Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Table 6

Various patents granted in the development of digital forensics.

Patent titleYearInventorCountryKey features
FiledPublished

Differencing engine for digital forensics20182020Monsen and Glisson [235]USAnomaly detection to mitigate the security attack on cloud-based servers.
Forensic investigation tool20172019Jon D. McEachron [236]USDigital investigation tool capable of recovering and decrypting the content.
Forensic system, forensic methods, and forensic program20152016Morimoto et al. [237]USA medium to acquire and analyze the digital information in a server or a plurality of computers.
Devices and methods for providing security in a remote digital forensic environment20162017Kang et al. [238]USA method for collecting digital evidence from the target system. Analysis of the collected evidence to be done at a remote location.
Method and apparatus for digital forensics20082012Choi et al. [239]USA method to perform digital forensics by extracting page files from the target stored medium. Also, extract features from the extracted page file.
Systems and methods for provisioning digital forensics services remotely over public and private networks20122015Shannon and Decker [240]USA method to collect and analyze electronically stored information over public and private networks using cloud computing.
Digital forensics20092014Buchanan et al. [241]USSystem call information is acquired from the device under test. The acquired data is converted into a sequence format for further investigation.
Methods for data analysis and digital forensics and systems using the same20112014Gil et al. [242]USIt comprises an online data forensic server to acquire and analyze the usage history of a device. It also issues a timestamp to the collected data.
Forensic digital watermarking with variable orientation and protocols20012008K. Levy [243]USA method of forensic digital watermarking on the randomly selected orientation in the content signal.
Secure digital forensics20072011Carpenter and Westerinen [244]USTo perform an audit of computer processor status and memory, a security module is designed. This can be done using a separate hardware path to access the processor register data through a debug port.