Font Size: a A A

Design & Realization Of Electronic Evidence Policing System Based On Fingerprint Identity Authentication

Posted on:2009-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:J J ChenFull Text:PDF
GTID:2178360278962688Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Electronic evidences resulted from the ten-year public security policing informationization, and played an important role in sorts of nowadays public security matters. In future, public shall put more effort into solving such problems as legitimate utilization, data sharing and security protection, which are brought by electronic evidences.Based on the fingerprint identity authentication technology and the cryptology technology, our research focused on building an economical and practical electronic evidence policing system, which could be connected seamlessly with the current public security policing informationization. In the system design and implementation, main tasks include:1. By using the fingerprint identification technology, we located fingerprint core points on the preprocessed fingerprint images to extract and match feature vectors, which could compact feature extraction, speed fingerprint matching, and hence realize the unified identity authentication, which could provide an information sharing platform for the electronic evidence policing system as well as many other public security applications.2. To apply the basic principles and algorithms of cryptology, and carry on symmetrical and the asymmetrical encryption and decryption techniques to security preserve electronic evidences; to use the SHA-256 hash algorithm to get and confirm the digital abstracts of electronic evidence data packets, and realize safe signature and submission of electronic evidences based on PKI.3. To define the form of public security case evidence from the point of view of law; to plan and study out the framework of electronic evidence policing systems according to requirements, operation mechanism and the way used.4. To design the overall system by making use of appropriate software engineering methods, and implement it through integrating safety controlling components, communication interface modules, electronic evidence preserving subsystems and electronic evidence submission subsystems. To provide excellent solutions to real requirements based on system integration and testing.5. The system should always be designed and implemented to provide particular information security, through elaborate electronic evidence preservation and submission strategy, authorization management, content protection and access control, which could guarantee the secrecy, authenticity, integrity and usability of electronic evidences.Practical data showed that our system had established a reliable safety barrier for public security electronic evidence businesses, and provided a safe storage space for preserving electronic evidence data as well, which had indeed guaranteed the security and the standardized application of public security electronic evidence information. At the same time, our system suggested that public security organs could merge the legalization and informationization of electronic evidences, and maximize the benefit of electronic evidences applied in political and legal domain.
Keywords/Search Tags:Electronic evidence, Fingerprint identity authentication, Encryption preservation, Signature submission
PDF Full Text Request
Related items