Popular terms

Checksum topics
Cyclic Redundancy Check
Redundancy
Communications
Replication
Subscriber
Data Packet
Dependency
Transaction Log
Hash Function
Central Processing Unit
Hash Table
Central Processing Units
Differentiation
Duplication
Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Checksum patents



      

This page is updated frequently with new Checksum-related patent applications.




Date/App# patent app List of recent Checksum-related patents
03/31/16
20160094564 
 Taxonomic malware detection and mitigation patent thumbnailTaxonomic malware detection and mitigation
In an example, a classification engine compares two binary objects to determine whether they can be classified as belonging to a common family. As an example application, the classification engine may be used to detect malware objects derived from a common ancestor.
Mcafee, Inc


03/31/16
20160092701 
 Methods and apparatus to enable runtime checksum verification of block device images patent thumbnailMethods and apparatus to enable runtime checksum verification of block device images
A method for verifying data integrity of a block device is provided. The method includes providing a secure world execution environment configured to monitor changes to data blocks of a block device, within the secure world execution environment, generating a hash for changed data blocks of the block device, and within the secure world execution environment, verifying and generating a cryptographic signature..
Samsung Electronics Co., Ltd.


03/31/16
20160092467 
 File system with per-extent checksums patent thumbnailFile system with per-extent checksums
A file system allows a different checksum algorithm to be used for different extents of a file system object independently of other extents of the file system object. The checksum algorithm can be a selectable attribute of an extent or range of extents of a file system object, such that some extents of a file system object can use a first checksum algorithm, while other extents of the file system object can use a second checksum algorithm.
Microsoft Corporation


03/10/16
20160071402 
 Master slave wireless fire alarm and mass notification system patent thumbnailMaster slave wireless fire alarm and mass notification system
A wireless fire alarm notification system uses wireless repeater devices to annunciate an alarm to slave devices from the control panel. A notification device provides a local synchronization signal via wire to a secondary notification device.
Simplex Time Recorder Co.


03/03/16
20160065595 
 Apparatus and  performing real-time network antivirus function patent thumbnailApparatus and performing real-time network antivirus function
An apparatus and method for performing a real-time network antivirus function, which can perform, at high speed, real-time antivirus scanning on a transmission file in a network to be protected and blocking of a malicious file. The apparatus includes a packet processing unit for parsing input packets and outputting a transmission data stream, a packet-based checksum calculation unit for calculating a checksum of the transmission data stream for each packet, and outputting a signature included in the transmission data stream when a last packet of the transmission data stream is input, a virus scanning unit for performing virus scanning based on the signature, a detection and blocking unit for blocking each input packet or transmitting it to a destination, based on result of the virus scanning unit, and a caching unit for updating a blacklist, based on result of the detection and blocking unit..
Electronics And Telecommunications Research Institute


03/03/16
20160063050 
 Database migration consistency checker patent thumbnailDatabase migration consistency checker
Following migration of data from one database to another, the contents of the source and target databases may be checked for consistency based on checksums computed for corresponding portions of the two databases. The origin of discrepancies may be determined iteratively by computing checksums for increasingly smaller sub-portions of portions whose checksums do not match..

02/25/16
20160056842 
 In-band status encoding and decoding using error correction symbols patent thumbnailIn-band status encoding and decoding using error correction symbols
A status encoder generates a checksum that encodes a status condition together with the checksum of an associated message. A receiver determines an inverse transformation that when applied to the received status-encoded checksum recovers the parity information associated with the codeword.
Rambus Inc.


02/04/16
20160036885 
 Content format conversion verification patent thumbnailContent format conversion verification
Content conversion verification, includes: converting, at a first computer system, an original content file to a target format, generating a converted content file in the target format; generating a checksum for the converted content file; and sending the original content file and the checksum to a second computer system. Key words include content verification and checksum..
Sony Pictures Entertainment Inc


01/28/16
20160026527 
 Systems and methods for error correction coding patent thumbnailSystems and methods for error correction coding
Described are methods, systems, and apparatus, including computer program products for error correction coding and decoding procedures for data storage or transfer. A plurality of data blocks is received.
Raidix Corporation


01/07/16
20160004717 
 Storage and retrieval of file-level changes on deduplication backup server patent thumbnailStorage and retrieval of file-level changes on deduplication backup server
When a backup client sends a request to back up a file to a backup server, the file and an index (e.g., checksum, hash, encryption, etc.) of the file are stored on the backup server in an efficient deduplication storage. If a backup client sends a request to back up a modified version of a file already stored on a backup server, the modified portion of the file is stored.
Druva Inc.


01/07/16
20160004592 

Method for detecting error of data, storage device, and recording medium


A method includes storing, by a processor that is configured to avoid adding the error correcting code to the data when the data passes through the inside of the processor, the data received from a host device and an error correcting code in the buffer memory; reading the data from the buffer memory and transmitting the read data to a calculating circuit; calculating, by the calculating circuit, a first checksum of the data and transmitting the data to the processor; storing, by the processor, the data and the error correcting code in a sub memory; reading the data from the sub memory and transmitting the read data to the calculating circuit through the processor; calculating, by the calculating circuit, a second checksum of the data; and determining, by the processor, whether an error of the data occurs within the processor by comparing the first checksum with the second checksum.. .
Fujitsu Limited


12/31/15
20150379264 

Mitigation of malware


Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to determine a series of checksums for a file, compare the series of checksums to a checksum tree, where the checksum tree includes a plurality of nodes that each include a fuzzy checksum of known malware, and assign one or more classifications to the file, where each of the one or more classifications is based on each node of the checksum tree that matches a checksum in the series of checksums and includes whether the file includes malware or benign checksums..
Mcafee, Inc.


12/24/15
20150373046 

System and mitigating toc/tou attacks in a cloud computing environment


A computer system, method, and computer program product for mitigating toctou attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is a result of a second process executing checksum code to verify at least one last branch record on the host. A processor also determined, based on the measurements, whether the first process was compromised..
Kddi Corporation


12/10/15
20150358155 

Secret computation system, arithmetic unit, secret computation method and program


Each of at least three arithmetic units includes: a random number generator determining shared value [r] obtained by performing secret sharing of random number r; a randomizator using shared value [a0], . .
Nippon Telegraph And Telephone Corporation


12/03/15
20150347859 

Credit card auto-fill


Differing embodiments of this disclosure may employ one or all of the several techniques described herein to perform credit card recognition using electronic devices with integrated cameras. According to some embodiments, the credit card recognition process may comprise: obtaining a first representation of a first image, wherein the first representation comprises a first plurality of pixels; identifying a first credit card region within the first representation; extracting a first plurality of sub-regions from within the identified first credit card region, wherein a first sub-region comprises a credit card number, wherein a second sub-region comprises an expiration date, and wherein a third sub-region comprises a card holder name; generating a predicted character sequence for the first, second, and third sub-regions; and validating the predicted character sequences for at least the first, second, and third sub-regions using various credit card-related heuristics, e.g., expected character sequence length, expected character sequence format, and checksums..
Apple Inc.


11/19/15
20150333903 

Method for operating a portable data carrier, and such a portable data carrier


A method for operating a portable data carrier includes a processing unit for processing commands and a memory unit for storing data, with random wait states being inserted into the processing of the commands for thwarting spa/dpa attacks. An actual checksum may be computed over the data of a selected region of the memory unit during a random wait state.
Giesecke & Devrient Gmbh


11/12/15
20150324259 

Method and system for automatic failover for clients accessing a resource through a server using hybrid checksum location


Some embodiments are directed to a method and apparatus for implementing an automatic failover mechanism for a resource. A client accesses a source through a first server using a first session.
Oracle International Corporation


11/12/15
20150324249 

Message page integrity verification in automotive network auto-negotiation


A transmitting device may implement a checksum for integrity verification for a message page during an auto-negotiation period. The checksum may provide redundancy to ensure the integrity of the message page after transmission.
Broadcom Corporation


11/05/15
20150319032 

Method and system for detecting changes in a network using simple network management protocol polling


In an embodiment, methods and systems have been provided for detecting changes in a network using improved simple network management protocol (snmp) polling that reduces network traffic. Examples of changes in the network include, but are not limited to, configuration and behavioral changes in a network device, and response of network device to a network change.
Cisco Technology, Inc.


11/05/15
20150317845 

Synchronization of records of duty status between a vehicle and a stationary unit


A system for synchronizing records of duty status (rods) information of a vehicle with a stationary unit includes: at least one mobile unit, and a stationary unit configured to store rods transmitted by the mobile unit. The mobile unit is configured to generate rods, store the generated rods, and transmit rods to the stationary unit.

11/05/15
20150317231 

Collecting and aggregating log data with fault tolerance


Systems and methods of collecting and aggregating log data with fault tolerance are disclosed. One embodiment includes, one or more devices that generate log data, the one or more machines each associated with an agent node to collect the log data, wherein, the agent node generates a batch comprising multiple messages from the log data and assigns a tag to the batch.
Cloudera, Inc.


11/05/15
20150317176 

Systems and methods for enabling value added services for extensible storage devices over a network via nvme controller


A new approach is proposed that contemplates systems and methods to support a plurality of value-added services for storage operations on a plurality of remote storage devices virtualized as extensible/flexible storages and nvme namespace(s) via an nvme controller in real time. First, the nvme controller virtualizes and presents the remote storage devices to one or more vms running on a host attached to the nvme controller as logical volumes so that each of the vms running on the host can perform read/write operations on the emote storage devices as if they were local storage devices.
Cavium, Inc.


10/29/15
20150309179 

Techniques for securing live positioning signals


A pay television satellite broadcast includes validation data that can be used to validate authenticity of live global positioning system (gps) data. The validation data may be included within entitlement messages and encrypted for security and selective reception by authorized receivers.
Opentv, Inc.


10/22/15
20150301886 

Information processing apparatus, system, and information processing method


The apparatus comprises a register, a transferring unit that transfers data stored in a first memory to a second memory, and a calculator that applies a checksum operation to the data being transferred by the transferring unit. When a first mode is set, the calculator transmits the result of the checksum operation to the transferring unit, and the transferring unit transfers the result to the second memory.
Canon Kabushiki Kaisha


10/15/15
20150296096 

Trusted evidence cameras and related methods and computer program products


Digital cameras configured to verify authenticity of digital photos taken with the digital camera and related methods and computer program products are provided. Gps information associated with a photograph taken with the digital camera is obtained.

10/15/15
20150293829 

Method and monitoring general purpose input output, gpio, signals


An apparatus and method for monitoring general purpose input output, gpio, signals at gpio pins of a gpio port of a system on chip, soc. The apparatus comprises a first checksum generation unit adapted to generate a first checksum on the basis of gpio bits stored in gpio registers of the soc, being connected via corresponding input output, io, pad circuits to provide analog gpio signals at the gpio pins.

10/15/15
20150293798 

Selecting output destinations for kernel messages


Methods, apparatus and computer program products implement embodiments of the present invention to identify, in a given kernel source code file for the operating system kernel, a given printk function call having a corresponding message text, the given kernel source code file having a kernel source code file name, calculate a configuration checksum, to assign, add, and store the respective destination and a key comprising the configuration checksum, to load, receive, and identify the name of a given source code file, and to determine, based on the identified name and the text string, a computed destination for the system message by calculating, using the identified name and the text string, a message checksum, and identifying, in the configuration table, an entry having a key equal to the message checksum, and wherein the determined destination comprises the respective destination in the identified entry. In the identified entry..

10/08/15
20150288217 

System and providing and controlling inductive power charging


Wireless power transfer between power transmitters and power receivers may be established by a digital ping phase during which the wireless power transmitter applies a power signal and waits for a valid response message from the power receiver. The response message may include an identification code and a checksum byte used by the power transmitter to validate the identification code.

10/01/15
20150281900 

Method for sending status information from a sender to a receiver


Method of sending the value of a status variable between a sending device (100; 201) and a receiving device (201, 100) as part of a standardized binary coded radio message within the scope of a distributed message system, which message comprises fields for a certain predetermined information to be sent with the message as well as a buffer field, comprising the steps of: causing the sending device to assemble, calculate a checksum for, digital store and periodically transmit a certain predetermined type of message in the form of a radio signal (120; 220) which is readable for a receiving device, and causing the receiving device to receive and interpret the thus transmitted message. The invention is characterized in that the status variable is not related to the predetermined information, in that the sending device, before the checksum is calculated, inserts the value of the status variable in binary coded format into the message in a buffer field, that according to the messaging standard is not intended to transmit information, and in that the receiving device interprets the binary value as the value of the status variable..
True Heading Ab


10/01/15
20150281812 

System for translating instructions in a switch node


A control module for an optical switch node, comprising a tim having a plurality of operating modes in which a first mode is identified by a first byte sequence; a communication interface unit transmitting a second byte sequence for placing the tim in the first mode, the first byte sequence different from the second byte sequence, and a gate array receiving the second byte sequence, storing a list of predetermined unique values, each value indicative of a particular operating mode command, receiving at least a portion of the second byte sequence and receiving instructions to apply an algorithm to at least a portion of the second byte sequence to transform the portion into a checksum value, comparing the checksum value to the list to determine the operating mode command, and transmitting the first byte sequence to the tim to place the tim into the first mode.. .
Infinera Corp.


10/01/15
20150281742 

Circuit arrangement and processing a digital video stream and for detecting a fault in a digital video stream, digital video system and computer readable program product


The present invention relates to a circuit arrangement for processing a digital video stream, the circuit arrangement comprising: an input interface for receiving a digital video stream, a processing circuit which is arranged to process the digital video stream, a hang-up detecting circuit for detecting a fault in the processed digital video stream, the hang-up detecting circuit comprising: a checksum generating circuit which is arranged to generate checksums for the frames of the processed digital video stream, a memory for storing generated checksums and an analyzing device arranged to compare a currently generated checksum to a plurality of corresponding checksums of preceding frames stored in the memory and to generate an error signal if at least one predefined amount of compared checksums are matching. The present invention also relates to a digital video system, a method for processing a digital video stream and a computer readable program product..
Freescale Semiconductor, Inc.


10/01/15
20150280742 

Caching method and data storage system capable of prolonging service lifetime of a cache memory


In a caching method implemented by a data storage system, a data word as user data is encoded into a codeword that is then written into an area of a cache memory. The codeword includes a data portion, a checksum parity portion and an error correction code (ecc) parity portion.
National Taiwan University


10/01/15
20150278010 

Digital device


A digital device includes one or more requestor units, one or more responder units, and a bus. Each responder unit is connected to the requestor units via the bus and includes a plurality of responder elements which are accessible by the requestor units via the bus and which include one or more critical responder elements.
Freescale Semiconductor, Inc.


10/01/15
20150277838 

Colour-discriminating checksum computation in a human-machine interface


A display (101) is controlled by a display drive signal (s2) generated based on an input signal (s1) encoding a safety-critical quantity. A checksum (s4) is computed based on the display drive signal and is used to verify the rendering process by which the display drive signal has been produced.
Bombardier Transportation Gmbh


09/24/15
20150269019 

Communication of information


Methods and devices are provided wherein feedback is included in a checksum.. .
Infineon Technologies Ag


09/24/15
20150269011 

Selecting output destinations for kernel messages


Methods, apparatus and computer program products implement embodiments of the present invention that include identifying, by a processor operating in a distributed computing environment, in a given kernel source code file for the operating system kernel, a given printk function call having a corresponding message text, the given kernel source code file having a kernel source code file name; calculating, using the kernel source code file name and the corresponding message text, a configuration checksum; adding, storing, and loading a record entry in a configuration file; assigning a respective destination to the configuration checksum; receiving, by the processor, a request to generate a system message comprising a text string; identifying a name of a source code file storing a function call that conveyed the request; and determining, based on the identified name and the text string, a computed destination for the system message.. .
International Business Machines Corporation


09/24/15
20150269010 

Selecting output destinations for kernel messages


Methods, apparatus and computer program products implement embodiments of the present invention to, within a distributed computing environment, identify, in a given kernel source code file for the operating system kernel, a given printk function call having a corresponding message text, the given kernel source code file having a kernel source code file name, calculate a configuration checksum, to assign, add, and store the respective destination and a key comprising the configuration checksum, to load, receive, and identify the name of a given source code file, and to determine, based on the identified name and the text string, a computed destination for the system message by calculating, using the identified name and the text string, a message checksum, and identifying, in the configuration table, an entry having a key equal to the message checksum, and wherein the determined destination comprises the respective destination in the identified entry.. .
International Business Machines Corporation


09/17/15
20150261501 

Checksum adder


Embodiments relate to a hardware circuit that is operable as a fixed point adder and a checksum adder. An aspect includes a driving of a multifunction compression tree disposed on a circuit path based on a control bit to execute one of first and second schemes of vector input addition and a driving of a multifunction adder disposed on the circuit path based on the control bit to perform the one of the first and second schemes of vector input addition..
International Business Machines Corporation


08/27/15
20150244843 

Header elimination for real time internet applications


The disclosed techniques provide for eliminating real-time transport protocol, rtp, extension bit x, marker bit m, time stamp and sequence number information and/or user data protocol, udp, checksum information from the header of a packet for transmission.. .
Alcatel-lucent Usa Inc.


08/27/15
20150242336 

Storing data in a memory of an electronic device


Data, such as usage restriction data (3), are stored in a memory (2) of an electronic device (1). When new data (3) is determined, a number of previously stored random data files (4) are transferred to a secure execution environment (7), in which a number of further random data files and a random seed are generated.
St-ericsson Sa


08/13/15
20150228239 

Display device and driving the same


In a display control circuit (60) of an ram through type, rgb data generated based on a command conformed to the dsi standard transmitted from a host (1) is supplied to a checksum circuit (33). The checksum circuit (33) obtains a checksum value of the rgb data and determines whether the rgb data is updated or not based on the obtained checksum value.
Sharp Kabushiki Kaisha


08/06/15
20150220456 

Method for protecting a program code, corresponding system and processor


Program code intended to be copied into the cache memory of a microprocessor is transferred encrypted between the random-access memory and the processor, and the decryption is carried out at the level of the cache memory. A checksum may be inserted into the cache lines in order to allow integrity verification, and this checksum is then replaced with a specific instruction before delivery of an instruction word to the central unit of the microprocessor..
Stmicroelectronics Sa


07/23/15
20150205948 

Method and system for detecting data modification within computing device


A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications.
Trend Micro Incorporated


07/16/15
20150200777 

Data securing method, data securing system and data carrier


A data securing method, a data securing system and a data carrier are provided. The data securing method comprises an encryption procedure for encrypting a data or performing an authentication procedure.
Mxtran Inc.


07/16/15
20150199243 

Data backup distributed file system


A data backup method of a distributed file system is provided. The method is based on a comparison of a source file system and a target file system.
Research Institute Of Tsinghua University In Shenzhen


07/09/15
20150195382 

Transparent bridging of transmission control protocol (tcp) connections


A transparent tcp proxy device intercepts tcp connection requests received from a tcp client and destined for a tcp server as if acting as the tcp server in a handshake with the tcp client. Only after completing the handshake with the tcp client, the transparent tcp proxy participates in a handshake with the tcp server as if acting as the tcp client.

06/25/15
20150178307 

Data deduplication using crc-seed differentiation between data and stubs


Various embodiments for differentiating between data and stubs pointing to a parent copy of deduplicated data. Undeduplicated data is stored with a checksum of an initial value.
International Business Machines Corporation


06/04/15
20150155883 

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
Intel Corporation


06/04/15
20150154222 

Efficiency of file synchronization in a linear tape file system


A mechanism is provided for improved file synchronization of a magnetic tape. A destination device determines whether one or more file checksums exist in an extended file attribute associated with an identified file.
International Business Machines Corporation


05/28/15
20150149779 

Secure transmission of a message


The embodiments relate to methods and apparatuses for producing secure transmission of a message. The methods are based on production of a basic key that is used for producing respective transmitter keys for a plurality of transmitters.

05/21/15
20150143080 

Vector checksum instruction


Elements from a second operand are added together one-by-one to obtain a first result. The adding includes performing one or more end around carry add operations.
International Business Machines Corporation


05/14/15
20150134619 

Digital data retention management


Embodiments relate to digital data retention management. An aspect includes calculating a retention date associated with a data object in a storage system.

04/09/15
20150100861 

Apparatus and calculating transmission control protocol checksum


Disclosed herein is an apparatus and method for calculating a tcp checksum. An apparatus for calculating a tcp checksum includes a data division unit for dividing content to be transmitted into two or more primary data fragments by a unit of a preset byte.
Electronics And Telecommunications Research Institute


04/09/15
20150100856 

Packet header protection for utility networks


A packet header protection system includes, for example, a header checksum (cs) that is arranged to provide error detection capability to fsk (frequency shift keyed) packet headers. Accordingly, receivers in the network can more quickly terminate processing of an errored packet upon detection of error(s) in the header.
Texas Instruments, Incorporated


04/09/15
20150100819 

Method of recovering data in a storage device


A method and system for recovering data written onto a storage device when system failure and/or damage occur during use is provided. A memory of the storage device is divided into a plurality of information zones, for storing data as a codeword set, and a plurality of check zones, for storing checksums, of equal size selected from different parts of the storage device.

03/26/15
20150089282 

Method of, and , layout rectification of erasure encoded storage systems


There is provided a method of recovering configuration metadata from an erasure encoded raid array. The raid array includes raw data including a plurality of codewords encoded using reed-solomon encoding.
Xyratex Technology Limited


03/26/15
20150088370 

Systems and methods for identification of a compromised module


A vehicle computing system having a computer processor in communication with a wireless transceiver, such that the wireless transceiver is capable of communication with a wireless communication device located remotely from the processor. The computer processor may be configured to receive input identifying at least one checksum value from one or more modules in the vehicle.
Ford Global Technologies, Llc


03/26/15
20150085835 

Out-of-synchronization detection and correction during compression


Methods and apparatus are described for synchronizing compression for communication between a user equipment (ue) and a serving node. The methods and apparatus include determining that a compressor memory of a compressor and a decompressor memory of a decompressor are out-of-synchronization based on a checksum failure.
Qualcomm Incorporated


03/19/15
20150078242 

Ts packet grooming


Received data packets are groomed to improve performance of mpeg-2 transport stream packet in a digital video broadcasting system. Multitude of crosschecking techniques are applied to ensure that crucial pieces of information such as the packet identifier (pid) field, the continuity counter (cc) field, table id, section length, ip header checksum, table and frame boundaries, application data table size are corrected if necessary..
Maxlinear, Inc.


03/12/15
20150074429 

System and secure distribution and/or storage of data files with long term file integrity verification


Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third party administrator are disclosed. The subscriber-based system acts as an electronic repository to ensure that data files remain intact, secure, and unaltered from their original form.

03/12/15
20150074415 

Image verification by an electronic device


A method for verifying an image by a first electronic device, the method comprising the first electronic device: sending a request for an image to a second electronic device, wherein the second electronic device is remote from the first electronic device and, optionally, a server; receiving an image and a certificate from the second electronic device, wherein the certificate comprises a protected checksum of at least the image; generating a checksum in dependence on at least the received image; performing a comparison in dependence on said generated checksum and the protected checksum received in the certificate; and verifying the received image in dependence upon the comparison. Advantageously, the first electronic device is able to verify each received image and to prevent the display of any received images that are not authenticated.
Mastercard International Incorporated


03/12/15
20150069849 

Demodulator for wireless power transmitter


A demodulator is mounted on a wireless power transmitter that conforms to the qi standard, and demodulates an amplitude modulated signal superimposed on a coil current icoil that flows through a primary coil of a transmission antenna, or otherwise on a coil voltage across both ends of the primary coil. Multiple demodulating units are each configured to have respectively different configurations, to operate in parallel, to extract a demodulated component from the coil current icoil or otherwise from the coil voltage, and to generate baseband signals as demodulated signals.
Rohm Co., Ltd.


03/05/15
20150067702 

Selecting output destinations for kernel messages


Methods, apparatus and computer program products implement embodiments of the present invention that include receiving a request to generate a system message comprising a text string and identifying a name of a source code file storing a function call that conveyed the request. An example of the function call is the printk function in linux™ based systems.
International Business Machines Corporation


02/26/15
20150058706 

Timing optimization for memory devices employing error detection coded transactions


Systems, methods, and apparatuses are directed to optimizing turnaround timing of successive transactions between a host and a memory device. The host includes framing logic that generates a write frame that includes a plurality of data bits and an error bit checksum that is appended at the end of the data bits.
Intel Corporation


02/26/15
20150053743 

Error detection arrangements for surgical instrument assemblies


A surgical instrument system can comprise an end effector comprising, one, stored data regarding parameters of the end effector and, two, a stored checksum. The system can further comprise a surgical instrument which can comprise means for ascertaining the stored data and the stored checksum, calculating a calculated checksum using the stored data, and comparing the calculated checksum to the stored checksum, wherein the surgical instrument is configured to generate an error response if the calculated checksum does not match the stored checksum.
Ethicon Endo-surgery, Inc.


02/19/15
20150052240 

Method and implementation for network instrumentation and traffic disposition with timestamps


A device for instrumentation and traffic disposition of a network using one or more time-stamps may include a receiving port to receive a data packet. A device configuration module may be configured to determine whether the device is a boundary device located on a boundary of an instrumented sub-network of the network.
Broadcom Corporation


02/12/15
20150046667 

Synchronization for initialization of a remote mirror storage facility


A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature.
International Business Machines Corporation


02/05/15
20150040240 

System and software piracy monetization


A method includes the steps of: providing a software product configured to run on a local computer and to perform a piracy monetization checksum based process; providing a list of valid checksums for a distribution filename of the software product version; connecting by computer the local computer with a software company server; identifying by computer a unique computer identification of the local computer; following a launch, sending the unique computer identification and a checksum of at least one distribution filename on the local computer to the software company server; comparing at the software company server the checksum to the list of valid checksums; and responsive to the step of comparing on detection of a non-authorized checksum, sending a message from the software company server to the local computer, the message configured to perform a piracy monetization action. A method using checksums and serial numbers is also described..
Corel Corporation


02/05/15
20150039598 

Data analysis control


According to an example, data analysis control may include receiving a predetermined number of search results for a query, and organizing the predetermined number of search results by checksum values of content of the search results in an ascending or a descending order. A generally final or a generally initial checksum value may be respectively used from the ascending or the descending order of the organized search results to determine a total content number representing an approximate total content of a search related to the query, where the total content number is greater than the predetermined number of search results.
Longsand Limited


01/22/15
20150026762 

System and enforcing security policies in a virtual environment


A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems.
Mcafee, Inc.


01/22/15
20150026536 

Data decoder with trapping set flip bit mapper


A low density parity check decoder includes a variable node processor operable to generate variable node to check node messages and to calculate perceived values based on check node to variable node messages, a check node processor operable to generate the check node to variable node message vectors and to calculate checksums based on the variable node to check node messages, and a convergence detector and bit map generator operable to convergence of the perceived values and to generate at least one bit map that identifies variable nodes that are connected to check nodes with unsatisfied parity checks.. .
Lsi Corporation


01/01/15
20150007251 

Safe script templating to provide reliable protection against attacks


Methods, systems, and computer-readable storage media for inhibiting cross-site scripting (xss) attacks, where actions include receiving a computer-readable document that provides a content security policy (csp) for a website and an extension to the csp, the csp specifying allowed script checksums, each allowed script checksum being associated with a script that is allowed to be executed, the extension requiring comparison of script checksums before respective scripts can be executed, receiving script templates and a value list, calculating an expected script checksum for each script template to provide respective expected script checksums, comparing the expected script checksums to the allowed script checksums, and determining that at least one expected script checksum matches an allowed script checksum, and in response, executing a respective script that corresponds to the at least one expected script checksum.. .
Sap Ag


11/13/14
20140334501 

Data link layer protocol having adaptive framing


Example techniques of the present disclosure provide a first computing device comprising one or more processors and at least one module operable by the one or more processors to output, to a second computing device, a first set of hdlc protocol data units in accordance with a first format in which each of the first set of hdlc protocol data units includes a start-of-frame indicator, a length indicator, a data portion, and an end-of-frame indicator. The module may be further operable by the one or more processors to determine an inability of the second computing device to process at least one of the first set of hdlc protocol data units and output a second set of hdlc protocol data units in accordance with a second format in which each of the second set includes the data portion, a checksum portion, and the end-of-frame indicator and excludes the length indicator..

11/06/14
20140330924 

Efficient cache validation and content retrieval in a content delivery network


Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.

09/18/14
20140283116 

Method for protected execution of code and protection of executable code and data against modifications


A method for an automated protection of a programmable code and data without using dedicated components for calculation of the checksums and/or hash values is provided. Execution of each machine instruction uses data from several small blocks of protected code or data.

09/18/14
20140281798 

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.

09/18/14
20140281530 

Enhanced ipsec anti-replay/anti-ddos performance


A method for authenticating an internet protocol security (ipsec) packet, wherein the method comprises, receiving the ipsec packet via an input port, performing a sequence-integrity check value (seq-icv) check that validates a sequence number within the ipsec packet, and performing an integrity check value (icv) check that validates a checksum within the ipsec packet, wherein the seq-icv check is performed before the icv check. In yet another example embodiment, an apparatus for transmitting an ipsec packet, comprising a processor, and a transmitter coupled to the processor, wherein the transmitter is configured to transmit an ipsec packet that comprises a header that comprises a sequence number field that provides a sequence number, and a payload that comprises one or more seq-icv segments used to authenticate the sequence number within the ipsec packet..

09/11/14
20140259154 

Displaying an icon based upon user input


Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a checksum function of the user input.

09/11/14
20140259142 

Systems and methods for detecting undesirable network traffic content


A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..

09/11/14
20140259141 

Systems and methods for detecting undesirable network traffic content


A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..

08/28/14
20140245017 

Digital tachograph


A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module.

08/28/14
20140244985 

Intelligent context management


Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.

08/21/14
20140237617 

Origin and custody of copies from a stored electronic record verified page by page


A method of authenticating a copy of a multi-page document, which includes digitizing a said multi-page document to generate one or more digitized files that together comprise a digitized transcript. A mark that is unique to the preparer of the document, such as a signature, is prepared and digitized.

08/21/14
20140237592 

Method and system for detecting data modification within computing device


A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications.

08/07/14
20140223268 

Methods and improved dmx512 communication


Disclosed are methods and apparatus for improved backwards compatible dmx communications. In some embodiments,methods and apparatus related to extensions of the dmx protocol enable error detection by enhanced dmx slave devices while maintaining full compatibility with non-enhanced dmx slave devices.

07/24/14
20140208078 

Vector checksum instruction


A vector checksum instruction. Elements from a second operand are added together one-by-one to obtain a first result.

07/17/14
20140198801 

Mac address synchronization in a fabric switch


One embodiment of the present invention provides a system for facilitating synchronization of mac addresses in a fabric switch. During operation, the system divides a number of media access control (mac) addresses associated with devices coupled to an interface of the switch.

07/03/14
20140189443 

Hop-by-hop error detection in a server system


A server system performs error detection on a hop-by-hop basis at multiple compute nodes, thereby facilitating the detection of a compute node experiencing failure. The server system communicates a packet from an originating node (the originating node) to a destination node by separating the packet into multiple flow control digits (flits) and routing the flits using a series of hops over a set of intermediate nodes.

07/03/14
20140188827 

Detection and correction of corrupted or dangling data object handles


Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.

06/19/14
20140173352 

Computing device and checking burned-in files


In a method to check burned-in files, a file is obtained from a storage device and a checksum value of the file is computed. A burning-in check system is integrated into the file, and then the file is burned-in a complex programmable logic device (cpld) chip.

06/19/14
20140172800 

Updating a file using differences and file format therefor


A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved.

06/12/14
20140164828 

Consistency of data in persistent memory


Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log.

06/12/14
20140164694 

Decoupled reliability groups


Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node.

06/12/14
20140164647 

Management data input/output (mdio) protocol including checksum mode


A process to manage data between one or more mdio manageable devices situated on the same bus utilizing the mdio protocol. The data management efficiency can be increased through the use of an mdio protocol that includes a checksum mode.

06/05/14
20140153024 

Data printing system and data protection method thereof


A data printing system and data protection method thereof are provided. The system includes a data output device and a data printing device.

05/29/14
20140146601 

Processors and systems with multiple reference columns in multibit phase-change memory


Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.

05/15/14
20140133408 

Methods and avoiding collisions due to hidden wireless nodes


Certain aspects of the present disclosure provide techniques and apparatus for starting an extended idle interval in an effort to avoid collisions with transmissions from hidden wireless nodes. One example apparatus generally includes a receiver and a processing system.

05/08/14
20140126418 

Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (iaas) on hybrid cloud networks


A layer-3 virtual router connects two or more virtual networks. Virtual networks are overlaid upon physical networks.



Checksum topics: Cyclic Redundancy Check, Redundancy, Communications, Replication, Subscriber, Data Packet, Dependency, Transaction Log, Hash Function, Central Processing Unit, Hash Table, Central Processing Units, Differentiation, Duplication, Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.


7.7356

4443

71 - 0 - 101