WO2019223310A1 - 一种数字现勘记录可信模型*** - Google Patents

一种数字现勘记录可信模型*** Download PDF

Info

Publication number
WO2019223310A1
WO2019223310A1 PCT/CN2018/123778 CN2018123778W WO2019223310A1 WO 2019223310 A1 WO2019223310 A1 WO 2019223310A1 CN 2018123778 W CN2018123778 W CN 2018123778W WO 2019223310 A1 WO2019223310 A1 WO 2019223310A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital
trusted
survey
sign
server
Prior art date
Application number
PCT/CN2018/123778
Other languages
English (en)
French (fr)
Inventor
杨一涛
李云
王新猛
吴育宝
Original Assignee
南京森林警察学院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南京森林警察学院 filed Critical 南京森林警察学院
Priority to JP2020520020A priority Critical patent/JP7026971B2/ja
Publication of WO2019223310A1 publication Critical patent/WO2019223310A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the invention belongs to the technical field of protecting data integrity in digital data processing, and particularly relates to a trusted model system for digital field survey records.
  • the current survey record is a collection of documents and attachments formed after the site survey is completed. It mainly includes: field transcripts, photos, videos, audio, traces, various physical evidence, electronic data evidence, and drawings. Among these current survey records, photos, videos, and audio have been digitally collected.
  • the current survey records in the form of transcripts, drawings, etc. are manually entered into the on-site survey information system by the surveyors to realize digitization.
  • the invention with the application number CN201710140360.5 and the name "a method and system for fixing electronic evidence on the spot” discloses a method and system for fixing electronic evidence on the spot.
  • the method includes obtaining user login information, selecting user rights, and starting recording user operations; collecting on-site electronic evidence; stopping recording of user operations, and generating a recording result of a user operation log; performing integrity verification on the obtained electronic evidence; Generate electronic reports of electronic evidence, and add the integrity verification results of electronic evidence to electronic reports; upload electronic files, the above through the user login module, evidence collection module, integrity verification result module, report generation module and upload module All modules are implemented together.
  • the present invention proposes a digital reconnaissance record trusted model system.
  • the digital reconnaissance records can be trusted Operation to ensure that all digital survey information from the beginning of the record to the submission of the court, the recorded content, the person who recorded, the location, the recording time and other digital information is complete and has not been tampered with.
  • DR ⁇ dr i
  • Ci The information of DR is stored in Ci
  • TR is a set of trusted digital reconnaissance records
  • TR ⁇ tr i
  • tr i dr i + Sign (dr i ) ⁇
  • Sign is a credible operation
  • the date and time DT are input to the server S, GPS coordinate information of the current location C i input to C i.
  • the above-mentioned on-site survey terminal equipment C i is bound to the identity of the investigator using the equipment, and is dedicated to a specific person.
  • the above-mentioned survey terminal device C i is equipped with a high-definition camera, a GPS sensor, Wi-fi and 4G signal access capabilities.
  • the aforementioned cryptographic algorithm set includes an asymmetric key pair generation algorithm, a symmetric key algorithm, a signature algorithm, and a hash algorithm.
  • the invention further proposes a method for performing credible operation by using the above-mentioned digital reconnaissance record trusted model system, which specifically includes the following steps:
  • PK s is stored in the digital certificate, recorded as Cert s .
  • SK s applies the AES algorithm (AES, Advanced Encryption Standard) and strong encryption. The key is stored locally on server S;
  • the server issues a certificate for the surveying terminal equipment and sends the private key to the terminal in an encrypted manner. All the surveying terminal equipment and the public key of the server are stored on the server and Publicly accessible
  • Site survey terminal equipment C i collects site survey data dr n through the equipment
  • the survey terminal device C i obtains the geographic location coordinates of the survey data collected through its own GPS sensor, and records it as G n ;
  • the server returns the current time dt n to the current survey terminal device, and adds a digital signature to ensure the credibility of the time.
  • the field survey terminal equipment C i verifies the credibility of the time, and performs credible processing on the field survey data dr n as follows to obtain the credible field survey data tr n :
  • the above-described registration process comprises: i inspect the site terminal device C transmits a registration request to the server S i and Key, which is the password holder is provided its own terminal i, the server generates the key pair S i is C E and D are the encryption and decryption functions of the symmetric encryption algorithm AES, Sign uses the asymmetric cryptographic algorithm DSA (Digital Signature Algorithm) for signing, and H is the hash function of the SHA1 (Secure Hash Algorithm) algorithm.
  • DSA Digital Signature Algorithm
  • H is the hash function of the SHA1 (Secure Hash Algorithm) algorithm.
  • the survey data described in step 3 of the signature process may be text, pictures, audio, and video.
  • the process of verifying the trusted spot survey data tr n is as follows:
  • dt n Validate (PK s , Sign (SK s , dt n ))
  • the present invention has the following beneficial technical effects:
  • a digital record generated during a crime scene investigation is credibly processed to generate a credible current investigation digital record.
  • the record contains the current investigation data, the collection place, the collection time, and the person's information. information.
  • the trusted record uses the terminal's private key to sign the record, and the person who collected the record saves the record.
  • the credibility of the record is reflected in tamper resistance and non-repudiation, because the terminal is dedicated and the digital signature ensures that the data is collected
  • the terminal owner cannot deny which terminal.
  • Figure 1 is a structural diagram of a trusted model of digital survey records.
  • FIG. 2 is a flowchart of terminal registration.
  • Figure 3 is a flow chart of the credibility verification of the survey data.
  • FIG. 1 depicts the structure of a trusted model.
  • DR ⁇ dr i
  • PK s is stored in the digital certificate, recorded as Cert s .
  • SKs uses the AES algorithm and a strong key stored locally on the server.
  • FIG. 2 is a flowchart of terminal registration.
  • the terminal equipment C i is the hand-held device of the reconnaissance personnel.
  • the equipment is equipped with high-definition cameras, GPS sensors, Wi-fi and 4G signal access capabilities, and input functions.
  • the identities of one investigator are bound one by one, and they are used exclusively by one person. This registration process needs to be completed before using the terminal device for the first time.
  • Key i is a password set by the holder of terminal i.
  • the purpose is to protect the security of the private key.
  • E and D are the encryption and decryption functions of the symmetric encryption algorithm AES in cryptography, Sign uses the asymmetric cryptography algorithm DSA for signature, and H is the hash function of the SHA1 algorithm.
  • the purpose of this step is to let the server issue a certificate for the terminal and send the private key to the terminal in an encrypted manner. All public keys of the terminal and server are kept on the server and can be accessed publicly.
  • the terminal C i collects the current survey data dr n through the equipment, and the data can be text, pictures, audio, and video;
  • the terminal C i obtains the geographic location coordinates of the collected survey data through its own GPS sensor, and records it as G n ;
  • Timestamp n dt n + Sign (SK s , dt n )
  • the terminal Ci verifies the credibility of the time and performs credible processing on the survey data drn as follows to obtain the trusted survey data tr n :
  • Figure 3 is a flowchart of the credibility verification of the survey data, which describes the whole process of trn verification of a trusted survey record. If the recorded data is tampered, the verification will fail.
  • the terminal device uses the public key of the server certificate to decrypt Sign (PK s , dt) to verify the credibility of dt. If it is true and valid, it generates the trusted spot survey data tr by the following steps:
  • Step 2 The obtained hash value is 1 and G Timestatmp combined, and the terminal using a private key SK S arithmetic sign: Sign (SK s, H ( DC0017.JPG), G, Timestamp);
  • a digital record generated during the investigation of a crime scene is credibly processed to generate a credible digital record of the current investigation.
  • the record contains information of the current investigation data, the collection location, the collection time, and the collection person. And guarantee that this information cannot be tampered with, and at the same time non-repudiation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种数字现勘记录可信模型***以及利用该***进行可信化操作的方法,该***将数字现勘记录可信模型记作T,T=(E,A,DR,TR,Sign),TR是可信的数字现勘记录集合,TR={tr i|tr i=dr i+Sign(dr i)},Sign是可信化操作。上述记录的数据如果被篡改,会导致验证失败,可信现勘数据tr n可以被验证。本发明针对犯罪现场勘查中产生的数字记录,对其进行可信化处理进而生成一份可信的现勘数字记录,该记录的可信度表现在防篡改和不可否认性,因为终端是专人专用,数字签名保证了数据采自于哪一台终端,因此终端持有人无法否认,不仅有效解决了现有的移动终端拍摄的照片、录像易被篡改的技术问题,而且解决了如何补签名和代签名的问题。

Description

一种数字现勘记录可信模型*** 技术领域
本发明属于数字数据处理的保护数据的完整性技术领域,具体涉及一种数字现勘记录可信模型***。
背景技术
随着科技技术的进步,公安部门的各项警务工作也进入了数字化时代。犯罪现场勘查通常指刑事案件发生后,侦査人员为了査明犯罪事实,收集犯罪证据,揭露证实犯罪人,依法对与犯罪有关的人和事以及场所、物品、人身、尸体等所进行的现场访问和勘验检査工作,犯罪现场勘查必须依据国家法律、法规,运用刑事科学技术手段在特定空间领域内进行。现勘记录是现场勘查工作结束后形成的文档和附件的集合,主要包括:现场笔录、现场照片、现场视频、现场音频、痕迹、各类物证、各类电子数据证据、绘图等。在这些现勘记录中,照片、视频、音频目前已经做到数字化采集,笔录、绘图等形式的现勘记录由勘查人员事后手工录入现场勘验信息***实现数字化。
现场勘查是一项程序性很强的工作,工作流程出现任何一个小瑕疵,都会导致很严重的后果,比如证据采集不充分、痕迹物证损坏等。其中,现勘记录可信度失效是灾难性的结果,这将导致整个证据链的起点就不被采纳,进而致使整个现勘工作无效。现有的现勘记录可信机制是依靠“签名”,每份纸质形式现勘记录、痕迹物证收集清单均需要侦查人员亲笔签署姓名来保证记录的可信性,为了防止记录被篡改,一般需要两名以上的侦查人员签名。但是在实际的现场勘查工作中,“签名”这一规范存在很着很多的问题,主要体现在以下两点:一、补签名,部分侦查人员为了图方便,在现场勘查时未及时按要求在记录和清单上签名,事后补签;二、代签名,部分侦查人员并未参与现场勘查,为了程序性的需要签名或是代替他人签名。
上述任一种行为都会导致现勘记录可信性被质疑,给后续的司法证明工作埋下隐患。在数字化时代,即使规避了上述手工签名的风险,面对大量的数字化现勘记录,如何有效地保证其可信性也是一个亟需解决的重要课题。
现有专利文献中,申请号为CN201710140360.5、名称为“一种现场固定电子证据的方法及***”的发明公开了一种现场固定电子证据的方法及***。该方 法包括获取用户登录信息,进行用户权限选择并开始记录用户操作;采集现场电子证据;停止记录用户操作,并将记录结果生成用户操作日志;对获取的电子证据进行完整性校验;将获取的电子证据生成电子报告,并将电子证据的完整性校验结果添加到电子报告中;上传电子文件,以上通过用户登录模块、证据采集模块,完整性校验结果模块、报告生成模块和上传模块各模块共同实现。该发明虽然一定程度上解决了现有的移动终端拍摄的照片、录像易被篡改的技术问题,但仍然没有解决补签名和代签名的问题。
发明内容
本发明针对上述现有技术中存在的上述问题,提出一种数字现勘记录可信模型***,通过使用密码学中的数字签名、哈希等方法,可以针对数字化的现勘记录进行可信化操作,以保证所有的数字现勘记录从开始记录到呈递法庭的整个过程中,记录的内容、记录的人、记录地点、记录时间等数字化信息是完整的,未经过篡改。
为实现上述目的,本发明采用的技术方案为一种数字现勘记录可信模型***,该***将数字现勘记录可信模型记作T,T=(E,A,DR,TR,Sign),其中,E是模型中的实体,E={S,C i},S为服务器,C i为现勘终端设备,S和C i之间通过无线通讯网络连接,A为可信模型中的密码算法集合,服务器S利用A中的非对称加密算法生成公私密钥,DR是所有数字现勘记录的集合,DR={dr i|dr i∈{数字照片,数字笔录,视频,音频}},DR的信息保存在C i中,TR是可信的数字现勘记录集合,TR={tr i|tr i=dr i+Sign(dr i)},Sign是可信化操作,该可信化操作使用了上述私密钥,DT是日期时间,输入到服务器S,GPS是C i的当前地理位置坐标信息,输入到C i
进一步,上述现勘终端设备C i与使用该设备的侦查人员的身份绑定,专人专用。
作为优选,上述现勘终端设备C i配备高清摄像头、GPS传感器、Wi-fi和4G信号接入能力。
进一步,上述密码算法集合包括非对称密钥对生成算法、对称密钥算法、签名算法和哈希算法。
本发明还进一步提出一种利用上述数字现勘记录可信模型***进行可信化 操作的方法,具体包含以下步骤:
一、初始化过程
使用RSA算法为服务器S生成公私密钥,记作PK s和SK s,PK s存放在数字证书中,记作Cert s,SK s应用AES算法(AES,Advanced Encryption Standard,高级加密标准)和强密钥存储在服务器S本地;
二、注册过程
第一次使用现勘终端设备前需要完成注册,服务器为现勘终端设备发行证书,并通过加密的方式将私钥发送给终端,所有现勘终端设备及服务器的公钥都在服务器上保存并可公开访问;
三、签名过程
1.现勘终端设备C i通过设备采集到现勘数据dr n
2.现勘终端设备C i通过自身的GPS传感器获取到采集现勘数据的地理位置坐标,记作G n
3.现勘终端设备C i向服务器请求可信时间戳;
4.服务器向现勘终端设备返回当前时间dt n,并加上数字签名,以保证时间的可信性,回复内容为:Timestamp n=dt n+Sign(SK s,dt n);
5.现勘终端设备C i验证时间的可信性,并按如下方式对现勘数据dr n作可信处理,得到可信现勘数据tr n
Figure PCTCN2018123778-appb-000001
进一步,上述注册过程具体包括:现勘终端设备C i向服务器S发送注册请求和Key i,后者是终端i的持有人自行设置的密码,服务器S为C i生成密钥对
Figure PCTCN2018123778-appb-000002
E和D分别是对称加密算法AES的加密与解密函数,Sign使用非对称密码算法DSA(Digital Signature Algorithm)进行签名,H是SHA1(Secure Hash Algorithm)算法的哈希函数。
进一步,上述签名过程的步骤三中所述现勘数据可以是文字、图片、音频、视频。
上述该记录的数据如果被篡改,会导致验证失败,可信现勘数据tr n被验证的过程如下:
S1:将tr n分解成原始数据O和验证数据V两个部分,O=dr n+G n+TimeStamp n,
Figure PCTCN2018123778-appb-000003
其中,TimeStamp n=dt n+Sign(SK s,dt n),
O=dr n+G n+dt n+Sign(SK s,dt n);
S2:验证原始数据O中的时间戳是否有效,检查下面的等式是否成立:
dt n=Validate(PK s,Sign(SK s,dt n))
若成立则继续下一步,若不成立则提示验证失败,并中止验证过程;
S3:验证原始数据O的可信性,检查下面的等式是否成立:
Figure PCTCN2018123778-appb-000004
若成立则说明验证成功,若不成立则提示验证失败;
S4:验证过程结束。
与现有技术相比,本发明具有以下的有益技术效果:
1,本发明针对犯罪现场勘查中产生的数字记录,对其进行可信化处理进而生成一份可信的现勘数字记录,该记录中包含现勘数据、采集地点、采集时间和采集人的信息。
2,可信记录使用终端私钥对记录签名,保存了该记录的采集记录人,该记录的可信度表现在防篡改和不可否认性,因为终端是专人专用,数字签名保证了数据采自于哪一台终端,终端持有人无法否认。
3,若现勘记录被篡改,通过验证过程就会被发现,即如果该记录的数据被篡改会导致验证失败,不仅有效解决了现有的移动终端拍摄的照片、录像易被篡改的技术问题,而且解决了如何防止补签名和代签名的问题。
附图说明
图1为数字现勘记录可信模型的结构图。
图2为终端注册流程图。
图3为现勘数据可信性验证流程图。
具体实施方式
现结合附图对本发明作进一步详细的说明。
图1描述了可信模型的结构图。本发明将数字现勘记录可信模型记作T,T= (E,A,DR,TR,Sign),其中E是模型中的实体,E={S,C i},S为服务器,C i为现勘终端设备,S和C i之间通过无线通讯网络连接;A为模型中的密码算法集合;DR是所有数字现勘记录集合,
DR={dr i|dr i∈{数字照片,数字笔录,视频,音频}};TR是可信的数字现勘记录集合,TR={Sign(dr i)};Sign是可信化操作;DT是日期时间;GPS是C i的当前地理位置坐标。
利用本***进行可信操作的过程如下:
(一)初始化过程
使用RSA算法为服务器S生成公私密钥,记作PK s和SK s,PK s存放在数字证书中,记作Cert s,SKs应用AES算法和强密钥存储在服务器本地。
(二)注册过程
图2为终端注册的流程图,终端设备C i是侦查人员的现勘手持设备,该设备配备高清摄像头、GPS传感器、Wi-fi和4G信号接入能力、录入等功能,每台终端设备与一名侦查人员的身份一一绑定,专人专用。在第一次使用终端设备前需要完成本注册过程。
在图2中,Key i是终端i的持有人自行设置的密码,目的是为了保护私钥的安全。E和D是密码学中的对称加密算法AES的加密与解密函数,Sign使用非对称密码算法DSA进行签名,H是SHA1算法的哈希函数。此步骤的目的是让服务器为终端发行证书,并通过加密的方式将私钥发送给终端,所有终端及服务器的公钥都在服务器上保存并可公开访问。
(三)签名过程
3.1,终端C i通过设备采集到现勘数据dr n,该数据可以是文字、图片、音频、视频;
3.2,终端C i通过自身的GPS传感器获取到采集现勘数据的地理位置坐标,记作G n
3.3,向服务器请求可信时间戳;
3.4,服务器向终端返回当前时间dtn并加上数字签名保证时间的可信性,回复内容为:Timestamp n=dt n+Sign(SK s,dt n)
3.5,终端Ci验证时间的可信性并按如下方式对现勘数据drn作可信处理, 得到可信现勘数据tr n
Figure PCTCN2018123778-appb-000005
图3为现勘数据可信性验证的流程图,其描述了一个可信现勘记录trn被验证的全过程,如果该记录的数据被篡改会导致验证失败。
为便于本领域的一般技术人员实施本发明,现提供一个具体实施例:
假设服务器S已经完成初始化操作,PK s已对外公开,SK s已秘密保存;另有侦查人员A,配备一部与A的身份绑定在一起的现勘终端设备C,服务器已为其生成了一对公私密钥对,公钥PK c已对外公开,SK c已在终端C上秘密保存。
假设侦查人员A在犯罪现场获取到一块电脑硬盘,使用自己的现勘终端设备C对该物证进行拍照取证,该物证数码照片的文件名为DC0017.JPG,在拍照保存照片的同时,终端设备采集自身GPS传感器上的地理位置值为G=(lat:22.5024,lng:113.9383),同时向服务器S发送可信时间戳的请求后,服务器返回当前的可信时间戳Timestamp为dt=“2018-03-10 18:09:22”以及服务器的签名Sign(PK s,dt)。
终端设备使用服务器证书的公钥对Sign(PK s,dt)解密来验证dt的可信性,若真实有效,则通过如下步骤生成可信现勘数据tr:
1.计算DC0017.JPG的SHA1哈希值:H(DC0017.JPG);
2.将第1步得到的哈希值与G和Timestatmp合并在一起,并使用该终端的私钥SK S进行签名运算:Sign(SK s,H(DC0017.JPG),G,Timestamp);
3.最终的可信现勘数据tr为下列数据合并而成:
DC0017.JPG,G,Timestamp,Sign(SK s,H(DC0017.JPG),G,dt)
接下来,对tr的可信验证过程如下:
1.先将tr分成原始数据部分O:DC0017.JPG,G,Timestam和验证数据部分V:Sign(SK s,H(DC0017.JPG),G,dt);
2.使用服务器的公钥验证原始数据中Timestamp的可信性,检查dt是否等于Validate(PK s,Sign(PK s,dt)),若相等则说明该时间戳可信,继续下一步验证;否则中止验证过程,提示验证失败;
3.对tr原始数据部分的DC0017.JPG进行SHA1哈希运算并与G和Timestamp的dt合并形成如下数据:H(DC0017.jpg)+G+dt,记作O';
4.使用服务器的公钥解开tr的验证数据部分,即Validate(PK s,V),然后检查O'是否等于Validate(PK s,V),若不相等则提示验证失败,若相等则验证成功,该物证照片DC0017.JPG是可信的,即该物证照片的采集时间为2018-03-10 18:09:22,采集地的经纬坐标为(纬度:22.5024,经度:113.9383),
采集人为侦查人员A,照片内容未发现篡改,以上信息真实有效。
本发明针对犯罪现场勘查中产生的数字记录,对其进行可信化处理进而生成一份可信的现勘数字记录,该记录中有现勘数据、采集地点、采集时间和采集人的信息,并保证这些信息无法被篡改,同时具备不可否认性。
需要说明的是,以上具体实施方式的描述并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (8)

  1. 一种数字现勘记录可信模型***,其特征在于,该***将数字现勘记录可信模型记作T,T=(E,A,DR,TR,Sign),其中,E是模型中的实体,E={S,C i},S为服务器,C i为现勘终端设备,S和C i之间通过无线通讯网络连接,A为可信模型中的密码算法集合,服务器S利用A中的非对称加密算法生成公私密钥,DR是所有数字现勘记录的集合,DR={dr i|dr i∈{数字照片,数字笔录,视频,音频}},DR的信息保存在C i中,TR是可信的数字现勘记录集合,TR={tr i|tr i=dr i+Sign(dr i)},Sign是可信化操作,该可信化操作使用了上述私密钥,DT是日期时间,输入到服务器S,GPS是C i的当前地理位置坐标信息,输入到C i
  2. 根据权利要求1所述的数字现勘记录可信模型***,其特征在于所述现勘终端设备C i与使用该设备的侦查人员的身份绑定。
  3. 根据权利要求2所述的数字现勘记录可信模型***,其特征在于所述现勘终端设备C i配备高清摄像头、GPS传感器、Wi-fi和4G信号接入能力。
  4. 根据权利要求1所述的数字现勘记录可信模型***,其特征在于所述密码算法集合包括非对称密钥对生成算法、对称密钥算法、签名算法和哈希算法。
  5. 一种利用权利要求1所述的数字现勘记录可信模型***进行可信化操作的方法,其特征在于包含以下步骤:
    (一)初始化过程
    使用RSA算法为服务器S生成公私密钥,记作PK s和SK s,PK s存放在数字证书中,记作Cert s并对外公开,SK s使用AES算法和强密钥存储在服务器S本地;
    (二)注册过程
    第一次使用现勘终端设备前需要完成注册,服务器为现勘终端设备发行证书,并通过加密的方式将私钥发送给终端,所有现勘终端设备及服务器的公钥都在服务器上保存并可公开访问;
    (三)签名过程
    a)现勘终端设备C i通过设备采集到现勘数据dr n
    b)现勘终端设备C i通过自身的GPS传感器获取到采集现勘数据的地理位置坐标,记作G n
    c)现勘终端设备C i向服务器请求可信时间戳;
    d)服务器向现勘终端设备返回当前时间dt n,并加上数字签名,以保证时间的可信性,回复内容为:TimeStamp  n=dt n+Sign(SK s,dt n);
    e)现勘终端设备C i验证时间的可信性,并按如下方式对现勘数据dr n作可信处 理,得到可信现勘数据tr n
    f)tr n=(dr n+G n+TimeStamp n)+Sign(SK ci,(H(dr n)+G n+dt n))。
  6. 根据权利要求5所述的利用数字现勘记录可信模型***进行可信化操作的方法,其特征在于注册过程具体包括:现勘终端设备C向服务器S发送注册请求和K i,后者是终端C i的持有人自行设置的密码,服务器S为C i生成密钥对
    Figure PCTCN2018123778-appb-100001
    E和D分别是对称加密算法AES的加密与解密函数,Sign使用非对称密码算法DSA进行签名,Validate使用DSA进行签名验证,H是SHA1算法的哈希函数。
  7. 根据权利要求5所述的利用数字现勘记录可信模型***进行可信化操作的方法,其特征在于签名过程的步骤a中所述数据可以是文字、图片、音频、视频。
  8. 根据权利要求5所述的利用数字现勘记录可信模型***进行可信化操作的方法,其特征在于所述可信现勘数据tr n被验证的过程如下:
    S1:将tr n分解成原始数据O和验证数据V两个部分,O=dr n+G n+TimeStamp n,
    Figure PCTCN2018123778-appb-100002
    Figure PCTCN2018123778-appb-100003
    其中,TimeStamp n=dt n+Sign(SK s,dt n),O=dr n+G n+dt n+Sign(SK s,dt n);
    S2:验证原始数据O中的时间戳是否有效,检查下面的等式是否成立:
    dt n=Validate(PK s,Sign(SK s,dt n))
    若成立则继续下一步,若不成立则提示验证失败,并中止验证过程;
    S3:验证原始数据O的可信性,检查下面的等式是否成立:
    Figure PCTCN2018123778-appb-100004
    若成立则说明验证成功,若不成立则提示验证失败;
    S4:验证过程结束。
PCT/CN2018/123778 2018-05-21 2018-12-26 一种数字现勘记录可信模型*** WO2019223310A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2020520020A JP7026971B2 (ja) 2018-05-21 2018-12-26 デジタル現場調査記録信頼モデルシステム及び方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810494011.8 2018-05-21
CN201810494011.8A CN108737095B (zh) 2018-05-21 2018-05-21 一种利用数字现勘记录可信模型***进行可信化操作的方法

Publications (1)

Publication Number Publication Date
WO2019223310A1 true WO2019223310A1 (zh) 2019-11-28

Family

ID=63937789

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/123778 WO2019223310A1 (zh) 2018-05-21 2018-12-26 一种数字现勘记录可信模型***

Country Status (3)

Country Link
JP (1) JP7026971B2 (zh)
CN (1) CN108737095B (zh)
WO (1) WO2019223310A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737095B (zh) * 2018-05-21 2021-03-05 南京森林警察学院 一种利用数字现勘记录可信模型***进行可信化操作的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000155524A (ja) * 1998-11-19 2000-06-06 Mitsubishi Electric Corp 電子検印システム
CN103593618A (zh) * 2013-10-28 2014-02-19 北京实数科技有限公司 电子数据证据的可采用性验证方法及***
CN108022194A (zh) * 2017-11-28 2018-05-11 深圳市华德安科技有限公司 执法记录仪及其数据安全处理方法、服务器及***
CN108737095A (zh) * 2018-05-21 2018-11-02 南京森林警察学院 一种数字现勘记录可信模型***

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6269446B1 (en) * 1998-06-26 2001-07-31 Canon Kabushiki Kaisha Authenticating images from digital cameras
JP4856433B2 (ja) 2006-01-27 2012-01-18 株式会社リコー 計測機器、計測データ編集装置及び計測時刻検証装置
JP4812002B2 (ja) 2006-02-16 2011-11-09 セイコーインスツル株式会社 記録装置、記録収集サーバ、記録方法、及び記録収集方法
US9064238B2 (en) * 2011-03-04 2015-06-23 Factify Method and apparatus for certification of facts
US9325509B2 (en) 2011-07-15 2016-04-26 Hitachi, Ltd. Determination method for cryptographic algorithm used for signature, validation server and program
CN104023044A (zh) * 2014-01-01 2014-09-03 电子科技大学 一种具有隐私保护的云存储数据轻量级公共审计的方法
CN105227537A (zh) 2014-06-16 2016-01-06 华为技术有限公司 用户身份认证方法、终端和服务端
CN105635070B (zh) * 2014-11-05 2019-12-27 许田 一种数字文件的防伪方法及***
JP6517582B2 (ja) 2015-05-21 2019-05-22 株式会社日立プラントコンストラクション 作業安全支援装置、作業安全支援システム、および、作業安全支援方法
JP2017204205A (ja) 2016-05-13 2017-11-16 佐々木 芳章 治験ビューアシステム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000155524A (ja) * 1998-11-19 2000-06-06 Mitsubishi Electric Corp 電子検印システム
CN103593618A (zh) * 2013-10-28 2014-02-19 北京实数科技有限公司 电子数据证据的可采用性验证方法及***
CN108022194A (zh) * 2017-11-28 2018-05-11 深圳市华德安科技有限公司 执法记录仪及其数据安全处理方法、服务器及***
CN108737095A (zh) * 2018-05-21 2018-11-02 南京森林警察学院 一种数字现勘记录可信模型***

Also Published As

Publication number Publication date
JP7026971B2 (ja) 2022-03-01
JP2020537411A (ja) 2020-12-17
CN108737095A (zh) 2018-11-02
CN108737095B (zh) 2021-03-05

Similar Documents

Publication Publication Date Title
US11574379B2 (en) System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
US10019773B2 (en) Authentication and validation of smartphone imagery
US11297500B2 (en) Authenticating digital evidence
US8190903B2 (en) Method and apparatus for verifying authenticity of digital data using trusted computing
CN113886860B (zh) 一种基于移动终端的电子数据保全***和方法
US20190354694A1 (en) Verification of data captured by a consumer electronic device
US8312284B1 (en) Verifiable timestamping of data objects, and applications thereof
US20180225428A1 (en) Secure recording and rendering of encrypted multimedia content
US10783278B2 (en) Signature generation device, signature verification device, signature generation method, and signature verification method
WO2019223310A1 (zh) 一种数字现勘记录可信模型***
CN112583772A (zh) 一种数据采集存储平台
JP2005284854A (ja) プラント点検保守記録の管理方法および装置、ならびにプラント点検保守記録の確認方法および装置
TWI734259B (zh) 電子簽章認證裝置及其方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18919549

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020520020

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18919549

Country of ref document: EP

Kind code of ref document: A1