METHOD OF PROVIDING EVIDENCE COLLECTION TOOL, AND APPARATUS AND METHOD FOR COLLECTING DIGITAL EVIDENCE IN DOMAIN SEPARATION-BASED MOBILE DEVICE
    2.
    发明申请
    METHOD OF PROVIDING EVIDENCE COLLECTION TOOL, AND APPARATUS AND METHOD FOR COLLECTING DIGITAL EVIDENCE IN DOMAIN SEPARATION-BASED MOBILE DEVICE 审中-公开
    提供证据收集工具的方法,以及用于在基于域分离的移动设备中收集数字证据的装置和方法

    公开(公告)号:US20150326618A1

    公开(公告)日:2015-11-12

    申请号:US14705155

    申请日:2015-05-06

    CPC classification number: G06F21/64 G06F21/53 H04L63/123 H04L63/30 H04L67/22

    Abstract: A method of providing an evidence collection tool, and an apparatus and method for collecting digital evidence in a domain separation-based mobile device are disclosed. The apparatus includes a target device information collection module, a collection module, a transmission module, and a control module. The target device information collection module collects the system feature information and user identification information of a domain separation-based mobile device. The collection module collects digital evidence using a received evidence collection tool. The control module transfers the user identification information and a previously inputted the investigator authentication key value to a server, transfers the security key from the server to the encryption unit of transmission module, the transmission module encrypts the digital evidence using a received security key and transmits the system feature information to the server, and transfers the evidence collection tool from the server to the collection module.

    Abstract translation: 公开了一种提供证据收集工具的方法,以及用于在基于域分离的移动设备中收集数字证据的装置和方法。 该装置包括目标设备信息收集模块,收集模块,传输模块和控制模块。 目标设备信息收集模块收集基于域分离的移动设备的系统特征信息和用户识别信息。 收集模块使用收集的证据收集工具收集数字证据。 控制模块将用户识别信息和先前输入的调查员认证密钥值传送到服务器,将安全密钥从服务器传送到传输模块的加密单元,传输模块使用接收到的安全密钥加密数字证据,并发送 系统将功能信息提供给服务器,并将证据收集工具从服务器传输到收集模块。

    APPARATUS AND METHOD FOR PERFORMING KEY DERIVATION IN CLOSED DOMAIN
    4.
    发明申请
    APPARATUS AND METHOD FOR PERFORMING KEY DERIVATION IN CLOSED DOMAIN 审中-公开
    在封闭领域执行关键衍生的装置和方法

    公开(公告)号:US20150117640A1

    公开(公告)日:2015-04-30

    申请号:US14243093

    申请日:2014-04-02

    CPC classification number: H04L9/0869

    Abstract: Provided are an apparatus and method for guaranteeing the safety of a computing device by separating a closed domain from an open domain in the computing device and allowing the closed domain to perform key derivation that is required for encryption/decryption of data. The computing device includes a hypervisor, the open domain and the closed domain isolated from the open domain without being open to a user, the open domain and the closed domain managed by the hypervisor, and a key derivation executable code configured to generate an encryption key needed to perform encryption in the open domain, from a seed value, the key derivation executable code being executed in the closed domain, wherein the encryption key generated by the key derivation executable code is transferred to the open domain, and is automatically discarded after being used for encryption of data in the open domain.

    Abstract translation: 提供了一种用于通过将计算设备中的闭合域与开放域分离并允许封闭域执行数据加密/解密所需的密钥导出来保证计算设备的安全性的装置和方法。 所述计算设备包括管理程序,所述开放域和所述关闭域与所述开放域隔离,而不被所述用户打开,所述开放域和所述管理程序管理的所述关闭域以及被配置为生成加密密钥的密钥导出可执行代码 需要在开放域中执行加密,从种子值,密钥导出可执行代码在封闭域中执行,其中由密钥导出可执行代码生成的加密密钥被传送到开放域,并且被放弃后被自动丢弃 用于开放域中的数据加密。

    Apparatus and method for detecting malicious device based on swarm intelligence

    公开(公告)号:US10798115B2

    公开(公告)日:2020-10-06

    申请号:US15920114

    申请日:2018-03-13

    Abstract: Disclosed herein are an apparatus and method for detecting a malicious device based on swarm intelligence. The method includes detecting a malicious device by causing at least one exploration ant to access a device swarm along movement routes in which pheromone trail values are taken into consideration, wherein the exploration ant is generated in response to a detection request received from a security management server, when the at least one exploration ant detects a suspicious device that is suspected to be a malicious device, causing the exploration ant to return along the movement routes in reverse order, and returning pheromone trail values generated by devices on the return movement routes to a malicious device detection apparatus, and identifying whether the suspicious device is the malicious device by calculating an optimal solution based on a local information set generated by aggregating the pheromone trail values returned for movement routes.

Patent Agency Ranking