|
Patent title | Year | Inventor | Country | Key features |
Filed | Published |
|
Differencing engine for digital forensics | 2018 | 2020 | Monsen and Glisson [235] | US | Anomaly detection to mitigate the security attack on cloud-based servers. |
Forensic investigation tool | 2017 | 2019 | Jon D. McEachron [236] | US | Digital investigation tool capable of recovering and decrypting the content. |
Forensic system, forensic methods, and forensic program | 2015 | 2016 | Morimoto et al. [237] | US | A medium to acquire and analyze the digital information in a server or a plurality of computers. |
Devices and methods for providing security in a remote digital forensic environment | 2016 | 2017 | Kang et al. [238] | US | A method for collecting digital evidence from the target system. Analysis of the collected evidence to be done at a remote location. |
Method and apparatus for digital forensics | 2008 | 2012 | Choi et al. [239] | US | A method to perform digital forensics by extracting page files from the target stored medium. Also, extract features from the extracted page file. |
Systems and methods for provisioning digital forensics services remotely over public and private networks | 2012 | 2015 | Shannon and Decker [240] | US | A method to collect and analyze electronically stored information over public and private networks using cloud computing. |
Digital forensics | 2009 | 2014 | Buchanan et al. [241] | US | System call information is acquired from the device under test. The acquired data is converted into a sequence format for further investigation. |
Methods for data analysis and digital forensics and systems using the same | 2011 | 2014 | Gil et al. [242] | US | It comprises an online data forensic server to acquire and analyze the usage history of a device. It also issues a timestamp to the collected data. |
Forensic digital watermarking with variable orientation and protocols | 2001 | 2008 | K. Levy [243] | US | A method of forensic digital watermarking on the randomly selected orientation in the content signal. |
Secure digital forensics | 2007 | 2011 | Carpenter and Westerinen [244] | US | To perform an audit of computer processor status and memory, a security module is designed. This can be done using a separate hardware path to access the processor register data through a debug port. |
|