A computer-implemented method in a computer system for facilitating auditing of the computer system is disclosed. The method includes receiving a request for a codeword from a user of the computer system. The method further includes ascertaining first data from the computer system, the first data including at least one of a number of active components found in the computer system and a number of inactive components found in the computer system. The method additionally includes ascertaining second data from the computer system, the second data including identification data, the identification data identifying at least one of the computer system and a software program executing on the computer system. The method also includes forming the codeword using the first data and the second data, wherein the codeword includes the first data and the second data. Furthermore, the method includes providing the codeword to the user.

 
Web www.patentalert.com

< Timeline protection

> Method and system for hardware accelerator for implementing f8 confidentiality algorithm in WCDMA compliant handsets

> Efficient modular reduction and modular multiplication

~ 00532