Font Size: a A A

Mobile Phone Forensics-Research And Implementation Of (U) SIM&UIM Card Forensics Platform

Posted on:2012-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:L Y ZhangFull Text:PDF
GTID:2178330332997908Subject:Computer expertise
Abstract/Summary:PDF Full Text Request
With the rapidly development, IC cards develop all over the world. We have been applying IC cards to finance, trade, traffic, IT, medical care, insurance, tourism, population and revenue administration, ID identification, security control, employment, account management and corresponding charging.In the information era, mobile phone has become necessary in our daily life. Nowadays, the mobile communications develop in China is most quickly in the world, and has the largest mobile communications network. Is precisely the handset's development, therefore many criminal offenders use handset to carry on the criminality.The paper takes the evidence platform of (U) SIM&UIM card as an example, first obtains from the system requirements analysis, the system divides into two major parts, respectively be regarding key information's extraction function. And makes the writing protect function with the key information data.In this needs to explain, research and development of the paper on the foundation of platform's first stage, which realized the function includes:The short information analysis, the final position analysis, the super directory analysis, the PIN data analysis, the SIM's region analysis, the OTA analysis in (U)SIM&UIM card as well as the card mirror image duplication function. The paper realizes the function in second stage includes:The telephone directory analysis, the inhales/exhales number analysis, the IMSI analysis, the final call analysis, the special/supplement service analysis, the data write-protection function in (U)SIM&UIM card as well as some platform auxiliary function.The paper use international standard protocol, ISO7816 protocol and using the WatchData company's CardReader to read the card and provides the analysis of the card information. Using the MD5 algorithm comes regarding the key information to carry on the encryption and write-protection function to important data.
Keywords/Search Tags:mobile phone forensics, computer forensics, MD5 algorithm, SIM card, IC card, smart card
PDF Full Text Request
Related items