Yoon et al., 2020 - Google Patents
Forensic analysis of fitbit versa 2 data on androidYoon et al., 2020
View HTML- Document ID
- 2231637862749234594
- Author
- Yoon Y
- Karabiyik U
- Publication year
- Publication venue
- Electronics
External Links
Snippet
The increase in the adoption of wearable fitness trackers has led to their inclusion as valuable evidence used by law enforcement during investigations. The information available in these fitness trackers can be used by law enforcement to prosecute or exonerate an …
- 238000004374 forensic analysis 0 title description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Herath et al. | Cybersecurity practices for social media users: a systematic literature review | |
Siyal et al. | Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives | |
Odeh et al. | Analysis of blockchain in the healthcare sector: application and issues | |
Figueroa et al. | An attribute-based access control model in RFID systems based on blockchain decentralized applications for healthcare environments | |
Daraghmi et al. | UniChain: A design of blockchain-based system for electronic academic records access and permissions management | |
Hyla et al. | eHealth integrity model based on permissioned blockchain | |
Yoon et al. | Forensic analysis of fitbit versa 2 data on android | |
Irons et al. | Digital forensics to intelligent forensics | |
Rastenis et al. | E-mail-based phishing attack taxonomy | |
Shojaei et al. | Security and privacy of technologies in health information systems: A systematic literature review | |
Rytel et al. | Towards a safer internet of things—a survey of iot vulnerability data sources | |
Kim et al. | Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator | |
Miranda Lopez et al. | Scenario-based digital forensics challenges in cloud computing | |
Al-Dhaqm et al. | Face validation of database forensic investigation metamodel | |
Florea et al. | A review of blockchain technology applications in ambient assisted living | |
Mirza et al. | Mobile cyber forensic investigations of Web3 wallets on Android and iOS | |
Salamh et al. | RPAS forensic validation analysis towards a technical investigation process: A case study of yuneec typhoon H | |
Hutchinson et al. | Investigating wearable fitness applications: Data privacy and digital forensics analysis on android | |
Sestrem Ochôa et al. | Performance and security evaluation on a blockchain architecture for license plate recognition systems | |
Alhussan et al. | A unified forensic model applicable to the database forensics field | |
Lee | Analysis of insider threats in the healthcare industry: A text mining approach | |
Keim et al. | Forensic analysis of tiktok alternatives on android and iOS devices: byte, dubsmash, and triller | |
Krehling et al. | A security and privacy scoring system for contact tracing apps | |
Ghanem et al. | D2WFP: a novel protocol for forensically identifying, extracting, and analysing deep and dark web browsing activities | |
Aldyaflah et al. | The design and implementation of a secure datastore based on ethereum smart contract |