CN109635099A - Case-involving electronic data evidence obtaining management system - Google Patents

Case-involving electronic data evidence obtaining management system Download PDF

Info

Publication number
CN109635099A
CN109635099A CN201811570557.3A CN201811570557A CN109635099A CN 109635099 A CN109635099 A CN 109635099A CN 201811570557 A CN201811570557 A CN 201811570557A CN 109635099 A CN109635099 A CN 109635099A
Authority
CN
China
Prior art keywords
data
file
suspect
face
electronic data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811570557.3A
Other languages
Chinese (zh)
Inventor
周长彦
肖云
石绍玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Huaxia Hi Tech Touchplus Information Corp
Original Assignee
Shandong Huaxia Hi Tech Touchplus Information Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Huaxia Hi Tech Touchplus Information Corp filed Critical Shandong Huaxia Hi Tech Touchplus Information Corp
Priority to CN201811570557.3A priority Critical patent/CN109635099A/en
Publication of CN109635099A publication Critical patent/CN109635099A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of case-involving electronic data evidence obtaining management systems, it is related to case-involving electronic evidence-collecting and technical field of face recognition, it includes suspect's management module, document management module, system module and face comparison retrieval module, suspect's management module includes inquiry, increase, modification and the deletion to data, and the document management module includes inquiry, increase, modification, deletion, upload and the encryption to data.The case-involving electronic data evidence obtaining management system, retrieval module is compared by setting suspect's management module, document management module, system module and face, and by volatile data acquisition, electronic data analysis, file filter, electronic data file encrypting and decrypting and face comparison retrieval, picture and video file data are obtained from suspect's mobile phone, centrally stored management, and it is able to carry out inquiry, filtering and analysis, pass through face comparative analysis, associated suspect's data information is inquired, provides more perfect judicial foundation for criminal investigation work.

Description

Case-involving electronic data evidence obtaining management system
Technical field
The present invention relates to case-involving electronic evidence-collecting and technical field of face recognition, specially a kind of case-involving electronic data evidence obtaining pipe Reason system.
Background technique
Smart phone is popularized, and mobile phone crime case is increasing, and smart phone electronic evidence-collecting technology also continues to develop, at For important judicial foundation evidence collecting method, it is the effective means fought crime, plays an important role in criminal investigation work.
Electronic evidence-collecting system on the market can only save suspect's mobile phone call history, short message record and chat note at present Record is unable to satisfy picture, the demand that video file is obtained, stores and analyzed, so that staff be caused to inquire associated suspicion In the presence of very big difficulty when doubting personal data information, it cannot work for criminal investigation and more perfect judicial foundation is provided.
Summary of the invention
(1) the technical issues of solving
In view of the deficiencies of the prior art, the present invention provides a kind of case-involving electronic data evidence obtaining management system, mesh is solved Preceding electronic evidence-collecting system on the market can only save suspect's mobile phone call history, short message record and chat record, be unable to satisfy The problem of demand that picture, video file are obtained, store and analyzed.
(2) technical solution
To achieve the above objectives, the technical solution adopted by the present invention is that: a kind of case-involving electronic data evidence obtaining management system, institute The system of stating includes suspect's management module, document management module, system module and face comparison retrieval module, suspect's pipe Reason module includes inquiry, increase, modification and deletion to data, the document management module include inquiry to data, increase, Modification is deleted, uploads and is encrypted, and the face comparison retrieval module includes that image uploads, feature extraction and suspect are consulted, institute Stating system administration includes mechanism, user, role-security and log recording, and the network topology structure of the system is headend equipment pair Suspect's equipment carries out electronic evidence-collecting, and the electronic data transfer that will acquire to evidence-obtaining system analyzed, and by gained picture and The large capacities file such as video carries out trust instrument storage.
Suspect's management module in the system covers volatile data obtaining step, electronic data analytical procedure and text Part filtration step, the volatile data obtaining step is to find evidence of crime from the file that suspect collects, according to crime The memory cache matching retrieval record of suspect's mobile phone retrieves that whether there is or not occurrences, then retrieve retrieval record in disk whether there is or not With item, then continue to retrieve when there is occurrence, final to export suspicion personal data, the electronic data analytical procedure stores file Suspicion personal data in library carries out file type sorting, and carries out the evidence obtaining of pipe fitting information according to specific time, coordinate and IP, will To data carry out electronic signature form deposit card or verifying, to obtain face database and suspect's database, the text Part filtration step depends on operating system, file system and application program, and partial document encryption application is clashed by file structure Pass through filter Driver on FSD with the operating system API in file application system, is filtered in above process by predefined data Finally obtain association suspect's data directory.
Document management module in the system covers encryption and decryption step to electronic data file, the electron number According to the encryption and decryption step of file since reading file, is intercepted using filtration drive and read file request and acquisition equipment The IsUVolume attribute of object, by being provided with function, reading is asked when move media and legal move media are to be It asks after being sent to lower layer's driving reading file data and two programs being decrypted to the data of reading in completing function, reads The end of file is then done directly the request and reads the end of file when move media or legal move media are no.
The photo of upload is carried out face characteristic information comparative analysis face by the face comparison retrieval module in the system Similarity face information is obtained after data bank, and finally inquires suspect's information with suspect's data bank information comparison.
Preferably, the development language of the system uses Java system, and the database in the system uses MySQL, and And it goes to implement according to the existing Technical Architecture in U.S. sub- Cupressaceae side.
Preferably, when retrieval matches the data in suspect's mobile phone in the volatile data obtaining step, including Data in the register, caching and memory of mobile phone are obtained.
Preferably, the content analyzed in the electronic data analytical procedure includes system information, the file information and long message, It is that the attribute according to as M-A-C time, suffix name, logic size and physics size carried out in the file filter step Filter.
It preferably, include to face musculus cutaneus texture, facial edge shadow, nose, eye in the face comparison retrieval module The extraction of eyeball, mouth and skeletal structure information, and for face comparison retrieval.
(3) beneficial effect
The present invention provides a kind of case-involving electronic data evidence obtaining management systems, and compared with prior art, of the invention is beneficial Effect is: the case-involving electronic data evidence obtaining management system, by the way that suspect's management module, document management module, system mould is arranged Block and face compare retrieval module, and by volatile data acquisition, electronic data analysis, file filter, electronic data text Part encrypting and decrypting and face comparison retrieval, acquisition picture and video file data from suspect's mobile phone, centrally stored management, and It is able to carry out inquiry, filtering and analysis, by face comparative analysis, inquires associated suspect's data information, is criminal investigation work More perfect judicial foundation is provided.
Detailed description of the invention
Fig. 1 is total system schematic diagram of the invention;
Fig. 2 is network topological system schematic diagram of the invention;
Fig. 3 is the flow diagram that volatile data of the invention obtains;
Fig. 4 is the flow diagram that electronic data of the invention is analyzed;
Fig. 5 is the flow diagram of file filter of the invention;
Fig. 6 is the flow diagram of electronic data file encrypting and decrypting of the invention;
Fig. 7 is the flow diagram of face comparison retrieval of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in figs. 1-7, the present invention provides a kind of technical solution: a kind of case-involving electronic data evidence obtaining management system, system Retrieval module is compared including suspect's management module, document management module, system module and face, suspect's management module is responsible for The management service of suspect's information, document management module then carry out encryption maintenance management, face comparison inspection to electronic evidence-collecting data For rope module for inquiring the higher suspect's information of similarity, system management module is responsible for basic system function management, system Development language use Java system, select Java system maximum advantage be its huge and perfect ecosystem, Learning cost and technical risk be it is relatively low, select Java system can be provided for the Persisting exploitation of project and maintenance one it is steady Growth curve, the database in system uses MySQL, and goes to implement according to the existing Technical Architecture in U.S. sub- Cupressaceae side, MySQL database is that a variety of storage engines can the different business of flexible adaptation with respect to Oracle with SQLServer database advantage Scene and distributed type assemblies have mature scheme for realizing and can integrate well with Java, and suspect's management module includes To the inquiry of data, increase, modification and deletion, document management module includes inquiry, increase, modification, deletion, the upload to data And encryption, face comparison retrieval module include that image uploads, feature extraction and suspect are consulted, system administration includes mechanism, uses Family, role-security and log recording, the network topology structure of system are that headend equipment carries out electronic evidence-collecting to suspect's equipment, will The electronic data transfer of acquisition to evidence-obtaining system is analyzed, and the large capacities file such as gained picture and video is carried out trustship text Part storage.
Suspect's management module in system covers volatile data obtaining step, electronic data analytical procedure and file mistake Step is filtered, volatile data obtaining step is to find evidence of crime from the file that suspect collects, according to suspicion of crime manpower The memory cache matching retrieval record of machine retrieves that whether there is or not occurrences, then retrieves retrieval record in disk whether there is or not occurrence, when Then continue to retrieve when having occurrence, final to export suspicion personal data, retrieval matching suspicion of crime in volatile data obtaining step When data in manpower machine, obtained including the data in register, caching and the memory to mobile phone, in electronic data evidence obtaining In the process, evidence of crime is mainly found from the file of suspect's mobile phone, however some important evidence of crime are frequently found in Suspect collects neat register, and in caching or memory, these evidences include the user list currently logged in, the time of entire file And the date, currently running process list, when the list of sockets of front opening, the application program monitored on open socket It is often referenced as volatile data Deng, these data, these data are just all lost invisible after system is closed, and this system is logical It crosses the acquisition to volatile data and then avoids this problem, electronic data analytical procedure is by the suspicion number in file repository The evidence obtaining of pipe fitting information is carried out according to progress file type sorting, and according to specific time, coordinate and IP, obtained data are subjected to electricity Sub- signature form deposits card or verifying, to obtain face database and suspect's database, divides in electronic data analytical procedure The content of analysis includes system information, the file information and long message, and electronic data analysis is the cores such as electronic data evidence obtaining and key, Analysis covers all forensic technologies, is to best embody the link of evidence obtaining personnel evidence obtaining ability, and different types of case can root Different analyses is carried out according to situation, for example this kind of key factor such as time, coordinate and IP utilized is different, file filter step Dependent on operating system, file system and application program, partial document encryption application passes through file structure head-on collision and file application Operating system API in system passes through filter Driver on FSD, finally obtains pass by predefined data filtering in above process Join suspect's data directory, be in file filter step according to M-A-C time, suffix name, logic size and physics size in this way Attribute be filtered, file is filtered to be more advantageous to.
Document management module in system covers encryption and decryption step to electronic data file, electronic data file Since encryption and decryption step intercept using filtration drive reading file and read file request and obtain device object IsUVolume attribute, by being provided with function, read request is sent to when move media and legal move media are to be After lower layer's driving reads file data and two programs are decrypted to the data of reading in completing function, file knot is read Beam is then done directly the request and reads the end of file, by using electricity when move media or legal move media are no The encryption and decryption step of subdata file have also ensured the safety of electronic data while realizing electronic data evidence obtaining process Property, important personal information and case information leakage are prevented, by the encrypt and decrypt operation to file, guarantees entire Business Stream The safety of journey, include in face comparison retrieval module to face musculus cutaneus texture, facial edge shadow, nose, eyes, mouth and The extraction of skeletal structure information, and for face comparison retrieval, people is captured to face face detection by face retrieval function Face regional image information, the feature based on human face structure, the face image data in rapid comparison suspect library are found similar High face information is spent, corresponding suspect's case data are transferred, improves the efficiency of criminal investigation work.
The photo of upload is carried out face characteristic information comparative analysis face data by the face comparison retrieval module in system Similarity face information is obtained after library, and finally inquires suspect's information with suspect's data bank information comparison.
Above specific embodiment has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects Illustrate, it should be understood that be not intended to restrict the invention the above is only a specific embodiment of the invention, it is all at this Within the spirit and principle of invention, any modification, equivalent substitution, improvement and etc. done should be included in protection model of the invention Within enclosing.

Claims (5)

1. a kind of case-involving electronic data evidence obtaining management system, it is characterised in that: the system comprises suspect's management modules, file Management module, system module and face compare retrieval module, suspect's management module include inquiry to data, increase, Modification and deletion, the document management module includes inquiry, increase, modification, deletion, upload and the encryption to data, the people Face comparison retrieval module includes that image uploads, feature extraction and suspect are consulted, and the system administration includes mechanism, user, angle Color permission and log recording, the network topology structure of the system are that headend equipment carries out electronic evidence-collecting to suspect's equipment, will The electronic data transfer of acquisition to evidence-obtaining system is analyzed, and the large capacities file such as gained picture and video is carried out trustship text Part storage;
Suspect's management module in the system covers volatile data obtaining step, electronic data analytical procedure and file mistake Step is filtered, the volatile data obtaining step is to find evidence of crime from the file that suspect collects, according to suspicion of crime The memory cache matching retrieval record of manpower machine retrieves that whether there is or not occurrences, then whether there is or not matchings for the retrieval record for retrieving in disk , then continue to retrieve when there is occurrence, final to export suspicion personal data, the electronic data analytical procedure is by file repository Interior suspicion personal data carries out file type sorting, and carries out the evidence obtaining of pipe fitting information according to specific time, coordinate and IP, will obtain Data carry out electronic signature form deposit card or verifying, to obtain face database and suspect's database, the file Filtration step depend on operating system, file system and application program, partial document encryption application by file structure head-on collision and Operating system API in file application system passes through filter Driver on FSD, in above process most by predefined data filtering Association suspect's data directory is obtained eventually;
Document management module in the system covers encryption and decryption step to electronic data file, the electronic data text Since the encryption of part and decryption step intercept using filtration drive reading file and read file request and acquisition device object IsUVolume attribute, by being provided with function, read request is sent out when move media and legal move media are to be It is driven to lower layer after reading file data and two programs being decrypted to the data of reading in completing function, reads file Terminate, when move media or legal move media are no, are then done directly the request and read the end of file;
The photo of upload is carried out face characteristic information comparative analysis face data by the face comparison retrieval module in the system Similarity face information is obtained after library, and finally inquires suspect's information with suspect's data bank information comparison.
2. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the exploitation language of the system Speech uses Java system, and the database in the system uses MySQL, and goes according to the existing Technical Architecture in U.S. sub- Cupressaceae side Implement.
3. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the volatile data obtains When taking the data in step in retrieval matching suspect's mobile phone, including the number in register, caching and the memory to mobile phone According to being obtained.
4. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the electronic data analysis The content analyzed in step includes system information, the file information and long message, when being according to M-A-C in the file filter step Between, attribute as suffix name, logic size and physics size is filtered.
5. case-involving electronic data evidence obtaining management system according to claim 1, it is characterised in that: the face comparison retrieval Include the extraction to face musculus cutaneus texture, facial edge shadow, nose, eyes, mouth and skeletal structure information in module, is used in combination It compares and retrieves in face.
CN201811570557.3A 2018-12-21 2018-12-21 Case-involving electronic data evidence obtaining management system Pending CN109635099A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811570557.3A CN109635099A (en) 2018-12-21 2018-12-21 Case-involving electronic data evidence obtaining management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811570557.3A CN109635099A (en) 2018-12-21 2018-12-21 Case-involving electronic data evidence obtaining management system

Publications (1)

Publication Number Publication Date
CN109635099A true CN109635099A (en) 2019-04-16

Family

ID=66076450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811570557.3A Pending CN109635099A (en) 2018-12-21 2018-12-21 Case-involving electronic data evidence obtaining management system

Country Status (1)

Country Link
CN (1) CN109635099A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110427742A (en) * 2019-08-06 2019-11-08 北京如优教育科技有限公司 Authentication service content of platform saves system, method and storage medium
CN111797140A (en) * 2020-07-06 2020-10-20 上海弘连网络科技有限公司 Abnormal behavior analysis method based on electronic data of intelligent terminal
CN112328652A (en) * 2020-10-27 2021-02-05 福建中锐电子科技有限公司 Method for mining virus-related information based on mobile phone evidence-obtaining electronic data
CN115859380A (en) * 2023-02-28 2023-03-28 深圳市大恒数据安全科技有限责任公司 Electronic data solid certificate correlation method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268528A (en) * 2013-04-23 2013-08-28 四川天翼网络服务有限公司 Intelligent skynet video resource analyzing system
CN106998444A (en) * 2017-02-14 2017-08-01 北京中科天云科技有限公司 A kind of big data face monitoring system and device
CN107870988A (en) * 2017-10-17 2018-04-03 厦门市美亚柏科信息股份有限公司 A kind of information verification method, terminal device and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268528A (en) * 2013-04-23 2013-08-28 四川天翼网络服务有限公司 Intelligent skynet video resource analyzing system
CN106998444A (en) * 2017-02-14 2017-08-01 北京中科天云科技有限公司 A kind of big data face monitoring system and device
CN107870988A (en) * 2017-10-17 2018-04-03 厦门市美亚柏科信息股份有限公司 A kind of information verification method, terminal device and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110427742A (en) * 2019-08-06 2019-11-08 北京如优教育科技有限公司 Authentication service content of platform saves system, method and storage medium
CN111797140A (en) * 2020-07-06 2020-10-20 上海弘连网络科技有限公司 Abnormal behavior analysis method based on electronic data of intelligent terminal
CN112328652A (en) * 2020-10-27 2021-02-05 福建中锐电子科技有限公司 Method for mining virus-related information based on mobile phone evidence-obtaining electronic data
CN115859380A (en) * 2023-02-28 2023-03-28 深圳市大恒数据安全科技有限责任公司 Electronic data solid certificate correlation method

Similar Documents

Publication Publication Date Title
CN109635099A (en) Case-involving electronic data evidence obtaining management system
CN110414203B (en) Internet medical identity authentication method based on block chain technology
CN105138709B (en) Remote evidence taking system based on physical memory analysis
CN104867217A (en) Community monitoring and management system
CN1975761A (en) Visual frequency data excavating system and method for automatic identifying human figure
CN108711208A (en) A kind of big data access control system and its management method
KR100932537B1 (en) Forensic Evidence Analysis System and Method Using Image Filter
CN205354056U (en) Law enforcement record appearance with face identification
US10030986B2 (en) Incident response analytic maps
Abeykoon et al. A forensic investigation of the robot operating system
Khan et al. Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction
Khanuja et al. Role of metadata in forensic analysis of database attacks
CN1655505A (en) Bank cashier safety system and method
Didik et al. Analysis and evaluation digital forensic investigation framework using iso 27037: 2012
CN107729562A (en) The video data digging system and method for portrait automatic identification
CN107315974A (en) A kind of image-forming media protection device based on Internet of Things
CN106780811A (en) A kind of attendance information management system based on iris recognition identification certification
CN109101828A (en) A kind of network is made house calls platform customer information stocking system
Zhang et al. Research on the key technology of secure computer forensics
KR101085509B1 (en) Computer screen scanning system and method for digital forensics
CN104282056A (en) Stamp safe keeping and using system
CN112863652A (en) Medical image data storage system
GB2598130A (en) Controlled data access
WO2021058936A2 (en) Imagery acquisition method and apparatus
Yang Research on the Application of Computer Network in my country’s Crime Investigation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination