The present invention leverages selections of data locations and
comparative analysis of data values stored in these locations to provide
a secure means of maintaining data integrity with minimal computational
burdens. This provides, in one instance of the present invention, a
tamper-resistant process to ensure that software application usage data
is protected from malicious attacks. By storing and recalling data in an
untraceable fashion, the present invention substantially increases the
effort required to spoof the stored data. Additionally, comparative
analysis is utilized with the randomized approach to facilitate in
maintaining consistency of the stored data both in retrieval of
information and when storing new data values. This allows checking of the
data prior to overwriting sensitive data, thwarting malicious attacks
that spoof new data as a means to alter the stored data.