Internet forensics method, device and Internet security system
An Internet, global technology, applied in the Internet field, can solve the problem of low credibility of network forensics, and achieve the effect of improving security and credibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0038] A kind of Internet forensics method of present embodiment such as figure 1 shown, including:
[0039] Step S1, connect to the virtual server of the notary office, use the virtual server as a proxy to access the network, and open the target interface. Among them, the target interface includes: website pages and instant messaging web pages, for example: the original author of an online work (novel or micro movie, etc.) discovers that a certain website has upl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


