Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A memory data forensics method based on Android platform automated test tool

A technology for automated testing and memory data, applied in electrical digital data processing, software testing/debugging, error detection/correction, etc., to solve problems such as unusable functions, affecting forensic work, and application data not being saved.

Inactive Publication Date: 2019-03-29
南京烽火星空通信发展有限公司
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Android 4.4 and later versions have enabled the selinux mechanism and other security mechanisms by default, making it very difficult to obtain su authority through rooting the mobile phone, thus affecting the development of forensic work
[0005] 2. The FDE (Full Disk Encryption) mode has been enabled by default since Android 6.0, resulting in the image download function not working through the chip manufacturer's burning tool
[0006] 3. Android 7.0 has been enabled by default and does not allow downgrading and installing applications, which makes the function of obtaining application data by downgrading the App unavailable. In addition, if the mobile phone has enabled multi-user mode, the application data under the avatar system cannot be passed through the traditional method. to collect
[0007] 4. For Android 7.0 and later versions, if the mobile phone manufacturer does not provide its own backup function, it will become very difficult to obtain the data of the mobile phone;
[0008] 5. For some APPs running on Andorid mobile phones, their application data is not saved locally, so even if local files can be obtained, their related application data cannot be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A memory data forensics method based on Android platform automated test tool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0031] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0032] Since the Android system provides a set of automated testing tools (ie, UIAutoMator), various simulated operation functions on the mobile phone can be realized, including operations such as clicking, sliding, dragging, and selecting controls on the mobile phone interface. The technical idea of ​​the present invention is to use the set of automated testing tools provided by the Andorid system to realize au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a memory data forensics method based on an Android platform automated test tool. The method uses the automatic test tool UIAutoMator provided by the Android system to simulatethe operation function of the mobile phone. When the user operates the mobile phone to enter a certain interface, the current page data is generated into an xml file through the automatic test tool UIAutoMator; and when the user operates the mobile phone to enter an interface, the xml file is generated through the automatic test tool UIAutoMator. the above-mentioned xml file is analyzed and data collection is completed; When the automatic test tool UIAutoMater cannot resolve the data in the specific interface, the screenshooting function of the automatic test tool UIAutoMater is called to process the screenshooting of the current specific interface, and then the screenshooting pictures captured are recognized and analyzed to complete the data collection. the method effectively solves the shortcomings of the traditional forensics technology and provides a digital forensics method in the intelligent mobile terminal Android system.

Description

technical field [0001] The invention discloses a memory data forensics method based on an Android platform automatic test tool, and relates to the technical field of digital forensics for intelligent mobile terminals. Background technique [0002] With the popularity of smart phones and the wide launch of various APPs running on them, everyone's daily life has been greatly enriched, but at the same time, various cases generated through smart phones have also increased, which has brought great impact on the mobile phone forensics industry. Come a tough challenge. According to the data released by the market research company Gartner in February 2018, the market share of Android has reached 86%, and that of iOS system is 14%. The two together account for 99.9% of the market. And along with the continuous update of Andorid and iOS system versions, the security of the mobile phone system is also constantly enhanced, especially the Android system, because of its open source, ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F8/61
CPCG06F8/61G06F11/3688
Inventor 王飞许先成马良郑钧汤国强
Owner 南京烽火星空通信发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products