Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

47 results about "Digital forensics" patented technology

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

Apparatus and method for searching for digital forensic data

Provided are an apparatus and method for searching for digital forensic data. In particular, provided are an apparatus and method for searching for digital forensic data capable of automatically determining a character encoding type that is used in searching for data. The apparatus for searching for digital forensic data includes: an imaging module for generating an image file from a data source; a file system analysis module for analyzing a file system of the image file to generate file system analysis information; a search module for determining a search character encoding type based on the file system analysis information and searching for the data using the search character encoding type; and a user interface for receiving a command related to a search from a user, transmitting the received command to the file system analysis module and the search module, and outputting the search results to the user. In searching for digital forensic data, information on an operating system, a processor and an active character encoding type, which are actually used by a suspect, is extracted to determine a search character encoding type, so that accuracy and efficiency of searching for data are increased, and time, effort and money spent in determining a character encoding type are reduced.
Owner:ELECTRONICS & TELECOMM RES INST

Method and system for achieving synergic forensic analysis on remote forensic target terminal

The invention relates to a method for achieving synergic forensic analysis on a remote forensic target terminal. The method comprises the following steps: dividing forensic analysis scripts into a plurality of corresponding basic operation unit sequences through the remote forensic target terminal; judging whether all basic operation unit sequences have repeated basic operation unit sequences or not through the terminal; if the basic operation unit sequences have repeated basic operation unit sequences, combining the repeated basic operation unit sequences, or else associating the basic operation unit sequences with a forensic analysis data target, and performing corresponding operation on the forensic analysis data target associated with the basic operation unit sequences according to the basic operation unit sequences. The invention further provides a system for achieving synergic forensic analysis on the remote forensic target terminal. The system comprises a forensic server and a forensic script interpreter. By adopting the method and the system provided by the invention, the forensic scripts are interpreted into specific forensic behavior and the forensic behavior is reasonably combined and optimized, so that the reliability of digital forensic analysis and the analysis processing efficiency are improved, and the method and the system have a relatively wide application range.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Apparatus and method for searching for digital forensic data

Provided are an apparatus and method for searching for digital forensic data. In particular, provided are an apparatus and method for searching for digital forensic data capable of automatically determining a character encoding type that is used in searching for data. The apparatus for searching for digital forensic data includes: an imaging module for generating an image file from a data source; a file system analysis module for analyzing a file system of the image file to generate file system analysis information; a search module for determining a search character encoding type based on the file system analysis information and searching for the data using the search character encoding type; and a user interface for receiving a command related to a search from a user, transmitting the received command to the file system analysis module and the search module, and outputting the search results to the user. In searching for digital forensic data, information on an operating system, a processor and an active character encoding type, which are actually used by a suspect, is extracted to determine a search character encoding type, so that accuracy and efficiency of searching for data are increased, and time, effort and money spent in determining a character encoding type are reduced.
Owner:ELECTRONICS & TELECOMM RES INST

YAFFS2 broken file reconstructing method based on history version

ActiveCN104778099AAchieve the purpose of recoveryMeet the requirements for accessing data stored on the deviceRedundant operation error correctionArray data structureFile system
The invention discloses a YAFFS2 broken file reconstructing method based on a history version. The YAFFS2 broken file reconstructing method comprises the following steps of scanning a NAND flash memory, and establishing a file node tree of the whole file system; judging whether the file is complete or not on the file node tree; storing the object number of the incomplete file into an array tmp[0]; storing the page numbers of all pages of the file on the file node tree into the tmp[1] -tmp[n]; scanning the pages on the NAND, and reading the yaffs_tags of each page; when the object number is tmp[0], implementing the next step; judging whether the object number of the current page exists in the array tmp[] or not; when the object number of the current page exists in the array tmp[], continuing to scan; when the object number of the current page does not exist in the array tmp[], inserting the page into the file node tree; when the incomplete file has been completed, copying all page data into the new specified address, and clearing the array tmp[]. The YAFFS2 broken file reconstructing method has the beneficial effects that the broken file is reconstructed according to the history version of the file, so as to realize the purpose of data recovery; in the digital forensics process, the requirements of completely obtaining the data stored in the equipment as much as possible is met.
Owner:黄炜

Digital forensic file fragment classification method based on digital image transformation and deep learning

The invention provides a digital forensic file fragment classification method based on digital image conversion and deep learning. Firstly, file fragments are converted to grayscale images, and then deep learning is utilized to extract more hidden features of the images to improve performance of file fragment classification. The more hidden features include different texture features, random features and compressibility used for classification. Deep learning uses a modified and optimized CNN model. A first convolutional layer of the model uses a 1x1 ratio convolutional kernel, and the same uses many pipes to enable a network structure to be complicated. All layers have different-numbers-and-scales filtering kernels, and thus feature maps best matching the classification model are obtainedby training through gradient descents and reverse training. According to the method, high-dimensional features of the file fragments are extracted through utilizing the advantages of local connectionand weight sharing of a CNN, and the scheme can also realize high-precision fragment classification for files such as composite files and compressed files which are not easy to classify in previous schemes.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

Systems and methods for remote forensics and data security services over public and private networks

InactiveUS20170366583A1Challenge can be overcomeExisting technologyTransmissionWorkstationData loss
Provided are systems and methods for employing remote forensics and data security services over public and private networks by obtaining full access to digital data from the non-transitory computer-readable media of geographically dispersed computing devices such that the entire physical or logical media from each device is fully accessible to one or more user computers over the network. This is achieved via WebSocket technology implemented in point-to-point connection configurations, WebSocket technology implemented in network based digital data software switch configurations, and in combinations thereof. Application of these systems and methods are generally employed for the purpose of conducting remote examinations and remediation efforts upon electronic data comprising non-transitory computer-readable media on a network accessible computing device. As a few examples, the application of these systems and methods may be applied for the purposes of data sharing, remote computer support, data recovery, data loss prevention, data backup, eDiscovery (electronic discovery), digital forensics, remote monitoring, audit compliance, incident response, security incident remediation, and mobile device data management purposes. Examples of computing devices include, but are not limited to, workstations, laptops, tablets, smart phones, network routers, network switches, mobile computing devices, electronic sensors, and any device comprising the Internet of Things (IoT).
Owner:SHANNON MATTHEW MARTIN +1

Method for locating geographical position of disk based on protocol head of hyper text transfer protocol (HTTP)

The invention discloses a method for locating a geographical position of a computer hard disk. The method comprises the following steps of: extracting protocol head information of a hyper text transfer protocol (HTTP) in the computer hard disk; constructing a geographical position name tree and a two-dimensional weight value linked list, scanning a Cookie data area of the HTTP protocol head, traversing the geographical position name tree for matching the geographical position name tree with each Cookie data area, if the matching succeeds, performing add operation on weights of nodes; constructing a data dictionary, and sequencing the data dictionary according to the sizes of weight values; and scanning a Data area in the HTTP protocol head, and acquiring the time when the computer hard disk is located at a certain historical position, so that strong physical evidence can be provided for criminal investigation work. According to the method, manual intervention is not required in a forensics process, disk scanning, calculation and final result generation can be automatically realized, operating cost is low, deployment is easy, and the method is applied to the field of computer hard disk digital forensics and has a wide application prospect.
Owner:SICHUAN UNIV

Digital forensic method and system based on Android memory dump technology

The invention discloses a digital forensic method and system based on Android memory dump technology. The system comprises the following steps: determining that the Android equipment has been rooted, and starting a USB debugging function; dumping a physical memory of the Android equipment; statically searching the dumped Android memory to excavate sensitive data; dynamically analyzing the physical memory, listing information such as running processes, open ports and loading modules of the equipment, detecting whether rogue program is existent in the equipment; analyzing structure features stored in the memory through application program data, and extracting locally encrypted and stored application data; detecting different type data of the application program, namely: text, voice, pictures and the like, and attempting to recover deleted data in the memory; searching user information such as username, password and the like in the memory to detect whether the application program can safely protect user privacy; and generating a digital forensic summary report according to the memory analysis result. Through the adoption of the method and system disclosed by the invention, the effectiveness and completeness of the digital forensic at a mobile terminal are improved, and the extensive technical and market application value are realized.
Owner:NANJING UNIV OF POSTS & TELECOMM

Digital forensics method based on blockchain privacy protection and fine-grained access control

ActiveCN111327597BPrevent abuse of powerSolve the problem of guarding and stealingSecuring communicationShardPrivacy protection
The invention discloses a digital forensics method based on blockchain privacy protection and fine-grained access control. The first supervisor creates a digital forensics transaction, initiates a digital forensics transaction request to the second supervisor, and transmits important information of the digital forensics transaction to the second supervisor. Two regulators; the second regulator generates attribute encryption intermediate parameters through the encryption module, and authorizes and publishes them in the blockchain; after the first regulator is authorized, it obtains the shard key from the key management institution module through the authorization information, and Combine the fragmentation keys to generate a decryption key, and the data acquisition module collects data in the storage system through the decryption key; the first supervisor analyzes the data after collecting the data, and obtains the data analysis results; then generates a digital report for forensics, and the forensics is completed ; The present invention utilizes the potential of blockchain and smart contracts, and designs encryption primitives to build a blockchain-based Internet of Vehicles digital forensics solution, which has auditability, privacy protection and fine-grained data access control.
Owner:JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products