CN109635099A - Case-involving electronic data evidence obtaining management system - Google Patents
Case-involving electronic data evidence obtaining management system Download PDFInfo
- Publication number
- CN109635099A CN109635099A CN201811570557.3A CN201811570557A CN109635099A CN 109635099 A CN109635099 A CN 109635099A CN 201811570557 A CN201811570557 A CN 201811570557A CN 109635099 A CN109635099 A CN 109635099A
- Authority
- CN
- China
- Prior art keywords
- data
- file
- suspect
- face
- electronic data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of case-involving electronic data evidence obtaining management systems, it is related to case-involving electronic evidence-collecting and technical field of face recognition, it includes suspect's management module, document management module, system module and face comparison retrieval module, suspect's management module includes inquiry, increase, modification and the deletion to data, and the document management module includes inquiry, increase, modification, deletion, upload and the encryption to data.The case-involving electronic data evidence obtaining management system, retrieval module is compared by setting suspect's management module, document management module, system module and face, and by volatile data acquisition, electronic data analysis, file filter, electronic data file encrypting and decrypting and face comparison retrieval, picture and video file data are obtained from suspect's mobile phone, centrally stored management, and it is able to carry out inquiry, filtering and analysis, pass through face comparative analysis, associated suspect's data information is inquired, provides more perfect judicial foundation for criminal investigation work.
Description
Technical field
The present invention relates to case-involving electronic evidence-collecting and technical field of face recognition, specially a kind of case-involving electronic data evidence obtaining pipe
Reason system.
Background technique
Smart phone is popularized, and mobile phone crime case is increasing, and smart phone electronic evidence-collecting technology also continues to develop, at
For important judicial foundation evidence collecting method, it is the effective means fought crime, plays an important role in criminal investigation work.
Electronic evidence-collecting system on the market can only save suspect's mobile phone call history, short message record and chat note at present
Record is unable to satisfy picture, the demand that video file is obtained, stores and analyzed, so that staff be caused to inquire associated suspicion
In the presence of very big difficulty when doubting personal data information, it cannot work for criminal investigation and more perfect judicial foundation is provided.
Summary of the invention
(1) the technical issues of solving
In view of the deficiencies of the prior art, the present invention provides a kind of case-involving electronic data evidence obtaining management system, mesh is solved
Preceding electronic evidence-collecting system on the market can only save suspect's mobile phone call history, short message record and chat record, be unable to satisfy
The problem of demand that picture, video file are obtained, store and analyzed.
(2) technical solution
To achieve the above objectives, the technical solution adopted by the present invention is that: a kind of case-involving electronic data evidence obtaining management system, institute
The system of stating includes suspect's management module, document management module, system module and face comparison retrieval module, suspect's pipe
Reason module includes inquiry, increase, modification and deletion to data, the document management module include inquiry to data, increase,
Modification is deleted, uploads and is encrypted, and the face comparison retrieval module includes that image uploads, feature extraction and suspect are consulted, institute
Stating system administration includes mechanism, user, role-security and log recording, and the network topology structure of the system is headend equipment pair
Suspect's equipment carries out electronic evidence-collecting, and the electronic data transfer that will acquire to evidence-obtaining system analyzed, and by gained picture and
The large capacities file such as video carries out trust instrument storage.
Suspect's management module in the system covers volatile data obtaining step, electronic data analytical procedure and text
Part filtration step, the volatile data obtaining step is to find evidence of crime from the file that suspect collects, according to crime
The memory cache matching retrieval record of suspect's mobile phone retrieves that whether there is or not occurrences, then retrieve retrieval record in disk whether there is or not
With item, then continue to retrieve when there is occurrence, final to export suspicion personal data, the electronic data analytical procedure stores file
Suspicion personal data in library carries out file type sorting, and carries out the evidence obtaining of pipe fitting information according to specific time, coordinate and IP, will
To data carry out electronic signature form deposit card or verifying, to obtain face database and suspect's database, the text
Part filtration step depends on operating system, file system and application program, and partial document encryption application is clashed by file structure
Pass through filter Driver on FSD with the operating system API in file application system, is filtered in above process by predefined data
Finally obtain association suspect's data directory.
Document management module in the system covers encryption and decryption step to electronic data file, the electron number
According to the encryption and decryption step of file since reading file, is intercepted using filtration drive and read file request and acquisition equipment
The IsUVolume attribute of object, by being provided with function, reading is asked when move media and legal move media are to be
It asks after being sent to lower layer's driving reading file data and two programs being decrypted to the data of reading in completing function, reads
The end of file is then done directly the request and reads the end of file when move media or legal move media are no.
The photo of upload is carried out face characteristic information comparative analysis face by the face comparison retrieval module in the system
Similarity face information is obtained after data bank, and finally inquires suspect's information with suspect's data bank information comparison.
Preferably, the development language of the system uses Java system, and the database in the system uses MySQL, and
And it goes to implement according to the existing Technical Architecture in U.S. sub- Cupressaceae side.
Preferably, when retrieval matches the data in suspect's mobile phone in the volatile data obtaining step, including
Data in the register, caching and memory of mobile phone are obtained.
Preferably, the content analyzed in the electronic data analytical procedure includes system information, the file information and long message,
It is that the attribute according to as M-A-C time, suffix name, logic size and physics size carried out in the file filter step
Filter.
It preferably, include to face musculus cutaneus texture, facial edge shadow, nose, eye in the face comparison retrieval module
The extraction of eyeball, mouth and skeletal structure information, and for face comparison retrieval.
(3) beneficial effect
The present invention provides a kind of case-involving electronic data evidence obtaining management systems, and compared with prior art, of the invention is beneficial
Effect is: the case-involving electronic data evidence obtaining management system, by the way that suspect's management module, document management module, system mould is arranged
Block and face compare retrieval module, and by volatile data acquisition, electronic data analysis, file filter, electronic data text
Part encrypting and decrypting and face comparison retrieval, acquisition picture and video file data from suspect's mobile phone, centrally stored management, and
It is able to carry out inquiry, filtering and analysis, by face comparative analysis, inquires associated suspect's data information, is criminal investigation work
More perfect judicial foundation is provided.
Detailed description of the invention
Fig. 1 is total system schematic diagram of the invention;
Fig. 2 is network topological system schematic diagram of the invention;
Fig. 3 is the flow diagram that volatile data of the invention obtains;
Fig. 4 is the flow diagram that electronic data of the invention is analyzed;
Fig. 5 is the flow diagram of file filter of the invention;
Fig. 6 is the flow diagram of electronic data file encrypting and decrypting of the invention;
Fig. 7 is the flow diagram of face comparison retrieval of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in figs. 1-7, the present invention provides a kind of technical solution: a kind of case-involving electronic data evidence obtaining management system, system
Retrieval module is compared including suspect's management module, document management module, system module and face, suspect's management module is responsible for
The management service of suspect's information, document management module then carry out encryption maintenance management, face comparison inspection to electronic evidence-collecting data
For rope module for inquiring the higher suspect's information of similarity, system management module is responsible for basic system function management, system
Development language use Java system, select Java system maximum advantage be its huge and perfect ecosystem,
Learning cost and technical risk be it is relatively low, select Java system can be provided for the Persisting exploitation of project and maintenance one it is steady
Growth curve, the database in system uses MySQL, and goes to implement according to the existing Technical Architecture in U.S. sub- Cupressaceae side,
MySQL database is that a variety of storage engines can the different business of flexible adaptation with respect to Oracle with SQLServer database advantage
Scene and distributed type assemblies have mature scheme for realizing and can integrate well with Java, and suspect's management module includes
To the inquiry of data, increase, modification and deletion, document management module includes inquiry, increase, modification, deletion, the upload to data
And encryption, face comparison retrieval module include that image uploads, feature extraction and suspect are consulted, system administration includes mechanism, uses
Family, role-security and log recording, the network topology structure of system are that headend equipment carries out electronic evidence-collecting to suspect's equipment, will
The electronic data transfer of acquisition to evidence-obtaining system is analyzed, and the large capacities file such as gained picture and video is carried out trustship text
Part storage.
Suspect's management module in system covers volatile data obtaining step, electronic data analytical procedure and file mistake
Step is filtered, volatile data obtaining step is to find evidence of crime from the file that suspect collects, according to suspicion of crime manpower
The memory cache matching retrieval record of machine retrieves that whether there is or not occurrences, then retrieves retrieval record in disk whether there is or not occurrence, when
Then continue to retrieve when having occurrence, final to export suspicion personal data, retrieval matching suspicion of crime in volatile data obtaining step
When data in manpower machine, obtained including the data in register, caching and the memory to mobile phone, in electronic data evidence obtaining
In the process, evidence of crime is mainly found from the file of suspect's mobile phone, however some important evidence of crime are frequently found in
Suspect collects neat register, and in caching or memory, these evidences include the user list currently logged in, the time of entire file
And the date, currently running process list, when the list of sockets of front opening, the application program monitored on open socket
It is often referenced as volatile data Deng, these data, these data are just all lost invisible after system is closed, and this system is logical
It crosses the acquisition to volatile data and then avoids this problem, electronic data analytical procedure is by the suspicion number in file repository
The evidence obtaining of pipe fitting information is carried out according to progress file type sorting, and according to specific time, coordinate and IP, obtained data are subjected to electricity
Sub- signature form deposits card or verifying, to obtain face database and suspect's database, divides in electronic data analytical procedure
The content of analysis includes system information, the file information and long message, and electronic data analysis is the cores such as electronic data evidence obtaining and key,
Analysis covers all forensic technologies, is to best embody the link of evidence obtaining personnel evidence obtaining ability, and different types of case can root
Different analyses is carried out according to situation, for example this kind of key factor such as time, coordinate and IP utilized is different, file filter step
Dependent on operating system, file system and application program, partial document encryption application passes through file structure head-on collision and file application
Operating system API in system passes through filter Driver on FSD, finally obtains pass by predefined data filtering in above process
Join suspect's data directory, be in file filter step according to M-A-C time, suffix name, logic size and physics size in this way
Attribute be filtered, file is filtered to be more advantageous to.
Document management module in system covers encryption and decryption step to electronic data file, electronic data file
Since encryption and decryption step intercept using filtration drive reading file and read file request and obtain device object
IsUVolume attribute, by being provided with function, read request is sent to when move media and legal move media are to be
After lower layer's driving reads file data and two programs are decrypted to the data of reading in completing function, file knot is read
Beam is then done directly the request and reads the end of file, by using electricity when move media or legal move media are no
The encryption and decryption step of subdata file have also ensured the safety of electronic data while realizing electronic data evidence obtaining process
Property, important personal information and case information leakage are prevented, by the encrypt and decrypt operation to file, guarantees entire Business Stream
The safety of journey, include in face comparison retrieval module to face musculus cutaneus texture, facial edge shadow, nose, eyes, mouth and
The extraction of skeletal structure information, and for face comparison retrieval, people is captured to face face detection by face retrieval function
Face regional image information, the feature based on human face structure, the face image data in rapid comparison suspect library are found similar
High face information is spent, corresponding suspect's case data are transferred, improves the efficiency of criminal investigation work.
The photo of upload is carried out face characteristic information comparative analysis face data by the face comparison retrieval module in system
Similarity face information is obtained after library, and finally inquires suspect's information with suspect's data bank information comparison.
Above specific embodiment has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects
Illustrate, it should be understood that be not intended to restrict the invention the above is only a specific embodiment of the invention, it is all at this
Within the spirit and principle of invention, any modification, equivalent substitution, improvement and etc. done should be included in protection model of the invention
Within enclosing.
Claims (5)
1. a kind of case-involving electronic data evidence obtaining management system, it is characterised in that: the system comprises suspect's management modules, file
Management module, system module and face compare retrieval module, suspect's management module include inquiry to data, increase,
Modification and deletion, the document management module includes inquiry, increase, modification, deletion, upload and the encryption to data, the people
Face comparison retrieval module includes that image uploads, feature extraction and suspect are consulted, and the system administration includes mechanism, user, angle
Color permission and log recording, the network topology structure of the system are that headend equipment carries out electronic evidence-collecting to suspect's equipment, will
The electronic data transfer of acquisition to evidence-obtaining system is analyzed, and the large capacities file such as gained picture and video is carried out trustship text
Part storage;
Suspect's management module in the system covers volatile data obtaining step, electronic data analytical procedure and file mistake
Step is filtered, the volatile data obtaining step is to find evidence of crime from the file that suspect collects, according to suspicion of crime
The memory cache matching retrieval record of manpower machine retrieves that whether there is or not occurrences, then whether there is or not matchings for the retrieval record for retrieving in disk
, then continue to retrieve when there is occurrence, final to export suspicion personal data, the electronic data analytical procedure is by file repository
Interior suspicion personal data carries out file type sorting, and carries out the evidence obtaining of pipe fitting information according to specific time, coordinate and IP, will obtain
Data carry out electronic signature form deposit card or verifying, to obtain face database and suspect's database, the file
Filtration step depend on operating system, file system and application program, partial document encryption application by file structure head-on collision and
Operating system API in file application system passes through filter Driver on FSD, in above process most by predefined data filtering
Association suspect's data directory is obtained eventually;
Document management module in the system covers encryption and decryption step to electronic data file, the electronic data text
Since the encryption of part and decryption step intercept using filtration drive reading file and read file request and acquisition device object
IsUVolume attribute, by being provided with function, read request is sent out when move media and legal move media are to be
It is driven to lower layer after reading file data and two programs being decrypted to the data of reading in completing function, reads file
Terminate, when move media or legal move media are no, are then done directly the request and read the end of file;
The photo of upload is carried out face characteristic information comparative analysis face data by the face comparison retrieval module in the system
Similarity face information is obtained after library, and finally inquires suspect's information with suspect's data bank information comparison.
2. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the exploitation language of the system
Speech uses Java system, and the database in the system uses MySQL, and goes according to the existing Technical Architecture in U.S. sub- Cupressaceae side
Implement.
3. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the volatile data obtains
When taking the data in step in retrieval matching suspect's mobile phone, including the number in register, caching and the memory to mobile phone
According to being obtained.
4. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the electronic data analysis
The content analyzed in step includes system information, the file information and long message, when being according to M-A-C in the file filter step
Between, attribute as suffix name, logic size and physics size is filtered.
5. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the face comparison retrieval
Include the extraction to face musculus cutaneus texture, facial edge shadow, nose, eyes, mouth and skeletal structure information in module, is used in combination
It compares and retrieves in face.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811570557.3A CN109635099A (en) | 2018-12-21 | 2018-12-21 | Case-involving electronic data evidence obtaining management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811570557.3A CN109635099A (en) | 2018-12-21 | 2018-12-21 | Case-involving electronic data evidence obtaining management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109635099A true CN109635099A (en) | 2019-04-16 |
Family
ID=66076450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811570557.3A Pending CN109635099A (en) | 2018-12-21 | 2018-12-21 | Case-involving electronic data evidence obtaining management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109635099A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110427742A (en) * | 2019-08-06 | 2019-11-08 | 北京如优教育科技有限公司 | Authentication service content of platform saves system, method and storage medium |
CN111797140A (en) * | 2020-07-06 | 2020-10-20 | 上海弘连网络科技有限公司 | Abnormal behavior analysis method based on electronic data of intelligent terminal |
CN112328652A (en) * | 2020-10-27 | 2021-02-05 | 福建中锐电子科技有限公司 | Method for mining virus-related information based on mobile phone evidence-obtaining electronic data |
CN115859380A (en) * | 2023-02-28 | 2023-03-28 | 深圳市大恒数据安全科技有限责任公司 | Electronic data solid certificate correlation method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268528A (en) * | 2013-04-23 | 2013-08-28 | 四川天翼网络服务有限公司 | Intelligent skynet video resource analyzing system |
CN106998444A (en) * | 2017-02-14 | 2017-08-01 | 北京中科天云科技有限公司 | A kind of big data face monitoring system and device |
CN107870988A (en) * | 2017-10-17 | 2018-04-03 | 厦门市美亚柏科信息股份有限公司 | A kind of information verification method, terminal device and storage medium |
-
2018
- 2018-12-21 CN CN201811570557.3A patent/CN109635099A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268528A (en) * | 2013-04-23 | 2013-08-28 | 四川天翼网络服务有限公司 | Intelligent skynet video resource analyzing system |
CN106998444A (en) * | 2017-02-14 | 2017-08-01 | 北京中科天云科技有限公司 | A kind of big data face monitoring system and device |
CN107870988A (en) * | 2017-10-17 | 2018-04-03 | 厦门市美亚柏科信息股份有限公司 | A kind of information verification method, terminal device and storage medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110427742A (en) * | 2019-08-06 | 2019-11-08 | 北京如优教育科技有限公司 | Authentication service content of platform saves system, method and storage medium |
CN111797140A (en) * | 2020-07-06 | 2020-10-20 | 上海弘连网络科技有限公司 | Abnormal behavior analysis method based on electronic data of intelligent terminal |
CN112328652A (en) * | 2020-10-27 | 2021-02-05 | 福建中锐电子科技有限公司 | Method for mining virus-related information based on mobile phone evidence-obtaining electronic data |
CN115859380A (en) * | 2023-02-28 | 2023-03-28 | 深圳市大恒数据安全科技有限责任公司 | Electronic data solid certificate correlation method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109635099A (en) | Case-involving electronic data evidence obtaining management system | |
CN110414203B (en) | Internet medical identity authentication method based on block chain technology | |
CN105138709B (en) | Remote evidence taking system based on physical memory analysis | |
CN104867217A (en) | Community monitoring and management system | |
CN1975761A (en) | Visual frequency data excavating system and method for automatic identifying human figure | |
CN108711208A (en) | A kind of big data access control system and its management method | |
KR100932537B1 (en) | Forensic Evidence Analysis System and Method Using Image Filter | |
CN205354056U (en) | Law enforcement record appearance with face identification | |
US10030986B2 (en) | Incident response analytic maps | |
Abeykoon et al. | A forensic investigation of the robot operating system | |
Khan et al. | Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction | |
Khanuja et al. | Role of metadata in forensic analysis of database attacks | |
CN1655505A (en) | Bank cashier safety system and method | |
Didik et al. | Analysis and evaluation digital forensic investigation framework using iso 27037: 2012 | |
CN107729562A (en) | The video data digging system and method for portrait automatic identification | |
CN107315974A (en) | A kind of image-forming media protection device based on Internet of Things | |
CN106780811A (en) | A kind of attendance information management system based on iris recognition identification certification | |
CN109101828A (en) | A kind of network is made house calls platform customer information stocking system | |
Zhang et al. | Research on the key technology of secure computer forensics | |
KR101085509B1 (en) | Computer screen scanning system and method for digital forensics | |
CN104282056A (en) | Stamp safe keeping and using system | |
CN112863652A (en) | Medical image data storage system | |
GB2598130A (en) | Controlled data access | |
WO2021058936A2 (en) | Imagery acquisition method and apparatus | |
Yang | Research on the Application of Computer Network in my country’s Crime Investigation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |