Tampering of electronic equipment may be detected by repeatedly instructing the electronic equipment to perform different computational operations, such as sequences of hashing operations, on a known software image. Tampering of the electronic equipment may also be detected by dividing the known software image into software image portions and repeatedly instructing the electronic equipment to perform computational operations on randomly-ordered software image portions, which may correspond to hashing orders. Hash results may be produced which correspond to a particular sequence of operations and order. Tampering may be detected by comparing the hash results to corresponding secure hash results produced on secure electronic equipment.

 
Web www.patentalert.com

< Logical port configuration system

> Methods and systems of verifying EMS compliance via NMS interface

~ 00473