FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Checksum topics
Cyclic Redundancy Check
Redundancy
Communications
Replication
Subscriber
Data Packet
Dependency
Transaction Log
Hash Function
Central Processing Unit
Hash Table
Central Processing Units
Differentiation
Duplication
Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Checksum patents



      
           
This page is updated frequently with new Checksum-related patents. Subscribe to the Checksum RSS feed to automatically get the update: related Checksum RSS feeds.

Subscribe to updates on this page: Checksum RSS RSS

Date/App# patent app List of recent Checksum-related patents
04/03/14
20140095804
 Efficient cache validation and content retrieval in a content delivery network patent thumbnailEfficient cache validation and content retrieval in a content delivery network
Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.
03/20/14
20140081935
 Detection and correction of corrupted or dangling data object handles patent thumbnailDetection and correction of corrupted or dangling data object handles
Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
03/13/14
20140074777
 Systems and methods for selective data replication patent thumbnailSystems and methods for selective data replication
Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file.
03/06/14
20140068005
 Identification, caching, and distribution of revised files in a content delivery network patent thumbnailIdentification, caching, and distribution of revised files in a content delivery network
A client computer sends a request for a web page to a web site host computer. The host returns an initial web page document that contains a listing of files needed to generate the web page and a revision identifier (revid) for certain files.
03/06/14
20140063931
 Multibit phase-change memory with multiple reference columns patent thumbnailMultibit phase-change memory with multiple reference columns
Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
03/06/14
20140063928
 Processors and systems with cell-generated-reference in phase-change memory patent thumbnailProcessors and systems with cell-generated-reference in phase-change memory
Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
03/06/14
20140063927
 Cell-generated reference in phase change memory patent thumbnailCell-generated reference in phase change memory
Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
02/27/14
20140056151
 Methods and systems for offload processing of encapsulated packets patent thumbnailMethods and systems for offload processing of encapsulated packets
Methods and systems described herein facilitate offload processing of encapsulated packets. A virtualization manager enables a virtual switch to be associated with a virtual overlay network.
02/13/14
20140047307
 Checksum calculation, prediction and validation patent thumbnailChecksum calculation, prediction and validation
A calculation, prediction and validation method can include receiving a portion of a data packet in a data buffer, computing, in a processor, information related to the checksum of the data packet based on the portion of the data packet and processing the data packet in the processor.. .
02/06/14
20140040403
 System, method and computer program product for gathering information relating to electronic content utilizing a dns server patent thumbnailSystem, method and computer program product for gathering information relating to electronic content utilizing a dns server
A system, method and computer program product are provided. In use, a checksum associated with electronic content is calculated.
02/06/14
20140040337
Device and method for maintenance filtering on a flow of coded inputs/outputs
A method and a device for maintenance filtering to process a flow of m coded incoming messages esj each with nj inputs/outputs esi,j, a checksum Σsesi,j of signatures sesi,j, and a date dj. Outgoing message esmj is generated from each incoming message with nj inputs/outputs esmi,j, a checksum Σsesmj of signatures sesmi,j, and the date dj.
02/06/14
20140040143
Method and device for controlling distribution and use of digital works
A method and device for controlling distribution and use of a digital work stored together with an attached usage right information on a record carrier. The attached usage right information, which may be unencrypted, is verified by using a hidden information which is changed at every change of the usage right information.
01/30/14
20140032915
Method and apparatus for validating the integrity of installer files prior to installation
A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file.. .
01/16/14
20140016550
Methods and apparatus for offloading checksum processing
Aspects of the present disclosure provide methods and apparatus for offloading checksum processing in a user equipment (ue) (e.g., from an application processor to a modem processor). Such offloading may speed up packet processing, increase data rate, and/or free up resources of the application processor for other tasks..
12/26/13
20130343389
High-speed cld-based pipeline architecture
A method of processing network traffic within a computing system, comprises at a first configurable logic device (cld), receiving an ingress network packet from an external network interface, associating the ingress network packet with a timestamp indicating the time of receipt, parsing the ingress network packet to locate a link-layer checksum value and a routing-layer checksum value, determining whether the link-layer and routing-layer checksum values are correct based on the ingress network packet contents, and transmitting the ingress network packet to a second cld via a high-speed interconnection; and at the second cld receiving the ingress network packet, parsing the ingress network packet to locate a source address and a destination address, determining a destination and a route for the ingress network packet based at least in part on the source and destination addresses, and transmitting the ingress network packet to the determined destination via the determined route.. .
12/12/13
20130329028
Image pickup system
An image pickup system is an image pickup system in which an image pickup device arranged at a distal end of an insertion section of an endoscope and a processor can communicate with each other. A group of multiple control parameters to be collectively transmitted and checksum codes related to the parameters are transmitted from the processor to the image pickup device, and the image pickup device reflects the control parameters on a register only when all the received multiple control parameters are normal, on the basis of the checksums..
12/05/13
20130326542
Runtime modification of property names in advanced configuration and power interface (acpi) tables
A system and method are disclosed for efficient runtime modification of device property names in advanced configuration and power interface (acpi) tables. In accordance with one embodiment, a computer system determines whether a device supports a device property, and when the device does not support the device property, a device property name corresponding to the device name is modified in a particular entry of an acpi table, such that a checksum for that entry remains unchanged.
12/05/13
20130326318
Enhanced checksum system
Generating data checksum for a data object including multiple data units comprises, for each data unit, obtaining a corresponding address of the data unit, and rotating the data unit based on said corresponding address of the data unit to generate a rotated data unit. A checksum value for the data object is determined based on said rotated data units..
11/28/13
20130318357
System and method for secure software update
A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on portable media that includes an executable update program, a checksum for the program that is encrypted with a symmetrical key, an encrypted symmetrical key that is encrypted with a public encryption key and a digital signature prepared with a private signature key.
11/28/13
20130318056
Lightweight integrity protection for web storage-driven content caching
Methods, systems, and computer-readable storage media for providing integrity protection for web storage-driven content caching. Implementations include receiving a web page from a server, the web page being associated with a script library and one or more items that can be stored in web storage of a web browser executed on a client computing device, each of the one or more items being associated with a pre-determined checksum value, and loading the script library, such that a local storage api is overwritten using a wrapper function, the script library being executable to, in response to a request for an item from web storage, perform operations including: determining a generated checksum value based on the item, and verifying an integrity of the item based on the generated checksum value and a pre-determined checksum value associated with the item..
11/14/13
20130305118
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305117
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305116
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305115
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305016
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305015
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305011
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130301827
Authentication of encrypted data blocks
An authentication-encryption unit provides at least one encryption element, where each encryption element encrypts a plain-data block and accordingly generates a cipher-data block. A common checksum is calculated over each cipher-data block.
10/31/13
20130288643
Method and apparatus for restricting radio access to a system
A first subscriber unit (su) operating in a two-way radio frequency (rf) communications system having at least one fixed terminal, one or more channels, and a plurality of subscriber units, generates a first burst of data for transmission to the at least one fixed terminal. The first su calculates a cyclic redundancy check (crc) or checksum value over (i) at least a first portion of the first burst of data and (ii) at least a portion of a first private data.
10/17/13
20130272429
Color component checksum computation in video coding
Checksum computation for video coding is provided that breaks the dependency between the color components of a picture in the prior art. More specifically, rather than computing a single checksum for a picture as in the prior art, a separate checksum is computed for each color component.
10/10/13
20130266152
Synchronizing wireless earphones
Various embodiments are directed to systems and methods involving first and second acoustic speaker devices for synchronizing playback of a common audio playback signal by the first and second acoustic speaker devices. The first acoustic speaker device may transmit wirelessly a first message comprising a first checksum set comprising a plurality of checksums indicating units of the common audio playback signal in a playback queue of the first acoustic speaker device.
10/03/13
20130262964
Device and method for the reading and storing of data
A method for reading data from an electronic data memory. The data lie as data words in the memory, wherein each data word is available at a unique address.
10/03/13
20130262422
Data deduplication using crc-seed differentiation between data and stubs
Various embodiments for differentiating between data and stubs pointing to a parent copy of deduplicated data are provided. Undeduplicated data is stored with a checksum of an initial value as a first cyclic redundancy check (crc) seed.
10/03/13
20130262421
Checksum and hashing operations resilient to malicious input data
A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (cpus). The hash function uses random secret data so that hash keys for particular data are difficult to predict.
09/19/13
20130246707
Two stage checksummed raid storage model
A method for writing a logical data block to storage. The method includes receiving a request to write a logical data block to a storage pool, allocating a number of physical log blocks in a raid log and a parity block for the logical data block, and writing the logical data block and the parity block to the physical log blocks.
09/19/13
20130246358
Online verification of a standby database in log shipping physical replication environments
Techniques are disclosed for performing an operation for determining whether a standby database is synchronized with a primary database in a log shipping physical database replication environment. In one embodiment, the operation may include receiving a transaction log at the standby database from the primary database.
08/29/13
20130227379
Efficient checksums for shared nothing clustered filesystems
Embodiments of the invention relate to efficiently employing checksums for shared nothing clustered filesystems. Tools are provided to compute the checksum in response to a read transaction and to utilize the computed checksum to prevent serving corrupted data.
08/29/13
20130226887
Method of, and apparatus for, improved data integrity in a networked storage system
A method of writing data to a distributed file system including a file system client, a server and a storage resource target, includes generating, on the client, a write request including a byte stream to be written to the storage resource target; formatting, on the client, the byte stream into sectors in accordance with the t10 protocol, the sectors including a data field and a protection information field, the protection information field including a guard field, an application field and a reference field; computing, on the client, checksum data for the guard field; sending, across a network, the data and the protection information to the server; verifying, in t10-capable hardware on the server, the checksum data for the guard field; verifying, on the storage resource target, the checksum data for the guard field; and storing the data on the storage resource target.. .
08/22/13
20130218854
File identification via universal file code
A unique, universal file code created for a file being created or saved for the first time has core elements that include an original device identifier; an original product identifier unique to a software product used to create or save the file; an original operating system identifier unique to an operating system used to create or save the file; an original user identifier unique to a user creating or saving the file; a checksum computed from a totality of a data content of the file; and a name of a checksum algorithm used to compute the checksum. The universal file code is added to file metadata or attributes for the new file and saved with the new file.
08/22/13
20130215972
Method and apparatus for synchronizing highly compressed enhancement layer data
Multimedia application data formats often use data packets and may contain packetized hierarchical layers with a base layer (bl) and one or more enhancement layers (el). Packets that comprise variable length coded data typically provide padding bits, which can be used for adding checksum information.
08/22/13
20130215908
Ethernet udp checksum compensation
In the methods and devices of the present disclosure, a dummy compensation word is added to the data packet such that the udp checksum value need not be modified from any previous value, regardless of changes to the udp payload. Because the udp checksum value is not modified in embodiments of the present disclosure, there is no delay waiting for a udp checksum value to be calculated and no need for additional buffers to store the data packet contents because of udp checksum calculations.
08/15/13
20130212258
Calculating a checksum with inactive networking components in a computing system
Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.. .
08/15/13
20130212253
Calculating a checksum with inactive networking components in a computing system
Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.. .
08/08/13
20130204914
Patient identification based on immutable characteristics
Techniques are described herein that are capable of identifying patients based on immutable characteristics. For instance, each patient identifier is based on immutable characteristics of the patient who is to be identified by that patient identifier.
08/01/13
20130198134
Online verification of a standby database in log shipping physical replication environments
Techniques are disclosed for performing an operation for determining whether a standby database is synchronized with a primary database in a log shipping physical database replication environment. In one embodiment, the operation may include receiving a transaction log at the standby database from the primary database.
07/25/13
20130191614
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
06/20/13
20130160121
Method and apparatus for detecting intrusions in a computer system
The present invention provides a method and apparatus for detecting intrusions in a processor-based system. One embodiment of the method includes calculating a first checksum from first bits representative of instructions in a block of a program concurrently with executing the instructions.
06/13/13
20130148721
Reference frame management for screen content video coding using hash or checksum functions
Techniques are provided for reference frame management for screen content video coding using hash or checksum functions. A video data stream including a plurality of frames is received, each frame including a plurality of pixels that define content within the frame.
06/06/13
20130145225
Code checking method for a memory of a printed circuit board
The present invention discloses a code checking method for a memory of a printed circuit board, which is to firstly add a check code to a data end of codes, after the codes is written in a memory, then use a timing controller to calculate a checksum of the data of the part of the primary codes and further compare the calculated checksum with the check code, and then output to a probe via a testing pin to display the result of comparison, so as to accomplish an object of checking if the written codes are correct. The present invention enhances work efficiency of checking the codes written in the memory..
06/06/13
20130142094
Systems and methods for frame filtering and for enabling frame filtering
The disclosure provides systems, methods, and apparatus for early receive chain shutoff using a typified crc and/or content change indicator signals. In one aspect, a method for low power frame filtering is provided.
05/30/13
20130139252
Securing network communications from blind attacks with checksum comparisons
Blind attacks on a protocol connection, such as a tcp connection, are prevented by inserting checksums computed during protocol connection establishment handshake into data sent through the connection and invalidating data sent through the connection that lacks the protocol setup information checksums. Reset attacks are prevented by invalidating reset requests unless a master checksum computed from the protocol setup information checksums is included with the reset request.
05/30/13
20130138881
Parallel reed-solomon raid (rs-raid) architecture, device, and method
The parallel rs-raid data storage architecture can aggregate that data and checksums within each cluster into intermediate or partial sums that are transferred or distributed to other clusters. The use of intermediate data symbols, intermediate checksum symbols, cluster configuration information on the assignment of data storage devices to clusters and the operational status of data storage devices, and the like, can reduce the computational burden and latency for the error correction calculations while increasing the scalability and throughput of the parallel rs-raid distributed data storage architecture..
05/23/13
20130133069
Silent-mode signature testing in anti-malware processing
Method and computer program product for signature testing used in anti-malware processing. Silent signatures, after being tested, are not updated into a white list and are sent directly to users instead.
05/23/13
20130132801
Error checking addressable blocks in storage
Provided are a method, system, and article of manufacture for error checking addressable blocks in storage. Addressable blocks of data are stored in a storage in stripes, wherein each stripe includes a plurality of data blocks for one of the addressable blocks and at least one checksum block including checksum data for the addressable block.
05/23/13
20130132730
Method and system for transmitting control data in a manner that is secured against manipulation
A method and system for detecting manipulation when control data are transmitted from a first control unit to a second control unit via a network, which includes generating integrity check information data for the control data transmitted by the first control unit via an integrity check generating unit on the transmitter side, calculating a cryptographic checksum for the integrity check information data generated on the transmitter side via the integrity check generating unit, transmitting the integrity check information data and the cryptographic checksum to an integrity check verifying unit that verifies the cryptographic checksum on the receiver side, generating integrity check information data on the receiver side for the control data received by the second control unit using the integrity check verifying unit, and comparing the integrity check information data and the integrity check information data with the cryptographic checksum to detect the manipulation of the transmitted control data.. .
05/16/13
20130124871
Application execution system and method of terminal
An application execution system and a method for executing applications, at a terminal, with security check on the application package are provided. The system includes an application creator including an enabler, for creating an application package including a plurality of binary codes and content files, and for adding a checksum file generated by ciphering, at the enabler, information on a main binary of the application package, and a terminal storing the application, for determining a validity of the application package, and for executing an application according to the validity of the application package, and a subsystem including a checker, for ciphering the main binary of the application package using the checker added to the open function in response to the call, for notifying, when the result of the ciphering and the checksum file match with each other, the operating system of the successful validation..
05/09/13
20130117823
System and method for enforcing security policies in a virtual environment
A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems.
05/02/13
20130111440
Methods, apparatuses, and computer-readable media for computing checksums for effective caching in continuous distributed builds
Methods, systems, and computer-readable media for determining whether dependencies of configuration files have changed such that the compilation strategy should be recomputed. Local build checksums are computed for individual configuration files.
04/25/13
20130104235
Detection of undesired computer files in archives
Systems and methods for content filtering are provided. According to one embodiment, a type and structure of an archive file are determined.
04/18/13
20130097314
Managing inventory data for components of a server system
Techniques are disclosed for managing inventory data for components of a server system. In one embodiment, a global management controller is provided, that is operatively connected to a plurality of local management controllers.
04/18/13
20130094648
Apparatus and method for producing a bit sequence
A method for reconstructing a physically unclonable function (puf) a for use in an electronic appliance is provided. The method includes producing a checksum c, producing a defective puf b and reconstructing the puf a from the defective puf b using an error correction algorithm.
04/18/13
20130093597
Communication applications
In some embodiments, an apparatus and a system, as well as a method and an article, may operate to transmit and receive data. Transmission may comprise transforming larger values of acquired data into smaller values of transformed data using a transform defined by a seed value selected to reduce digital pulse position modulation transmission time for the acquired data.
04/11/13
20130091305
Identifying users through a proxy
Methods, systems, and computer-readable media with executable instructions stored thereon for identifying a user that accesses a webpage from a user device through a proxy are provided. Identifying users through a proxy can include providing rewritten content of the webpage accessed by the user to the user device, the rewritten content including a reference to a data file, and the reference including a checksum computed from actual content of the webpage.
04/04/13
20130086643
Tamper proof mutating software
System and method is disclosed for protecting client software running on a client computer from tampering using a secure server. Prior to or independent of executing the client software, the system integrates self-protection into the client software; removes functions from the client software for execution on the server; develops client software self-protection updates; and periodically distributes the updates.
04/04/13
20130086393
Increasing data security in enterprise applications by obfuscating encryption keys
A method, system, and computer program product for using hidden buffer formatting and passing obfuscated encryption key values to detect tampering with and/or prevent unauthorized inspection of a data buffer. The method comprises receiving an unencrypted sequence to be encrypted, selecting a layout version to associate to an encryption method and a checksum method, then encrypting the unencrypted sequence using the encryption method to form an encrypted sequence, and calculating, using the checksum calculation method, an unencrypted sequence checksum.
04/04/13
20130086392
Increasing data security in enterprise applications by using formatting, checksums, and encryption to detect tampering of a data buffer
A method, system, and computer program product for using hidden buffer formatting and passing obfuscated encryption key values to detect tampering with and/or prevent unauthorized inspection of a data buffer. The method comprises receiving an unencrypted sequence to be encrypted, selecting a layout version to associate to an encryption method and a checksum method, then encrypting the unencrypted sequence using the encryption method to form an encrypted sequence, and calculating, using the checksum calculation method, an unencrypted sequence checksum.
03/28/13
20130080511
Software detection
A method, system and computer program product for software discovery in a computer system comprising a server and a client. Data defining at least one file category is received at the client from the server.
03/28/13
20130077780
Method and apparatus for facilitating efficient authenticated encryption
In some embodiments, a key shared between communicating parties is mapped to a key variant using a block cipher. The key variant is mapped into a sequence of basis offsets using shifts and conditional xors.
03/21/13
20130073813
Mechanism for saving a snapshot of free space of a file system on persistent storage
A mechanism for saving a snapshot of free space of a file system on persistent storage is disclosed. A method of the invention includes determining whether generation numbers stored in each of a free space cache inode of an on-disk free space cache of a block group, a free space cache item, and a free space cache header are valid, determining whether a checksum generated for a first page of the free space cache matches a checksum stored in the file system and associated with the free space cache, and adding entries stored in the on-disk free space cache to an in-memory free space cache for the block group kept in volatile memory of a computing device, wherein the on-disk free space cache is stored in persistent data storage indexed by a file system of the computing device..
03/14/13
20130067188
Storage device drivers and cluster participation
The representation of storage devices on computers (e.g., as logical volumes) may be complicated by the pooling of multiple storage devices in order to apply redundancy plans such as mirroring and checksumming. Presented herein is a storage device driver configured to operate as a storage device interface generating representations of the storage regions of the storage devices; to claim those regions as a storage controller; and to expose pooled storage regions as logical disks.
03/14/13
20130067179
Nonvolatile media dirty region tracking
A storage set (e.g., an array of hard disk drives) may experience a failure, such as a loss of power, a software crash, or a disconnection of a storage device, while writes to the storage set are in progress. Recover from the failure may involve scanning the storage set to detect and correct inconsistencies (e.g., comparing mirrors of a data set or testing checksums).
03/14/13
20130067174
Nonvolatile media journaling of verified data sets
The storage of data sets in a storage set (e.g., data sets written to hard disk drives comprising a raid array) may diminish the performance of the storage set through non-sequential writes, particularly if the storage devices promptly write data sets that are followed by sequentially following data sets. Additionally, storage sets may exhibit inconsistencies due to non-atomic writes of data sets and verifiers (e.g., checksums) and an intervening failure, such as an occurrence of the raid write hole.
03/14/13
20130067004
Electronic message system with federation of trusted senders
Systems and methods for allowing challenge messages to be sent directly to a recipient's inbox where normally the challenge message would be sent to a pending folder or deleted. Challenge messages sent between federated messaging services contain a federated token which can be identified, authenticated and validated to determine whether the challenge message should be sent to a recipient's inbox.


Popular terms: [SEARCH]

Checksum topics: Cyclic Redundancy Check, Redundancy, Communications, Replication, Subscriber, Data Packet, Dependency, Transaction Log, Hash Function, Central Processing Unit, Hash Table, Central Processing Units, Differentiation, Duplication, Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patents related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.9827

3209

3 - 0 - 73