Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information evidence collection method for Internet of things

An Internet of Things and headprint technology, applied in the field of information security, can solve the problems of misappropriation of intellectual property rights, Internet of Things deception, and difficulty in collecting effective evidence, and achieve the effect of ensuring security and confidentiality.

Inactive Publication Date: 2014-05-21
UNIV OF SCI & TECH LIAONING
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, computer forensics is an interdisciplinary science in the field of computer science and law. It is used to solve a large number of computer crimes and accidents, including Internet of Things intrusion, theft of intellectual property rights, and Internet of Things deception. Now it basically uses camera methods, which cannot be real-time. Analysis and judgment
[0003] IoT evidence is very different compared to traditional evidence, therefore, many difficulties arise during the collection of such new evidence
According to practice, the Internet of Things forensics work mainly faces the following difficulties: (1), a large amount of Internet of Things data brings difficulties to the collection and analysis work
The data generated by the computer Internet of Things every day is complex and huge. How to obtain and store these data in a timely manner, review and judge the computer Internet of Things evidence that is related to the case and reflects the objective facts of the case poses a big challenge for us.
(2) Computer users have weak security awareness and legal concepts
Internet of things crime is a crime with high scientific and technological content, and the technical quality of investigators is not high, so it is difficult to collect effective evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information evidence collection method for Internet of things
  • Information evidence collection method for Internet of things
  • Information evidence collection method for Internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0036] like figure 1 , figure 2 , image 3 shown, including the following steps:

[0037] Step 1. Enter the forensics start mode of the Internet of Things;

[0038] Step 2. When the start mode of step 1 is set, anyone must pass identity verification before using the Internet of Things, and the identity verification includes image verification and headprint verification;

[0039] Step 21, image forensics mode:

[0040] After successfully setting up this forensic mode, when entering the identity forensics interface, the user needs to take an image to start the IOT smoothly; otherwise, the IOT will stay in the forensics stage and cannot perform any operations;

[0041] Step 22. Forensics mode of forehead tattoo

[0042] After successfully setting this forensic mode, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information evidence collection method for Internet of things. The method comprises the following steps that 1, an evidence collection starting mode of the Internet of things is selected; 2, after the starting mode in the step 1 is set, any person needs to pass identity evidence collection before using the Internet of things, wherein the identity evidence collection comprises image evidence collection and head pattern evidence collection; 3, the evidence collection of the Internet of things is started successfully, and the Internet of things enters a work mode. A system comprises a processor module, an information evidence collection module and an internal memory connected with the processor module, wherein the information evidence collection module comprises a head pattern evidence collection module and an image evidence collection module; both the head pattern evidence collection module and the image pattern are connected with the processor module. According to the information evidence collection method for the Internet of things, an evidence collection step is added in the starting process, so that the use of the Internet of things is more secure.

Description

technical field [0001] The present invention relates to the field of information security, in particular to on-site forensics technology, and specifically to an information forensics method for the Internet of Things. Background technique [0002] With the rapid development of computers and Internet of Things technology, e-commerce, Internet of Things banking, various Internet of Things services and e-government are widely used in economic and social interpersonal communication and business activities. Subsequently, all kinds of economic disputes, civil disputes and criminal cases will appear from time to time. In the process of judging or handling various disputes and criminal cases, electronic documents have become one of the important evidences. Computer forensics plays a key role in combating computer and Internet of Things crimes. Its purpose is to provide the traces left by criminals in computers as effective litigation evidence to courts so that criminal suspects can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32H04N5/232
CPCG06F21/32
Inventor 武传胜师云秋王丹孙赫男刘芳慧刘宏张迪
Owner UNIV OF SCI & TECH LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products