CN101017563A - Method for fixing and saving evidence of computer crime and device therefor - Google Patents

Method for fixing and saving evidence of computer crime and device therefor Download PDF

Info

Publication number
CN101017563A
CN101017563A CN 200610144812 CN200610144812A CN101017563A CN 101017563 A CN101017563 A CN 101017563A CN 200610144812 CN200610144812 CN 200610144812 CN 200610144812 A CN200610144812 A CN 200610144812A CN 101017563 A CN101017563 A CN 101017563A
Authority
CN
China
Prior art keywords
evidence
fixing
personnel
damage
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200610144812
Other languages
Chinese (zh)
Inventor
唐勇
韦韬
高明
张行功
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN 200610144812 priority Critical patent/CN101017563A/en
Publication of CN101017563A publication Critical patent/CN101017563A/en
Pending legal-status Critical Current

Links

Images

Abstract

This invention provides one computer criminal evidence fix and ensuring method, which comprises the following steps: starting suspect devices to modify the suspect Bios set to primordially start the supportive disc; identification step to identify the person for electron evidence; recording device and operating information for evidence person, operation time and evidence medium; data images and property computing for property on the magnetic disc static memory medium for total images; crossly identifying according to fix result and process legality contract to ensure more than two legality evidence person on spot; printing the operation information and signature for final determination to fulfill electron signature and paper signature.

Description

Fixing and the security method of a kind of the evidence of computer crime and realize the device of this method
Technical field
The present invention relates to the fixing and security method of the evidence of computer crime and realize the device of this method, particularly owing to use a computer and the obtaining, fix and method of saving from damage and the device of realizing this method of various judicals that network causes and the electronic evidence in the investigation computer crime process.
Background technology
Along with the high speed development of infotech, computer and network becomes the important component part of society, politics, economy, culture life, is profoundly changing people's life.Meanwhile, the dependence of infotech has also been brought huge security risk to human society, various judicals relevant with computing machine and computer crime phenomenon are more and more, become increasingly conspicuous, and the trend of further expansion is arranged.Fully reliable, convictive electronic evidence becomes the important means of resolving a dispute and hitting computer crime.Therefore, computer forensics (Computer Forensic) is as the cross discipline of the computing machine and the science of law---and receive increasing concern, even become the focus of FIRST (forum ofincident response and security teams) meeting safe year for successive years.
Computer forensics comprises having potential legal effect, is present in the overall process of obtaining, protect, analyze, identify, filing of the electronic evidence in computing machine, relevant peripheral hardware and the network.Electronic evidence comprises the data message that is present on the static physical medium (magnetic medium, light medium, magnet-optical medium), as hard disk, and CD, floppy disk, tape, the information on the memory devices such as flash card; Just at the dynamic data information such as the internal storage data of operating computer system, registration table, temporary file, port status, progress information etc., journal file; The data message of the network operation comprises the data message of the network of flowing through etc.Electronic evidence has high-tech, invisible nature, and diversity, objective reality, destructible, compositeness is collected rapidly principal characters such as easy preservation.It is the important products and the advanced achievement of modern high technology development, is the embodiment of development of modern science and technology on Evidence in Litigation, and is with high content of technology, easily be forged, distort and go to pot.Exist with specific binary coding form, data storage is in magnetic medium, and is hidden invisible.Simultaneously it should have the characteristic of the objective reality of common judicial evidence, and is associated with concrete criminal offence, and the evidence obtaining process is legal authenticating.
The computer crime evidence obtaining is exactly by thorough, effective and safe computer information technology is provided, guarantee the true and reliable property of the electronic evidence in the computer crime investigation and evidence collection process, relevance, integrality, the legitimacy of confirmability, high resisting breakage and evidence obtaining flow process.
Fixing and saving from damage of the evidence of computer crime is the first step of computer forensics work, also is a most important link, and it is the basis of all other work.Follow-up work also comprises the analysis of electronic evidence, finds, extracts etc.Also do not have the method for the complete computer crime evidence obtaining of a cover at present both at home and abroad, this field belongs to new things.The present invention can solve the subproblem in this field.
Summary of the invention
The purpose of this invention is to provide that a kind of the evidence of computer crime is fixed and method of saving from damage and the device of realizing this method.The evidence of computer crime of the present invention is fixed with security method and is realized that the device of this method has adopted computer security techniques such as authentication, digital signature, data check, has ensured the legitimacy of electronic evidence, relevance, confirmability, integrality.
The evidence of computer crime of the present invention is fixed and the method for saving from damage comprises: the step that starts suspicion equipment: the Bios that revises the suspicion computing machine is provided with, and makes computing machine support that CD preferentially starts, and automated induction systems starts the suspicion computing machine; Identification step is used for the evidence obtaining personnel's of electronic evidence identity is authenticated, and finishes the audit to its legal qualification; Recording unit and operation information step are used to write down evidence obtaining personnel's identity, and the running time, the information of evidence obtaining medium etc. guarantee electronic evidence that is obtained and the relevance of collecting evidence between the medium; The step of data image and eigenvalue calculation is used for the electronic evidence that is present on the static memory medium such as disk is carried out completely mirror image and counter eigenwert by turn; The step of cross-certification is used for the fixedly legitimacy approval of result and process of evidence is guaranteed that the judicial evidence collection personnel more than two carry out work simultaneously at the scene; The step of printing information and signature is used for the fixedly result and the procedural information of electronic evidence are finally confirmed, finishes the signature of electronic signature and papery.
Because the evidence of computer crime of the present invention is fixed and the method for saving from damage has adopted CD self-starting technology, allow the evidence obtaining personnel under the condition of not dismantling hard disk, magnetic disk media to needs evidence obtainings carries out completely mirror image by turn, has fully guaranteed the reliability of the electronic evidence obtained.
The evidence of computer crime of the present invention is fixed and the feature of the method for saving from damage also is, adopts the right mode of public/private keys that electronic evidence fixed personnel's identity is authenticated in described identification step.
The evidence of computer crime of the present invention is fixed and the feature of the method for saving from damage also is, adopts the user cipher mode that electronic evidence fixed personnel's identity is authenticated in described identification step.
The evidence of computer crime of the present invention is fixed and the feature of the method for saving from damage also is, adopts the fingerprint recognition mode that electronic evidence fixed personnel's identity is authenticated in described identification step.
The evidence of computer crime of the present invention is fixed and the feature of the method for saving from damage is that also utilizing by turn, mirror image technology carries out mirror image by turn to hard disc data in the step of described data image and eigenvalue calculation.
The evidence of computer crime of the present invention is fixed and the feature of the method for saving from damage is that also in described recording unit and operation information step, described facility information comprises: device location, device name, device type, place capacity, total sector number, sector-size, cylinder number, magnetic head number, track number; Described operation information comprises: evidence obtaining personnel title, collect evidence start and end time copying speed, the eigenwert of suspicion equipment.
The evidence of computer crime of the present invention is fixing to be comprised with secure device: the device that starts suspicion equipment: this device is provided with by the Bios of modification suspicion computing machine, makes computing machine support that CD preferentially starts, and automated induction systems starts the suspicion computing machine; Identification authentication system, this device are used for the evidence obtaining personnel's of electronic evidence identity is authenticated, and finish the audit to its legal qualification; Equipment and operation information pen recorder, this device is used to write down evidence obtaining personnel's identity, running time, the information of evidence obtaining medium etc., the relevance between electronic evidence that assurance is obtained and the evidence obtaining medium; Data image and eigenvalue calculation device, this device are used for carrying out completely by turn mirror image and calculating its eigenwert being present in electronic evidence on the static memory medium such as disk; The device of cross-certification, this device are used for the fixedly legitimacy approval of result and process of evidence; Output unit, this device are used to export the fixedly result and the procedural information of electronic evidence, finally finish the papery signature.
The evidence of computer crime of the present invention feature fixing and secure device is that also described identification authentication system adopts the right mode of public/private keys that electronic evidence fixed personnel's identity is authenticated.
The evidence of computer crime of the present invention feature fixing and secure device also is, described data image and eigenvalue calculation device utilize by turn that mirror image technology carries out mirror image by turn to hard disc data.
The evidence of computer crime of the present invention is fixed and the feature of the method for saving from damage also is, described equipment and operation information pen recorder, and with device location, device name, device type, place capacity, total sector number, sector-size, cylinder number, the magnetic head number, track number is carried out record as facility information; The personnel's title of will collecting evidence, evidence obtaining start and end time, copying speed, the eigenwert of suspicion equipment is carried out record as operation information.
Adopt computer security techniques such as authentication, digital signature, data check because the evidence of computer crime of the present invention is fixing with security method and device, ensured legitimacy, relevance, confirmability, the integrality of electronic evidence.Adopt the self-starting optical disc, guarantee under the condition that does not start suspicion equipment the hard disc apparatus in the mirror image suspicion machine that can be complete.The present invention is applicable to that the evidence in the computer crime evidence obtaining process obtains, and has favorable compatibility, extensibility and practicality.
Description of drawings
Fig. 1 is the fixing process flow diagram with security method of the evidence of computer crime of the present invention.
Fig. 2 is the process flow diagram of the fixing embodiment with security method of the evidence of computer crime of the present invention.
Fig. 3 is the fixing and secure device structural drawing of the evidence of computer crime of the present invention.
Embodiment
Followingly with reference to accompanying drawing the specific embodiment of the present invention is elaborated, Fig. 1 is the fixing process flow diagram with security method of the evidence of computer crime of the present invention.
The evidence of computer crime of the present invention is fixed and the method for saving from damage comprises: the step S10 that starts suspicion equipment: the Bios that revises the suspicion computing machine is provided with, and makes computing machine support that CD preferentially starts, and automated induction systems starts the suspicion computing machine; Identification step S20, by reading evidence obtaining personnel's private key, and with private key one piece of data is encrypted, the PKI with the built-in evidence obtaining personnel of system is decrypted content then, two groups of data that comparison obtains, if two groups of data are identical, then advance to step S30, if two groups of data differences, log off, in addition, also can adopt user cipher, methods such as fingerprint recognition are carried out authentication; Recording unit and operation information step S30, the main information of recorded electronic evidence associated storage device is as, device location, device name, device type, place capacity, total sector number, sector-size, cylinder number, magnetic head number, track number; And the information in the evidence fixation procedure is as, evidence obtaining personnel title, evidence obtaining start and end time, copying speed, the eigenwert of suspicion equipment; The step S40 of data image and eigenvalue calculation utilizes by turn that mirror image technology carries out mirror image by turn to hard disc data, and the eigenwert of computational data, also can use SHA-1, and perhaps other Hash methods such as MDC-4 are obtained eigenwert; The step S50 of cross-certification, to the operation information of record, procedural information, facility information intersect signature authentication, promptly utilize evidence obtaining personnel identity ID that record is carried out digital signature; The step S60 of printing information and signature comes out the information of system log (SYSLOG) by printer prints, require evidence obtaining personnel manually signing.
Fig. 2 is the process flow diagram of the fixing embodiment with security method of the evidence of computer crime of the present invention.S110 reads evidence obtaining personnel identity ID and private key, reads relevant information from the calling interface function from external equipment, as usb key, and identity laser disc etc.; S120 carries out cryptographic operation to specific character string X and generates character string Y; S130 obtains evidence obtaining personnel's PKI from system according to identity ID; S140 utilizes PKI that character string Y is decrypted, and obtains character string X '; S150 judges whether X equates with X ', if equate, has then proved evidence obtaining personnel's identity, advances to step S160, if unequal, then quits a program; S160 calling system interface function is enumerated the memory device in the system, mainly is hard disc apparatus; S170 is according to evidence obtaining personnel's selection, enumerate the relevant information of hard disc apparatus, as sign, mainly comprise: a. device location: be used for the hardware interface position of marking equipment in suspicion equipment, b. device name: the equipment title of equipment vendors' sign, c. device type: the interface type that is used for identifying suspicion equipment, as IDE, SCSI, d. equipment identity: device identification number, e. place capacity: be used for marking equipment total volume size, f. total sector number: the number that is used for identifying total sector, g. sector-size: the amount of capacity of single sector, h. cylinder number: total cylinder number of equipment, i. magnetic head number: the magnetic head number of equipment, j. track number: the track number of equipment; The call function interface is done data image by turn to disk; S180 is the mirror image hard disc data by turn; S190 utilizes the data computation eigenwert of Md5 to evidence obtaining, is output as 128 character string; S200 writes down the information M of whole process, and M comprises: a. personnel 1 that collect evidence: evidence obtaining personnel title, the b. personnel 2 that collect evidences: evidence obtaining personnel title, c. start time: evidence obtaining start time, d. concluding time: collect evidence knocking-off time, e. copying speed: the copying speed of disk copy, f. apparatus characteristic information: suspicion equipment, g. apparatus characteristic information: alternate device, h. data check value: the result who hard disk is carried out eigenvalue calculation; S210 identity ID1 encrypted private key M generates N; S220 identity ID2 encrypted private key N generates W; S230 preserves M and W; Print the information of preserving and quit a program evidence obtaining personnel signature.
The evidence of computer crime of the present invention is fixing to be comprised with secure device: the device 1 that starts suspicion equipment: this device is provided with by the Bios of modification suspicion computing machine, makes computing machine support that CD preferentially starts, and automated induction systems starts the suspicion computing machine; Identification authentication system 2, this device are used for the evidence obtaining personnel's of electronic evidence identity is authenticated, and finish the audit to its legal qualification; Equipment and operation information pen recorder 3, this device is used to write down evidence obtaining personnel's identity, running time, the information of evidence obtaining medium etc., the relevance between electronic evidence that assurance is obtained and the evidence obtaining medium; Data image and eigenvalue calculation device 4, this device are used for carrying out completely by turn mirror image and calculating its eigenwert being present in electronic evidence on the static memory medium such as disk; The device 5 of cross-certification, this device are used for the fixedly legitimacy approval of result and process of evidence; Output unit 6, this device are used to export the fixedly result and the procedural information of electronic evidence, finally finish the papery signature.
Adopt computer security techniques such as authentication, digital signature, data check because the evidence of computer crime of the present invention is fixing with security method and device, ensured legitimacy, relevance, confirmability, the integrality of electronic evidence.Adopt the self-starting optical disc, guarantee under the condition that does not start suspicion equipment the hard disc apparatus in the mirror image suspicion machine that can be complete.The present invention is applicable to that the evidence in the computer crime evidence obtaining process obtains, and has favorable compatibility, extensibility and practicality.

Claims (10)

1, a kind of the evidence of computer crime method of fixing and saving from damage is characterized in that, comprising:
The step of startup suspicion equipment: the Bios that revises the suspicion computing machine is provided with, and makes computing machine support that CD preferentially starts;
Identification step is used for the evidence obtaining personnel's of electronic evidence identity is authenticated;
Recording unit and operation information step are used to write down evidence obtaining personnel's identity, running time, information such as evidence obtaining medium;
The step of data image and eigenvalue calculation is used for the electronic evidence that is present on the static memory medium such as disk is carried out completely mirror image and counter eigenwert by turn;
The step of cross-certification, be used for to evidence fixedly the legitimacy of result and process admit, guarantee that the judicial evidence collection personnel more than two carry out work simultaneously at the scene;
The step of printing information and signature is used for the fixedly result and the procedural information of electronic evidence are finally confirmed, finishes the signature of electronic signature and papery.
2, the evidence of computer crime as claimed in claim 1 method of fixing and saving from damage is characterized in that, adopts the right mode of public/private keys that electronic evidence fixed personnel's identity is authenticated in described identification step.
3, the evidence of computer crime as claimed in claim 1 method of fixing and saving from damage is characterized in that, adopts the user cipher mode that electronic evidence fixed personnel's identity is authenticated in described identification step.
4, the evidence of computer crime as claimed in claim 1 method of fixing and saving from damage is characterized in that, adopts the fingerprint recognition mode that electronic evidence fixed personnel's identity is authenticated in described identification step.
5, the evidence of computer crime as claimed in claim 1 method of fixing and saving from damage is characterized in that utilizing by turn, mirror image technology carries out mirror image by turn to hard disc data in the step of described data image and eigenvalue calculation.
6, the evidence of computer crime as claimed in claim 1 method of fixing and saving from damage, it is characterized in that in described recording unit and operation information step, described facility information comprises: device location, device name, device type, place capacity, total sector number, sector-size, cylinder number, magnetic head number, track number; Described operation information comprises: evidence obtaining personnel title, collect evidence start and end time copying speed, the eigenwert of suspicion equipment.
7, a kind of the evidence of computer crime device of fixing and saving from damage is characterized in that, comprising:
The device of startup suspicion equipment: this device is provided with by the Bios of modification suspicion computing machine, makes computing machine support that CD preferentially starts, and automated induction systems starts the suspicion computing machine;
Identification authentication system, this device are used for the evidence obtaining personnel's of electronic evidence identity is authenticated, and finish the audit to its legal qualification;
Equipment and operation information pen recorder, this device is used to write down evidence obtaining personnel's identity, running time, the information of evidence obtaining medium etc., the relevance between electronic evidence that assurance is obtained and the evidence obtaining medium;
Data image and eigenvalue calculation device, this device are used for carrying out completely by turn mirror image and calculating its eigenwert being present in electronic evidence on the static memory medium such as disk;
The device of cross-certification, this device are used for the fixedly legitimacy approval of result and process of evidence;
Output unit, this device are used to export the fixedly result and the procedural information of electronic evidence, finally finish the papery signature.
8, the evidence of computer crime as claimed in claim 7 device fixing and save from damage is characterized in that,
Described identification authentication system adopts the right mode of public/private keys that electronic evidence fixed personnel's identity is authenticated.
9, the evidence of computer crime as claimed in claim 7 device fixing and save from damage is characterized in that, described data image and eigenvalue calculation device utilize by turn that mirror image technology carries out mirror image by turn to hard disc data.
10, the evidence of computer crime as claimed in claim 7 device fixing and save from damage, it is characterized in that described equipment and operation information pen recorder are with device location, device name, device type, place capacity, total sector number, sector-size, cylinder number, the magnetic head number, track number is carried out record as facility information; The personnel's title of will collecting evidence, evidence obtaining start and end time, copying speed, the eigenwert of suspicion equipment is carried out record as operation information.
CN 200610144812 2006-11-21 2006-11-21 Method for fixing and saving evidence of computer crime and device therefor Pending CN101017563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610144812 CN101017563A (en) 2006-11-21 2006-11-21 Method for fixing and saving evidence of computer crime and device therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610144812 CN101017563A (en) 2006-11-21 2006-11-21 Method for fixing and saving evidence of computer crime and device therefor

Publications (1)

Publication Number Publication Date
CN101017563A true CN101017563A (en) 2007-08-15

Family

ID=38726555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610144812 Pending CN101017563A (en) 2006-11-21 2006-11-21 Method for fixing and saving evidence of computer crime and device therefor

Country Status (1)

Country Link
CN (1) CN101017563A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390225A (en) * 2013-08-05 2013-11-13 天津勤达科贸有限公司 Justice credit information preservation system
CN105260640A (en) * 2015-10-28 2016-01-20 南京邮电大学 Evidence collecting system and method based on fingerprint authentication and GPS
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate
CN106815185A (en) * 2017-03-10 2017-06-09 茂名市公安局 One kind investigates report automatic generation method and system on the spot
CN106960164A (en) * 2017-03-10 2017-07-18 茂名市公安局 A kind of method and system of the fixed electronic evidence in scene
CN107332820A (en) * 2017-05-26 2017-11-07 南京邮电大学 Digital evidence obtaining system based on Linux environment
CN107832021A (en) * 2017-11-29 2018-03-23 厦门市美亚柏科信息股份有限公司 A kind of electronic evidence fixing means, terminal device and storage medium
CN108418813A (en) * 2018-02-12 2018-08-17 北京工业大学 A kind of implementation method of the electronic evidence Chain of Custody based on trusted timestamp

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390225A (en) * 2013-08-05 2013-11-13 天津勤达科贸有限公司 Justice credit information preservation system
CN105260640B (en) * 2015-10-28 2019-04-30 南京邮电大学 A kind of evidence-obtaining system and method based on finger print identifying and GPS
CN105260640A (en) * 2015-10-28 2016-01-20 南京邮电大学 Evidence collecting system and method based on fingerprint authentication and GPS
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate
CN106559433B (en) * 2016-12-07 2019-12-31 北京信任度科技有限公司 Method and system for fixing electronic evidence and user identity by using digital certificate
CN106960164A (en) * 2017-03-10 2017-07-18 茂名市公安局 A kind of method and system of the fixed electronic evidence in scene
CN106815185A (en) * 2017-03-10 2017-06-09 茂名市公安局 One kind investigates report automatic generation method and system on the spot
CN107332820A (en) * 2017-05-26 2017-11-07 南京邮电大学 Digital evidence obtaining system based on Linux environment
CN107832021A (en) * 2017-11-29 2018-03-23 厦门市美亚柏科信息股份有限公司 A kind of electronic evidence fixing means, terminal device and storage medium
CN107832021B (en) * 2017-11-29 2020-09-22 厦门市美亚柏科信息股份有限公司 Electronic evidence fixing method, terminal equipment and storage medium
CN108418813A (en) * 2018-02-12 2018-08-17 北京工业大学 A kind of implementation method of the electronic evidence Chain of Custody based on trusted timestamp
CN108418813B (en) * 2018-02-12 2020-11-06 北京工业大学 Electronic evidence chain of custody realization method based on trusted timestamp

Similar Documents

Publication Publication Date Title
CN101017563A (en) Method for fixing and saving evidence of computer crime and device therefor
JP3748155B2 (en) File management system with falsification prevention / detection function
CN110868300B (en) Block chain evidence-storing method and system
US20080313726A1 (en) Integrated systems for simultaneous mutual authentication of database and user
CN109033789B (en) Method, device and system for generating right-confirming certificate
EP3543891B1 (en) A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof
US20130290330A1 (en) Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint
CN1527208A (en) Method and device for realizing computer safety and enciphering based on identity confirmation
CN103310141A (en) Method and system for monitoring of certificate information security
CN103310254A (en) Secure anti-counterfeiting certificate and production method for same
CN109960917A (en) A kind of time slot scrambling and device of document
CN103368736B (en) Business information encryption, decryption method and device
CN109067702B (en) Method for generating and protecting real-name system network identity
WO2011121928A1 (en) Digital content management system, verification device, programs therefor, and data processing method
JP4266412B2 (en) Data storage system
CN113742745A (en) Audit process evidence obtaining link management system and management method
CN103295169B (en) Method and system for safely supervising real estate real person registration information
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
JP4765262B2 (en) Electronic data storage device, program
TWI444849B (en) System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof
CN107392060A (en) A kind of hard disk, duplicator safety detection method, system
Ma et al. Recovery of evidence and the judicial identification of electronic data based on ExFAT
US11681787B1 (en) Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens
US20110022849A1 (en) System and method for securely storing information
Mariappan et al. Digital Forensic and Machine Learning

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20070815