Please download the dossier by clicking on the dossier button x
×

Configurable forensic investigative tool

  • US 10,067,787 B2
  • Filed: 02/10/2011
  • Issued: 09/04/2018
  • Est. Priority Date: 02/10/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • storing an investigative profile that identifies a plurality of forensic tools from a set of forensic tools and defines a manner in which a forensic investigative tool invokes the identified forensic tools for an investigation of a target computing device, wherein to define the manner in which the forensic investigative tool invokes the identified forensic tools, the investigative profile defines;

    a sequence in which the forensic investigative tool invokes the identified forensic tools,one or more operational parameters for respective identified forensic tools needed for the execution of the respective forensic tools on the target computing device, andan identification of data to capture from the target computing device;

    processing the investigative profile with the forensic investigative tool on a forensic device to provide a common execution framework for selective execution of the plurality of forensic tools identified by the investigative profile, the framework including a common user interface and a reporting structure associated with the plurality of forensic tools;

    transferring, with the forensic device upon execution of the forensic investigative tool, one or more of the identified forensic tools and a remote agent to the target computing device for temporary storage;

    temporarily executing, with the forensic device upon execution of the forensic investigative tool, the remote agent on the target computing device to execute the identified forensic tools on the target computing device in accordance with the sequence and the one or more operational parameters investigative profile;

    receiving, with the forensic investigative tool executing on the forensic device, data acquired from the target computing device by the execution of the identified forensic tools in accordance with the investigative profile; and

    deleting, after receiving the data acquired from the target computing device, the transferred identified forensic tools, the remote agent, and a temporary directory within the target computing device where the transferred forensic tools and the remote agent are temporarily stored.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×