Summary of the invention
A technical matters to be solved by this invention be in prior art Computer forensics when guaranteeing integrality, only solidify in time Computer forensics information, the technical matters that the authenticity that cannot meet all sidedly Computer forensics of bringing, relevance, legitimacy require, thus a kind of method and system that can simultaneously verify the employing property of Computer forensics on integrality, time and the space of evidence obtaining personnel, system user, Computer forensics have been proposed.
For solving the problems of the technologies described above, the present invention is achieved by the following technical solutions:
An employing property verification method, comprise the following steps:
Carry out the authentication of system user, and be stored in data check set;
Personnel's the authentication of collecting evidence, and be stored in data check set;
Obtain Computer forensics file;
According to the digital digest of Computer forensics file described in described Computer forensics file generated, and be stored in data check set;
Acquisition time stamp, and be stored in data check set;
Obtain geographic position data, and be stored in data check set;
The result of the result of the described evidence obtaining personal identity authentication obtaining, described system user authentication, described digital digest, described timestamp and described geographic position data are implanted in Quick Response Code by Quick Response Code generator program simultaneously, and be presented in the probation report of generation;
Identify digital digest, timestamp and the geographic position data of evidence obtaining personal identity authentication result that the Quick Response Code on described probation report obtains, system user identity authentication result, Computer forensics;
Described evidence obtaining personal identity authentication result, described system user authentication result, described digital digest, described timestamp and described geographic position data that the described evidence obtaining personal identity authentication result that identification is obtained, described system user authentication result, described digital digest, described timestamp and described geographic position data and data check are concentrated are compared, if consistent, judge that described evidence obtaining personnel identity is correct, and described Computer forensics is not tampered; Otherwise, judge that described evidence obtaining personnel identity is incorrect, or described Computer forensics is tampered.
The step of evidence obtaining personnel being carried out to authentication also comprises:
Extract described evidence obtaining personnel's biological information.
Described biological information is evidence obtaining personnel's fingerprint.
The step of system user being carried out to authentication also comprises:
Verify the password of described system user input;
By software security dog, system user is carried out to hardware verification.
The step of described acquisition time stamp specifically comprises:
Connect national standard time server, to described national standard time server request time authentication, and receive the time certification certificate that country's standard time server is sent.
By the preassembled Geographic Information System of home server, obtain described geographic position data instantly.
Based on same inventive concept, the present invention also provides a kind of employing property verification system of Computer forensics of Computer forensics, comprises with lower module:
The first authentication module, carries out the authentication of system user, and is stored in data check set;
The second authentication module, the personnel's that collect evidence authentication, and be stored in data check set;
The first acquisition module, obtains Computer forensics file;
Generation module, the digital digest to Computer forensics file described in described Computer forensics file generated, and be stored in data check set;
The second acquisition module, obtains the timestamp of described Computer forensics file, and is stored in data check set;
The 3rd acquisition module, obtains the geographic position data of described Computer forensics file, and is stored in data check set;
Implant module, the result of the result of the described evidence obtaining personal identity authentication obtaining, described system user authentication, described digital digest, described timestamp and described geographic position data are implanted in Quick Response Code by Quick Response Code generator program simultaneously, and be presented in the probation report of generation;
Identification module, identifies digital digest, timestamp and the geographic position data of evidence obtaining personal identity authentication result that the Quick Response Code on described probation report obtains, system user identity authentication result, Computer forensics;
Comparing module, described evidence obtaining personal identity authentication, described system user authentication, described digital digest, described timestamp and described geographic position data that the described evidence obtaining personal identity authentication that identification is obtained, described system user authentication, described digital digest, described timestamp and described geographic position data and data check are concentrated are compared, if consistent, judge that described evidence obtaining personnel identity is correct, and described Computer forensics is not tampered; Otherwise, judge that described evidence obtaining personnel identity is incorrect, or described Computer forensics is tampered.
Described the second authentication module also comprises:
The first checking submodule, extracts described evidence obtaining personnel's biological information.
Described biological information is evidence obtaining personnel's fingerprint.
Described the first authentication module also comprises:
The first checking submodule, verifies the password that described system user is inputted;
The second checking submodule, carries out hardware verification by software security dog to system user.
Described the second acquisition module also comprises:
Time certification submodule, connects national standard time server, to described national standard time server request time authentication, and receives the time certification certificate that country's standard time server is sent.
By the preassembled Geographic Information System of home server, obtain described geographic position data instantly.
Technique scheme of the present invention has the following advantages compared to existing technology:
(1) employing property verification method and the system of Computer forensics of the present invention, by carrying out authentication to system user, evidence obtaining personnel; To described Computer forensics file generated digital digest; And acquisition time stamp and geographic position data; To collect evidence personnel and system user authentication result, digital digest, timestamp and geographic position data by Quick Response Code generator program implantation Quick Response Code, and generate probation report, and when produce (shenglvehao)in court and checking data collection compare, if consistent, illustrate that evidence obtaining personnel and system user identity are legal, evidence is not tampered.The present invention is by extracting digital digest to Computer forensics, proved the integrality of described Computer forensics, by the authentication for evidence obtaining personnel and discriminating, guaranteed evidence obtaining personnel's legitimacy, and stab and geographic position data information by the joining day, Computer forensics is bound from time and two aspects, space, guaranteed the employing property of Computer forensics.
(2) employing property verification method and the system of Computer forensics of the present invention, described user is carried out to authentication, can verify by pin mode, and carry out hardware verification by software security dog, and the biological information that extracts described evidence obtaining personnel, extract in the present invention described evidence obtaining personnel finger print information; Thereby Computer forensics is being ensured aspect evidence obtaining personnel.
(3) employing property verification method and the system of Computer forensics of the present invention, by obtaining authoritative national standard time certification, guarantee described Computer forensics authenticity in time more; By the preassembled Geographic Information System of home server, obtain geographic position data instantly, by obtaining geographic position data, guaranteed Computer forensics authenticity spatially.
Embodiment
Embodiment mono-:
As shown in Figure 1, it comprises the following steps the process flow diagram of the employing property verification method of Computer forensics of the present invention:
Carry out the authentication of system user, and be stored in data check set;
Extract described evidence obtaining personnel's biological information, and be stored in data check set;
Obtain Computer forensics file;
According to the digital digest of Computer forensics file described in described Computer forensics file generated, and be stored in data check set;
Acquisition time stamp, and be stored in data check set;
Obtain geographic position data, and be stored in data check set;
The result of the result of the described evidence obtaining personal identity authentication obtaining, described system user authentication, described digital digest, described timestamp and described geographic position data are implanted in Quick Response Code by Quick Response Code generator program simultaneously, and be presented in the probation report of generation;
Identify digital digest, timestamp and the geographic position data of evidence obtaining personal identity authentication result that the Quick Response Code on described probation report obtains, system user identity authentication result, Computer forensics;
Described evidence obtaining personal identity authentication result, described system user authentication result, described digital digest, described timestamp and described geographic position data that the described evidence obtaining personal identity authentication result that identification is obtained, described system user authentication result, described digital digest, described timestamp and described geographic position data and data check are concentrated are compared, if consistent, judge that described evidence obtaining personnel identity is correct, and described Computer forensics is not tampered; Otherwise, judge that described evidence obtaining personnel identity is incorrect, or described Computer forensics is tampered.
The biological information that extracts described evidence obtaining personnel can adopt the technology such as instantly popular fingerprint recognition, face recognition and pupil identification.In the present embodiment, the biological information that extracts described evidence obtaining personnel adopts fingerprint identification method, extract described evidence obtaining personnel's fingerprint, again evidence obtaining personnel's fingerprint and described electronics summary, timestamp and geographical location information are together implanted in Quick Response Code, thereby Computer forensics is being ensured aspect evidence obtaining personnel.
The step of system user being carried out to authentication also comprises:
Verify the password of described system user input;
By software security dog, system user is carried out to hardware verification.
When the integrality of Computer forensics and legitimacy are verified, for avoiding malice the 3rd people's login system to distort evidence, need to carry out authentication to the user of login system, specifically comprise the checking of software and hardware mode.System user can be judge or other legal related personnel.Only have the legal related personnel just can login system, to guarantee that Computer forensics is not tampered.
When obtaining Computer forensics file, if obtain a plurality of Computer forensics files simultaneously, regard described a plurality of Computer forensics files as a file, to its generating digital summary.
The process of described generating digital summary is that the input of random length is processed, and produces the fixing pseudo-random sequence of length, and its feature comprises: how long the information no matter (1) is inputted has, and the digital digest calculating is regular length always; (2) whether digital digest looks like at random, can check its output identical with a large amount of inputs, and different inputs has different output.Only, when input is identical, just can obtain identical digital digest.Digital digest and Computer forensics information have unique correspondence, thereby can protect the integrality of Computer forensics file.
In the present embodiment, the method for generating digital summary adopts hash algorithm, also claims hash function.Hash function (or hashing algorithm, claim again hash function, English: be Hash Function) a kind of method that creates little numeral " fingerprint " from any data.Hash, " hash " done in general translation, is that (be called again pre-mapping, pre-image), by hashing algorithm, be transformed into the output of regular length, this output is exactly hashed value for input random length.This conversion is a kind of compressing mapping, and namely, the space of hashed value is conventionally much smaller than the space of input, and different inputs may hash to identical output, and can not carry out unique definite input value from hashed value.Formulation is: h=H (M), H ()--one-way hash function wherein, M--random length expressly, h--regular length hashed value.
The hash algorithm of applying in information security field, also needs to meet other key characteristics:
The first yes one-way (one-way), from pre-mapping, can obtain simply rapidly hashed value, and can not shine upon in advance by one of structure on calculating, make its hash result equal certain specific hashed value, construct corresponding M=H-1 (h) infeasible.Like this, hashed value just can statistics on unique sign input value, therefore, Hash in cryptography be otherwise known as " eap-message digest (message digest) ", be exactly that requirement can easily be carried out " message " " summary ", but in " summary " in cannot be compared " summary " itself more about " message " information.
The secondth, anti-collision (collision-resistant), cannot produce 2 pre-mappings that hashed value is identical.Given M, calculates and cannot find M', meets H (M)=H (M'), the weak anti-collision of this meaning; In calculating, be also difficult to find a pair of M arbitrarily and M', make to meet H (M)=H (M'), this calls strong anti-collision.Requiring " strong anti-collision " is mainly in order to take precautions against what is called " birthday attack (birthday attack) ", in 10 people's group, you can find the people's identical with your birthday probability is 2.4%, and in same group, having 2 identical probability of people's birthday is 11.7%.Similarly, in the very large situation in the space of pre-mapping, algorithm must have enough intensity to guarantee to find easily the people of " identical birthday ".
The 3rd is mapping distributing homogeneity and difference profile homogeneity.In hash result, be 0 bit and be 1 bit, its sum should be about equally; The variation of a bit in input, will have bit over half to change in hash result, and this is called again " avalanche effect (avalanche effect) "; Realize the variation that makes to occur in hash result 1bit, in input, have at least bit over half to change.Its essence is the information that must make each bit in input, each bit that is as far as possible reflected to uniformly output gets on; Each bit in output is the result that in inputting, the information one of many as far as possible bit works.So-called " compression function (compression function) ", is exactly by a regular length input, is transformed into the output of shorter regular length.Hash function is exactly to be designed to the grouping of continuous repetition " compression " input based on by specific compression function and the process of the result that front first compression is processed, until whole message is all compressed complete, last output is as the hashed value of whole message.
MD5 (RFC1321) is that Rivest was in the improvement version to MD4 in 1991.It is to input still with 512 groupings, and its output is the cascade of 4 32 words, identical with MD4.The improvement that it is done compared with MD4 is:
1) added fourth round
2) each step has unique additive constant;
3) the second G function in taking turns becomes ((X ∧ Z) ∨ (Y ∧~Z)) to reduce its symmetry from ((X ∧ Y) ∨ (X ∧ Z) ∨ (Y ∧ Z));
4) each step has all added the result of back, to accelerate " avalanche effect ";
5) changed the 2nd and taken turns the order of taking turns middle access input subgroup with 3rd, reduced the similarity degree of form;
6) near-optimal every ring shift left displacement of taking turns, to accelerating " avalanche effect ", ring shift left of each wheel is all different.
First message splitted into several groupings of 512, and wherein last 512 groupings are " message ending+byte of padding (100 ... 0)+64 message-lengths ", and to guarantee the message for different length, this grouping is not identical.The restriction of 64 message-lengths has caused the input length of MD5 safety must be less than 264bit, because be greater than the length information of 64, will be left in the basket.And 4 32 bit register words are initialized as A=0x01234567, B=0x89abcdef, C=0xfedcba98, D=0x76543210, they will participate in all the time computing and form final hash result.
The major cycle that then each 512 message groupings enter algorithm with the form of 16 32 words, individual data of 512 message groupings have determined the number of times circulating.Major cycle has 4 to take turns, and every wheel used respectively nonlinear function
F(X,Y,Z)=(X∧Y)∨(~X∧Z)
G(X,Y,Z)=(X∧Z)∨(Y∧~Z)
H(X,Y,Z)=X⊕Y⊕Z
I(X,Y,Z)=X⊕(Y∨~Z)
This 4 round transformation is to proceed as follows respectively entering 16 32 words of 512 message groupings of major cycle: the result by 3 in copy a, the b of A, B, C, D, c, d after F, G, H, I computing and the 4th addition, add the additive constant of 32 words and 32 words, and by the some positions of the value ring shift left of gained, finally acquired results is added to one of a, b, c, d, and be recycled to ABCD, complete thus once circulation.
Additive constant used is by such table T[i] define, wherein i is 1 ... 64, T[i] be the integral part of 4294967296 powers of the sinusoidal absolute value of i, doing is like this in order further to eliminate the linearity in conversion by sine function and power function.
After all 512 all computings of dividing into groups, the cascade of ABCD will be outputted as the result of MD5 hash.
Timestamp technology is a kind of conventional technology in this area, conventionally timestamp is divided into two classes: (1) self-built timestamp: this type of timestamp is (as GPS by time receiving equipment, CDMA, big-dipper satellite) come acquisition time to time stamp server, and sign and issue timestamp certificate by time stamp server.This kind of timestamp can be used to not have when enterprises confirmation of responsibility , court authenticates legal effect, because of its by the time, exist during receiving equipment time of reception be tampered may, so can not be as legal basis; (2) there is the timestamp of the effect of law: third party's trusted timestamp authentication service that Ta Shiyou China Chinese Academy of Sciences country's time service center provides, by national time service center, be responsible for the time service and punctual monitoring of time.Because its punctual monitoring function ensures the accuracy of the time in timestamp certificate and is not tampered.
The timestamp service that adopts more authoritative national time dissemination system to provide in the present embodiment, on home server Time Created platform, time server by home server and national time dissemination system connects, obtain timestamp, local computer obtains the timestamp that home server provides.This time can not distort, and guarantees in time the authenticity of Computer forensics.
Simultaneously, Geographic Information System is also installed on home server, and (English is Geographic Information System or Geo-Information system, be called for short GIS), the geographical location information while obtaining the preservation of evidence, thus spatially guarantee the authenticity of Computer forensics.
In other embodiments, acquisition time stabs and obtains the step order of geographic position data and do not limit, and can first obtain the step of geographic position data, then carry out the step of acquisition time stamp.
In the present embodiment, probation report is format text, the information that has comprised Computer forensics self, the described system user authentication result of obtaining, described evidence obtaining personal identity authentication result, described digital digest, described timestamp and described geographic position data are implanted in Quick Response Code by Quick Response Code generator program simultaneously, be presented in probation report.In court, in the time of need to adopting Computer forensics, Quick Response Code on probation report is identified, and compare with original system user authentication, the authentication of evidence obtaining personnel identity, digital digest, timestamp and geographical location information that above-mentioned several steps generate, if consistent, illustrate that evidence was not tampered, personnel identity is legal, can adopt.
The present invention is by extracting digital digest to Computer forensics, proved the integrality of described Computer forensics, and stab and geographic position data information by the joining day, adopt system user authentication and the authentication of evidence obtaining personnel identity, Computer forensics is bound from time and two aspects, space, and guaranteed evidence obtaining personnel legitimacy, guaranteed the adopting property of electronics according to card.
Embodiment bis-:
Based on same inventive concept, the present invention also provides a kind of employing property verification system of Computer forensics of Computer forensics, and its system architecture figure as shown in Figure 2 comprises with lower module:
The first authentication module, carries out the authentication of system user, and is stored in data check set;
The second authentication module, the personnel's that collect evidence authentication, and be stored in data check set;
The first acquisition module, obtains Computer forensics file;
Generation module, the digital digest to Computer forensics file described in described Computer forensics file generated, and be stored in data check set;
The second acquisition module, obtains the timestamp of described Computer forensics file, and is stored in data check set;
The 3rd acquisition module, obtains the geographic position data of described Computer forensics file, and is stored in data check set;
Implant module, the result of the result of the described evidence obtaining personal identity authentication obtaining, described system user authentication, described digital digest, described timestamp and described geographic position data are implanted in Quick Response Code by Quick Response Code generator program simultaneously, and be presented in the probation report of generation;
Identification module, identifies digital digest, timestamp and the geographic position data of evidence obtaining personal identity authentication result that the Quick Response Code on described probation report obtains, system user identity authentication result, Computer forensics;
Comparing module, described evidence obtaining personal identity authentication, described system user authentication, described digital digest, described timestamp and described geographic position data that the described evidence obtaining personal identity authentication that identification is obtained, described system user authentication, described digital digest, described timestamp and described geographic position data and data check are concentrated are compared, if consistent, judge that described evidence obtaining personnel identity is correct, and described Computer forensics is not tampered; Otherwise, judge that described evidence obtaining personnel identity is incorrect, or described Computer forensics is tampered.
Described the second authentication module also comprises:
The first checking submodule, extracts described evidence obtaining personnel's biological information
Described biological information is evidence obtaining personnel's fingerprint.
Described the first authentication module also comprises:
The second checking submodule, verifies the password that described system user is inputted;
The 3rd checking submodule, carries out hardware verification by software security dog to system user.
In other embodiments, the biological information that extracts described evidence obtaining personnel can adopt the technology such as face recognition and pupil identification.
Described the second acquisition module also comprises:
Time certification submodule, connects national standard time server, to described national standard time server request time authentication, and receives the time certification certificate that country's standard time server is sent.
Timestamp technology is a kind of conventional technology in this area, conventionally timestamp is divided into two classes: (1) self-built timestamp: this type of timestamp is (as GPS by time receiving equipment, CDMA, big-dipper satellite) come acquisition time to time stamp server, and sign and issue timestamp certificate by time stamp server.This kind of timestamp can be used to not have when enterprises confirmation of responsibility , court authenticates legal effect, because of its by the time, exist during receiving equipment time of reception be tampered may, so can not be as legal basis; (2) there is the timestamp of the effect of law: China third party trusted timestamp authentication service that Ta Shiyou China Chinese Academy of Sciences country's time service center provides, by national time service center, be responsible for the time service and punctual monitoring of time.Because its punctual monitoring function ensures the accuracy of the time in timestamp certificate and is not tampered.
In the present embodiment, by the preassembled Geographic Information System of home server, obtain described geographic position data instantly, thereby spatially guarantee the authenticity of Computer forensics.
The present invention is by extracting digital digest to Computer forensics, proved the integrality of described Computer forensics, by the authentication for evidence obtaining personnel and discriminating, guaranteed evidence obtaining personnel's legitimacy, and stab and geographic position data information by the joining day, Computer forensics is bound from time and two aspects, space, guaranteed the employing property of Computer forensics.
Obviously, above-described embodiment is only for example is clearly described, and the not restriction to embodiment.For those of ordinary skill in the field, can also make other changes in different forms on the basis of the above description.Here exhaustive without also giving all embodiments.And the apparent variation of being extended out thus or change are still among the protection domain in the invention.