CN1224901C - Method for researching and validating default data and buffered data of common application software - Google Patents

Method for researching and validating default data and buffered data of common application software Download PDF

Info

Publication number
CN1224901C
CN1224901C CN 03116800 CN03116800A CN1224901C CN 1224901 C CN1224901 C CN 1224901C CN 03116800 CN03116800 CN 03116800 CN 03116800 A CN03116800 A CN 03116800A CN 1224901 C CN1224901 C CN 1224901C
Authority
CN
China
Prior art keywords
file
keyword
string
carry out
word
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 03116800
Other languages
Chinese (zh)
Other versions
CN1445665A (en
Inventor
李明禄
刘月琴
吴华
沈海华
洪锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai No116 Inst
Shanghai Jiaotong University
Original Assignee
Shanghai 116 Institute
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai 116 Institute, Shanghai Jiaotong University filed Critical Shanghai 116 Institute
Priority to CN 03116800 priority Critical patent/CN1224901C/en
Publication of CN1445665A publication Critical patent/CN1445665A/en
Application granted granted Critical
Publication of CN1224901C publication Critical patent/CN1224901C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a method for researching and validating the default data and the buffering data of common application software, which belongs to a computer application field. The method comprises the following steps: step 1, a research computer and a target computer are connected; step 2, a file to be analyzed is obtained by the research computer from the target computer, the file format of a file to be researched and retrieval route information are designated on the research computer, and a target computer file conforming to a retrieval condition is copied from the target computer to a hard disk memory of the research computer by connection; step 3, the obtained file to be analyzed is analyzed, and sensitive information is searched from target files; step 4, all the target files are researched, and step 5 or the step 3 are executed according to a result; the step 5, an inspection result is extracted from a database by a research result report tool to generate a final sensitive information report which is browsed by users. The present invention can meet various work requirements of research, detection and evidence taking, can analyze and search a computer of a computer criminal suspect to search criminal evidence.

Description

Common application software default data and buffered data are reconnoitred evidence collecting method
Technical field
What the present invention relates to is reconnoitring and evidence collecting method of a kind of computing machine evidence, and particularly a kind of common application software default data and buffered data are reconnoitred evidence collecting method, belong to computer application field.
Background technology
When computing machine brings progressive and convenient to the mankind, when enriching and changing people's life, its negative effect also is that people are quite unexpected, is object of crime with the computer information system and is that all kinds of novel criminal activity of guilty tool is born down menacingly with the computer information system.All kinds of computer crimes, particularly with the criminal activity of computer system as guilty tool, constantly the quasi-tradition criminal activity is close combines with each, and the development and stabilization of country in serious harm, hits and the strick precaution computer crime has become a great problem that the various countries police and organ of power need to be resolved hurrily.As the computer data of computer crime evidence obtaining object, be with modes such as magnetic medium and light medium be stored in comprise hard disk, floppy disk, USB flash disk and readable on the storer such as writing optical disk, have the characteristics of oneself: 1, contain much information.Be compared to traditional paper document, the information capacity of computer data storer is big, and common now harddisk memory can be preserved the information content that more than one hundred million pages of document printing comprise.2, file structure complexity.The file storage structure of computer data simultaneously, is removed outside the basic file structures such as literal form in response to changing with the difference of software, and sound, image also are common computer data storage organizations.3, disguise.Sensitive information is present in a large amount of lengthy and jumbled data, and can hide by realizations such as cryptographic algorithm.4, easy impaired property.Computer data is destroyed easily, and the operation of mistake also may be damaged sensitive information.
Find by literature search, Application No.: 6,345,283, patent name is: " Method andapparatus for forensic analysis of information stored in computer-readablemedia (" method and apparatus of computer-readable memory evidence obtaining ") ", this patent computer-oriented memory device mainly is a hard disk, obtains possible evidence information by the environmental data on extraction, the anacom readable memory.Environmental data is the dependence data of computer system, mainly comprises text data, binary string and other non-text datas.Environmental data is transparent to the computer user, but may contain the information of systems inspection person's needs.Because sensitive information is to be hidden in the lengthy and jumbled in a large number environmental data, inquiry and analysis environments data will consume a large amount of computing times.Patent system is all environmental datas of copy earlier, search the punctuation mark in the copies data then, analyze punctuation mark character on every side then, and significant text character copies in the file destination; And the non-text data that will run into replaces with the space, the file destination that final generation can be browsed by commercial processors.The main deficiency of this patent is: 1, directly hard disk is carried out data analysis, be about to target hard disk and will add in its investigation system, system could work.Under the special applications background in preliminry basic research, as not removing under the situation of hard disk from suspect's PC, this system can't work.2, search for a large amount of environmental datas, can cause the slow problem of investigation system travelling speed.In the practical application, may shift to an earlier date ends with system because of the unsuitable for a long time conclusion of system's operation, thereby the chance of some sensitive data is found in forfeiture.3, only at Windows operating system, the scope of application remains to be further expanded.
Summary of the invention
The objective of the invention is to overcome deficiency of the prior art, uniqueness at the computing machine evidence, provide a kind of common application software default data and buffered data to reconnoitre evidence collecting method, make it solve the shortcoming and the deficiency of background technology, can be towards the multiple requirements of one's work of reconnoitring, track down, collect evidence, computing machine to the computer crime suspect extracts, searches for and analyzes, and searches out the evidence of crime.
The present invention is achieved by the following technical solutions, and method concrete steps of the present invention are as follows:
Step 1: connect and reconnoitre computing machine and object computer.Being connected between computing machine and the object computer reconnoitred in foundation, with regard to the connection mode, integrated third party's control (GegeLink USB Network Adaptor) and operating system GetIpUpDown have been realized above-mentioned connected mode, support 4 kinds of parallel port, serial ports and USB, the network ports etc.; Just connect object, support Windows to the connection between the operating systems such as Linux, Unix and Macintosh by integrated third party's control (Samb, Dave) etc.Like this, run on reconnoitring kernel program and can carry out data extract work under the Windows to the target machine under most of state.
Step 2: the machine of reconnoitring obtains file to be analyzed from target machine.By in the file layout and the searching route information of waiting to reconnoitre file of reconnoitring appointment on the computing machine, from target machine by connect copy meet above the target machine file of search condition to the harddisk memory of reconnoitring computing machine.
Step 3: the file to be analyzed that obtains is carried out file analysis, from file destination, seek sensitive information.
Step 4: reconnoitre all file destinations, if the All Files analysis finishes, execution in step 5; If file analysis does not finish, execution in step 3.
Step 5: utilize the prospecting results report tool, from database, extract check result, generate final sensitive information report and browse for the user.
Described sensitive information character string is Chinese, English and other spoken and written languages, and character string digital, that punctuation mark is formed.Described search condition is sensitive information character string, character string pattern matching rule.Described character string pattern matching rule comprises telephone number strings, E-mail address string and postcode string.
The inventive method is not only applicable to the occasion that computing machine connects, and goes for direct evidence obtaining to readable access arrangement yet.
Below the inventive method is further described, the file analysis flow process is as follows:
(1) reads the keyword string of investigator's appointment and character string mode in internal memory.Critical field wherein need be specified by the investigator by investigation; Character string mode can the investigator be edited generation, and E-mail address, telephone number, postcode are the pattern information of acquiescence for choosing.
(2) file destination that will analyze opens file by file layout .doc .xls .ppt .eml .dbx .html .txt .eml etc., and the content of file is read in the internal memory, and products for further is handled.
(3) judge the memory encoding of file according to file layout, if the Word file is carried out (4); If ASII coded file (as .eml .html .txt etc.) is carried out (5); If Unicode coded file (as .dbx .xls .ppt etc.) is carried out (6).
(4) be the .txt file with the Word file conversion.
(5) to the ASII coded file or reconnoitre, search for, whether retrieval exists sensitive information string, sensitive information pattern etc.; Turn to (7).
(6) the Unicode coded file is reconnoitred, searched for, whether retrieval exists sensitive information string, sensitive information pattern etc.
(7) result that file is reconnoitred is saved in the database, comprises statement, sensitive information place file-related information in the file of sensitive information place: document, place store path information, rise time, modification time, access time etc.
● in the file analysis flow process (4), describedly become txt file specific as follows the Word file conversion:
1. read character string and be converted into integer at 21CH-21FH place, Word file address, deduct the shared figure place of file header information again, obtain the actual storage content-length of Word file.
2. the reading pointer with file points to the 0A00H place, and this place is the starting point of Word file actual storage content.
3. read one section of file to character buffer by the size of character string buffer zone.
Whether in the character buffer read have Unicode coding, 5. the reason that the Unicode coding occurs normally owing to comprised category information such as form in the document, if do not have, is carried out if 4. judging; If have, carry out 6..
5. the content with character buffer is saved in the temporary file.
6. the character conversion that the Unicode that occurs is encoded is the character string of ASII coding, deposits in the Back Word symbol buffer zone relevant position.
7. judge whether the Word file runs through,, carry out 8. if all run through; If no, execution in step 3..
8. obtain transformation result, i.e. .txt file by temporary file.
● in the file analysis flow process (5), describedly reconnoitre, search for specific as follows to the ASII coded file:
1. read a keyword string (pattern) in the key word from internal memory (pattern) group.
2. read a segment file to filebuf, search whether to exist and be complementary with this keyword string (pattern).
3. mate this key word (pattern) success, carry out 4.; Otherwise, carry out 5..
4. position and statement in key word (pattern) and the place file thereof are saved in the database.
5. read next segment file to filebuf.
6. judge whether this document runs through, and is, carry out 7.; Otherwise, carry out 2..
7. judging whether key word (pattern) group in the internal memory exists the key word of not analyzing, is to carry out 1.; , do not carry out 8..
8. the result that file is reconnoitred, analyzed is saved in the database, comprises the content, the quantity that contain keyword string (pattern) in the file, the store path of file, generation time, modification time, access time etc.
● in the file analysis flow process (6), describedly reconnoitre, search for specific as follows to the Unicode coded file:
1. all word strings in key word (pattern) group all are converted to the Unicode coding.
2. read a keyword string (pattern) in the key word from internal memory (pattern) group.
Whether 3. read a segment file to filebuf, search to exist with this keyword string (pattern) and be complementary, matching algorithm is the KMP algorithm.
4. mate this key word (pattern) success, carry out 5.; Otherwise, carry out 6..
5. position and statement in key word (pattern) and the place file thereof are saved in the database.
6. read next segment file to filebuf.
7. judge whether this document runs through, and is, carry out 8.; Otherwise, carry out 3..
8. judging whether key word (pattern) group in the internal memory exists the key word of not analyzing, is to carry out 2.; , do not carry out 9..
9. the result that file is reconnoitred, analyzed is saved in the database, comprises the content, the quantity that contain keyword string (pattern) in the file, the store path of file, generation time, modification time, access time etc.
The present invention can satisfy in following applications demand: 1, the public security officer suspects that a machine in the Internet bar is suspected of being guilty.If search one by one too high with regard to cost, efficient is too low.The public security officer catches the crime machine, obtains evidence of crime as long as this cover system is installed on server just can be searched for all machines of whole local area network.In addition, can also monitor whole local area network.2, the public security officer has captured a computing machine, connects machine and the suspicion machine reconnoitred by using this method, by carrying out search utility relevant evidence is got in the evidence obtaining machine.3, public security officer's surprise check suspicion of crime robot, the suspect also not machine switched off before, obtain the control of machine.At this moment, can some temporary files, the cache file on the suspicion of crime robot be extracted, obtain evidence.
The present invention has substantive distinguishing features and marked improvement, the invention solves disadvantages of background technology, support multiple computing machine connected modes such as parallel port, serial ports and USB, the network port, connection by intercomputer, directly object computer is reconnoitred, do not needed to remove suspect's hard disk; Support platform of multiple operating systems (Windows98, windows NT, windows XP, Macintosh, Linux, Unix), realized the data extract and the analysis of application software under the kinds of platform; The default data and the buffered data of search application software, and operating system temporary file compare with background technology, and the search environment data reduce, and application data increases, though find the quantity of sensitive information to reduce, search speed is than being significantly improved; Reconnoitre program and application program seamless combination, do not have destructiveness reconnoitring on-the-spot computer run system; Can to computer crime suspect's computing machine, analyze and search for towards the multiple requirements of one's work of reconnoitring, track down, collect evidence, search out the evidence of crime.
Description of drawings
Fig. 1 the inventive method process flow diagram.
Among the figure: set up and to reconnoitre being connected between computing machine and the object computer, reconnoitre computing machine and obtain All Files to be analyzed, and then analyze the All Files that obtains, and finish the back and show prospecting results analyzing from object computer.
Fig. 2 file analysis process flow diagram of the present invention.
Among the figure: specify keyword string and the character string mode reconnoitred, according to target file layout opens file and reconnoitres, and is reconnoitring end back display-object file prospecting results.
Fig. 3 Word file conversion of the present invention is the .txt document flowchart.
Among the figure: read the Word file size, read the Word file successively by character buffer length, hand over word is encoded to the ASII coding, and writes temporary file.After Word file all the elements dispose, obtain the txt destination file.
Fig. 4 the present invention searches for the process flow diagram of ASCII fromat file.
Among the figure: take out keyword string and character string mode to be reconnoitred successively whole ASII formatted file is mated, the match is successful preserves the key word summary.After keyword string that remains to be reconnoitred and character string pattern matching finish, all key word summaries are aggregated into the analysis result file.The matching process of character string directly uses the matches criteria function of ASII character.
Fig. 5 the present invention searches for the process flow diagram of Unicode format file.
Among the figure: take out successively keyword string to be reconnoitred and character string mode whole Unicode format file is advanced The row coupling, the match is successful preserves the keyword summary. The keyword string and the character string pattern matching that remain to be reconnoitred are complete After finishing, all keyword summaries are aggregated into the analysis result file. The matching process of character string uses by KMP The Unicode adaptation function that method realizes.
Embodiment
As Fig. 1, Fig. 2 and Fig. 3, Fig. 4, shown in Figure 5, provide following examples in conjunction with the content of the inventive method:
Reconnoitre in the process in a case, obtained good practice effect, captured suspect's computing machine, with this invention fast with reconnoitre efficiently and the record that has obtained relevant crime.
Suspect's computing machine is a Toshiba notebook computer, and model is satellite 2410, and basic hardware configuration is as follows: enhancement mode SpeedStep TMThe portable intel pentium 4 processor 1.70GHz-M of technology aim at the 845MP of the Intel chipset that mobile intel pentium 4 processors design, 400MHz system front end bus, 256MB PC2100 DDR internal memory, 30G hard disk, 10/100Mbps ethernet port; Operating system is Windows2000 Professional.
The public security officer reconnoitres machine and is the assembling desktop computer, and the basic hardware configuration is as follows: intel pentium 4 processor 2.00GHz, the 845D of Intel chipset, 266M Front Side Bus, 256MB PC2100 DDR internal memory, 80G hard disk, 10/100Mbps ethernet port; Operating system is Windows2000 Server.
Concrete condition is as follows:
1, because connect both sides ethernet port is arranged all, so set up public security officer's the machine of reconnoitring and suspect's target machine network is connected with twisted-pair feeder.
2, the public security officer selects file type (system default provides) and path to be searched to be searched in " hunting zone " dialog box.In the practical operation, selected word processing class software (.doc, .xls, .ppt), E-mail receiver/send class software (.eml .dbx), browser software (.html), path to be searched non-selected (pressing cancel button), being all readable memories that searching route is defaulted as target machine, only is the hard disk of target machine under this practical environment.Investigation system begins target machine is searched for, with corresponding document copying to be analyzed reconnoitring on the machine to the public security officer according to default location (promptly the storing the path) location that various file type files exist.
3, after investigation system is finished the work of searching for according to file types to target machine, the public security officer sets key word or the pattern that will obtain evidence in " setting key word (pattern) " dialog box; In the actual practice process, the public security officer imports key word and is " Falun Gong ", and the public security officer clicks " analysis " button then, and survey system begins to begin to carry out the sensitive information coupling to copying the file of reconnoitring on the computing machine to.
4, judge whether the file that target machine meets file types is all reconnoitred, if prospecting is for finishing, survey system continues all file destinations of prospecting.
5, All Files is reconnoitred and is finished, the public security officer clicks " result browses ", demonstrated all with the html form and had key word for .doc .xls .ppt .eml., dbx .html file and the temporary file thereof of " Falun Gong " and comprise corresponding fileinfo.Actual retrieval goes out to satisfy the file more than 2000 of the condition of reconnoitring, and has satisfied public security officer's the requirement of reconnoitring.
Concrete implementation result: (1) travelling speed is fast, can search out the multiple file that has sensitive information at short notice, helps to grasp fast on-the-spot evidence; (2) flexible configuration when operation, has a plurality of options available, to adapt to the application under the different situations; (3) need not on target machine to be searched, install, can use, help to improve office efficiency, and not destory the scene; (4) interface is succinct, is simple and easy to usefulness, helps popularizing of system.

Claims (8)

1, a kind of common application software default data and buffered data are reconnoitred evidence collecting method, it is characterized in that concrete steps are as follows:
Step 1: connect and reconnoitre computing machine and object computer, support parallel port, serial ports and USB, the network port, support Windows to the connection between Linux, Unix and the Macintosh operating system by integrated third party's control, run on reconnoitring kernel program and can carry out data extract work under the Windows the target machine under most of state;
Step 2: the machine of reconnoitring obtains file to be analyzed from target machine, by in the file layout and the searching route information of waiting to reconnoitre file of reconnoitring appointment on the computing machine, from target machine by connect copy meet above the target machine file of search condition to the harddisk memory of reconnoitring computing machine;
Step 3: the file to be analyzed that obtains is carried out file analysis, from file destination, seek sensitive information,
Step 4: reconnoitre all file destinations, if the All Files analysis finishes, execution in step 5, if file analysis does not finish, execution in step 3;
Step 5: utilize the prospecting results report tool, from database, extract check result, generate final sensitive information report and browse for the user.
2, common application software default data according to claim 1 and buffered data are reconnoitred evidence collecting method, it is characterized in that, the file analysis flow process is as follows:
(1) read the keyword string of appointment and character string mode in internal memory: critical field wherein needs to specify by investigation; Character string mode can be edited generation, the pattern information that E-mail address, telephone number, postcode are selected altogether for acquiescence;
(2) file destination that will analyze opens file by file layout .doc .xls .ppt .eml .html .txt .eml, and the content of file is read in the internal memory, and products for further is handled;
(3) judge the memory encoding of file according to file layout, if the Word file is carried out (4); If the ASII coded file is carried out (5); If the Unicode coded file is carried out (6);
(4) be the .txt file with the Word file conversion;
(5) the ASII coded file is reconnoitred, searched for, whether retrieval exists sensitive information string, sensitive information pattern;
(6) the Unicode coded file is reconnoitred, searched for, whether retrieval exists sensitive information string, sensitive information pattern;
(7) result that file is reconnoitred is saved in the database, comprises statement, sensitive information place file-related information in the file of sensitive information place: document, place store path information, rise time, modification time, access time.
3, common application software default data according to claim 2 and buffered data are reconnoitred evidence collecting method, it is characterized in that, in the file analysis flow process (4), describedly become txt file specific as follows the Word file conversion:
1. read character string and be converted into integer at 21CH-21FH place, Word file address, deduct the shared figure place of file header information again, obtain the actual storage content-length of Word file.
2. the reading pointer with file points to the 0A00H place, and this place is the starting point of Word file actual storage content;
3. read one section of file to character buffer by the size of character string buffer zone;
Whether in the character buffer read have Unicode coding, 5. the reason that the Unicode coding occurs normally owing to comprised category information such as form in the document, if do not have, is carried out if 4. judging; If have, carry out 6.;
5. the content with character buffer is saved in the temporary file;
6. the character conversion that the Unicode that occurs is encoded is the character string of ASII coding, deposits in the Back Word symbol buffer zone relevant position;
7. judge whether the Word file runs through,, carry out 8. if all run through; If no, execution in step 3.;
8. obtain transformation result, i.e. .txt file by temporary file.
4, common application software default data according to claim 2 and buffered data are reconnoitred evidence collecting method, it is characterized in that, in the file analysis flow process (5), reconnoitre, search for specific as follows to the ASII coded file:
1. read a keyword string or keyword string pattern in key word from internal memory or the keyword mode group;
2. read a segment file to filebuf, search whether to exist and be complementary with this keyword string or keyword string pattern;
3. mate the success of this key word or keyword mode, carry out 4.; Otherwise, carry out 5.;
4. position and statement in key word or keyword mode and the place file thereof are saved in the database;
5. read next segment file to filebuf;
6. judge whether this document runs through, and is, carry out 7.; Otherwise, carry out 2.;
7. judging whether key word or keyword mode group in the internal memory exist the key word of not analyzing, is to carry out 1.; , do not carry out 8..
5, common application software default data according to claim 2 and buffered data are reconnoitred evidence collecting method, it is characterized in that, in the file analysis flow process (6), describedly reconnoitre, search for specific as follows to the Unicode coded file:
1. all word strings in key word or the keyword string modal sets all are converted to the Unicode coding;
2. read a keyword string or keyword string pattern in key word from internal memory or the keyword mode group;
Whether 3. read a segment file to filebuf, search to exist with this keyword string or keyword string pattern and be complementary, matching algorithm is the KMP algorithm;
4. mate the success of this key word or keyword mode, carry out 5.; Otherwise, carry out 6.;
5. position and statement in key word or keyword mode and the place file thereof are saved in the database;
6. read next segment file to filebuf;
7. judge whether this document runs through, and is, carry out 8.; Otherwise, carry out 3.;
8. judging whether key word or keyword mode group in the internal memory exist the key word of not analyzing, is to carry out 2.; , do not carry out 9.;
9. the result that file is reconnoitred, analyzed is saved in the database, comprises the content, the quantity that contain keyword string or keyword string pattern in the file, the store path of file, generation time, modification time, access time.
6, reconnoitre evidence collecting method according to claim 2 or 4 or 5 described common application software default data and buffered data, it is characterized in that described search condition is sensitive information character string, character string pattern matching rule; The sensitive information character string is Chinese, English and other spoken and written languages, and character string digital, that punctuation mark is formed.
7, common application software default data according to claim 6 and buffered data are reconnoitred evidence collecting method, it is characterized in that, described character string pattern matching rule comprises telephone number strings, E-mail address string and postcode string.
8, common application software default data according to claim 1 and buffered data are reconnoitred evidence collecting method, it is characterized in that, are applicable to the occasion that computing machine connects, and perhaps are applicable to direct evidence obtaining to readable access arrangement.
CN 03116800 2003-05-08 2003-05-08 Method for researching and validating default data and buffered data of common application software Expired - Fee Related CN1224901C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03116800 CN1224901C (en) 2003-05-08 2003-05-08 Method for researching and validating default data and buffered data of common application software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03116800 CN1224901C (en) 2003-05-08 2003-05-08 Method for researching and validating default data and buffered data of common application software

Publications (2)

Publication Number Publication Date
CN1445665A CN1445665A (en) 2003-10-01
CN1224901C true CN1224901C (en) 2005-10-26

Family

ID=27814936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03116800 Expired - Fee Related CN1224901C (en) 2003-05-08 2003-05-08 Method for researching and validating default data and buffered data of common application software

Country Status (1)

Country Link
CN (1) CN1224901C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1303528C (en) * 2003-10-13 2007-03-07 英业达股份有限公司 Automatic switching method between Xwindows display mode and console display mode
CN1303542C (en) * 2003-10-24 2007-03-07 英业达股份有限公司 Plug-and-play method for USB equipment under linux operation system
CN100463399C (en) * 2004-03-13 2009-02-18 鸿富锦精密工业(深圳)有限公司 Memory gateway and data backup method thereof
CN100414540C (en) * 2005-04-25 2008-08-27 北京拓普极客技术有限公司 System and method for analyzing and abstracting data evidence
CN102915245A (en) * 2011-08-02 2013-02-06 珠海赛纳打印科技股份有限公司 Method and device for installing driver of image formation device
CN106529214A (en) * 2016-12-05 2017-03-22 湖北灰科信息技术有限公司 Electronic evidence collection device and electronic evidence collection method employing same
CN113934669B (en) * 2021-09-23 2022-08-05 厦门市美亚柏科信息股份有限公司 Serial port based GOIP equipment evidence obtaining method and system

Also Published As

Publication number Publication date
CN1445665A (en) 2003-10-01

Similar Documents

Publication Publication Date Title
CN1292371C (en) Inverted index storage method, inverted index mechanism and on-line updating method
Ma et al. Efficiently finding web services using a clustering semantic approach
CN1738352A (en) Document processing device, document processing method, and storage medium recording program therefor
CN1472665A (en) Bill processing device, method and program
CN110297879B (en) Method, device and storage medium for data deduplication based on big data
JP2020537268A (en) Methods and systems for semantic search in large databases
CN1904886A (en) Method and apparatus for establishing link structure between multiple documents
CN101196935B (en) System and method for creating index database
CN101075252A (en) Method and system for searching network
CN1362681A (en) Information search processing device and method, recording medium recording information search programme
CN1932809A (en) Method and apparatus for matching associated person information
CN1750018A (en) Document processing device, document processing method, and storage medium recording program therefor
Wang et al. Duplicate-search-based image annotation using web-scale data
CN1224901C (en) Method for researching and validating default data and buffered data of common application software
CN1831825A (en) Document management method and apparatus and document search method and apparatus
CN100498783C (en) Method for supporting full text retrieval system, and searching numerical value categorical data domain meanwhile
Gao et al. Application of full text search engine based on Lucene
Liu et al. Multi-keywords carrier-free text steganography based on part of speech tagging
CN115729465A (en) Document decoupling and synthesizing system based on paragraph small file storage
Zheng et al. Using high-level semantic features in video retrieval
CN1244865C (en) Method for detecting plagiarism in electronic text using computer program
Zhou et al. Double-Indexing Mechanism of Search Engine Based on Campus Net
CN1269058C (en) Personal directory and knowledge management system, method and its finished product
KR102688150B1 (en) Method for high speed searching of illegal adults website including video contents
CN111984807B (en) Content screening and storing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: SHANGHAI JIAOTONG UNIV.; SHANGHAI NO.116 INST

Free format text: FORMER OWNER: SHANGHAI JIAOTONG UNIV.

Effective date: 20031009

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20031009

Applicant after: Shanghai Jiao Tong University

Applicant after: Shanghai No.116 Inst

Applicant before: Shanghai Jiao Tong University

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee