
浏览全部资源
扫码关注微信
1.中国人民公安大学侦查学院,北京 100038
2.温州市公安司法鉴定中心,浙江 温州 325101
3.中国人民公安大学公共安全行为科学实验室,北京 100038
Received:01 December 2014,
Revised:2025-12-05,
Accepted:25 December 2025,
Online First:30 March 2026,
Published:20 April 2026
移动端阅览
顾红星,上官梦轩,丁锰等.面向指纹考勤机的数据取证与分析方法[J].电信科学,
Gu Hongxing,Shangguan Mengxuan,Ding Meng,et al.Data forensics and analysis for fingerprint attendance machines[J].Telecommunications Science,
顾红星,上官梦轩,丁锰等.面向指纹考勤机的数据取证与分析方法[J].电信科学, DOI:10.11959/j.issn.1000−0801.2026103.
Gu Hongxing,Shangguan Mengxuan,Ding Meng,et al.Data forensics and analysis for fingerprint attendance machines[J].Telecommunications Science, DOI:10.11959/j.issn.1000−0801.2026103.
指纹考勤机作为目前广泛应用的身份识别设备,其存储的指纹数据和考勤记录在法庭科学中具有重要的取证价值。然而,对其取证和分析面临以下3个问题:常规取证方法受限、指纹模板数据识别困难、缺少有针对性的关联分析方法。针对以上问题,提出了一种面向指纹考勤机的数据取证与分析方法。首先根据指纹考勤机的存储特性,研究直连提取方法,能够直接从存储芯片中读取底层数据;其次,针对考勤机中常见的3类指纹模板,提出对应的识别方法;最后,对于考勤机内部不同类型的数据,提出异构数据的关联分析方法。实验结果表明,该方法能够突破接口限制,可实现复杂条件下的数据提取,对于指纹模板数据可实现跨设备识别,在此基础上通过关联分析能够发现涉案人的行为模式,为法庭科学取证工作提供新的思路和方法。
As widely applied identity recognition devices
fingerprint attendance machines store fingerprint data and attendance records
which possess significant evidentiary value in forensic science. However
the forensic extraction and analysis of this data were challenged by three primary issues: the limitations of conventional extraction methods
the difficulty in identifying fingerprint template data
and the lack of targeted correlation analysis methods. To address the aforementioned issues
a data forensic and analysis method specifically for fingerprint attendance machines was proposed. Firstly
based on the storage characteristics of the attendance machines
a direct-connect extraction method was developed
by which low-level data could be read directly from the storage chip. Secondly
corresponding identification methods were proposed for the three common types of fingerprint templates found in these machines. Finally
for the different types of data within the machines
a correlation analysis method for heterogeneous data was put forward. Experimental results demonstrated that interface limitations could be overcome by this method
and data extraction was achieved under complex conditions. For fingerprint template data
cross-device identification was realized. Building on this
the behavioral patterns of individuals involved could be discovered through correlation analysis. Consequently
new approaches and methodologies were provided for forensic science work.
Rahkoyo E , Yangdol S , Kaur B , et al . IoT-based fingerprint attendance system: enhancing efficiency and security in educational and organizational settings [C ] // Proceedings of the 2024 International Conference on Advances in Modern Age Technologies for Health and Engineering Science (AMATHE) . Piscataway : IEEE Press , 2024 : 1 - 7 .
Kanagamalliga S , Rajalingam S , Karthikeyan M , et al . Arduino-powered fingerprint authentication for door access control [C ] // Proceedings of the 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC) . Piscataway : IEEE Press , 2024 : 131 - 135 .
Malabi Y , Hani'ah M , Noprianto , et al . Efficient employee attendance system integrating RFID and Android-based face recognition with liveness detection [C ] // Proceedings of the 2024 International Conference on Electrical and Information Technology (IEIT) . Piscataway : IEEE Press , 2024 : 163 - 168 .
梁广俊 , 辛建芳 , 王群 , 等 . 物联网取证综述 [J ] . 计算机工程与应用 , 2022 , 58 ( 8 ): 12 - 32 .
Liang G J , Xin J F , Wang Q , et al . Survey of IoT forensics [J ] . Computer Engineering and Applications , 2022 , 58 ( 8 ): 12 - 32 .
Sang T , Gharaibeh M A , Wentlent L , et al . Drop and impact reliability investigation of BGA and LGA interconnects [J ] . Soldering & Surface Mount Technology , 2023 , 35 ( 4 ): 244 - 254 .
Song K X , Gao J C , Flowers G T , et al . Modeling and analysis of signal integrity of ball grid array packages with failed ground solder balls [J ] . IEEE Transactions on Components, Packaging and Manufacturing Technology , 2022 , 12 ( 2 ): 306 - 315 .
Hung H H , Cheng Y C , Hwang S J , et al . Analysis of flip-chip ball grid array underfill flow process [J ] . The International Journal of Advanced Manufacturing Technology , 2024 , 134 ( 9 ): 4851 - 4870 .
Yang H , Xu Z Y . Comparison of nano-silver solder joints and SAC305 based on ANSYS simulation and life prediction [J ] . AIP Advances , 2023 , 13 ( 6 ): 065025 .
Singh D , Kaur H , Verma C , et al . A novel 3-D image encryption algorithm based on SHA-256 and chaos theory [J ] . Alexandria Engineering Journal , 2025 , 122 : 564 - 577 .
Abdullahi S M , Sun S F , Wang B , et al . Biometric template attacks and recent protection mechanisms: a survey [J ] . Information Fusion , 2024 , 103 : 102144 .
Kaur P , Kumar N , Singh M . Biometric cryptosystems: a comprehensive survey [J ] . Multimedia Tools and Applications , 2023 , 82 ( 11 ): 16635 - 16690 .
National Institute of Standards and Technology . Proprietary fingerprint template (PFT) III evaluation: NIST-ITL-IAD-2022 [R ] . Gaithersburg : NIST , 2022 .
Fakhouri H N , AlSharaiah M A , Alhwaitat A K , et al . Overview of challenges faced by digital forensic [C ] // Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR) . Piscataway : IEEE Press , 2024 : 1 - 8 .
Klasén L , Fock N , Forchheimer R . The invisible evidence: Digital forensics as key to solving crimes in the digital age [J ] . Forensic Science International , 2024 , 362 : 112133 .
Faizal A , Luthfi A . Comparison study of NIST SP 800-86 and ISO/IEC 27037 standards as a framework for digital forensic evidence analysis [J ] . Journal of Information Systems and Informatics , 2024 , 6 ( 2 ): 701 - 718 .
Alshumrani A , Clarke N , Ghita B . A unified forensics analysis approach to digital investigation [C ] // Proceedings of the 18th International Conference on Cyber Warfare and Security (ICCWS 2023) . Reading : Academic Conferences International Press , 2023 : 466 - 475 .
Önel İ G , Arbac S , Korçak Ö . Flash memory based performance analysis on PROFINET devices [C ] // Proceedings of the 2025 24th International Symposium INFOTEH-JAHORINA (INFOTEH) . Piscataway : IEEE Press , 2025 : 1 - 7 .
Tong G G , Huang H S , Li X . Flash controller verification for dual-core IoT chip [C ] // Proceedings of the 2025 5th International Conference on Artificial Intelligence and Industrial Technology Applications (AIITA) . Piscataway : IEEE Press , 2025 : 1509 - 1512 .
Li Y H , Nie Y J , Huang Z H , et al . Research on firmware upgrade method of PCIE board based on FPGA [C ] // Proceedings of the 2024 IEEE 4th International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) . Piscataway : IEEE Press , 2024 : 1340 - 1344 .
Huang H , Pan Y Q , Xia W , et al . Simplifying and accelerating NOR flash I/O stack for RAM-restricted microcontrollers [C ] // Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems , Volume 2 . New York : ACM Press , 2025: 1076 - 1090 .
孙鉴 , 武晓晓 , 谢开斌 , 等 . 面向闪存的树型索引综述 [J ] . 计算机工程与应用 , 2022 , 58 ( 22 ): 30 - 40 .
Sun J , Wu X X , Xie K B , et al . Review of tree index based on flash memory [J ] . Computer Engineering and Applications , 2022 , 58 ( 22 ): 30 - 40 .
Ben Moussa N , Chetoui M , Amairi M . Optimization-based robust fractional-order controllers design for multiple-input single-output systems with time delays [J ] . Measurement and Control , 2025 , 58 ( 10 ): 1383 - 1398 .
Suresh A , Pruthviraj N N , Srivastava S , et al . Reliable and expandable SPI interface for multichannel ADC [C ] // Proceedings of the SoutheastCon 2024 . Piscataway : IEEE Press , 2024 : 989 - 994 .
Shaila C K , Manoj G , Divya P S , et al . Functional verification of SPI protocol using UVM based on AMBA architecture for flash memory applications [C ] // Proceedings of the 2023 4th International Conference on Signal Processing and Communication (ICSPC) . Piscataway : IEEE Press , 2023 : 311 - 315 .
Gao J C , Zhang G H , Wu Y F , et al . Research on the reliable loading technology of OS-based space-borne embedded systems [C ] // Proceedings of the 2024 IEEE 6th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) . Piscataway : IEEE Press , 2024 : 1365 - 1370 .
Li S M , Xu H , Wang J K , et al . Hierarchical perceptual noise injection for social media fingerprint privacy protection [J ] . IEEE Transactions on Image Processing , 2024 , 33 : 2714 - 2729 .
Bouhamed S A . Possibilistic modeling for fingerprint image quality assessment in Automatic Identification Systems [J ] . Applied Soft Computing , 2025 , 171 : 112790 .
Jia Z X , Huang C W , Wang Z , et al . Finger recovery transformer: toward better incomplete fingerprint identification [J ] . IEEE Transactions on Information Forensics and Security , 2024 , 19 : 8860 - 8874 .
Yang W C , Wang S , Hu J K , et al . Feature extraction and learning approaches for cancellable biometrics: a survey [J ] . CAAI Transactions on Intelligence Technology , 2024 , 9 ( 1 ): 4 - 25 .
李思远 , 陈文燕 , 朱文龙 . 基于被动矩阵有机发光二极管屏的光学指纹采集系统 [J ] . 科学技术与工程 , 2021 , 21 ( 12 ): 5005 - 5010 .
Li S Y , Chen W Y , Zhu W L . Optical fingerprint acquisition system based on passive matrix OLED screen [J ] . Science Technology and Engineering , 2021 , 21 ( 12 ): 5005 - 5010 .
Dunsin D , Ghanem M C , Ouazzane K , et al . A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response [J ] . Forensic Science International: Digital Investigation , 2024 , 48 : 301675 .
Birler A , Schmidt T , Fent P , et al . Simple, efficient, and robust hash tables for join processing [C ] // Proceedings of the 20th In ternational Workshop on Data Management on New Hardware . New York : ACM , 2024 : 1 - 9 .
Tanović A , Mezei I . Embedded parallel K-means algorithm evaluation on ESP32 across various memory allocations [C ] // Proceedings of the 2024 IEEE East-West Design & Test Symposium (EWDTS) . Piscataway : IEEE Press , 2025 : 1 - 7 .
Zubair M , Iqbal M A , Shil A , et al . An improved K-means clustering algorithm towards an efficient data-driven modeling [J ] . Annals of Data Science , 2024 , 11 ( 5 ): 1525 - 1544 .
0
Views
0
下载量
0
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621