Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.

 
Web www.patentalert.com

< Using federated mote-associated logs

> Automated detection of cross site scripting vulnerabilities

~ 00495