Abstract:
The present invention concerns the recovery of fragmented files. In particular, the present invention concerns finding fragmentation points and continuation points of a fragmented JPEG image for purposes of reassembling the JPEG image. The continuation points are found by using a JPEG thumbnail image corresponding to the JPEG image to be reassembled.
Abstract:
Described herein are methods and devices for forensic access control of an electronic device, including encryption and decryption of access keys of an electronic device. Two pairs of asymmetric key pairs (AKP) are created, e.g., created by more than one organization. An encrypted access key is configured to be decrypted by another organization possessing the private key of the first AKP and the private key of the second AKP. In some embodiments, the private key of the second AKP is encrypted. The encrypted private key of the second AKP is configured to be decrypted using the private key of the first AKP. The encrypted access key may be decrypted using the decrypted private key of the second AKP.
Abstract:
The present invention concerns the recovery of fragmented files. In particular, the present invention concerns finding fragmentation points and continuation points of a fragmented JPEG image for purposes of reassembling the JPEG image. The continuation points are found by using a JPEG thumbnail image corresponding to the JPEG image to be reassembled.
Abstract:
Described herein are methods and devices for forensic access control of an electronic device, including encryption and decryption of access keys of an electronic device. Two pairs of asymmetric key pairs (AKP) are created, e.g., created by more than one organization. An encrypted access key is configured to be decrypted by another organization possessing the private key of the first AKP and the private key of the second AKP. In some embodiments, the private key of the second AKP is encrypted. The encrypted private key of the second AKP is configured to be decrypted using the private key of the first AKP. The encrypted access key may be decrypted using the decrypted private key of the second AKP.
Abstract:
The present disclosure relates to a system and method for forensic access control of an electronic device. More specifically, the present disclosure relates to a system and a method for handling encryption and decryption of access keys of an electronic device.
Abstract:
In the field of forensic analysis of databases, a method of performing database rollback to a previous state of a database using a write-ahead log (WAL) includes: selecting, in the set of frames recorded to the WAL, a specific frame representing a specific revised content of a corresponding specific page; identifying, in the set of frames, a first subset of frames containing the specific frame and zero or more thereto chronologically preceding frames; extracting, from the set of pages of the database, a first subset of pages; extracting, from the corresponding pages of the first subset of frames, a second subset of pages; and performing, based on the contents of the first subset of pages and the revised contents of the second subset of pages, a rollback of the database to a previous state containing the revised content of the specific page.
Abstract:
The present disclosure relates to a system and method for forensic access control of an electronic device. More specifically, the present disclosure relates to a system and a method for handling encryption and decryption of access keys of an electronic device.
Abstract:
In the field of forensic analysis of databases, a method of performing database rollback to a previous state of a database using a write-ahead log (WAL) includes: selecting, in the set of frames recorded to the WAL, a specific frame representing a specific revised content of a corresponding specific page; identifying, in the set of frames, a first subset of frames containing the specific frame and zero or more thereto chronologically preceding frames; extracting, from the set of pages of the database, a first subset of pages; extracting, from the corresponding pages of the first subset of frames, a second subset of pages; and performing, based on the contents of the first subset of pages and the revised contents of the second subset of pages, a rollback of the database to a previous state containing the revised content of the specific page.
Abstract:
In the field of forensic analysis of databases, a method of performing database rollback to a previous state of a database using a write-ahead log (WAL) includes: selecting, in the set of frames recorded to the WAL, a specific frame representing a specific revised content of a corresponding specific page; identifying, in the set of frames, a first subset of frames containing the specific frame and zero or more thereto chronologically preceding frames; extracting, from the set of pages of the database, a first subset of pages; extracting, from the corresponding pages of the first subset of frames, a second subset of pages; and performing, based on the contents of the first subset of pages and the revised contents of the second subset of pages, a rollback of the database to a previous state containing the revised content of the specific page.