Enterprise computer investigation system
First Claim
1. A method of examining a storage device coupled to a target machine in a communications network the method comprising:
- installing a servelet on the target machine;
commanding the servelet over the communications network to retrieve data from the storage device;
using the servelet to retrieve data from the storage device;
receiving data from the servelet over the communications network; and
storing the retrieved data on a client machine.
0 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
-
Citations
18 Claims
-
1. A method of examining a storage device coupled to a target machine in a communications network the method comprising:
-
installing a servelet on the target machine;
commanding the servelet over the communications network to retrieve data from the storage device;
using the servelet to retrieve data from the storage device;
receiving data from the servelet over the communications network; and
storing the retrieved data on a client machine.
-
-
2. A method for secure forensic investigation over a communications network the method comprising:
-
receiving an authentication key from a vendor;
authenticating the received authentication key;
receiving a second authentication key from the vendor; and
transmitting the second authentication key to a target machine. - View Dependent Claims (3, 4, 5, 6, 7)
-
-
8. A system for secure forensic investigation over a communications network comprising:
-
a keymaster;
a vendor coupled to the keymaster over the communications network, wherein the vendor receives a first authentication key from the keymaster; and
a server coupled to the vendor over the communications network, wherein the server receives the first authentication key from the vendor, wherein the server authenticates the first authentication key. - View Dependent Claims (9, 10, 11)
-
-
12. An apparatus for secure forensic investigation over a communications network the apparatus comprising:
-
a network coupling configured to communicate using the communications network;
a processor coupled to the network coupling, the processor configured to receive an authentication key from a vendor, authenticate the received authentication key, receive a second authentication key from the vendor; and
transmit the second authentication key to a target machine. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification