Unlock instant, AI-driven research and patent intelligence for your innovation.

Enterprise Computer Investigation System

a computer investigation and enterprise technology, applied in the field of computer investigation systems, can solve the problems of destroying or altering data on the storage device, unable to access such items as swapping files, deleted files, file slack, etc., and unable to access remote administrators such as printer spooler files,

Active Publication Date: 2008-07-31
OPEN TEXT HLDG INC
View PDF34 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach allows for secure, minimally invasive forensic analysis that preserves data integrity by reducing network traffic and avoiding operating system interactions, enabling efficient examination of all file structures and hidden data without altering timestamps or creating temporary files.

Problems solved by technology

For example, merely booting a target computer into its native Windows environment will alter critical date stamps, erase temporary data, and cause data to be written to a hard disk drive or other storage device, thereby possibly destroying or altering data on the storage device.
Viewing computer files presents additional problems when used in a network setting.
Even though a remote administrator can commonly access files, a remote administrator may be unable to access such items as swap files, deleted files, file slack, or printer spooler files.
Additionally, a search done by the remote administrator may be slower than a search carried out by software resident on that node.
Remote access over a computer network also provides additional opportunities for abuse, such as unauthorized inspection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise Computer Investigation System
  • Enterprise Computer Investigation System
  • Enterprise Computer Investigation System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The detailed description set forth below in connection with the appended drawings is intended as a description of exemplary embodiments of the present invention and is not intended to represent the only embodiments in which the present invention can be practiced. The term “exemplary” used throughout this description means “serving as an example, instance, or illustration,” and should not necessarily be construed as preferred or advantageous over other embodiments. The detailed description includes specific details for the purpose of providing a thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced without these specific details. In some instances, well known structures and devices are shown in block diagram form in order to better illustrate the concepts of the present invention.

[0034] Various aspects of the inventive concepts herein will be described in the context of a computer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application is a continuation of U.S. patent application Ser. No. 10 / 176,349, filed Jun. 20, 2002, the entire content of which is incorporated by reference herein.FIELD OF THE INVENTION [0002] The present invention relates to computer investigation systems, and more specifically, to secure computer forensic investigations in a network. BACKGROUND [0003] Computer investigation has become increasingly important as the use of computers has extended to virtually all areas of everyday life. Computer investigation, as used herein, includes computer forensics, which is the collection, preservation and analysis of computer-related evidence. Computer-related evidence is increasingly being used for court trials and police investigations. Computer evidence may be relevant in criminal or civil matters. [0004] One tool for computer forensic investigation is software used to perform the computer forensic investigation. Electronic evidence may be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00G06FG06F11/30G06F12/14G06F21/00H04L9/32H04L29/06
CPCG06F21/606G06F21/64H04L63/0435H04L63/0442H04L63/08H04L63/083H04L63/1433H04L9/00H04L63/062G06F16/248G06F16/9535G06F16/24575G06F21/60
Inventor MCCREIGHT, SHAWNWEBER, DOMINIKGARRETT, MATTHEW
Owner OPEN TEXT HLDG INC