会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SYSTEM AND METHOD FOR COLLECTING FORENSIC DATA VIA A MOBILE DEVICE
    • 用于通过移动设备收集威胁数据的系统和方法
    • US20140244522A1
    • 2014-08-28
    • US14192846
    • 2014-02-27
    • GUIDANCE SOFTWARE, INC.
    • Shawn McCreight
    • G06Q50/26H04W4/00
    • A system and method for conducting forensic investigations by investigators on an investigations field using a mobile device. A digital search warrant is downloaded to the mobile device prior to conducting the forensic investigation. The digital search warrant defines the search parameters of the search to be conducted, including key terms, file types, and the like. The mobile device is coupled to a target device in the investigations field that is the subject of the forensic investigation. The mobile device parses the digital search warrant and automatically identifies and collects data from the target device based on the parsed digital search warrant. The automatically identifying and collecting of the data is done without modifying a state of the target device to retain forensic integrity during the investigation process.
    • 调查人员使用移动设备对调查领域进行法医调查的系统和方法。 在进行法医调查之前,将数字搜索令下载到移动设备。 数字搜索令定义要进行的搜索的搜索参数,包括关键术语,文件类型等。 该移动设备被耦合到作为法医调查对象的调查领域中的目标设备。 移动设备解析数字搜索令,并根据解析的数字搜索令自动识别和收集来自目标设备的数据。 完成数据的自动识别和收集,而不会在调查过程中修改目标设备的状态以保留法医完整性。
    • 2. 发明申请
    • ENTERPRISE COMPUTER INVESTIGATION SYSTEM
    • 企业计算机调查系统
    • US20130212389A1
    • 2013-08-15
    • US13757481
    • 2013-02-01
    • Guidance Software, Inc.
    • Shawn McCreightDominik WeberMatthew Garrett
    • H04L9/00
    • G06F17/30554G06F17/30528G06F17/30867G06F21/60G06F21/606G06F21/64H04L9/00H04L63/0435H04L63/0442H04L63/062H04L63/08H04L63/083H04L63/1433
    • A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
    • 一种用于通过通信网络的客户端机器对目标机器进行安全取证调查的方法,装置和系统。 在一个方面,该方法包括通过通信网络与服务器建立安全通信,通过通信网络建立与目标机器的安全通信,其中建立与目标机器的安全通信包括建立服务器与目标机器之间的安全通信,安装 目标机器上的服务器,通过通信网络向服务器发送安全命令,执行服务中的安全命令,由目标机器响应于服务指令发送数据,以及从目标机器接收数据 通过通信网络。 要强调的是,该摘要被提供以符合要求摘要的规则,这将允许搜索者或其他读者快速确定技术公开的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。
    • 8. 发明申请
    • SYSTEM AND METHOD FOR GENERATING, MAINTAINING, AND QUERYING A DATABASE FOR COMPUTER INVESTIGATIONS
    • 用于产生,维护和查询计算机调查数据库的系统和方法
    • US20160342680A1
    • 2016-11-24
    • US15162591
    • 2016-05-23
    • Guidance Software Inc.
    • Shawn McCreightRoger AngaritaChris Petrus
    • G06F17/30
    • A computer investigation system and method organizes information in a hive. Information in a target device is parsed by a processor, and facts and links are extracted from the data. The processor identifies the fact type for each identified fact, and further generates a fact ID for the fact. The information for the fact is stored in the hive in a fact table associated with the fact type. The processor also identifies the link type for each identified link, and further generates a link ID for the link. The information for the link ID is stored in the hive in a link table associated with the identified link type. A query language that is adapted to work with the hive allows querying of data stored in the hive.
    • 计算机调查系统和方法在蜂巢中组织信息。 目标设备中的信息由处理器解析,并从数据中提取事实和链接。 处理器识别每个识别的事实的事实类型,并进一步生成事实的事实ID。 事实的信息存储在与事实类型相关联的事实表中的配置单元中。 处理器还识别每个已标识链路的链路类型,并进一步生成链路的链路ID。 链接ID的信息被存储在与识别的链接类型相关联的链接表中的蜂巢中。 适用于蜂巢的查询语言允许查询存储在蜂巢中的数据。
    • 10. 发明授权
    • Enterprise computer investigation system
    • 企业电脑调查系统
    • US08838969B2
    • 2014-09-16
    • US13757481
    • 2013-02-01
    • Guidance Software, Inc.
    • Shawn McCreightDominik WeberMatthew Garrett
    • H04L9/00H04L29/06G06F21/60G06F21/64
    • G06F17/30554G06F17/30528G06F17/30867G06F21/60G06F21/606G06F21/64H04L9/00H04L63/0435H04L63/0442H04L63/062H04L63/08H04L63/083H04L63/1433
    • A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
    • 一种用于通过通信网络的客户端机器对目标机器进行安全取证调查的方法,装置和系统。 在一个方面,该方法包括通过通信网络与服务器建立安全通信,通过通信网络建立与目标机器的安全通信,其中建立与目标机器的安全通信包括建立服务器与目标机器之间的安全通信,安装 目标机器上的服务器,通过通信网络向服务器发送安全命令,执行服务中的安全命令,由目标机器响应于服务指令发送数据,以及从目标机器接收数据 通过通信网络。 要强调的是,该摘要被提供以符合要求摘要的规则,这将允许搜索者或其他读者快速确定技术公开的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。