Unlock instant, AI-driven research and patent intelligence for your innovation.

Database forensics method and device

A database and specific data technology, applied in the database field, can solve problems such as low operation efficiency and complex process of the target database, and achieve the effect of improving operation efficiency, solving complex process, and simplifying operation process

Active Publication Date: 2016-08-24
SAFE STONE INFORMATION TECHBEIJINGCO
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the embodiment of the present invention provides a database forensics method and device to solve the existing problems in the existing database forensics methods, such as complex process of obtaining the target database and low operation efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database forensics method and device
  • Database forensics method and device
  • Database forensics method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] figure 1 It shows the working flow diagram of the database forensics method provided by the embodiment of the present invention, and the method includes:

[0035] Step 101, according to the database structure of the target database and the table structure of each table included in the target database, establish and save a blank result database having the same structure as the target database;

[0036] Specifically, for the target database in the offline device, the database export file and / or the database backup file and / or the database file in the target database can be loaded through a preset interface to obtain the database structure of the target database and each database included in the target database. The table structure of the table; for the online target database, it can be connected to the online target database through the preset interface according to the address information of the target database, and based on the known authentication information or author...

Embodiment 2

[0047] figure 2 Another work flow diagram of the database forensics method provided by the embodiment of the present invention is shown, the method includes:

[0048] Step 201, according to the database structure of the target database and the table structure of each table included in the target database, establish and save a blank result database having the same structure as the target database;

[0049] Similar to the above step 101, the structure of the target database can be obtained by loading the target database to access the target database in the offline device, or access the online target database through a preset interface, and establish the result database according to the obtained target database structure;

[0050] Establish and save the result database with the same structure as the target database, and be able to obtain and save the structural characteristics of the target database;

[0051] Step 202, check the target database to obtain the check value of the ...

Embodiment 3

[0067] The embodiment of the present invention also provides a database forensics method, the method is based on the first or second embodiment, such as image 3 As shown, the following processing is also included:

[0068] Step 301, acquiring and saving user information and log information of the target database;

[0069] Wherein, the log information includes one or a combination of the following: login log, operation log, SQL log, import and export log, backup log, error log, alarm log, and the log information may also include other types of log information;

[0070] Obtaining and saving log information can replicate the operation of the target database, and can provide reference for subsequent analysis and processing in application scenarios such as electronic data forensics;

[0071] Step 302, respectively verifying the acquired user information and log information to obtain the verification value of the user information and the verification value of the log information, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database evidence obtaining method and device. The method includes the steps of establishing and storing a blank result database of the same structure as a target database according to the database structure of the target database and the table structures of all tables contained in the target database, conducting copying to obtain the structure of the target database, verifying all records of all the tables in the target database to obtain verification values, storing the verification values of all the records in the target database, sealing and storing the records in the target database, obtaining the records, meeting the set conditions, in the target database, storing the obtained records, and only copying required record content. Thus, by means of the database evidence obtaining method and device, the content of the target database is prevented from being all obtained, operation procedures can be simplified, operation efficiency is improved, and the problems that by means of an existing database evidence obtaining method, the procedure is complex and operation efficiency is low when the target database is obtained can be solved.

Description

technical field [0001] The invention relates to database technology, in particular to a method and device for obtaining evidence from a database. Background technique [0002] At present, database forensics methods usually include: backup and export the entire target database, install the same platform and the same version of database software on the operator's computer, and then import the exported database backup file to obtain the target database. A basically consistent result database, based on which the operator conducts analysis and evidence collection. [0003] However, in the process of database forensics, it may be necessary to collect forensics on databases of different platforms. Using the above method to obtain forensics on databases of multiple different platforms requires operators to be familiar with the operation methods of each platform, which leads to the complexity of the process of the above-mentioned database forensics method. High technical requirement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
CPCG06F16/214G06F16/2282G06F16/27
Inventor 韩晟王盈
Owner SAFE STONE INFORMATION TECHBEIJINGCO