Follow us on Twitter
twitter icon@FreshPatents


Checksum patents

      

This page is updated frequently with new Checksum-related patent applications.




 Vector checksum instruction patent thumbnailVector checksum instruction
A vector checksum instruction. Elements from a second operand are added together one-by-one to obtain a first result.
International Business Machines Corporation


 Techniques for securing live positioning signals patent thumbnailTechniques for securing live positioning signals
A pay television satellite broadcast includes validation data that can be used to validate authenticity of live global positioning system (gps) data. The validation data may be included within entitlement messages and encrypted for security and selective reception by authorized receivers.
Opentv, Inc.


 Network address translation patent thumbnailNetwork address translation
A method including receiving, at a virtual private network (vpn) server, an encapsulated packet on one of the ingress addresses wherein the ingress address is associated with the packet information. After processing the packet at the vpn server, the packet source address is transformed to the address of the ingress port before transmitting the packet over a network.
Openvpn Technologies, Inc.


 System and  detecting harmful files executable on a virtual stack machine based on parameters of the files and the virtual stack machine patent thumbnailSystem and detecting harmful files executable on a virtual stack machine based on parameters of the files and the virtual stack machine
Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the virtual stack machine to identify both parameters of a file section of the file and parameters of a function of the virtual stack machine when executing the file; identifying, in a database, at least one cluster of safe files based on the identified parameters of the file section of the file and the identified parameters of the virtual stack machine; creating, using at least one clustering rule, a data cluster based on the identified at least one cluster of safe files; calculating at least one checksum of the created data cluster; and determining that the file executable on the virtual stack machine is harmful if the computed at least one checksum matches a checksum in a database of checksums of harmful files..
Ao Kaspersky Lab


 Method and system for validating data integrity patent thumbnailMethod and system for validating data integrity
A method of validating data between a first system and at least one second system, wherein the first and second systems have corresponding data volumes, the method comprising isolating first and second data volumes in the first and second systems respectively, wherein the first and second data volumes comprise the corresponding data volumes; generating a checksum for the first and second data volumes; comparing the checksum between the first and second data volumes; and indicating an error if the checksum between the first and second data volumes is different; and inserting results into a database for reporting, for event monitoring or for statistical analysis.. .
J. C. Taylor Antique Automobile Agency, Inc.


 Systems and methods for detecting undesirable network traffic content patent thumbnailSystems and methods for detecting undesirable network traffic content
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
Fortinet, Inc.


 Highly parallel scalable distributed email threading algorithm patent thumbnailHighly parallel scalable distributed email threading algorithm
Systems, apparatuses, methods, and computer readable mediums for implementing a scalable distributed email threading algorithm. A database is created for storing a plurality of emails organized by subjects and relaxed checksums.
Symantec Corporation


 Configuration management for nodes in a network patent thumbnailConfiguration management for nodes in a network
Disclosed are various embodiments for managing configuration changes applied to node devices in a network. Expected and target configuration files for a node are obtained, where the configuration files specify various parameters with corresponding values.
Landis+gyr Innovations, Inc.


 System and  hash-based data stream authentication patent thumbnailSystem and hash-based data stream authentication
An authentication system and a method of creating a secure check value used by the system to verify the integrity and authenticity of data. The authentication system comprises one or more processors, data stores, and network interfaces that can communicate among themselves and with other devices.

 Filesystem capacity and performance metrics and visualizations patent thumbnailFilesystem capacity and performance metrics and visualizations
A software and hardware facility persistently maintains metrics on directories at different levels within a tree of a filesystem. The facility hierarchically aggregates attributes of files contained by directories and stores them as metric values in each directory within a tree.
Qumulo, Inc.


Filesystem hierarchical capacity quantity and aggregate metrics

A software and hardware facility persistently maintains metrics on directories at different levels within a tree of a filesystem. The facility hierarchically aggregates attributes of files contained by directories and stores them as metric values in each directory within a tree.
Qumulo, Inc.

Techniques for encoding, decoding and representing high dynamic range images

Techniques for high dynamic range image processing are presented. Base layer data, first checksum parameter, and residual ratio data for a high dynamic range (hdr) image are each received.
Dolby Laboratories Licensing Corporation

Consumer friendly token number allocation

A consumer-friendly token number allocation method and system. In an embodiment, a token service provider (tsp) computer receives a tokenization request from a token requestor that includes a primary account number (pan) of a cardholder.
Mastercard International Incorporated

Mac address synchronization in a fabric switch

One embodiment of the present invention provides a system for facilitating synchronization of mac addresses in a fabric switch. During operation, the system divides a number of media access control (mac) addresses associated with devices coupled to an interface of the switch.
Brocade Communications Systems, Inc.

Maintaing encryption keys to provide encryption on top of data deduplication

Exemplary methods, apparatuses, and systems generate an encryption key based upon data content of a portion of data to be encrypted by the encryption key. The encryption key is stored as one of a plurality of encryption keys within a subset of storage.
Vmware, Inc.

Using checksums to reduce the write latency of logging

Techniques for reducing write latency when logging write operations are provided. In one embodiment, a computer system can receive a write operation originating from a storage client, where the write operation is directed to a data object stored on a nonvolatile storage of the computer system.
Vmware, Inc.

Providing end-to-end checksum within a distributed virtual storage area network module

Exemplary methods, apparatuses, and systems include a first layer of a virtual storage area network (vsan) module receiving a write request from a data compute node. The write request includes data to be written and the vsan module is distributed across a plurality of computers to provide an aggregate object store using storage attached to each of the plurality of computers.
Vmware, Inc.

Method and device for feature extraction

Provided are a method and device for feature extraction. The method comprises: acquiring a batch of black sample files and white sample files from an application layer of a smart terminal operating system; parsing each file, acquiring information structure of all functions contained in each file, and computing a checksum for each function; determining whether or not the files contain the functions corresponding to the checksums, thus compiling statistics on the number of occurrences of each function in the black sample files and the white sample files; and, extracting a black sample feature on the basis of functions occurring only in the black sample files and not occurring in the white sample files, or extracting a white sample feature on a similar basis..
Beijing Qihoo Technology Company Limited

Verifying accurate storage in a data storage system

A post-encryption checksum is generated for a file to be stored on a remote storage location. It can be generated before sending the encrypted file to the remote storage system.
Microsoft Technology Licensing, Llc

System and methods for secure firmware validation

An electronic device, such as a dynamic transaction card having an emv chip, that acts as a tpm having a memory, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in emv chip memory.
Capital One Services, Llc.

Method and system for synchronization of two databases in a lawful interception network by comparing checksum values

The present invention relates to methods and validity securing arrangement and embodiments thereof for effectively securing validity of a target database in a node in a lawful interception network. Said target database is intended to be identical to a source target database.
Telefonaktiebolaget L M Ericsson (publ)

Imaging systems with real-time digital testing capabilities

An imaging system with real-time digital testing capabilities verifies the functionality of image processing circuitry used to process pixel data signals read out from a pixel array during imaging operations. Image processing circuitry may process a data frame read from an imaging array that includes multiple regions of imaging and non-imaging data.
Semiconductor Components Industries, Llc

Method and system for updating firmware

A method, a non-transitory computer readable medium, and a system are disclosed for updating firmware in a memory of a device. The method including creating a new firmware image for the device; calculating a checksum of the new firmware image; performing a binary comparison of the new firmware image with an existing firmware image on the device; preparing a new differential data image for the binary comparison of the new firmware image to the existing firmware image; and calculating a checksum of the new differential data image for the binary comparison of the new firmware image to the existing firmware image..
Konica Minolta Laboratory U.s.a., Inc.

Efficiency of file synchronization in a linear tape file system

A mechanism is provided for improved file synchronization of a magnetic tape. A destination device determines whether one or more file checksums exist in an extended file attribute associated with an identified file.
International Business Machines Corporation

Decoupled reliability groups

Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node.
Netapp, Inc.

Concurrent error detection in a ternary content-addressable memory (tcam) device

A plurality of data words are written into a tcam; each has binary digits and don't-care digits. Contemporaneously, for each of the words: a first checksum is calculated on the binary digits; and the following are stored in a corresponding portion of a ram: an identifier of the binary digits and the first checksum.
International Business Machines Corporation

Concurrent error detection in a ternary content-addressable memory (tcam) device

A plurality of data words are written into a tcam; each has binary digits and don't-care digits. Contemporaneously, for each of the words: a first checksum is calculated on the binary digits; and the following are stored in a corresponding portion of a ram: an identifier of the binary digits and the first checksum.
International Business Machines Corporation

Smart hashing to reduce server memory usage in a distributed system

Architecture that computes smart-hashes (checksums) in a central server, and in a language agnostic way. The process comprises: decompiling the binaries using language/platform specific tool(s); applying configurable filtering of the decompiled output and only keeping contents that are semantically relevant; generating a hash (checksum) on those filtered semantically relevant content; and, downloading to each of the machines in the data-center a checksum list from a repository.
Microsoft Technology Licensing, Llc

Collecting and aggregating log data with fault tolerance

Systems and methods of collecting and aggregating log data with fault tolerance are disclosed. One embodiment includes, one or more devices that generate log data, the one or more machines each associated with an agent node to collect the log data, wherein, the agent node generates a batch comprising multiple messages from the log data and assigns a tag to the hatch.
Cloudera, Inc.

Data recovery agent and search service for repairing bit rot

A data recovery agent and search service for repairing bit rot are presented herein. The data recovery agent can receive error event notifications representing respective file system errors.
Osnexus Corporation

Coding apparatus and position-finding apparatus and method

A computer-implemented method for determining the position of a lift cabin in a lift shaft with the aid of a coding device, in which method is at least one of a section of the code band and the bearing device is recorded with an optical detection device as a pixel image in which the pixel image is larger than the position marker, the pixel image is processed and a binary code is decoded by means of an algorithm and converted into a position indication, a checksum of the position marker, which is formed by at least one of the binary code and grayscale values of the position marker, is compared to a predetermined value, and one of a barcode and a 2d code calculated from the position indication using an inverse of the algorithm and is compared with at least one recorded row outside of the position marker.. .
Cedes Ag

Updating a file using differences and file format therefor

A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved.
Vmware, Inc.

Intelligent mobile application update

In an approach for managing updates of a mobile software application, a computer receives information regarding a mobile computing device and a mobile software application on the mobile computing device, wherein the information regarding the mobile computing device comprises at least one or more of a location of the mobile computing device, a network connection type, a security bit associated with the mobile computing device, and a checksum associated with the at least one mobile software application. The computer determines whether the mobile software application matches a stored mobile software application on a computing device.
International Business Machines Corporation

Intelligent mobile application update

In an approach for managing updates of a mobile software application, a computer receives information regarding a mobile computing device and a mobile software application on the mobile computing device, wherein the information regarding the mobile computing device comprises at least one or more of a location of the mobile computing device, a network connection type, a security bit associated with the mobile computing device, and a checksum associated with the at least one mobile software application. The computer determines whether the mobile software application matches a stored mobile software application on a computing device.
International Business Machines Corporation

Automatically capturing and cropping image of check from video sequence for banking or other computing application

A mobile device with camera automatically captures an image of a check from a video sequence. A computing application assesses quality metrics of a frame of the video and, if acceptable, initiates capture of the check in that frame without user selection.
Lexmark International, Inc.

Automatically capturing and cropping image of check from video sequence for banking or other computing application

A mobile device with camera automatically captures an image of a check from a video sequence. A computing application assesses quality metrics of a frame of the video and, if acceptable, initiates capture of the check in that frame without user selection.
Lexmark International, Inc.

System and method to mitigate malware

Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the script data, compare each checksum of the checksum tree to one or more subtree checksums, and assign one or more classifications to the script data. In one example, the checksum tree is an abstract syntax tree..
Mcafee, Inc.

Embedded system and method thereof

An embedded system may include an embedded device and a host device. The embedded device may provide a packet for a service, and generate a first transmission control protocol (tcp) segment including a piece of the packet and a first header with no checksum value.
Sk Hynix Memory Solutions Inc.

Performing a cyclic redundancy checksum operation responsive to a user-level instruction

In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
Intel Corporation

Synchronization for initialization of a remote mirror storage facility

A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature.
International Business Machines Corporation

System on chip power management

An implementation of a system disclosed herein provides an apparatus, comprising a system on chip, wherein the system on chip is configured to receive a sleep command from a host and in response to the sleep command, calculate a primary checksum of a block of data from a low latency memory such as a tightly coupled memory (tcm), copy the primary checksum and the block of data into a volatile storage media, preserve interface variables of the system on chip in the volatile storage media, operate the volatile storage media in a self-refresh mode, and shut down power to other components on the system on chip.. .
Seagate Technology Llc

Sensor interface that provides a long package crc to improve functional safety

A data transmission system comprising an automotive sensor network system (asns) connected to a plurality of source locations via a common bus, wherein the asns is configured to ascertain the source from which the data-frames and first package checksum are received and based on the ascertainment of the source, appropriate decoding methods are used to calculate the asns location data-frame checksums and the asns location package checksums. A higher order redundancy check is done over a series of data-frames to detect errors in the reception caused by temporary high interference that may exist in the transmission path..
Infineon Technologies Ag

Method and identifying and characterizing errant electronic files

A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory.
Intellectual Ventures I Llc

Secret parallel processing device, secret parallel processing method, and program

A secret parallel processing device reducing communication amount includes: a randomization unit that obtains a non-randomized input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly applied on the non-randomized sequence.. .
Nippon Telegraph And Telephone Corporation

Secure computing for virtual environment and interactive experiences

Systems and methods for secure computing and virtual environments are provided herein. An example method includes authenticating a client using social media credentials received from the client, evaluating authenticity of the client based on social network information obtained from a social network using the social media credentials, and securely communicate with the client over web service or web sockets using the social media credentials and a token checksum to facilitate an online endurance game..

Checksum adder

Embodiments relate to a hardware circuit that is operable as a fixed point adder and a checksum adder. An aspect includes a driving of a multifunction compression tree disposed on a circuit path based on a control bit to execute one of first and second schemes of vector input addition and a driving of a multifunction adder disposed on the circuit path based on the control bit to perform the one of the first and second schemes of vector input addition..

Code integrity protection by computing target addresses from checksums

A method of obscuring software code including a plurality of basic blocks, including: calculating, by a processor, a checksum value of the current basic block and a pointer to the end of the current basic block; determining a preceding basic block for the current basic block; inserting the checksum value for the current basic block into the preceding basic block; and inserting instructions into the preceding basic block to determine a pointer to the beginning of the current basic block based upon the checksum value of the current basic block.. .
Nxp B.v.

System and data deduplication utilizing extent id database

An extent map (emap) database may include one or more extent map entries configured to map extent ids to pvbns. Each extent id may be apportioned into a most significant bit (msb) portion, i.e., checksum bits, and a least significant bit (lsb) portion, i.e., duplicate bits.
Netapp, Inc.

Content-based replication of data between storage units

Methods, systems, and computer programs are presented for replicating data across storage systems. One method includes an operation for transferring a snapshot of a volume from an upstream array to a downstream array.
Nimble Storage, Inc.

Data transfer system

A method for transferring data, more particularly, over a low energy connection such as a bluetooth low energy connection, includes dividing a source data into a plurality of data chunks, associating each data chunk with a verification data such as a checksum, transferring the data chunks and verifying that each data chunk was received without error, using the checksum. The method may also include providing a verification data for the source data, transferring it before and after all the data chunks, and verifying that all the data chunks and thus the entire source data was received..

Content-based replication of data in scale out system

Methods, systems, and programs are presented for replicating data across scale-out storage systems. One method includes replicating, from an upstream to a downstream system, a volume snapshot having one or more bins.
Nimble Storage, Inc.

Data integrity enhancement to protect against returning old versions of data

Systems, methods and/or devices are used to enhance data integrity to protect against returning old versions of data. In one aspect, a method includes (1) receiving a write request from a host that specifies write data for a set of logical block addresses, (2) mapping, using a mapping table, the set of logical block addresses to a set of physical addresses, where the mapping table includes a plurality of subsets, and (3) performing operations for each subset of the mapping table that includes at least one entry corresponding to a logical block specified by the set of logical block addresses, including: (a) generating metadata for the subset, the metadata including a version number for the subset, (b) calculating a cyclic redundancy check (crc) checksum for the subset, and (c) storing the version number for the subset and the crc checksum for the subset in a version data structure..
Sandisk Enterprise Ip Llc



Checksum topics:
  • Cyclic Redundancy Check
  • Redundancy
  • Communications
  • Replication
  • Subscriber
  • Data Packet
  • Dependency
  • Transaction Log
  • Hash Function
  • Central Processing Unit
  • Hash Table
  • Central Processing Units
  • Differentiation
  • Duplication
  • Data Deduplication


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.6002

    file did exist - 2285

    1 - 1 - 52