CN2681237Y - A special machine for computer crime investigation and evidence obtaining - Google Patents

A special machine for computer crime investigation and evidence obtaining Download PDF

Info

Publication number
CN2681237Y
CN2681237Y CN 03253565 CN03253565U CN2681237Y CN 2681237 Y CN2681237 Y CN 2681237Y CN 03253565 CN03253565 CN 03253565 CN 03253565 U CN03253565 U CN 03253565U CN 2681237 Y CN2681237 Y CN 2681237Y
Authority
CN
China
Prior art keywords
evidence
special machine
port
main frame
hard disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 03253565
Other languages
Chinese (zh)
Inventor
滕达
张雪峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 03253565 priority Critical patent/CN2681237Y/en
Application granted granted Critical
Publication of CN2681237Y publication Critical patent/CN2681237Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a special machine for computer crime investigation and evidence obtaining, comprising a computer host, an evidence read only protection lock, a six-in-one card reader and an SIM card reader. The input of the evidence read only protection lock is connected in an evidence hard disc. The output of the evidence read only protection lock is connected with a second hard disk controller SecondIDE data interface of the computer host through an IDE data channel. A first hard disk controller PrimaryIDE data interface on the computer host is connected with a copy hard disc through the IDE data channel. The six-in-one card reader and the SIM card reader are respectively connected with the USB interface on the computer host through a USB connecting line. The utility model is provided with a special evidence obtaining interface and the evidence obtaining port is complete after the structure is adopted. The requirement of computer case evidence obtaining principle is accorded. The utility model is a special machine for computer crime investigation and evidence obtaining which has the advantages that the utility model is convenient to carry and mobile, the evidence obtaining analysis process is quick and operation is simple.

Description

A kind of computer crime prospecting evidence obtaining special machine
Technical field
The utility model belongs to field of computer technology, particularly relates to a kind of computer crime prospecting evidence obtaining special machine.
Background technology
Fast development along with Chinese national economy, the significantly raising of living standards of the people, the particularly fast development of Computer Applied Technology, computing machine has become one of widely known common tool, the big computing machine that uses to network is as bank's banking procedure where deposits and withdrawals are processed at any branch bank network, stock jobbery stock network etc., the little LAN (Local Area Network) of using to unit, even the home computer that the individual uses etc., the use of computing machine has been quite universal.Yet along with a large amount of of computer utility popularize, incident is the appearance of computer crime phenomenon, as implementing stealing to computer information data, the computing machine significant data is implemented to destroy or distort, utilize computer manufacture, propagate harmful information, by computing machine manufacturing, transmitted virus, or implement " hacker " physical sabotage network order or the like.The consequence that this computer crime behavior is brought, the development of the development of the national economy and the safety and stablization of society have seriously been influenced, computer crime collected evidence reconnoitred important means into present strike and prevention computer crime behavior, at present, in prospecting that the computer crime behavior is collected evidence, the desk-top computer that the computing machine that uses is used as the pocket computer or the desktop of notebook type, in two kinds of types, when adopting notebook to be used for the evidence obtaining prospecting, the one, lack proprietary evidence obtaining interface, it does not have the port of direct connection ID E hard disk, can only connect various types of hard disks or evidence media in the other side's computing machine by the mode of Extended Capabilities Port process conversion, not meet the cardinal rule of computer forensics; The 2nd, speed is slow, during owing to evidence medias such as notebook connection ID E hard disk, SCSI hard disks, can only realize by external converter, so data traffic is low, causes the evidence obtaining working time long; The 3rd, self capacity is very little, has both caused forensics analysis work can only adopt substep to carry out, and causes efficient to become very low, even can't finish the work at all; Be not easy to expansion again, need expanding hard-disk capacity can only connect External memory equipment by the switching device of external-connected port, makes the speed of forensics analysis can be lower; The 4th, interface function is incomplete, lacks corresponding card reader, is unfavorable for that the user carries out high efficiency work; The 5th, the ability of opposing rugged surroundings is relatively poor.When adopting desk-top computer to be used for the evidence obtaining prospecting, the one, be not easy to carry, do not meet the basic demand of evidence obtaining work; The 2nd, interface function is incomplete, and various evidence media interfaces all need the case analysis personnel to assemble in addition according to need of work, have brought the inconvenience in many work; The 3rd, there is not proprietary evidence obtaining interface, can't guarantee effectively that in the forensics analysis process evidence data can not be modified, do not meet the basic demand of computer forensics; The 4th, the opposing rugged surroundings ability relatively poor, non-watertight, not antidetonation, cause device damage extremely easily, causing can't operate as normal.
The utility model content
The purpose of this utility model is to overcome the deficiency of prior art, provides a kind of and is easy to carry, and is provided with proprietary evidence obtaining interface, and the evidence obtaining port is complete, and forensics analysis is handled fast, computer crime prospecting evidence obtaining special machine simple to operate.
The technical scheme that its technical matters that solves the utility model adopts is: a kind of computer crime prospecting evidence obtaining special machine, and it comprises:
One main frame, main frame is made up of cpu central processing unit, internal storage, input/output end port, system bus, its role is to provide the control of analysis, processing and Information Access to information, main frame is provided with the second hard disk controller Second IDE data-interface, the first hard disk controller Primary IDE data-interface, USB interface;
The read-only protection lock of one evidence the port that provides one to be connected with the evidence hard disk is provided, and makes this connectivity port have write-protect, after the evidence hard disk inserts, can guarantee the primitiveness of evidence;
The six directions one card reader, the interface that provides one can read various storing card data information such as CF card, SM card, mmc card, SONY memory stick very easily is provided, and the function by the various recovery softwares in the special machine realizes reading the information such as historical summary that the other side has deleted, and can be the user more strong means are provided;
The interface that provides one can read data in mobile phone information very easily is provided the SIM card reader, and reads out all information in the other side's GSM mobile handset card easily by the various special softwares in the special machine, as yellow pages information, SMS etc.;
The input of the read-only protection lock of evidence is connected to the evidence hard disk; the output of the read-only protection lock of evidence is connected with the second hard disk controller Second IDE data-interface on the main frame by the IDE data channel; the first hard disk controller Primary IDE data-interface on the main frame by the IDE data channel with duplicate hard disk and join, the six directions one card reader, SIM card reader are connected with USB interface on the main frame by the USB connecting line respectively.
Also can comprise on the described special machine and be provided with scsi adapter, correspondingly be provided with pci expansion slot the computing machine Your Majesty, scsi adapter is connected with pci expansion slot on the main frame by system's pci bus, and scsi adapter can join with SCSI evidence hard disk by the scsi data passage.
Can comprise also on the described special machine being provided with wireless network card that wireless network card is connected with USB interface on the main frame.
Can comprise also on the described special machine being provided with universal serial bus networks concentrator USBHUB expansion interface that universal serial bus networks concentrator USB HUB expansion interface is connected with USB interface on the main frame by the USB connecting line.
Also can comprise on the described special machine being provided with the 1000M network port, this port is directly connected in the gigabit networking port on the main frame, and this port can be connected with the peripheral hardware network switch by network connection.
Also can comprise on the described special machine being provided with serial port, this port is directly connected on the COM port on the main frame, and this serial port can be connected with peripheral hardware serial communication equipment by the serial communication line.
Also can comprise on the described special machine being provided with parallel port, this port is directly connected on the parallel communication port on the main frame, and this parallel port can be connected with peripheral hardware parallel port communication equipment by the parallel communication line.
The read-only protection lock of described evidence includes write-protect equipment, and write-protect equipment mainly is made of the high-speed figure chip.
In use, evidence and corresponding ports are joined, to the reading in of evidence, can carry out data by the evidence-taking and analysis system in the special machine and obtain or analyze by port; When evidence is the IDE hard disk, the read-only protection lock of IDE hard disk and evidence is connected, then the data in the IDE hard disk are read in the main frame via the second hard disk controller Second IDE data-interface by the IDE data channel, and carry out data by the evidence-taking and analysis system in the special machine and collect evidence and analysis, because the IDE hard disk reads in by the read-only protection lock of evidence, any incident that this hard disk is revised all can be forbidden by above-mentioned interface in operating process; For the evidence obtaining of IDE hard disk, both be applicable to the IDE hard disk of desktop computer, also be applicable to the evidence obtaining of notebook IDE hard disk; Main frame is being analyzed in the evidence obtaining process the IDE hard disk that reads in, and also simultaneously data is copied to by the IDE data channel by the first hard disk controller Primary IDE data-interface and duplicates on the hard disk.When evidence is floppy disk, earlier floppy disk is placed under the write-protect state, open computing machine, floppy disk is inserted corresponding socket, then same as described above, enter the forensics analysis duty.When evidence is the SCSI hard disk, the SCSI hard disk is connected with scsi adapter by the scsi data passage, then the data in the SCSI hard disk are read in the main frame via scsi adapter by the scsi data passage, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is various storage card, various storage cards such as CF card, SM card, mmc card, SONY memory stick etc. are inserted in the respective socket of the six directions one card reader, then the data in the storage card are read in the main frame by the six directions one card reader, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is the SIM card of mobile phone, SIM card is inserted in the socket of SIM card reader, then the data in the SIM card are read in the main frame by the SIM card reader, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.
The beneficial effects of the utility model are, owing to adopted special machine to be provided with the interface arrangement that the read-only protection lock of evidence reads in as evidence, make evidence the read protection equipment of special machine by means of special use, can directly connect the evidence hard disk and carry out forensics analysis work, and do not worry in analytic process revising any data in original hard disk, avoided all operations in the past to carry out the drawback that to carry out evidence analysis work after evidence duplicates, improved the response speed of case effectively by means of external evidence obtaining specific purpose tool; Owing on special machine, be provided with various evidence obtaining ports such as IDE hard-disk interface, SCSI hard disk expansion card interface, the six directions one card reading interface, SIM card reading interface, make the case investigator in the investigation and evidence collection process, at different evidence medias, can use different evidence fetch interfaces, and attaching in addition is very easy to case investigator's operation; Owing to can install jumbo disk in the inside of special machine, when running into the suspect and may use many computing machines to participate in crime, case investigator can comprehensively compare, analyze under the situation of data compression the data in a plurality of hard disks all being copied in this special purpose computer fully, searching is concealed in evidence chain relation wherein, thereby has greatly improved work efficiency; Because all functions equipment is all concentrated in the special machine, improved portability of equipment greatly, make when the case investigator goes out to investigate and collect evidence, only need carry a chest that this special machine is housed and get final product.The utility model is a kind ofly to be easy to carry, movably, is provided with proprietary evidence obtaining interface and the evidence obtaining port is complete, meets that computing machine case evidence obtaining cardinal rule requires, and forensics analysis is handled fast, computer crime prospecting evidence obtaining special machine simple to operate.
Description of drawings
Below in conjunction with drawings and Examples the utility model is described in further detail; But a kind of computer crime prospecting evidence obtaining special machine of the present utility model is not limited to embodiment.
Fig. 1 is a structural principle block diagram of the present utility model;
Fig. 2 is the synoptic diagram that is electrically connected of the present utility model;
Fig. 3 is the structural representation one of the read-only protection lock of the utility model evidence;
Fig. 4 is the structural representation two of the read-only protection lock of the utility model evidence.
Embodiment
Shown in accompanying drawing, a kind of computer crime prospecting evidence obtaining special machine of the present utility model, it comprises:
One main frame 1, main frame 1 is made up of cpu central processing unit, internal storage, input/output end port, system bus, the effect of main frame 1 is to provide the control of analysis, processing and Information Access to information, on main frame 1, be provided with the second hard disk controller Second IDE data-interface 11, be provided with the first hard disk controller Primary IDE data-interface 12, be provided with usb 16, be provided with parallel port 13, be provided with serial port 14, be provided with the 1000M network port 15, be provided with pci expansion slot 17;
The port that provides one to be connected with the evidence hard disk is provided for the read-only protection lock 2 of one evidence, the effect of the read-only protection lock 2 of evidence, and makes this connectivity port have write-protect, after the evidence hard disk inserts, can guarantee the primitiveness of evidence; As shown in Figure 3, Figure 4, the read-only protection lock 2 of evidence is made up of computing machine output input device 101, write-protect equipment 102, and write-protect equipment 102 mainly is made of the high-speed figure chip; In the disk operating process, operating system 111 is carried out read-write operation by 101 pairs of disks of basic output input device 103 of computing machine; In writing the disk process, system sends write command and transfers data to the data-interface of hard disk 103 to hard disk 103, and the control circuit of hard disk 103 is replied to system feedback after receiving look-at-me, and both sides begin to carry out data transmit-receive; Hard disk 103 is done the data verification in write operation, and gives system with the information feedback of write data, guarantees that so write operation normally carries out; If operating system can't obtain the feedback information of hard disk, will be considered as gross error and cause stopping problems such as response; Therefore, hard disk write-protecting equipment 102 will guarantee that data can not write hard disk 103 on the one hand, wants the anti-locking system of analog feedback signal to make mistakes on the other hand; Hard disk write-protecting equipment 103 utilizes the high-speed figure chip, on the one hand, and the write control signal of equipment 103 shielding hard disks; On the other hand, the built-in buffer memory of equipment utilization is accepted the data that system transmits, and the analog hard disk circuit is beamed back feedback signal " deception " operating system according to data to system, prevents that operating system from makeing mistakes; When system during to the hard disk write data, write command signal activates hard disk write-protecting equipment, and equipment is according to above-mentioned principle work; When system to hard disk 103 reading of data the time, write-protect equipment 102 becomes the equipment of one " transparent ";
The six directions one card reader 3, the interface that provides one can read various storing card data information such as CF card, SM card, mmc card, SONY memory stick very easily is provided in the effect of the six directions one card reader 3, and the function by the various recovery softwares in the special machine realizes reading the information such as historical summary that the other side has deleted, and can be the user more strong means are provided;
SIM card reader 5, the interface that provides one can read data in mobile phone information very easily is provided in the effect of SIM card reader 5, and read out all information in the other side's GSM mobile handset card easily by the various special softwares in the special machine, as yellow pages information, SMS etc.;
The read-only protection lock 2 of evidence is used for connection ID E evidence hard disk; the output of the read-only protection lock 2 of evidence is connected with the second hard disk controller Second IDE data-interface 11 on the main frame 1 by the IDE data channel; the first hard disk controller Primary IDE data-interface 12 on the main frame 1 by the IDE data channel with duplicate hard disk and join, the six directions one card reader 3, SIM card reader 5 are connected with usb 16 on the main frame 1 by the USB connecting line respectively.
On special machine, also can be provided with scsi adapter 4, scsi adapter 4 is connected by 1 pci expansion slot 17 on system's pci bus and the main frame, scsi adapter 4 can join with SCSI evidence hard disk by the scsi data passage, promptly, connect the scsi device access interface that scsi device adapter 4 provides the 68PIN of standard by the pci expansion slot on the main frame 1 that is installed in special machine inside 17, like this, can make things convenient for the user to connect various scsi devices; Actually rare in view of the use of scsi device in real work, therefore, improve the availability of integral device for reducing failure rate, scsi adapter 4 is a selectable unit, can not connect this scsi adapter 4 when needing scsi device at ordinary times.
On special machine, be provided with wireless network card, wireless network card is connected with usb 16 on the main frame 1,, connects wireless network card by the USB2.0 standard data communications port that is installed on the special machine internal host 1 that is, this network interface card is integrated in cabinet inside, adopts built-in antenna; This network interface card wireless transmit frequency is 2.4GHZ, and communication protocol is that 802.11B belongs to standard computer wireless network communication equipment; Like this, because special machine has had the wireless network communication function, when going out to handle official business, the work of on-the-spot scouting evidence obtaining is transportable to be connected with scouting command car or on-the-spot LAN temporarily, and do not need to carry out specially the work that network connects, can be the user and bring great convenience.
USB port one on main frame 1 has 4, contain two types of USB1.1 standard and USB2.0 standards etc., 2 USB2.0 ports are directly connected on the main frame 1, and two other USB1.1 port is expanded by the USB1.1HUB that connects main frame 1; Because the outside various memory devices of present computing machine, the more use USB plug and play port of communication apparatus; therefore two USB2.0 ports providing of special machine can be better, the evidence fetch equipment with various USB interface carries out data communication faster; two other USB1.1 port also can be realized above-mentioned functions, but main function is to connect various software protective locks by this port.
Connect the six directions one card reader 3 by the USB2.0 standard data communications port that is installed on the main frame 1, the user of service can read the data message in the various storage cards such as CF card, SM card, mmc card, SONY memory stick very easily; Because the card reader of the inner integrated various storage cards of special machine, therefore run at work when need from the other side's various storage cards, read relevant information and just can directly read, and realize reading the information such as historical summary that the other side has deleted by the function of the various recovery softwares in the special machine; For the user provides more strong means.
By being installed in the mobile phone SIM card reader 5 of the USB2.0 standard data communications port connection USB interface on the main frame 1, can read out all information in the other side's GSM mobile handset card (for example yellow pages information, written notes note etc.) easily by special software by inner integrated SIM card reader 5 users of service of special machine.
On special machine, be provided with the 1000M network port, this port is directly connected in the gigabit networking port one 5 on the main frame, this port can be connected with the peripheral hardware network switch by network connection, and can carry out rapid data transmission and exchanges data with other computing machines by the network switch of gigabit.As: reconnoitre command car by express network port and computing machine and be connected the various data that special purpose computer can be gathered at the scene and import to fast on the vehicle-mounted case overall treatment platform and carry out unified Analysis, processing.
Be provided with serial port on special machine, this port is directly connected on the COM port 14 on the main frame, and this serial port can be connected with peripheral hardware serial communication equipment by the serial communication line.
On special machine, be provided with parallel port, this port is directly connected on the parallel communication port one 3 on the main frame, this parallel port can be connected with peripheral hardware parallel port communication equipment by the parallel communication line, as connecting various printers, cooperate special machine to carry out providing various data reports and carrying out file printout after the data analysis by this port connection printer.
In use, evidence and corresponding ports are joined, to the reading in of evidence, can carry out data by the evidence-taking and analysis system in the special machine and obtain or analyze by port; When evidence is the IDE hard disk, the read-only protection lock 2 of IDE hard disk and evidence is connected, then the data in the IDE hard disk are read in the main frame 1 via the second hard disk controller Second IDE data-interface 11 by the IDE data channel, and carry out data by the evidence-taking and analysis system in the special machine and collect evidence and analysis, because the IDE hard disk reads in by the read-only protection lock of evidence, any incident that this hard disk is revised all can be forbidden by above-mentioned interface in operating process; For the evidence obtaining of IDE hard disk, both be applicable to the IDE hard disk of desktop computer, also be applicable to the evidence obtaining of notebook IDE hard disk; Main frame 1 is being analyzed in the evidence obtaining process the IDE hard disk that reads in, and also simultaneously data is copied to by the IDE data channel by the first hard disk controller Primary IDE data-interface 12 and duplicates on the hard disk.When evidence is floppy disk, earlier floppy disk is placed under the write-protect state, open computing machine, floppy disk is inserted corresponding socket, then same as described above, enter the forensics analysis duty.When evidence is the SCSI hard disk, the SCSI hard disk is connected with scsi adapter 4 by the scsi data passage, then the data in the SCSI hard disk are read in the main frame 1 via scsi adapter 4 by the scsi data passage, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is various storage card, various storage cards such as CF card, SM card, mmc card, SONY memory stick etc. are inserted in the respective socket of the six directions one card reader 3, then the data in the storage card are read in the main frame 1 by the six directions one card reader 3, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.When evidence is the SIM card of mobile phone, SIM card is inserted in the socket of SIM card reader 5, then the data in the SIM card are read in the main frame 1 by SIM card reader 5, and are carried out the data evidence obtaining and analyzed by the evidence-taking and analysis system in the special machine.

Claims (8)

1. the evidence obtaining special machine is reconnoitred in a computer crime, and it is characterized in that: it comprises a main frame, and main frame is provided with the second hard disk controller Second IDE data-interface, the first hard disk controller Primary IDE data-interface, USB interface; The read-only protection lock of one evidence; The six directions one card reader; The SIM card reader; The input of the read-only protection lock of evidence is connected to the evidence hard disk; the output of the read-only protection lock of evidence is connected with the second hard disk controller Second IDE data-interface on the main frame by the IDE data channel; the first hard disk controller Primary IDE data-interface on the main frame by the IDE data channel with duplicate hard disk and join, the six directions one card reader, SIM card reader are connected with USB interface on the main frame by the USB connecting line respectively.
2. a kind of computer crime prospecting evidence obtaining special machine according to claim 1, it is characterized in that: also can comprise on the described special machine being provided with scsi adapter, the corresponding pci expansion slot that on main frame, is provided with, scsi adapter is connected with pci expansion slot on the main frame by system's pci bus, and scsi adapter can join with SCSI evidence hard disk by the scsi data passage.
3. a kind of computer crime prospecting evidence obtaining special machine according to claim 1 is characterized in that: can comprise also on the described special machine being provided with wireless network card that wireless network card is connected with USB interface on the main frame.
4. a kind of computer crime prospecting evidence obtaining special machine according to claim 1, it is characterized in that: can comprise also on the described special machine being provided with universal serial bus networks concentrator USB HUB expansion interface that universal serial bus networks concentrator USB HUB expansion interface is connected with USB interface on the main frame by the USB connecting line.
5. a kind of computer crime prospecting evidence obtaining special machine according to claim 1, it is characterized in that: also can comprise on the described special machine being provided with the 1000M network port, this port is directly connected in the gigabit networking port on the main frame, and this port can be connected with the peripheral hardware network switch by network connection.
6. a kind of computer crime prospecting evidence obtaining special machine according to claim 1, it is characterized in that: also can comprise on the described special machine being provided with serial port, this port is directly connected on the COM port on the main frame, and this serial port can be connected with peripheral hardware serial communication equipment by the serial communication line.
7. a kind of computer crime prospecting evidence obtaining special machine according to claim 1, it is characterized in that: also can comprise on the described special machine being provided with parallel port, this port is directly connected on the parallel communication port on the main frame, and this parallel port can be connected with peripheral hardware parallel port communication equipment by the parallel communication line.
8. a kind of computer crime prospecting evidence obtaining special machine according to claim 1, it is characterized in that: the read-only protection lock of described evidence includes write-protect equipment, and write-protect equipment mainly is made of the high-speed figure chip.
CN 03253565 2003-09-18 2003-09-18 A special machine for computer crime investigation and evidence obtaining Expired - Lifetime CN2681237Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03253565 CN2681237Y (en) 2003-09-18 2003-09-18 A special machine for computer crime investigation and evidence obtaining

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03253565 CN2681237Y (en) 2003-09-18 2003-09-18 A special machine for computer crime investigation and evidence obtaining

Publications (1)

Publication Number Publication Date
CN2681237Y true CN2681237Y (en) 2005-02-23

Family

ID=34598836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03253565 Expired - Lifetime CN2681237Y (en) 2003-09-18 2003-09-18 A special machine for computer crime investigation and evidence obtaining

Country Status (1)

Country Link
CN (1) CN2681237Y (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793299A (en) * 2014-02-18 2014-05-14 重庆爱思网安信息技术有限公司 Evidence taking all-in-one machine
CN104331338A (en) * 2014-10-24 2015-02-04 四川神琥科技有限公司 Special trace evidence obtaining recovery equipment for Linux/Unix system
CN104391758A (en) * 2014-10-30 2015-03-04 四川神琥科技有限公司 Trace evidence taking and recovering equipment special for Apple MAC (media access control) system
CN106529214A (en) * 2016-12-05 2017-03-22 湖北灰科信息技术有限公司 Electronic evidence collection device and electronic evidence collection method employing same
CN108664441A (en) * 2018-07-13 2018-10-16 重庆爱思网安信息技术有限公司 The read-only control systems of USB and method
CN113986806A (en) * 2021-11-03 2022-01-28 厦门市美亚柏科信息股份有限公司 GOIP high-speed evidence obtaining method and system based on serial port and network port and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793299A (en) * 2014-02-18 2014-05-14 重庆爱思网安信息技术有限公司 Evidence taking all-in-one machine
CN104331338A (en) * 2014-10-24 2015-02-04 四川神琥科技有限公司 Special trace evidence obtaining recovery equipment for Linux/Unix system
CN104391758A (en) * 2014-10-30 2015-03-04 四川神琥科技有限公司 Trace evidence taking and recovering equipment special for Apple MAC (media access control) system
CN106529214A (en) * 2016-12-05 2017-03-22 湖北灰科信息技术有限公司 Electronic evidence collection device and electronic evidence collection method employing same
CN108664441A (en) * 2018-07-13 2018-10-16 重庆爱思网安信息技术有限公司 The read-only control systems of USB and method
CN108664441B (en) * 2018-07-13 2020-03-31 重庆爱思网安信息技术有限公司 USB read-only control system and method
CN113986806A (en) * 2021-11-03 2022-01-28 厦门市美亚柏科信息股份有限公司 GOIP high-speed evidence obtaining method and system based on serial port and network port and storage medium
CN113986806B (en) * 2021-11-03 2022-08-02 厦门市美亚柏科信息股份有限公司 GOIP high-speed evidence obtaining method and system based on serial port and network port and storage medium

Similar Documents

Publication Publication Date Title
CN2681237Y (en) A special machine for computer crime investigation and evidence obtaining
CN1312551C (en) Portable secret computer
CN201259673Y (en) Device for computer crime investigation and evidence obtaining
CN202584143U (en) A read-only card reader with multiple interfaces
CN2684479Y (en) Security isolation apparatus for unidirectional connection network
CN208538119U (en) The standard PCIe card of nine external hard disc cabinets is connected based on cabinet inside
CN112347017A (en) PS/2 keyboard dual-host plug-in system with LPC bus interface and switching method
CN100511196C (en) Data processing chip and memory device
CN2884332Y (en) Cards reader
CN107547542A (en) A kind of USB serial communications detection method and equipment
CN212932931U (en) Information interaction system of electrical measurement and detection equipment
CN2751360Y (en) A CPU card meter
CN202815872U (en) Identity authentication device with fingerprint identifying and ID card identifying functions
CN202383695U (en) USB/ATA read only lock
CN2911789Y (en) Portable device able to exchange date memory or process data
CN206193919U (en) Staple commodities order repurchase system based on PCI E encrypts card
CN213211026U (en) Workstation device for evidence obtaining and analysis of mobile terminal
CN2582282Y (en) Physical isolation equipment for network safety
CN209167963U (en) A kind of network security mainboard
CN213934886U (en) Safety management system for unified storage of files
CN203552364U (en) All-in-one machine device outside cabinet
CN209879391U (en) Evidence analysis special equipment
CN109816083A (en) A kind of aviation dual-port permission electric board
CN210006088U (en) image forgery detection system
CN215264792U (en) Device for remotely connecting HBA card serial port

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: XIAMEN CITY MEYABOOK INFORMATION SCIENCE AND TECHN

Free format text: FORMER OWNER: TENG DA

Effective date: 20091113

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20091113

Address after: Fujian Province, Xiamen software park two sunrise Road No. 12 102 unit 402, zip code: 361000

Patentee after: Xiamen Meiah Pico Information Technology Co., Ltd.

Address before: Fujian province Xiamen City Siming Software Park No. 3 1F, zip code: 361000

Co-patentee before: Zhang Xuefeng

Patentee before: Ten ten

C56 Change in the name or address of the patentee

Owner name: XIAMEN MEIYA PICO INFORMATION CO., LTD.

Free format text: FORMER NAME: XIAMEN CITY MEYABOOK INFORMATION SCIENCE AND TECHNOLOGY CO., LTD.

CP03 Change of name, title or address

Address after: Fujian Province, Xiamen software park two sunrise Road No. 12 102 unit 402, zip code: 361000

Patentee after: Xiamen Meiya Pico Information Co., Ltd.

Address before: Fujian Province, Xiamen software park two sunrise Road No. 12 102 unit 402, zip code: 361000

Patentee before: Xiamen Meiah Pico Information Technology Co., Ltd.

C17 Cessation of patent right
CX01 Expiry of patent term

Expiration termination date: 20130918

Granted publication date: 20050223