Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37 results about "Computer forensics" patented technology

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

SQLite data recovery method applicable to merging of non-integral primary keys with free blocks

The invention provides an SQLite data recovery method applicable to merging of non-integral primary keys and free blocks and relates to the field of computer forensics. The method includes the steps of 1), starting from a root page and a file header to search all the free blocks and free pages; 2), analyzing difference of cell layout of integral primary keys and the non-integral primary keys as well as difference of meanings of bytes, temporarily assuming each free block contains one cell, calculating information of types covered, analyzing the type information and a data field and performing data recovery; 3), for the free blocks cannot pass the step 2), believing that each of the free blocks contains multiple cell, pre-estimating length of the cells stored in the free blocks is from 4 to free block length on the basis of splitting and verifying, and judging pre-estimated values with a single free block extraction module; 4), in response to decreasing of the free blocks due to B+tree reorganization, extracting the data from the free pages collected in the step 1). With the method, the data deleted can be easily recovered from SQLite3 database files, and the data is provided for follow-up electronic forensics work.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

A sqlite data recovery method suitable for merging non-integer primary keys and free blocks

The invention provides an SQLite data recovery method applicable to merging of non-integral primary keys and free blocks and relates to the field of computer forensics. The method includes the steps of 1), starting from a root page and a file header to search all the free blocks and free pages; 2), analyzing difference of cell layout of integral primary keys and the non-integral primary keys as well as difference of meanings of bytes, temporarily assuming each free block contains one cell, calculating information of types covered, analyzing the type information and a data field and performing data recovery; 3), for the free blocks cannot pass the step 2), believing that each of the free blocks contains multiple cell, pre-estimating length of the cells stored in the free blocks is from 4 to free block length on the basis of splitting and verifying, and judging pre-estimated values with a single free block extraction module; 4), in response to decreasing of the free blocks due to B+tree reorganization, extracting the data from the free pages collected in the step 1). With the method, the data deleted can be easily recovered from SQLite3 database files, and the data is provided for follow-up electronic forensics work.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Computer forensics investigation apparatus

The invention discloses a computer forensic investigation equipment, which comprises a flat plate, the left and right ends of the flat plate are fixedly connected to the inner corresponding sides of the slip ring, the middle part of the slip ring is slidably installed with a sliding column, and the lower end of the sliding column passes through a rotating shaft Rotate and connect the upper side of the triangular plate, the lower end of the triangular plate is fixedly connected to the upper middle part of the grounding plate, the lower end of the grounding plate is provided with an anti-skid surface, and the upper end of the sliding column is fixedly connected to the lower end middle part of the limiting plate. The right-angle insert rod is inserted into the lock groove to stabilize the position of the slip ring, and then the device is placed on the uneven ground for use, and the small evidence is placed in the cylinder, which is inserted into the cylinder groove, and the clamping plate corresponds to the clamping Slot, rotate the right-angle turning lever, and the card board is stuck in the card slot, which is convenient for placing small documents on the device. After the lock lever is out of the socket, the card board comes out of the card slot, and the small evidence is taken out of the cylinder Use, and then it is convenient to use when looking for small documents next time.
Owner:成都安信思远信息技术有限公司

A reliability verification method, device and system based on computer forensics

ActiveCN112668649BOvercoming flaws not applicable to hidden computer virusesReliable forensicsCharacter and pattern recognitionPlatform integrity maintainanceAlgorithmUltraviolet lights
This application discloses a reliability verification method, device and system for computer forensics, which obtains hidden computer viruses, image recognition models and coding rules; irradiates visible light on the real picture frame; conducts the first image collection and processing, and obtains the second One image, to obtain the first image recognition result; carry out the first encoding process to obtain the first code; irradiate the ultraviolet light and visible light on the real picture frame at the same time; carry out the second image acquisition process to obtain the second image, and obtain the second Image recognition result; obtain the second code; make the real picture frame only be irradiated by ultraviolet rays; perform the third image acquisition process to obtain the third image and obtain the third image recognition result; perform the third encoding process to obtain the third code; Integrate into the total code, and calculate the similarity value; if the similarity value is greater than the similarity threshold, it is determined that the computer forensics is reliable. Therefore, the reliability verification of forensics for hidden computer viruses is realized.
Owner:CHINA SOUTHERN POWER GRID COMPANY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products