System and method to proactively detect software tampering

Electrical computers and digital processing systems: support – Computer virus detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C713S179000

Reexamination Certificate

active

10248130

ABSTRACT:
Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

REFERENCES:
patent: 4757533 (1988-07-01), Allen et al.
patent: 5673316 (1997-09-01), Auerbach et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 5850559 (1998-12-01), Angelo et al.
patent: 5944821 (1999-08-01), Angelo
patent: 5978475 (1999-11-01), Schneier et al.
patent: 5983348 (1999-11-01), Ji
patent: 5996113 (1999-11-01), Korn et al.
patent: 6006328 (1999-12-01), Drake
patent: 6192475 (2001-02-01), Wallace
patent: 6268789 (2001-07-01), Diamant et al.
patent: 6681331 (2004-01-01), Munson et al.
patent: 6963983 (2005-11-01), Munson et al.
patent: 7096497 (2006-08-01), Ellison et al.
patent: 7096499 (2006-08-01), Munson
patent: 7185367 (2007-02-01), Munson
patent: 2002/0144121 (2002-10-01), Ellison et al.
patent: 1076279 (2001-02-01), None
patent: 2366028 (2002-02-01), None
patent: 2001236132 (2001-08-01), None
patent: WO 99/04530 (1999-01-01), None
patent: WO 00/77596 (2000-12-01), None
patent: WO 00/77597 (2000-12-01), None
patent: WO 01/14953 (2001-03-01), None
Bellare et al., “Forward Integrity for Secure Audit Logs,” Department of Computer Science & Engineering, University of California at San Diego, Nov. 23, 1997, pp. 1-16.
Ferristal, J., “AppScan Flags Security Problems in Web Applications,”Network Computing, vol. 11, No. 20, Oct. 16, 2000, pp. 32-34.
Song, “Practical Forward Secure Group Signature Schemes,”CCS'01, Nov. 5-8, 2001, Philadelphia, PA, pp. 1-10.
Yee, “Home Sweet Home (bsy's home page),” <http://www-cse.ucsd.edu/users/bsy/>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method to proactively detect software tampering does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method to proactively detect software tampering, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method to proactively detect software tampering will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3889209

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.