FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Checksum topics
Cyclic Redundancy Check
Redundancy
Communications
Replication
Subscriber
Data Packet
Dependency
Transaction Log
Hash Function
Central Processing Unit
Hash Table
Central Processing Units
Differentiation
Duplication
Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Checksum patents



      
           
This page is updated frequently with new Checksum-related patent applications. Subscribe to the Checksum RSS feed to automatically get the update: related Checksum RSS feeds. RSS updates for this page: Checksum RSS RSS


Packet header protection for utility networks

Texas Instruments

Packet header protection for utility networks

Method of recovering data in a storage device

Method of recovering data in a storage device

Date/App# patent app List of recent Checksum-related patents
04/09/15
20150100861
 Apparatus and  calculating transmission control protocol checksum patent thumbnailApparatus and calculating transmission control protocol checksum
Disclosed herein is an apparatus and method for calculating a tcp checksum. An apparatus for calculating a tcp checksum includes a data division unit for dividing content to be transmitted into two or more primary data fragments by a unit of a preset byte.
Electronics And Telecommunications Research Institute
04/09/15
20150100856
 Packet header protection for utility networks patent thumbnailPacket header protection for utility networks
A packet header protection system includes, for example, a header checksum (cs) that is arranged to provide error detection capability to fsk (frequency shift keyed) packet headers. Accordingly, receivers in the network can more quickly terminate processing of an errored packet upon detection of error(s) in the header.
Texas Instruments, Incorporated
04/09/15
20150100819
 Method of recovering data in a storage device patent thumbnailMethod of recovering data in a storage device
A method and system for recovering data written onto a storage device when system failure and/or damage occur during use is provided. A memory of the storage device is divided into a plurality of information zones, for storing data as a codeword set, and a plurality of check zones, for storing checksums, of equal size selected from different parts of the storage device.
03/26/15
20150089282
 Method of, and , layout rectification of erasure encoded storage systems patent thumbnailMethod of, and , layout rectification of erasure encoded storage systems
There is provided a method of recovering configuration metadata from an erasure encoded raid array. The raid array includes raw data including a plurality of codewords encoded using reed-solomon encoding.
Xyratex Technology Limited
03/26/15
20150088370
 Systems and methods for identification of a compromised module patent thumbnailSystems and methods for identification of a compromised module
A vehicle computing system having a computer processor in communication with a wireless transceiver, such that the wireless transceiver is capable of communication with a wireless communication device located remotely from the processor. The computer processor may be configured to receive input identifying at least one checksum value from one or more modules in the vehicle.
Ford Global Technologies, Llc
03/26/15
20150085835
 Out-of-synchronization detection and correction during compression patent thumbnailOut-of-synchronization detection and correction during compression
Methods and apparatus are described for synchronizing compression for communication between a user equipment (ue) and a serving node. The methods and apparatus include determining that a compressor memory of a compressor and a decompressor memory of a decompressor are out-of-synchronization based on a checksum failure.
Qualcomm Incorporated
03/19/15
20150078242
 Ts packet grooming patent thumbnailTs packet grooming
Received data packets are groomed to improve performance of mpeg-2 transport stream packet in a digital video broadcasting system. Multitude of crosschecking techniques are applied to ensure that crucial pieces of information such as the packet identifier (pid) field, the continuity counter (cc) field, table id, section length, ip header checksum, table and frame boundaries, application data table size are corrected if necessary..
Maxlinear, Inc.
03/12/15
20150074429
 System and  secure distribution and/or storage of data files with long term file integrity verification patent thumbnailSystem and secure distribution and/or storage of data files with long term file integrity verification
Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third party administrator are disclosed. The subscriber-based system acts as an electronic repository to ensure that data files remain intact, secure, and unaltered from their original form.
03/12/15
20150074415
 Image verification by an electronic device patent thumbnailImage verification by an electronic device
A method for verifying an image by a first electronic device, the method comprising the first electronic device: sending a request for an image to a second electronic device, wherein the second electronic device is remote from the first electronic device and, optionally, a server; receiving an image and a certificate from the second electronic device, wherein the certificate comprises a protected checksum of at least the image; generating a checksum in dependence on at least the received image; performing a comparison in dependence on said generated checksum and the protected checksum received in the certificate; and verifying the received image in dependence upon the comparison. Advantageously, the first electronic device is able to verify each received image and to prevent the display of any received images that are not authenticated.
Mastercard International Incorporated
03/12/15
20150069849
 Demodulator for wireless power transmitter patent thumbnailDemodulator for wireless power transmitter
A demodulator is mounted on a wireless power transmitter that conforms to the qi standard, and demodulates an amplitude modulated signal superimposed on a coil current icoil that flows through a primary coil of a transmission antenna, or otherwise on a coil voltage across both ends of the primary coil. Multiple demodulating units are each configured to have respectively different configurations, to operate in parallel, to extract a demodulated component from the coil current icoil or otherwise from the coil voltage, and to generate baseband signals as demodulated signals.
Rohm Co., Ltd.
03/05/15
20150067702

Selecting output destinations for kernel messages


Methods, apparatus and computer program products implement embodiments of the present invention that include receiving a request to generate a system message comprising a text string and identifying a name of a source code file storing a function call that conveyed the request. An example of the function call is the printk function in linux™ based systems.
International Business Machines Corporation
02/26/15
20150058706

Timing optimization for memory devices employing error detection coded transactions


Systems, methods, and apparatuses are directed to optimizing turnaround timing of successive transactions between a host and a memory device. The host includes framing logic that generates a write frame that includes a plurality of data bits and an error bit checksum that is appended at the end of the data bits.
Intel Corporation
02/26/15
20150053743

Error detection arrangements for surgical instrument assemblies


A surgical instrument system can comprise an end effector comprising, one, stored data regarding parameters of the end effector and, two, a stored checksum. The system can further comprise a surgical instrument which can comprise means for ascertaining the stored data and the stored checksum, calculating a calculated checksum using the stored data, and comparing the calculated checksum to the stored checksum, wherein the surgical instrument is configured to generate an error response if the calculated checksum does not match the stored checksum.
Ethicon Endo-surgery, Inc.
02/19/15
20150052240

Method and implementation for network instrumentation and traffic disposition with timestamps


A device for instrumentation and traffic disposition of a network using one or more time-stamps may include a receiving port to receive a data packet. A device configuration module may be configured to determine whether the device is a boundary device located on a boundary of an instrumented sub-network of the network.
Broadcom Corporation
02/12/15
20150046667

Synchronization for initialization of a remote mirror storage facility


A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature.
International Business Machines Corporation
02/05/15
20150040240

System and software piracy monetization


A method includes the steps of: providing a software product configured to run on a local computer and to perform a piracy monetization checksum based process; providing a list of valid checksums for a distribution filename of the software product version; connecting by computer the local computer with a software company server; identifying by computer a unique computer identification of the local computer; following a launch, sending the unique computer identification and a checksum of at least one distribution filename on the local computer to the software company server; comparing at the software company server the checksum to the list of valid checksums; and responsive to the step of comparing on detection of a non-authorized checksum, sending a message from the software company server to the local computer, the message configured to perform a piracy monetization action. A method using checksums and serial numbers is also described..
Corel Corporation
02/05/15
20150039598

Data analysis control


According to an example, data analysis control may include receiving a predetermined number of search results for a query, and organizing the predetermined number of search results by checksum values of content of the search results in an ascending or a descending order. A generally final or a generally initial checksum value may be respectively used from the ascending or the descending order of the organized search results to determine a total content number representing an approximate total content of a search related to the query, where the total content number is greater than the predetermined number of search results.
Longsand Limited
01/22/15
20150026762

System and enforcing security policies in a virtual environment


A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems.
Mcafee, Inc.
01/22/15
20150026536

Data decoder with trapping set flip bit mapper


A low density parity check decoder includes a variable node processor operable to generate variable node to check node messages and to calculate perceived values based on check node to variable node messages, a check node processor operable to generate the check node to variable node message vectors and to calculate checksums based on the variable node to check node messages, and a convergence detector and bit map generator operable to convergence of the perceived values and to generate at least one bit map that identifies variable nodes that are connected to check nodes with unsatisfied parity checks.. .
Lsi Corporation
01/01/15
20150007251

Safe script templating to provide reliable protection against attacks


Methods, systems, and computer-readable storage media for inhibiting cross-site scripting (xss) attacks, where actions include receiving a computer-readable document that provides a content security policy (csp) for a website and an extension to the csp, the csp specifying allowed script checksums, each allowed script checksum being associated with a script that is allowed to be executed, the extension requiring comparison of script checksums before respective scripts can be executed, receiving script templates and a value list, calculating an expected script checksum for each script template to provide respective expected script checksums, comparing the expected script checksums to the allowed script checksums, and determining that at least one expected script checksum matches an allowed script checksum, and in response, executing a respective script that corresponds to the at least one expected script checksum.. .
Sap Ag
11/13/14
20140334501

Data link layer protocol having adaptive framing


Example techniques of the present disclosure provide a first computing device comprising one or more processors and at least one module operable by the one or more processors to output, to a second computing device, a first set of hdlc protocol data units in accordance with a first format in which each of the first set of hdlc protocol data units includes a start-of-frame indicator, a length indicator, a data portion, and an end-of-frame indicator. The module may be further operable by the one or more processors to determine an inability of the second computing device to process at least one of the first set of hdlc protocol data units and output a second set of hdlc protocol data units in accordance with a second format in which each of the second set includes the data portion, a checksum portion, and the end-of-frame indicator and excludes the length indicator..
11/06/14
20140330924

Efficient cache validation and content retrieval in a content delivery network


Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.
09/18/14
20140283116

Method for protected execution of code and protection of executable code and data against modifications


A method for an automated protection of a programmable code and data without using dedicated components for calculation of the checksums and/or hash values is provided. Execution of each machine instruction uses data from several small blocks of protected code or data.
09/18/14
20140281798

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
09/18/14
20140281530

Enhanced ipsec anti-replay/anti-ddos performance


A method for authenticating an internet protocol security (ipsec) packet, wherein the method comprises, receiving the ipsec packet via an input port, performing a sequence-integrity check value (seq-icv) check that validates a sequence number within the ipsec packet, and performing an integrity check value (icv) check that validates a checksum within the ipsec packet, wherein the seq-icv check is performed before the icv check. In yet another example embodiment, an apparatus for transmitting an ipsec packet, comprising a processor, and a transmitter coupled to the processor, wherein the transmitter is configured to transmit an ipsec packet that comprises a header that comprises a sequence number field that provides a sequence number, and a payload that comprises one or more seq-icv segments used to authenticate the sequence number within the ipsec packet..
09/11/14
20140259154

Displaying an icon based upon user input


Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a checksum function of the user input.
09/11/14
20140259142

Systems and methods for detecting undesirable network traffic content


A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
09/11/14
20140259141

Systems and methods for detecting undesirable network traffic content


A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
08/28/14
20140245017

Digital tachograph


A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module.
08/28/14
20140244985

Intelligent context management


Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.
08/21/14
20140237617

Origin and custody of copies from a stored electronic record verified page by page


A method of authenticating a copy of a multi-page document, which includes digitizing a said multi-page document to generate one or more digitized files that together comprise a digitized transcript. A mark that is unique to the preparer of the document, such as a signature, is prepared and digitized.
08/21/14
20140237592

Method and system for detecting data modification within computing device


A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications.
08/07/14
20140223268

Methods and improved dmx512 communication


Disclosed are methods and apparatus for improved backwards compatible dmx communications. In some embodiments,methods and apparatus related to extensions of the dmx protocol enable error detection by enhanced dmx slave devices while maintaining full compatibility with non-enhanced dmx slave devices.
07/24/14
20140208078

Vector checksum instruction


A vector checksum instruction. Elements from a second operand are added together one-by-one to obtain a first result.
07/17/14
20140198801

Mac address synchronization in a fabric switch


One embodiment of the present invention provides a system for facilitating synchronization of mac addresses in a fabric switch. During operation, the system divides a number of media access control (mac) addresses associated with devices coupled to an interface of the switch.
07/03/14
20140189443

Hop-by-hop error detection in a server system


A server system performs error detection on a hop-by-hop basis at multiple compute nodes, thereby facilitating the detection of a compute node experiencing failure. The server system communicates a packet from an originating node (the originating node) to a destination node by separating the packet into multiple flow control digits (flits) and routing the flits using a series of hops over a set of intermediate nodes.
07/03/14
20140188827

Detection and correction of corrupted or dangling data object handles


Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
06/19/14
20140173352

Computing device and checking burned-in files


In a method to check burned-in files, a file is obtained from a storage device and a checksum value of the file is computed. A burning-in check system is integrated into the file, and then the file is burned-in a complex programmable logic device (cpld) chip.
06/19/14
20140172800

Updating a file using differences and file format therefor


A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved.
06/12/14
20140164828

Consistency of data in persistent memory


Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log.
06/12/14
20140164694

Decoupled reliability groups


Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node.
06/12/14
20140164647

Management data input/output (mdio) protocol including checksum mode


A process to manage data between one or more mdio manageable devices situated on the same bus utilizing the mdio protocol. The data management efficiency can be increased through the use of an mdio protocol that includes a checksum mode.
06/05/14
20140153024

Data printing system and data protection method thereof


A data printing system and data protection method thereof are provided. The system includes a data output device and a data printing device.
05/29/14
20140146601

Processors and systems with multiple reference columns in multibit phase-change memory


Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
05/15/14
20140133408

Methods and avoiding collisions due to hidden wireless nodes


Certain aspects of the present disclosure provide techniques and apparatus for starting an extended idle interval in an effort to avoid collisions with transmissions from hidden wireless nodes. One example apparatus generally includes a receiver and a processing system.
05/08/14
20140126418

Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (iaas) on hybrid cloud networks


A layer-3 virtual router connects two or more virtual networks. Virtual networks are overlaid upon physical networks.
05/01/14
20140122981

Data receiving apparatus, data receiving method, and computer-readable recording medium


A data receiving apparatus includes: a header analyzing unit that analyzes a header of a frame and outputs header information; a checksum judging unit that calculates and judges a checksum of the frame; a buffer unit that stores a data portion of the frame; a reading unit that reads connection information corresponding to the header information from a second storage unit; an identifying unit that identifies a write location for the data portion based on the connection information; a data writing unit that reads data from the buffer unit and starts writing the data to the identified write location in a first storage unit before the checksum is judged; and a writing unit that, if the judgment result is “pass,” writes the connection information updated based on the header information to the second storage unit while the data writing unit is writing.. .
05/01/14
20140122892

Insuring integrity of remote procedure calls used in a client and server storage system


A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure specific parameters of an rpc and then encrypting the resulting hash value.
05/01/14
20140122844

Intelligent context management


Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.
04/24/14
20140115258

System and managing a deduplication table


Implementations described and claimed herein provide systems and methods for allocating and managing resources for a deduplication table. In one implementation, an upper limit to an amount of memory allocated to a deduplication table is established.
04/03/14
20140095804

Efficient cache validation and content retrieval in a content delivery network


Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.
03/20/14
20140081935

Detection and correction of corrupted or dangling data object handles


Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
03/13/14
20140074777

Systems and methods for selective data replication


Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file.
03/06/14
20140068005

Identification, caching, and distribution of revised files in a content delivery network


A client computer sends a request for a web page to a web site host computer. The host returns an initial web page document that contains a listing of files needed to generate the web page and a revision identifier (revid) for certain files.
03/06/14
20140063931

Multibit phase-change memory with multiple reference columns


Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
03/06/14
20140063928

Processors and systems with cell-generated-reference in phase-change memory


Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
03/06/14
20140063927

Cell-generated reference in phase change memory


Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
02/27/14
20140056151

Methods and systems for offload processing of encapsulated packets


Methods and systems described herein facilitate offload processing of encapsulated packets. A virtualization manager enables a virtual switch to be associated with a virtual overlay network.
02/13/14
20140047307

Checksum calculation, prediction and validation


A calculation, prediction and validation method can include receiving a portion of a data packet in a data buffer, computing, in a processor, information related to the checksum of the data packet based on the portion of the data packet and processing the data packet in the processor.. .
02/06/14
20140040403

System, method and computer program product for gathering information relating to electronic content utilizing a dns server


A system, method and computer program product are provided. In use, a checksum associated with electronic content is calculated.
02/06/14
20140040337

Device and maintenance filtering on a flow of coded inputs/outputs


A method and a device for maintenance filtering to process a flow of m coded incoming messages esj each with nj inputs/outputs esi,j, a checksum Σsesi,j of signatures sesi,j, and a date dj. Outgoing message esmj is generated from each incoming message with nj inputs/outputs esmi,j, a checksum Σsesmj of signatures sesmi,j, and the date dj.
02/06/14
20140040143

Method and device for controlling distribution and use of digital works


A method and device for controlling distribution and use of a digital work stored together with an attached usage right information on a record carrier. The attached usage right information, which may be unencrypted, is verified by using a hidden information which is changed at every change of the usage right information.
01/30/14
20140032915

Method and validating the integrity of installer files prior to installation


A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file.. .
01/16/14
20140016550

Methods and offloading checksum processing


Aspects of the present disclosure provide methods and apparatus for offloading checksum processing in a user equipment (ue) (e.g., from an application processor to a modem processor). Such offloading may speed up packet processing, increase data rate, and/or free up resources of the application processor for other tasks..
12/26/13
20130343389

High-speed cld-based pipeline architecture


A method of processing network traffic within a computing system, comprises at a first configurable logic device (cld), receiving an ingress network packet from an external network interface, associating the ingress network packet with a timestamp indicating the time of receipt, parsing the ingress network packet to locate a link-layer checksum value and a routing-layer checksum value, determining whether the link-layer and routing-layer checksum values are correct based on the ingress network packet contents, and transmitting the ingress network packet to a second cld via a high-speed interconnection; and at the second cld receiving the ingress network packet, parsing the ingress network packet to locate a source address and a destination address, determining a destination and a route for the ingress network packet based at least in part on the source and destination addresses, and transmitting the ingress network packet to the determined destination via the determined route.. .
12/12/13
20130329028

Image pickup system


An image pickup system is an image pickup system in which an image pickup device arranged at a distal end of an insertion section of an endoscope and a processor can communicate with each other. A group of multiple control parameters to be collectively transmitted and checksum codes related to the parameters are transmitted from the processor to the image pickup device, and the image pickup device reflects the control parameters on a register only when all the received multiple control parameters are normal, on the basis of the checksums..
12/05/13
20130326542

Runtime modification of property names in advanced configuration and power interface (acpi) tables


A system and method are disclosed for efficient runtime modification of device property names in advanced configuration and power interface (acpi) tables. In accordance with one embodiment, a computer system determines whether a device supports a device property, and when the device does not support the device property, a device property name corresponding to the device name is modified in a particular entry of an acpi table, such that a checksum for that entry remains unchanged.
12/05/13
20130326318

Enhanced checksum system


Generating data checksum for a data object including multiple data units comprises, for each data unit, obtaining a corresponding address of the data unit, and rotating the data unit based on said corresponding address of the data unit to generate a rotated data unit. A checksum value for the data object is determined based on said rotated data units..
11/28/13
20130318357

System and secure software update


A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on portable media that includes an executable update program, a checksum for the program that is encrypted with a symmetrical key, an encrypted symmetrical key that is encrypted with a public encryption key and a digital signature prepared with a private signature key.
11/28/13
20130318056

Lightweight integrity protection for web storage-driven content caching


Methods, systems, and computer-readable storage media for providing integrity protection for web storage-driven content caching. Implementations include receiving a web page from a server, the web page being associated with a script library and one or more items that can be stored in web storage of a web browser executed on a client computing device, each of the one or more items being associated with a pre-determined checksum value, and loading the script library, such that a local storage api is overwritten using a wrapper function, the script library being executable to, in response to a request for an item from web storage, perform operations including: determining a generated checksum value based on the item, and verifying an integrity of the item based on the generated checksum value and a pre-determined checksum value associated with the item..


Popular terms: [SEARCH]

Checksum topics: Cyclic Redundancy Check, Redundancy, Communications, Replication, Subscriber, Data Packet, Dependency, Transaction Log, Hash Function, Central Processing Unit, Hash Table, Central Processing Units, Differentiation, Duplication, Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         













0.3976

3165

2 - 1 - 72