) + Sign (SK ci , (H (dr n ) + G n + dt n )).
  6. 根据权利要求5所述的利用数字现勘记录可信模型系统进行可信化操作的方法,其特征在于注册过程具体包括:现勘终端设备C向服务器S发送注册请求和K i,后者是终端C i的持有人自行设置的密码,服务器S为C i生成密钥对
    Figure PCTCN2018123778-appb-100001
    E和D分别是对称加密算法AES的加密与解密函数,Sign使用非对称密码算法DSA进行签名,Validate使用DSA进行签名验证,H是SHA1算法的哈希函数。
    The method according to claim 5 for performing credible operations using a trusted model system of digital survey records, characterized in that the registration process specifically comprises: the survey terminal device C sends a registration request and K i to the server S, the latter being holder password terminal C i of the self-setting, the server S generates a key pair of C i
    Figure PCTCN2018123778-appb-100001
    E and D are the encryption and decryption functions of the symmetric encryption algorithm AES, Sign uses the asymmetric cryptographic algorithm DSA for signature, Validate uses DSA for signature verification, and H is the hash function of the SHA1 algorithm.
  7. 根据权利要求5所述的利用数字现勘记录可信模型系统进行可信化操作的方法,其特征在于签名过程的步骤a中所述数据可以是文字、图片、音频、视频。The method according to claim 5 for performing credible operations using a trusted model system of digital survey records, wherein the data in step a of the signature process may be text, pictures, audio, or video.
  8. 根据权利要求5所述的利用数字现勘记录可信模型系统进行可信化操作的方法,其特征在于所述可信现勘数据tr n被验证的过程如下: The method for performing credible operation by using a trusted model system of digital survey records according to claim 5, characterized in that the process of verifying the trusted survey data tr n is as follows:
    S1:将tr n分解成原始数据O和验证数据V两个部分,O=dr n+G n+TimeStamp n,
    Figure PCTCN2018123778-appb-100002
    Figure PCTCN2018123778-appb-100003
    其中,TimeStamp n=dt n+Sign(SK s,dt n),O=dr n+G n+dt n+Sign(SK s,dt n);
    S1: decompose tr n into two parts of original data O and verification data V, O = dr n + G n + TimeStamp n ,
    Figure PCTCN2018123778-appb-100002
    Figure PCTCN2018123778-appb-100003
    Among them, TimeStamp n = dt n + Sign (SK s , dt n ), O = dr n + G n + dt n + Sign (SK s , dt n );
    S2:验证原始数据O中的时间戳是否有效,检查下面的等式是否成立:S2: Verify that the timestamp in the original data O is valid, and check whether the following equation holds:
    dt n=Validate(PK s,Sign(SK s,dt n)) dt n = Validate (PK s , Sign (SK s , dt n ))
    若成立则继续下一步,若不成立则提示验证失败,并中止验证过程;If it is true, continue to the next step; if it is not true, it will prompt the verification failure and abort the verification process;
    S3:验证原始数据O的可信性,检查下面的等式是否成立:S3: Verify the authenticity of the original data O, and check whether the following equation holds:
    Figure PCTCN2018123778-appb-100004
    Figure PCTCN2018123778-appb-100004
    若成立则说明验证成功,若不成立则提示验证失败;If it is true, it means that the verification is successful; if it is not true, it indicates that the verification has failed;
    S4:验证过程结束。S4: The verification process ends.
PCT/CN2018/123778 2018-05-21 2018-12-26 Digital crime scene investigation record trusted model system WO2019223310A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2020520020A JP7026971B2 (en) 2018-05-21 2018-12-26 Digital field survey record reliability model system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810494011.8 2018-05-21
CN201810494011.8A CN108737095B (en) 2018-05-21 2018-05-21 Method for carrying out credible operation by using digital current survey record credible model system

Publications (1)

Publication Number Publication Date
WO2019223310A1 true WO2019223310A1 (en) 2019-11-28

Family

ID=63937789

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/123778 WO2019223310A1 (en) 2018-05-21 2018-12-26 Digital crime scene investigation record trusted model system

Country Status (3)

Country Link
JP (1) JP7026971B2 (en)
CN (1) CN108737095B (en)
WO (1) WO2019223310A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737095B (en) * 2018-05-21 2021-03-05 南京森林警察学院 Method for carrying out credible operation by using digital current survey record credible model system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000155524A (en) * 1998-11-19 2000-06-06 Mitsubishi Electric Corp Electronic seal stamping system
CN103593618A (en) * 2013-10-28 2014-02-19 北京实数科技有限公司 Verification method and system for adoptability of electronic data evidence
CN108022194A (en) * 2017-11-28 2018-05-11 深圳市华德安科技有限公司 Law-enforcing recorder and its data safety processing method, server and system
CN108737095A (en) * 2018-05-21 2018-11-02 南京森林警察学院 A kind of number now surveys record trust model system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6269446B1 (en) * 1998-06-26 2001-07-31 Canon Kabushiki Kaisha Authenticating images from digital cameras
JP4856433B2 (en) * 2006-01-27 2012-01-18 株式会社リコー Measuring device, measurement data editing device and measurement time verification device
JP4812002B2 (en) * 2006-02-16 2011-11-09 セイコーインスツル株式会社 Recording apparatus, recording collection server, recording method, and recording collection method
US9064238B2 (en) * 2011-03-04 2015-06-23 Factify Method and apparatus for certification of facts
EP2733885A4 (en) * 2011-07-15 2015-06-17 Hitachi Ltd Determination method for cryptographic algorithm used for signature, verification server and program
CN104023044A (en) * 2014-01-01 2014-09-03 电子科技大学 Cloud-storage data lightweight-level public auditing method with privacy protection
CN105227537A (en) * 2014-06-16 2016-01-06 华为技术有限公司 Method for authenticating user identity, terminal and service end
CN105635070B (en) * 2014-11-05 2019-12-27 许田 Anti-counterfeiting method and system for digital file
JP6517582B2 (en) * 2015-05-21 2019-05-22 株式会社日立プラントコンストラクション Work safety support device, work safety support system, and work safety support method
JP2017204205A (en) * 2016-05-13 2017-11-16 佐々木 芳章 Clinical trial viewer system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000155524A (en) * 1998-11-19 2000-06-06 Mitsubishi Electric Corp Electronic seal stamping system
CN103593618A (en) * 2013-10-28 2014-02-19 北京实数科技有限公司 Verification method and system for adoptability of electronic data evidence
CN108022194A (en) * 2017-11-28 2018-05-11 深圳市华德安科技有限公司 Law-enforcing recorder and its data safety processing method, server and system
CN108737095A (en) * 2018-05-21 2018-11-02 南京森林警察学院 A kind of number now surveys record trust model system

Also Published As

Publication number Publication date
CN108737095A (en) 2018-11-02
CN108737095B (en) 2021-03-05
JP2020537411A (en) 2020-12-17
JP7026971B2 (en) 2022-03-01

Similar Documents

Publication Publication Date Title
US11574379B2 (en) System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
US10019773B2 (en) Authentication and validation of smartphone imagery
US11297500B2 (en) Authenticating digital evidence
US8190903B2 (en) Method and apparatus for verifying authenticity of digital data using trusted computing
US20190354694A1 (en) Verification of data captured by a consumer electronic device
US8312284B1 (en) Verifiable timestamping of data objects, and applications thereof
CN113886860A (en) Electronic data security system and method based on mobile terminal
US20180225428A1 (en) Secure recording and rendering of encrypted multimedia content
US10783278B2 (en) Signature generation device, signature verification device, signature generation method, and signature verification method
WO2019223310A1 (en) Digital crime scene investigation record trusted model system
JP2005284854A (en) Method and device for managing plant inspection and maintenance record and method and device for confirming plant inspection and maintenance record
TWI734259B (en) Electronic signature authentication device and method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18919549

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020520020

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18919549

Country of ref document: EP

Kind code of ref document: A1