Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_e757fd4fedc4fe825bb81b1b466a0947 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2101 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-552 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-316 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-14 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 |
filingDate |
2003-10-22-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ea276ae60126cd48a3f51a8f9d1451ec http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_a22c8afdccfa2464047b1d47a75e2079 |
publicationDate |
2008-08-27-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
EP-1573545-A4 |
titleOfInvention |
SYSTEM AND METHOD FOR PROACTIVE DETECTION OF SOFTWARE ALTERATION |
abstract |
Software intrusion is proactively detected using a dynamically evolving audit log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on both the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these values. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410). |
priorityDate |
2002-12-19-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |