[go: up one dir, main page]

CN110852718A - Method for carrying out system prejudgment on evidence obtaining computer - Google Patents

Method for carrying out system prejudgment on evidence obtaining computer Download PDF

Info

Publication number
CN110852718A
CN110852718A CN201911097744.9A CN201911097744A CN110852718A CN 110852718 A CN110852718 A CN 110852718A CN 201911097744 A CN201911097744 A CN 201911097744A CN 110852718 A CN110852718 A CN 110852718A
Authority
CN
China
Prior art keywords
computer
checked
information
valuable
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911097744.9A
Other languages
Chinese (zh)
Inventor
郭玉智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Tax Soft Software Technology Co Ltd
Original Assignee
Jiangsu Tax Soft Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Tax Soft Software Technology Co Ltd filed Critical Jiangsu Tax Soft Software Technology Co Ltd
Priority to CN201911097744.9A priority Critical patent/CN110852718A/en
Publication of CN110852718A publication Critical patent/CN110852718A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/668Internet protocol [IP] address subnets

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for carrying out systematic prejudgment on a computer for obtaining evidence, which belongs to the technical field of big data, firstly carries out prejudgment on basic information of a computer to be checked to find out a valuable computer, then carries out data acquisition on the valuable computer to generate a data acquisition report, and solves the technical problem that whether electronic data in the computer is helpful for tax inspection or not is automatically prejudged.

Description

Method for carrying out system prejudgment on evidence obtaining computer
Technical Field
The invention belongs to the technical field of big data, and particularly relates to a method for carrying out systematic prejudgment on a evidence obtaining computer.
Background
Along with the continuous popularization of computerization, paperless official working is more and more popular, the division of the enterprise financial staff is clearer, more than one financial staff in one enterprise, especially large enterprises, the financial staff are dozens of or more, each financial staff is provided with at least one or more computers, the computers in financial rooms are more, under the condition that the normal operation activities of the enterprises are not influenced, the computers which are required to be checked at this time are quickly judged, and a method for the tax inspection staff to carry out system prejudgment on the field computers is needed.
Disclosure of Invention
The invention aims to provide a method for carrying out systematic prejudgment on a computer for evidence collection, which solves the technical problem that whether electronic data in the computer is helpful to the inspection of tax or not is automatically prejudged.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for carrying out system prejudgment on a forensic computer comprises the following steps:
step 1: establishing a multi-equipment team cooperation tool box, wherein the multi-equipment team cooperation tool box comprises a mobile workstation, a mobile wireless router, a law enforcement recorder, a recording pen, a mobile hard disk, an encrypted high-speed U disk, a large-capacity mobile power supply, a high-speed shooting instrument, a portable projector, a portable printer, a portable duplicator and an interphone;
the mobile workstation is used for reading and collecting tax related information of a computer to be checked, and the mobile hard disk and the encryption high-speed U disk are used for storing the tax related information;
the law enforcement recorder, the recording pen, the high shooting instrument, the portable projector, the portable printer and the portable duplicator are all used for recording the evidence obtaining process;
the high-capacity mobile power supply is used for supplying power to the various equipment team cooperation tool boxes;
the mobile wireless router is used for providing a wireless network, and the law enforcement recorder, the recording pen, the high shooting instrument, the portable projector, the portable printer and the portable copier are all in data interaction with the mobile workstation through the wireless network;
the interphone is used for providing voice communication for field personnel;
the mobile hard disk and the encrypted high-speed U disk are in data interaction with the mobile workstation through the USB interface;
step 2: the mobile workstation is connected with a computer to be checked through a network cable or a USB interface, and reads tax related information of the computer to be checked, wherein the tax related information comprises basic information and tax information;
the basic information comprises operating system information, user information, shared information, network card information, port information, software installation information, usb use records, database types, access information and document information;
and step 3: the mobile workstation judges whether the computer to be checked is a value computer according to the following method:
step S1: recording operating system information and user information of a computer to be checked, taking the operating system information and the user information as evidence fixed information, and determining a storage computer of evidence data according to the evidence fixed information;
step S2: reading shared information in a computer to be checked, namely reading shared file information in a folder shared on the computer to be checked, and storing the shared file information as valuable evidence;
step S3: reading network card information in a computer to be checked, and recording the IP address of the computer to be checked;
step S4: reading port information of the computer to be checked, and judging whether the computer to be checked is in data connection with the databases through an open port of the computer to be checked;
step S5: reading software installation information of a computer to be checked, judging the type and the quantity of software installed in the computer to be checked, presetting a valuable software list, and judging whether the valuable software is installed in the computer to be checked or not by contrasting the valuable software list;
step S6: reading a usb usage record of a computer to be checked, storing the usb usage record in a system log record in the computer to be checked, presetting a valuable USB flash disk list, and comparing the usb usage record with the valuable USB flash disk list to judge whether the computer to be checked is connected with the valuable USB flash disk;
step S7: reading the database type of the computer to be checked, wherein the database type is stored in the registry information of the computer to be checked, and the type and the version number of the database installed in the computer to be checked are stored;
step S8: reading access information and document information of a computer to be checked, judging access records of a computer to be checked which is expected to be checked recently through the access information and the document information, establishing a keyword lexicon, comparing the keyword lexicon, searching the document which is accessed recently by the computer to be checked, finding out the document containing the keywords as a valuable document, and storing the valuable document;
and 4, step 4: judging whether the computer to be checked has a shared file, whether value software is installed, whether a valuable U disk is connected or whether a valuable document exists according to the method in the step 3, and judging that the computer to be checked is a valuable computer when one or more of the conditions are true;
and 5: data acquisition of a valuable computer, comprising the steps of:
step A1: reading a corporate financial account set in a value computer, comprising the steps of:
step AA 1: reading a data source within a database of a value computer;
step AA 2: retrieving financial data, inventory data, payroll data and fixed assets in a data source, and generating financial data files, inventory files, payroll files and fixed asset files, respectively;
step AA 3: performing data encryption on the contents of the financial data file, the inventory file, the wage file and the fixed asset file to generate an encrypted TXT file;
step AA 4: the encrypted TXT file is compressed and then encrypted again;
step B1: reading out of account data in a valuable computer, comprising the steps of:
step BB 1: reading and storing disk data in a valuable computer;
step BB 2: reading and storing registry information of a valuable computer;
step BB 3: opening an installation directory of computer mail related software, reading and storing files in a folder in the installation directory;
step BB 4: searching the suffix name of the file in the valuable computer, screening and storing the valuable file;
step BB 5: reading and storing IP addresses of all computers which belong to the same network segment with the valuable computer;
step 6: and (5) taking the data acquired by the method in the step 5 as evidence data to generate a data acquisition report.
Preferably, the mobile workstation is a notebook computer, a mobile phone or a tablet computer.
Preferably, the financial data file, the inventory file, the payroll file and the fixed asset file generated when step AA2 is performed are TXT files;
the financial data file, the inventory file, the payroll file, and the fixed asset file are each a plurality of TXT files.
The invention relates to a method for carrying out systematic prejudgment on a computer for obtaining evidence, which solves the technical problem that whether electronic data in the computer is helpful for tax inspection or not is automatically prejudged.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
A method for performing systematic prejudgment on a forensic computer as shown in fig. 1, comprising the steps of:
step 1: establishing a multi-equipment team cooperation tool box, wherein the multi-equipment team cooperation tool box comprises a mobile workstation, a mobile wireless router, a law enforcement recorder, a recording pen, a mobile hard disk, an encrypted high-speed U disk, a large-capacity mobile power supply, a high-speed shooting instrument, a portable projector, a portable printer, a portable duplicator and an interphone;
the mobile workstation is used for reading and collecting tax related information of a computer to be checked, and the mobile hard disk and the encryption high-speed U disk are used for storing the tax related information;
the law enforcement recorder, the recording pen, the high shooting instrument, the portable projector, the portable printer and the portable duplicator are all used for recording the evidence obtaining process;
the high-capacity mobile power supply is used for supplying power to the various equipment team cooperation tool boxes;
the mobile wireless router is used for providing a wireless network, and the law enforcement recorder, the recording pen, the high shooting instrument, the portable projector, the portable printer and the portable copier are all in data interaction with the mobile workstation through the wireless network;
the interphone is used for providing voice communication for field personnel;
the mobile hard disk and the encrypted high-speed U disk are in data interaction with the mobile workstation through the USB interface;
step 2: the mobile workstation is connected with a computer to be checked through a network cable or a USB interface, and reads tax related information of the computer to be checked, wherein the tax related information comprises basic information and tax information;
the basic information comprises operating system information, user information, shared information, network card information, port information, software installation information, usb use records, database types, access information and document information;
the operating system information comprises a system version, a computer name, installation time, a serial number and the like;
the user information comprises a user name, a user group, login time and login times;
the sharing information comprises a sharing name and a sharing path;
the network card information comprises network card description, IP address and lease time;
the port information comprises a local IP address, a local port, a process name, a remote IP address and corresponding services;
the software installation information comprises a program name, a version number, a company, installation time and an installation catalog;
the usb usage record comprises a device name, a mounted disc identifier, first plugging time, last plugging time and a device GUID;
the database type comprises a database name, an installation path and a version;
the access information comprises the recently accessed documents or folders and the recently deleted documents or folders;
the document information comprises a desktop document, an instant messaging transmitted document, an encrypted document and different keyword classified documents;
and step 3: the mobile workstation judges whether the computer to be checked is a value computer according to the following method:
in the embodiment, all computers in the financial room are subjected to prejudgment operation to find out valuable computers, after a prejudgment strategy is set, a prejudgment result is obtained after prejudgment is finished, the prejudgment result is valuable when the prejudgment result is checked, if the prejudgment result is valuable, the computers to be checked are collected, a collection report is obtained after collection is finished, then collection is finished, and if the prejudgment result is not valuable, collection is directly finished, and another computer is replaced for operation.
If the computer is an enterprise financial manager or a computer of a boss, the computer does not need system prejudgment, data acquisition is directly used, data acquisition is carried out according to an acquisition strategy, an acquisition report is also generated after the acquisition is finished, and then the acquisition is finished; if the financial software is a server computer of an enterprise, the document information can not be stored in the server, and the financial software can be directly collected, the account data of the financial software on the server computer is collected, then the collection report is checked, and the collection is finished after the data information is confirmed.
Step S1: recording operating system information and user information of a computer to be checked, taking the operating system information and the user information as evidence fixed information, and determining a storage computer of evidence data according to the evidence fixed information;
the operating system information (such as system version, computer name, installation time and serial number) and the user information (such as user name, user group, login time and login times) are used for fixing evidence in later evidence collection, so that the user can conveniently and intuitively know the electronic data information collected from the computer;
step S2: reading shared information in a computer to be checked, namely reading shared file information in a folder shared on the computer to be checked, and storing the shared file information as valuable evidence;
the shared information (such as shared name and shared path) is shared file information in a folder shared on an enterprise computer, and the shared information is internal information of the enterprise and is valuable information for tax inspection;
step S3: reading network card information in a computer to be checked, and recording the IP address of the computer to be checked;
the IP address of the computer to be checked is directly displayed by the network card information (such as network card description, IP address and lease time) for confirmation of the server and the client at the later stage.
Step S4: reading port information of the computer to be checked, and judging whether the computer to be checked is in data connection with the databases through an open port of the computer to be checked;
the port information (such as a local IP address, a local port, a process name, a remote IP address, and a corresponding service) can tell the tax staff which ports are opened by the local machine, in this embodiment, each database has a unique port connection, such as a connection in which 1433 port is a local SQL server database, such as a connection in which 1521 port is a local oracle database, and the port information is used for the tax staff to collect data.
Step S5: reading software installation information of a computer to be checked, judging the type and the quantity of software installed in the computer to be checked, presetting a valuable software list, and judging whether the valuable software is installed in the computer to be checked or not by contrasting the valuable software list;
the software installation information (such as program name, version number, company, installation time, and installation catalog) prompts the tax staff to indicate which software is installed in the computer to be checked, and whether the information such as financial software or database software concerned by the tax staff exists.
Step S6: reading a usb usage record of a computer to be checked, storing the usb usage record in a system log record in the computer to be checked, presetting a valuable USB flash disk list, and comparing the usb usage record with the valuable USB flash disk list to judge whether the computer to be checked is connected with the valuable USB flash disk;
the USB usage records (such as device name, mounted disc identifier, first plugging time, last plugging time, and device GUID) are information recorded by the system, and the records of the USB device are displayed for discovering important mobile devices.
Step S7: reading the database type of the computer to be checked, wherein the database type is stored in the registry information of the computer to be checked, and the type and the version number of the database installed in the computer to be checked are stored;
the judgment of the database type (such as the name, the installation path and the version of the database) is to display the database installed on the computer to be checked through the registry information to tell tax inspectors what type of database is installed on the computer and to tell the version number.
Step S8: reading access information and document information of a computer to be checked, judging access records of a computer to be checked which is expected to be checked recently through the access information and the document information, establishing a keyword lexicon, comparing the keyword lexicon, searching the document which is accessed recently by the computer to be checked, finding out the document containing the keywords as a valuable document, and storing the valuable document;
the access information (such as the recently accessed documents or folders and the recently deleted documents or folders) and the document information (such as desktop documents, instant messaging transmitted documents, encrypted documents and documents classified by different keywords) are found out from the more frequently used document information on the recent financial staff or financial manager computer through the information recorded by the system, and the information with the keywords of various industries concerned with tax inspection can be listed separately for collecting and evidence collection, such as: scrap iron, scrap, and the like are the subject of inspection attention in the industrial industry.
And 4, step 4: judging whether the computer to be checked has a shared file, whether value software is installed, whether a valuable U disk is connected or whether a valuable document exists according to the method in the step 3, and judging that the computer to be checked is a valuable computer when one or more of the conditions are true;
and 5: data acquisition of a valuable computer, comprising the steps of:
step A1: reading a corporate financial account set in a value computer, comprising the steps of:
step AA 1: reading a data source within a database of a value computer;
step AA 2: retrieving financial data, inventory data, payroll data and fixed assets in a data source, and generating financial data files, inventory files, payroll files and fixed asset files, respectively;
step AA 3: performing data encryption on the contents of the financial data file, the inventory file, the wage file and the fixed asset file to generate an encrypted TXT file;
step AA 4: the encrypted TXT file is compressed and then encrypted again;
step B1: reading out of account data in a valuable computer, comprising the steps of:
step BB 1: reading and storing disk data in a valuable computer;
step BB 2: reading and storing registry information of a valuable computer;
step BB 3: opening an installation directory of computer mail related software, reading and storing files in a folder in the installation directory;
step BB 4: searching the suffix name of the file in the valuable computer, screening and storing the valuable file;
step BB 5: reading and storing IP addresses of all computers which belong to the same network segment with the valuable computer;
step 6: and (5) taking the data acquired by the method in the step 5 as evidence data to generate a data acquisition report.
Preferably, the mobile workstation is a notebook computer, a mobile phone or a tablet computer.
Preferably, the financial data file, the inventory file, the payroll file and the fixed asset file generated when step AA2 is performed are TXT files;
the financial data file, the inventory file, the payroll file, and the fixed asset file are each a plurality of TXT files.
The invention relates to a method for carrying out systematic prejudgment on a computer for obtaining evidence, which solves the technical problem that whether electronic data in the computer is helpful for tax inspection or not is automatically prejudged.

Claims (3)

1. A method for carrying out system prejudgment on a forensic computer is characterized in that: the method comprises the following steps:
step 1: establishing a multi-equipment team cooperation tool box, wherein the multi-equipment team cooperation tool box comprises a mobile workstation, a mobile wireless router, a law enforcement recorder, a recording pen, a mobile hard disk, an encrypted high-speed U disk, a large-capacity mobile power supply, a high-speed shooting instrument, a portable projector, a portable printer, a portable duplicator and an interphone;
the mobile workstation is used for reading and collecting tax related information of a computer to be checked, and the mobile hard disk and the encryption high-speed U disk are used for storing the tax related information;
the law enforcement recorder, the recording pen, the high shooting instrument, the portable projector, the portable printer and the portable duplicator are all used for recording the evidence obtaining process;
the high-capacity mobile power supply is used for supplying power to the various equipment team cooperation tool boxes;
the mobile wireless router is used for providing a wireless network, and the law enforcement recorder, the recording pen, the high shooting instrument, the portable projector, the portable printer and the portable copier are all in data interaction with the mobile workstation through the wireless network;
the interphone is used for providing voice communication for field personnel;
the mobile hard disk and the encrypted high-speed U disk are in data interaction with the mobile workstation through the USB interface;
step 2: the mobile workstation is connected with a computer to be checked through a network cable or a USB interface, and reads tax related information of the computer to be checked, wherein the tax related information comprises basic information and tax information;
the basic information comprises operating system information, user information, shared information, network card information, port information, software installation information, usb use records, database types, access information and document information;
and step 3: the mobile workstation judges whether the computer to be checked is a value computer according to the following method:
step S1: recording operating system information and user information of a computer to be checked, taking the operating system information and the user information as evidence fixed information, and determining a storage computer of evidence data according to the evidence fixed information;
step S2: reading shared information in a computer to be checked, namely reading shared file information in a folder shared on the computer to be checked, and storing the shared file information as valuable evidence;
step S3: reading network card information in a computer to be checked, and recording the IP address of the computer to be checked;
step S4: reading port information of the computer to be checked, and judging whether the computer to be checked is in data connection with the databases through an open port of the computer to be checked;
step S5: reading software installation information of a computer to be checked, judging the type and the quantity of software installed in the computer to be checked, presetting a valuable software list, and judging whether the valuable software is installed in the computer to be checked or not by contrasting the valuable software list;
step S6: reading a usb usage record of a computer to be checked, storing the usb usage record in a system log record in the computer to be checked, presetting a valuable USB flash disk list, and comparing the usb usage record with the valuable USB flash disk list to judge whether the computer to be checked is connected with the valuable USB flash disk;
step S7: reading the database type of the computer to be checked, wherein the database type is stored in the registry information of the computer to be checked, and the type and the version number of the database installed in the computer to be checked are stored;
step S8: reading access information and document information of a computer to be checked, judging access records of a computer to be checked which is expected to be checked recently through the access information and the document information, establishing a keyword lexicon, comparing the keyword lexicon, searching the document which is accessed recently by the computer to be checked, finding out the document containing the keywords as a valuable document, and storing the valuable document;
and 4, step 4: judging whether the computer to be checked has a shared file, whether value software is installed, whether a valuable U disk is connected or whether a valuable document exists according to the method in the step 3, and judging that the computer to be checked is a valuable computer when one or more of the conditions are true;
and 5: data acquisition of a valuable computer, comprising the steps of:
step A1: reading a corporate financial account set in a value computer, comprising the steps of:
step AA 1: reading a data source within a database of a value computer;
step AA 2: retrieving financial data, inventory data, payroll data and fixed assets in a data source, and generating financial data files, inventory files, payroll files and fixed asset files, respectively;
step AA 3: performing data encryption on the contents of the financial data file, the inventory file, the wage file and the fixed asset file to generate an encrypted TXT file;
step AA 4: the encrypted TXT file is compressed and then encrypted again;
step B1: reading out of account data in a valuable computer, comprising the steps of:
step BB 1: reading and storing disk data in a valuable computer;
step BB 2: reading and storing registry information of a valuable computer;
step BB 3: opening an installation directory of computer mail related software, reading and storing files in a folder in the installation directory;
step BB 4: searching the suffix name of the file in the valuable computer, screening and storing the valuable file;
step BB 5: reading and storing IP addresses of all computers which belong to the same network segment with the valuable computer;
step 6: and (5) taking the data acquired by the method in the step 5 as evidence data to generate a data acquisition report.
2. The invoice data analysis method of claim 1, wherein: the mobile workstation is a notebook computer, a mobile phone or a tablet computer.
3. The invoice data analysis method of claim 1, wherein: in performing step AA2, the financial data file, the inventory file, the payroll file and the fixed asset file generated are TXT files;
the financial data file, the inventory file, the payroll file, and the fixed asset file are each a plurality of TXT files.
CN201911097744.9A 2019-11-12 2019-11-12 Method for carrying out system prejudgment on evidence obtaining computer Pending CN110852718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911097744.9A CN110852718A (en) 2019-11-12 2019-11-12 Method for carrying out system prejudgment on evidence obtaining computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911097744.9A CN110852718A (en) 2019-11-12 2019-11-12 Method for carrying out system prejudgment on evidence obtaining computer

Publications (1)

Publication Number Publication Date
CN110852718A true CN110852718A (en) 2020-02-28

Family

ID=69601466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911097744.9A Pending CN110852718A (en) 2019-11-12 2019-11-12 Method for carrying out system prejudgment on evidence obtaining computer

Country Status (1)

Country Link
CN (1) CN110852718A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363844A1 (en) * 2014-06-13 2015-12-17 Newvistas, Llc Apparatus and method for facilitating transactions between a network of businesses
CN106255078A (en) * 2016-08-09 2016-12-21 中国联合网络通信集团有限公司 Collecting method based on note and data collecting system
CN107402951A (en) * 2017-05-17 2017-11-28 四川秘无痕信息安全技术有限责任公司 A kind of method of rapid extraction Android wechats circle of friends data
CN108920617A (en) * 2018-06-28 2018-11-30 中译语通科技股份有限公司 A kind of decision-making system and method, information data processing terminal of data acquisition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363844A1 (en) * 2014-06-13 2015-12-17 Newvistas, Llc Apparatus and method for facilitating transactions between a network of businesses
CN106255078A (en) * 2016-08-09 2016-12-21 中国联合网络通信集团有限公司 Collecting method based on note and data collecting system
CN107402951A (en) * 2017-05-17 2017-11-28 四川秘无痕信息安全技术有限责任公司 A kind of method of rapid extraction Android wechats circle of friends data
CN108920617A (en) * 2018-06-28 2018-11-30 中译语通科技股份有限公司 A kind of decision-making system and method, information data processing terminal of data acquisition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
六味书屋: ""税务稽查电子证据现场取证流程"", 《HTTPS://WWW.DOCIN.COM/P-479027703.HTML》 *

Similar Documents

Publication Publication Date Title
US8200690B2 (en) System and method for leveraging historical data to determine affected entities
US20180285596A1 (en) System and method for managing sensitive data
US20110153748A1 (en) Remote forensics system based on network
JP2009075655A (en) File management system, file management method, and file management program
USRE44932E1 (en) Computer-implemented system for recording oil and gas inspection data
US20100250488A1 (en) Labeling electronic data in an electronic discovery enterprise system
US20140358868A1 (en) Life cycle management of metadata
US20130036478A1 (en) Identifying and Redacting Privileged Information
US20130013768A1 (en) Custodian management system
JP2008097484A (en) Log management system and forensic investigation method
CN112488674A (en) Electronic archive management system and method
CN112416713A (en) Operation auditing system and method, computer readable storage medium and electronic equipment
CN110245059B (en) Data processing method, device and storage medium
CN105843915A (en) Data management method and system
US8819048B1 (en) Virtual repository management to provide retention management services
US20110082839A1 (en) Generating intellectual property intelligence using a patent search engine
CN110852718A (en) Method for carrying out system prejudgment on evidence obtaining computer
EP2237208A2 (en) Cost estimations in an electronic discovery system
CN111752914A (en) A document storage platform
EP2819028A2 (en) Content management system
CN110008108A (en) Return range determining method, device, equipment and computer readable storage medium
US10664501B2 (en) Deriving and interpreting users collective data asset use across analytic software systems
CN116108111A (en) Analysis system for data analysis management
CN112860627A (en) Electronic file monitoring, collecting, sharing and utilizing system
JP5796652B2 (en) E-mail audit apparatus, control method thereof, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200228

RJ01 Rejection of invention patent application after publication