Methods for evidencing illicit use of a computer system or device
First Claim
Patent Images
1. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
- receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes appending the forensic tracer data to an existing file having other contents not related to forensic tracer data.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer is provided with software that looks for certain activities that may be illicit (e.g. processing of a graphic file corresponding to a banknote). If such an activity is detected, tracer data detailing the activity is generated and secretly stored. in the computer. If the computer is later searched or seized, the tracer data can be recovered and employed as evidence of the computer'"'"'s use, e.g. in counterfeiting.
121 Citations
24 Claims
-
1. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes appending the forensic tracer data to an existing file having other contents not related to forensic tracer data. - View Dependent Claims (2)
-
-
3. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the storing includes storing without use of a file system normally employed by said computer system for file storage, wherein the forensic tracer data storage is not listed in a file listing produced by said file system.
-
-
4. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes queuing the forensic tracer data in RAM for later storage, and later storing the data in said non-volatile store, wherein program tracing tools will not note an immediate write of said forensic tracer data to the non-volatile store.
-
-
5. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes converting a deadwood file to use as a storage repository for said forensic tracer data.
-
-
6. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes converting a duplicate file to use as a storage repository for said forensic tracer data.
-
-
7. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes converting a long-unused file to use as a storage repository for said forensic tracer data.
-
-
8. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes append the forensic tracer data to an application “
help”
file.
-
-
9. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult, later performing an integrity check of the obfuscated forensic tracer data, and repairing any damage found.
-
-
10. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult, and replicating obfuscated storage of said forensic tracer data at several storage locations.
-
-
11. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the computer system has an operating system including a registry database, and the method includes storing the forensic tracer data in said registry database.
-
-
12. A method for robustly evidencing illicit use of a computer system, the system having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of a system component for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein-the obfuscating comprises steganographically encoding the forensic tracer data amidst other data.
-
-
13. A method for robustly evidencing illicit use of a device, the device having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of the device for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating includes queuing the forensic tracer data in RAM for later storage, and later storing the data in said non-volatile store, wherein program tracing tools will note an immediate write of said forensic tracer data to the non-volatile store. - View Dependent Claims (14, 15)
-
-
16. A method for robustly evidencing illicit use of a device, the device having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of the device for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult, later performing an integrity check of the obfuscated forensic tracer data, and repairing any damage found. - View Dependent Claims (17, 18)
-
-
19. A method for robustly evidencing illicit use of a device, the device having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of the device for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult, and replicating obsfuscated storage of said forensic tracer data at several storage locations. - View Dependent Claims (20, 21)
-
-
22. A method for robustly evidencing illicit use of a device, the device having associated therewith at least one data processor and at least one non-volatile data store, the method comprising:
-
receiving a signal indicating possible use of the device for an illicit activity;
in response to receipt of said signal, storing forensic tracer data in at least one of said non-volatile data stores;
the method further including obfuscating said storage of said forensic tracer data so as to make detection thereof more difficult;
wherein the obfuscating comprises steganographically encoding the forensic tracer data amidst other data. - View Dependent Claims (23, 24)
-
Specification