Lachniet, 2008 - Google Patents
8, Author retains full rights.Lachniet, 2008
- Document ID
- 7761424043059584201
- Author
- Lachniet M
- Publication year
External Links
- 201000009032 substance abuse 0 abstract description 20
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00514—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein the entire content is encrypted with the same key, e.g. disc key or master key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huber et al. | Social snapshots: Digital forensics for online social networks | |
Quick et al. | Cloud storage forensics | |
US9961030B2 (en) | Method and system for sender-controlled messaging and content sharing | |
CN106302337B (en) | Vulnerability detection method and device | |
US20200052983A1 (en) | Data leakage protection in cloud applications | |
US8843637B2 (en) | Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage nodes | |
US20070139231A1 (en) | Systems and methods for enterprise-wide data identification, sharing and management in a commercial context | |
Salamh et al. | What’s on the horizon? An in-depth forensic analysis of Android and iOS applications | |
Shafqat | Forensic investigation of user's web activity on Google Chrome using various forensic tools | |
US20210336796A1 (en) | System and computer method including a blockchain-mediated agreement engine | |
Pandey et al. | Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime | |
Mannan et al. | Privacy-enhanced sharing of personal content on the web | |
Shaaban et al. | Practical windows forensics | |
Teing et al. | Private cloud storage forensics: Seafile as a case study | |
Easttom | Digital forensics, investigation, and response | |
Van Dongen | Forensic artefacts left by windows live messenger 8.0 | |
Azhar et al. | Forensic investigations of Google Meet and Microsoft Teams–two popular conferencing tools in the pandemic | |
Breitinger et al. | A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage | |
Babbin | Security log management: identifying patterns in the chaos | |
US20100250708A1 (en) | Digital media referral and distribution | |
CN106295366B (en) | Sensitive data identification method and device | |
Akinbi et al. | Forensic analysis of open-source XMPP/Jabber multi-client instant messaging apps on Android smartphones | |
Lachniet | A Forensic Primer for Usenet Evidence | |
Lachniet | 8, Author retains full rights. | |
Schroader et al. | Alternate Data Storage Forensics |