EXTENSIBLE SOFTWARE TOOL FOR INVESTIGATING PEER-TO-PEER USAGE ON A TARGET DEVICE
First Claim
1. A computer-readable medium comprising instructions that cause one or more processors to:
- determine whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients;
gather usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device;
analyze the gathered usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device; and
generate a report of the analyzed gathered usage information for the one or more peer-to-peer clients.
1 Assignment
0 Petitions
Accused Products
Abstract
In general, the invention provides for analyzing a target computer for computer crimes such as illegal sharing of files or sharing of illegal files on peer-to-peer clients. The target computer may have software for a plurality of peer-to-peer clients. Only one extensible forensic device may be necessary to analyze the plurality of peer-to-peer clients for downloaded or shared files. For example, the invention may provide for a method comprising determining whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients. The method further includes, gathering usage information for the one or more peer-to-peer clients that had been determined to be installed on the target computer, analyzing the usage information, and automatically generating a report of the analyzed usage information.
33 Citations
26 Claims
-
1. A computer-readable medium comprising instructions that cause one or more processors to:
-
determine whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients; gather usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device; analyze the gathered usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device; and generate a report of the analyzed gathered usage information for the one or more peer-to-peer clients.
-
-
2. A method comprising:
-
determining, by a forensic system that includes a target device, whether one or more peer-to-peer clients are or have been installed on the target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients; gathering, by the forensic system, usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device; analyzing, by the forensic system, the gathered usage information for the one or more peer-to-peer clients; and automatically generating, by the forensic system, a report of the analyzed gathered usage information for the one or more peer-to-peer clients. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A forensic system comprising;
-
a forensic device coupled to a target device; and a software tool, executable by the forensic device to analyze and extract data from the target device, wherein the software tool, when executed, determines whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients, gathers usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device, analyzes the gathered usage information for the one or more peer-to-peer clients that had been determined to be installed on the target device, and generates a report of the analyzed gathered usage information for the one or more peer-to-peer clients. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A forensic device comprising:
-
an analysis control module configured to extract and analyze data for one or more peer-to-peer clients that are or have been installed on a target device; one or more peer-to-peer plug-ins that interface the analysis control module to the one or more peer-to-peer clients; one or more configuration files comprising data details for the one or more peer-to-peer clients; and a storage unit that stores the extracted and analyzed data from the analysis control module, wherein each peer-to-peer plug-in interfaces the analysis control module to one of the one or more peer-to-peer clients, wherein each configuration file comprises data details for one of the one or more peer-to-peer clients, and wherein each configuration file is associated with one of the one or more peer-to-peer plug-ins. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification