FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Checksum topics
Cyclic Redundancy Check
Redundancy
Communications
Replication
Subscriber
Data Packet
Dependency
Transaction Log
Hash Function
Central Processing Unit
Hash Table
Central Processing Units
Differentiation
Duplication
Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Checksum patents



      
           
This page is updated frequently with new Checksum-related patent applications. Subscribe to the Checksum RSS feed to automatically get the update: related Checksum RSS feeds. RSS updates for this page: Checksum RSS RSS


Date/App# patent app List of recent Checksum-related patents
09/18/14
20140283116
 Method for protected execution of code and protection of executable code and data against modifications patent thumbnailMethod for protected execution of code and protection of executable code and data against modifications
A method for an automated protection of a programmable code and data without using dedicated components for calculation of the checksums and/or hash values is provided. Execution of each machine instruction uses data from several small blocks of protected code or data.
09/18/14
20140281798
 Performing a cyclic redundancy checksum operation responsive to a user-level instruction patent thumbnailPerforming a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
09/18/14
20140281530
 Enhanced ipsec anti-replay/anti-ddos performance patent thumbnailEnhanced ipsec anti-replay/anti-ddos performance
A method for authenticating an internet protocol security (ipsec) packet, wherein the method comprises, receiving the ipsec packet via an input port, performing a sequence-integrity check value (seq-icv) check that validates a sequence number within the ipsec packet, and performing an integrity check value (icv) check that validates a checksum within the ipsec packet, wherein the seq-icv check is performed before the icv check. In yet another example embodiment, an apparatus for transmitting an ipsec packet, comprising a processor, and a transmitter coupled to the processor, wherein the transmitter is configured to transmit an ipsec packet that comprises a header that comprises a sequence number field that provides a sequence number, and a payload that comprises one or more seq-icv segments used to authenticate the sequence number within the ipsec packet..
09/11/14
20140259154
 Displaying an icon based upon user input patent thumbnailDisplaying an icon based upon user input
Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a checksum function of the user input.
09/11/14
20140259142
 Systems and methods for detecting undesirable network traffic content patent thumbnailSystems and methods for detecting undesirable network traffic content
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
09/11/14
20140259141
 Systems and methods for detecting undesirable network traffic content patent thumbnailSystems and methods for detecting undesirable network traffic content
A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
08/28/14
20140245017
 Digital tachograph patent thumbnailDigital tachograph
A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module.
08/28/14
20140244985
 Intelligent context management patent thumbnailIntelligent context management
Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.
08/21/14
20140237617
 Origin and custody of copies from a stored electronic record verified page by page patent thumbnailOrigin and custody of copies from a stored electronic record verified page by page
A method of authenticating a copy of a multi-page document, which includes digitizing a said multi-page document to generate one or more digitized files that together comprise a digitized transcript. A mark that is unique to the preparer of the document, such as a signature, is prepared and digitized.
08/21/14
20140237592
 Method and system for detecting data modification within computing device patent thumbnailMethod and system for detecting data modification within computing device
A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications.
08/07/14
20140223268
Methods and apparatus for improved dmx512 communication
Disclosed are methods and apparatus for improved backwards compatible dmx communications. In some embodiments,methods and apparatus related to extensions of the dmx protocol enable error detection by enhanced dmx slave devices while maintaining full compatibility with non-enhanced dmx slave devices.
07/24/14
20140208078
Vector checksum instruction
A vector checksum instruction. Elements from a second operand are added together one-by-one to obtain a first result.
07/17/14
20140198801
Mac address synchronization in a fabric switch
One embodiment of the present invention provides a system for facilitating synchronization of mac addresses in a fabric switch. During operation, the system divides a number of media access control (mac) addresses associated with devices coupled to an interface of the switch.
07/03/14
20140189443
Hop-by-hop error detection in a server system
A server system performs error detection on a hop-by-hop basis at multiple compute nodes, thereby facilitating the detection of a compute node experiencing failure. The server system communicates a packet from an originating node (the originating node) to a destination node by separating the packet into multiple flow control digits (flits) and routing the flits using a series of hops over a set of intermediate nodes.
07/03/14
20140188827
Detection and correction of corrupted or dangling data object handles
Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
06/19/14
20140173352
Computing device and method of checking burned-in files
In a method to check burned-in files, a file is obtained from a storage device and a checksum value of the file is computed. A burning-in check system is integrated into the file, and then the file is burned-in a complex programmable logic device (cpld) chip.
06/19/14
20140172800
Updating a file using differences and file format therefor
A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved.
06/12/14
20140164828
Consistency of data in persistent memory
Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log.
06/12/14
20140164694
Decoupled reliability groups
Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node.
06/12/14
20140164647
Management data input/output (mdio) protocol including checksum mode
A process to manage data between one or more mdio manageable devices situated on the same bus utilizing the mdio protocol. The data management efficiency can be increased through the use of an mdio protocol that includes a checksum mode.
06/05/14
20140153024
Data printing system and data protection method thereof
A data printing system and data protection method thereof are provided. The system includes a data output device and a data printing device.
05/29/14
20140146601
Processors and systems with multiple reference columns in multibit phase-change memory
Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
05/15/14
20140133408
Methods and apparatus for avoiding collisions due to hidden wireless nodes
Certain aspects of the present disclosure provide techniques and apparatus for starting an extended idle interval in an effort to avoid collisions with transmissions from hidden wireless nodes. One example apparatus generally includes a receiver and a processing system.
05/08/14
20140126418
Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (iaas) on hybrid cloud networks
A layer-3 virtual router connects two or more virtual networks. Virtual networks are overlaid upon physical networks.
05/01/14
20140122981
Data receiving apparatus, data receiving method, and computer-readable recording medium
A data receiving apparatus includes: a header analyzing unit that analyzes a header of a frame and outputs header information; a checksum judging unit that calculates and judges a checksum of the frame; a buffer unit that stores a data portion of the frame; a reading unit that reads connection information corresponding to the header information from a second storage unit; an identifying unit that identifies a write location for the data portion based on the connection information; a data writing unit that reads data from the buffer unit and starts writing the data to the identified write location in a first storage unit before the checksum is judged; and a writing unit that, if the judgment result is “pass,” writes the connection information updated based on the header information to the second storage unit while the data writing unit is writing.. .
05/01/14
20140122892
Insuring integrity of remote procedure calls used in a client and server storage system
A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure specific parameters of an rpc and then encrypting the resulting hash value.
05/01/14
20140122844
Intelligent context management
Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.
04/24/14
20140115258
System and method for managing a deduplication table
Implementations described and claimed herein provide systems and methods for allocating and managing resources for a deduplication table. In one implementation, an upper limit to an amount of memory allocated to a deduplication table is established.
04/03/14
20140095804
Efficient cache validation and content retrieval in a content delivery network
Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.
03/20/14
20140081935
Detection and correction of corrupted or dangling data object handles
Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
03/13/14
20140074777
Systems and methods for selective data replication
Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file.
03/06/14
20140068005
Identification, caching, and distribution of revised files in a content delivery network
A client computer sends a request for a web page to a web site host computer. The host returns an initial web page document that contains a listing of files needed to generate the web page and a revision identifier (revid) for certain files.
03/06/14
20140063931
Multibit phase-change memory with multiple reference columns
Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
03/06/14
20140063928
Processors and systems with cell-generated-reference in phase-change memory
Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
03/06/14
20140063927
Cell-generated reference in phase change memory
Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
02/27/14
20140056151
Methods and systems for offload processing of encapsulated packets
Methods and systems described herein facilitate offload processing of encapsulated packets. A virtualization manager enables a virtual switch to be associated with a virtual overlay network.
02/13/14
20140047307
Checksum calculation, prediction and validation
A calculation, prediction and validation method can include receiving a portion of a data packet in a data buffer, computing, in a processor, information related to the checksum of the data packet based on the portion of the data packet and processing the data packet in the processor.. .
02/06/14
20140040403
System, method and computer program product for gathering information relating to electronic content utilizing a dns server
A system, method and computer program product are provided. In use, a checksum associated with electronic content is calculated.
02/06/14
20140040337
Device and method for maintenance filtering on a flow of coded inputs/outputs
A method and a device for maintenance filtering to process a flow of m coded incoming messages esj each with nj inputs/outputs esi,j, a checksum Σsesi,j of signatures sesi,j, and a date dj. Outgoing message esmj is generated from each incoming message with nj inputs/outputs esmi,j, a checksum Σsesmj of signatures sesmi,j, and the date dj.
02/06/14
20140040143
Method and device for controlling distribution and use of digital works
A method and device for controlling distribution and use of a digital work stored together with an attached usage right information on a record carrier. The attached usage right information, which may be unencrypted, is verified by using a hidden information which is changed at every change of the usage right information.
01/30/14
20140032915
Method and apparatus for validating the integrity of installer files prior to installation
A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file.. .
01/16/14
20140016550
Methods and apparatus for offloading checksum processing
Aspects of the present disclosure provide methods and apparatus for offloading checksum processing in a user equipment (ue) (e.g., from an application processor to a modem processor). Such offloading may speed up packet processing, increase data rate, and/or free up resources of the application processor for other tasks..
12/26/13
20130343389
High-speed cld-based pipeline architecture
A method of processing network traffic within a computing system, comprises at a first configurable logic device (cld), receiving an ingress network packet from an external network interface, associating the ingress network packet with a timestamp indicating the time of receipt, parsing the ingress network packet to locate a link-layer checksum value and a routing-layer checksum value, determining whether the link-layer and routing-layer checksum values are correct based on the ingress network packet contents, and transmitting the ingress network packet to a second cld via a high-speed interconnection; and at the second cld receiving the ingress network packet, parsing the ingress network packet to locate a source address and a destination address, determining a destination and a route for the ingress network packet based at least in part on the source and destination addresses, and transmitting the ingress network packet to the determined destination via the determined route.. .
12/12/13
20130329028
Image pickup system
An image pickup system is an image pickup system in which an image pickup device arranged at a distal end of an insertion section of an endoscope and a processor can communicate with each other. A group of multiple control parameters to be collectively transmitted and checksum codes related to the parameters are transmitted from the processor to the image pickup device, and the image pickup device reflects the control parameters on a register only when all the received multiple control parameters are normal, on the basis of the checksums..
12/05/13
20130326542
Runtime modification of property names in advanced configuration and power interface (acpi) tables
A system and method are disclosed for efficient runtime modification of device property names in advanced configuration and power interface (acpi) tables. In accordance with one embodiment, a computer system determines whether a device supports a device property, and when the device does not support the device property, a device property name corresponding to the device name is modified in a particular entry of an acpi table, such that a checksum for that entry remains unchanged.
12/05/13
20130326318
Enhanced checksum system
Generating data checksum for a data object including multiple data units comprises, for each data unit, obtaining a corresponding address of the data unit, and rotating the data unit based on said corresponding address of the data unit to generate a rotated data unit. A checksum value for the data object is determined based on said rotated data units..
11/28/13
20130318357
System and method for secure software update
A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on portable media that includes an executable update program, a checksum for the program that is encrypted with a symmetrical key, an encrypted symmetrical key that is encrypted with a public encryption key and a digital signature prepared with a private signature key.
11/28/13
20130318056
Lightweight integrity protection for web storage-driven content caching
Methods, systems, and computer-readable storage media for providing integrity protection for web storage-driven content caching. Implementations include receiving a web page from a server, the web page being associated with a script library and one or more items that can be stored in web storage of a web browser executed on a client computing device, each of the one or more items being associated with a pre-determined checksum value, and loading the script library, such that a local storage api is overwritten using a wrapper function, the script library being executable to, in response to a request for an item from web storage, perform operations including: determining a generated checksum value based on the item, and verifying an integrity of the item based on the generated checksum value and a pre-determined checksum value associated with the item..
11/14/13
20130305118
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305117
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305116
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305115
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305016
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305015
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305011
Performing a cyclic redundancy checksum operation responsive to a user-level instruction
In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130301827
Authentication of encrypted data blocks
An authentication-encryption unit provides at least one encryption element, where each encryption element encrypts a plain-data block and accordingly generates a cipher-data block. A common checksum is calculated over each cipher-data block.
10/31/13
20130288643
Method and apparatus for restricting radio access to a system
A first subscriber unit (su) operating in a two-way radio frequency (rf) communications system having at least one fixed terminal, one or more channels, and a plurality of subscriber units, generates a first burst of data for transmission to the at least one fixed terminal. The first su calculates a cyclic redundancy check (crc) or checksum value over (i) at least a first portion of the first burst of data and (ii) at least a portion of a first private data.
10/17/13
20130272429
Color component checksum computation in video coding
Checksum computation for video coding is provided that breaks the dependency between the color components of a picture in the prior art. More specifically, rather than computing a single checksum for a picture as in the prior art, a separate checksum is computed for each color component.
10/10/13
20130266152
Synchronizing wireless earphones
Various embodiments are directed to systems and methods involving first and second acoustic speaker devices for synchronizing playback of a common audio playback signal by the first and second acoustic speaker devices. The first acoustic speaker device may transmit wirelessly a first message comprising a first checksum set comprising a plurality of checksums indicating units of the common audio playback signal in a playback queue of the first acoustic speaker device.
10/03/13
20130262964
Device and method for the reading and storing of data
A method for reading data from an electronic data memory. The data lie as data words in the memory, wherein each data word is available at a unique address.
10/03/13
20130262422
Data deduplication using crc-seed differentiation between data and stubs
Various embodiments for differentiating between data and stubs pointing to a parent copy of deduplicated data are provided. Undeduplicated data is stored with a checksum of an initial value as a first cyclic redundancy check (crc) seed.
10/03/13
20130262421
Checksum and hashing operations resilient to malicious input data
A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (cpus). The hash function uses random secret data so that hash keys for particular data are difficult to predict.
09/19/13
20130246707
Two stage checksummed raid storage model
A method for writing a logical data block to storage. The method includes receiving a request to write a logical data block to a storage pool, allocating a number of physical log blocks in a raid log and a parity block for the logical data block, and writing the logical data block and the parity block to the physical log blocks.
09/19/13
20130246358
Online verification of a standby database in log shipping physical replication environments
Techniques are disclosed for performing an operation for determining whether a standby database is synchronized with a primary database in a log shipping physical database replication environment. In one embodiment, the operation may include receiving a transaction log at the standby database from the primary database.
08/29/13
20130227379
Efficient checksums for shared nothing clustered filesystems
Embodiments of the invention relate to efficiently employing checksums for shared nothing clustered filesystems. Tools are provided to compute the checksum in response to a read transaction and to utilize the computed checksum to prevent serving corrupted data.
08/29/13
20130226887
Method of, and apparatus for, improved data integrity in a networked storage system
A method of writing data to a distributed file system including a file system client, a server and a storage resource target, includes generating, on the client, a write request including a byte stream to be written to the storage resource target; formatting, on the client, the byte stream into sectors in accordance with the t10 protocol, the sectors including a data field and a protection information field, the protection information field including a guard field, an application field and a reference field; computing, on the client, checksum data for the guard field; sending, across a network, the data and the protection information to the server; verifying, in t10-capable hardware on the server, the checksum data for the guard field; verifying, on the storage resource target, the checksum data for the guard field; and storing the data on the storage resource target.. .
08/22/13
20130218854
File identification via universal file code
A unique, universal file code created for a file being created or saved for the first time has core elements that include an original device identifier; an original product identifier unique to a software product used to create or save the file; an original operating system identifier unique to an operating system used to create or save the file; an original user identifier unique to a user creating or saving the file; a checksum computed from a totality of a data content of the file; and a name of a checksum algorithm used to compute the checksum. The universal file code is added to file metadata or attributes for the new file and saved with the new file.
08/22/13
20130215972
Method and apparatus for synchronizing highly compressed enhancement layer data
Multimedia application data formats often use data packets and may contain packetized hierarchical layers with a base layer (bl) and one or more enhancement layers (el). Packets that comprise variable length coded data typically provide padding bits, which can be used for adding checksum information.
08/22/13
20130215908
Ethernet udp checksum compensation
In the methods and devices of the present disclosure, a dummy compensation word is added to the data packet such that the udp checksum value need not be modified from any previous value, regardless of changes to the udp payload. Because the udp checksum value is not modified in embodiments of the present disclosure, there is no delay waiting for a udp checksum value to be calculated and no need for additional buffers to store the data packet contents because of udp checksum calculations.
08/15/13
20130212258
Calculating a checksum with inactive networking components in a computing system
Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.. .
08/15/13
20130212253
Calculating a checksum with inactive networking components in a computing system
Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.. .


Popular terms: [SEARCH]

Checksum topics: Cyclic Redundancy Check, Redundancy, Communications, Replication, Subscriber, Data Packet, Dependency, Transaction Log, Hash Function, Central Processing Unit, Hash Table, Central Processing Units, Differentiation, Duplication, Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.4697

3121

2 - 1 - 71