Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

 
Web www.patentalert.com

< Internet browser-based gaming system and method for providing browser operations to a non-browser enabled gaming network

< Transcoding SMS-based streamed messages to SIP-based IP signals in wireless and wireline networks

> Method for call forwarding without hairpinning and with split billing

> Method and system for configuring a graphical user interface based upon a user profile

~ 00601