会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Local storage of information pedigrees
    • 本地存储信息谱系
    • US08510860B2
    • 2013-08-13
    • US13048713
    • 2011-03-15
    • Ken ThurberRobert A. JoyceJulia A. Baker
    • Ken ThurberRobert A. JoyceJulia A. Baker
    • G06F7/04H04L29/06H04L9/34
    • G06F17/30011G06F21/64H04L29/0687H04L63/105H04L63/12
    • This disclosure describes techniques for dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a document may include local pedigree fragments and optionally one or more pointers to remote pedigree fragments not locally stored in the document. A pedigree fragment, generally, is a data structure that specifies a direct relationship between a first resource, e.g., a primary resource, and a second resource from which an asserted fact of the first resource is derived. Because a pedigree fragment specifies such direct relationships, a set of pedigree fragments may be used to assemble the complete pedigree of resource.
    • 本公开描述了用于动态组合和利用资源谱系的技术。 资源的血统是描述资源来源的一组语句。 如本文所述,文档可以包括本地谱系片段和可选地一个或多个指向远程谱系片段的指向,而不是本地存储在文档中。 一般来说,谱系片段是指定第一资源(例如主资源)和从其导出第一资源的断言事实的第二资源之间的直接关系的数据结构。 因为一个谱系片段指定了这样的直接关系,所以可以使用一组谱系片段来组合完整的资源谱系。
    • 9. 发明授权
    • Extensible software tool for investigating peer-to-peer usage on a target device
    • 用于调查目标设备上的点对点使用的可扩展软件工具
    • US07886049B2
    • 2011-02-08
    • US12190314
    • 2008-08-12
    • Frank N. AdelsteinJudson PowersRobert A. JoyceDerek Bronner
    • Frank N. AdelsteinJudson PowersRobert A. JoyceDerek Bronner
    • G06F15/16G06F15/173
    • H04L63/1425G06F21/55H04L43/065H04L43/0876
    • In general, the invention provides for analyzing a target computer for computer crimes such as illegal sharing of files or sharing of illegal files on peer-to-peer clients. The target computer may have software for a plurality of peer-to-peer clients. Only one extensible forensic device may be necessary to analyze the plurality of peer-to-peer clients for downloaded or shared files. For example, the invention may provide for a method comprising determining whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients. The method further includes, gathering usage information for the one or more peer-to-peer clients that had been determined to be installed on the target computer, analyzing the usage information, and automatically generating a report of the analyzed usage information.
    • 一般来说,本发明提供一种目标计算机,用于分析非法共享文件或在对等客户端上共享非法文件等计算机犯罪行为。 目标计算机可以具有用于多个对等客户端的软件。 只有一个可扩展取证设备可能需要分析多个对等客户端才能下载或共享文件。 例如,本发明可以提供一种方法,包括通过识别与一个或多个对等模块相关联的信息来确定一个或多个对等客户端是否已被安装在目标设备上,其中每个模块是 与一个或多个对等客户端中的不同的一个相关联。 该方法还包括:收集已被确定安装在目标计算机上的一个或多个对等客户端的使用信息,分析使用信息,以及自动生成所分析的使用信息的报告。