FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Checksum topics
Cyclic Redundancy Check
Redundancy
Communications
Replication
Subscriber
Data Packet
Dependency
Transaction Log
Hash Function
Central Processing Unit
Hash Table
Central Processing Units
Differentiation
Duplication
Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Checksum patents



      
           
This page is updated frequently with new Checksum-related patent applications. Subscribe to the Checksum RSS feed to automatically get the update: related Checksum RSS feeds. RSS updates for this page: Checksum RSS RSS


Error detection arrangements for surgical instrument assemblies

Ethicon Endo-surgery

Error detection arrangements for surgical instrument assemblies

Date/App# patent app List of recent Checksum-related patents
02/26/15
20150058706
 Timing optimization for memory devices employing error detection coded transactions patent thumbnailnew patent Timing optimization for memory devices employing error detection coded transactions
Systems, methods, and apparatuses are directed to optimizing turnaround timing of successive transactions between a host and a memory device. The host includes framing logic that generates a write frame that includes a plurality of data bits and an error bit checksum that is appended at the end of the data bits.
Intel Corporation
02/26/15
20150053743
 Error detection arrangements for surgical instrument assemblies patent thumbnailnew patent Error detection arrangements for surgical instrument assemblies
A surgical instrument system can comprise an end effector comprising, one, stored data regarding parameters of the end effector and, two, a stored checksum. The system can further comprise a surgical instrument which can comprise means for ascertaining the stored data and the stored checksum, calculating a calculated checksum using the stored data, and comparing the calculated checksum to the stored checksum, wherein the surgical instrument is configured to generate an error response if the calculated checksum does not match the stored checksum.
Ethicon Endo-surgery, Inc.
02/19/15
20150052240
 Method and implementation for network instrumentation and traffic disposition with timestamps patent thumbnailMethod and implementation for network instrumentation and traffic disposition with timestamps
A device for instrumentation and traffic disposition of a network using one or more time-stamps may include a receiving port to receive a data packet. A device configuration module may be configured to determine whether the device is a boundary device located on a boundary of an instrumented sub-network of the network.
Broadcom Corporation
02/12/15
20150046667
 Synchronization for initialization of a remote mirror storage facility patent thumbnailSynchronization for initialization of a remote mirror storage facility
A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature.
International Business Machines Corporation
02/05/15
20150040240
 System and  software piracy monetization patent thumbnailSystem and software piracy monetization
A method includes the steps of: providing a software product configured to run on a local computer and to perform a piracy monetization checksum based process; providing a list of valid checksums for a distribution filename of the software product version; connecting by computer the local computer with a software company server; identifying by computer a unique computer identification of the local computer; following a launch, sending the unique computer identification and a checksum of at least one distribution filename on the local computer to the software company server; comparing at the software company server the checksum to the list of valid checksums; and responsive to the step of comparing on detection of a non-authorized checksum, sending a message from the software company server to the local computer, the message configured to perform a piracy monetization action. A method using checksums and serial numbers is also described..
Corel Corporation
02/05/15
20150039598
 Data analysis control patent thumbnailData analysis control
According to an example, data analysis control may include receiving a predetermined number of search results for a query, and organizing the predetermined number of search results by checksum values of content of the search results in an ascending or a descending order. A generally final or a generally initial checksum value may be respectively used from the ascending or the descending order of the organized search results to determine a total content number representing an approximate total content of a search related to the query, where the total content number is greater than the predetermined number of search results.
Longsand Limited
01/22/15
20150026762
 System and  enforcing security policies in a virtual environment patent thumbnailSystem and enforcing security policies in a virtual environment
A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems.
Mcafee, Inc.
01/22/15
20150026536
 Data decoder with trapping set flip bit mapper patent thumbnailData decoder with trapping set flip bit mapper
A low density parity check decoder includes a variable node processor operable to generate variable node to check node messages and to calculate perceived values based on check node to variable node messages, a check node processor operable to generate the check node to variable node message vectors and to calculate checksums based on the variable node to check node messages, and a convergence detector and bit map generator operable to convergence of the perceived values and to generate at least one bit map that identifies variable nodes that are connected to check nodes with unsatisfied parity checks.. .
Lsi Corporation
01/01/15
20150007251
 Safe script templating to provide reliable protection against attacks patent thumbnailSafe script templating to provide reliable protection against attacks
Methods, systems, and computer-readable storage media for inhibiting cross-site scripting (xss) attacks, where actions include receiving a computer-readable document that provides a content security policy (csp) for a website and an extension to the csp, the csp specifying allowed script checksums, each allowed script checksum being associated with a script that is allowed to be executed, the extension requiring comparison of script checksums before respective scripts can be executed, receiving script templates and a value list, calculating an expected script checksum for each script template to provide respective expected script checksums, comparing the expected script checksums to the allowed script checksums, and determining that at least one expected script checksum matches an allowed script checksum, and in response, executing a respective script that corresponds to the at least one expected script checksum.. .
Sap Ag
11/13/14
20140334501
 Data link layer protocol having adaptive framing patent thumbnailData link layer protocol having adaptive framing
Example techniques of the present disclosure provide a first computing device comprising one or more processors and at least one module operable by the one or more processors to output, to a second computing device, a first set of hdlc protocol data units in accordance with a first format in which each of the first set of hdlc protocol data units includes a start-of-frame indicator, a length indicator, a data portion, and an end-of-frame indicator. The module may be further operable by the one or more processors to determine an inability of the second computing device to process at least one of the first set of hdlc protocol data units and output a second set of hdlc protocol data units in accordance with a second format in which each of the second set includes the data portion, a checksum portion, and the end-of-frame indicator and excludes the length indicator..
11/06/14
20140330924

Efficient cache validation and content retrieval in a content delivery network


Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.
09/18/14
20140283116

Method for protected execution of code and protection of executable code and data against modifications


A method for an automated protection of a programmable code and data without using dedicated components for calculation of the checksums and/or hash values is provided. Execution of each machine instruction uses data from several small blocks of protected code or data.
09/18/14
20140281798

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
09/18/14
20140281530

Enhanced ipsec anti-replay/anti-ddos performance


A method for authenticating an internet protocol security (ipsec) packet, wherein the method comprises, receiving the ipsec packet via an input port, performing a sequence-integrity check value (seq-icv) check that validates a sequence number within the ipsec packet, and performing an integrity check value (icv) check that validates a checksum within the ipsec packet, wherein the seq-icv check is performed before the icv check. In yet another example embodiment, an apparatus for transmitting an ipsec packet, comprising a processor, and a transmitter coupled to the processor, wherein the transmitter is configured to transmit an ipsec packet that comprises a header that comprises a sequence number field that provides a sequence number, and a payload that comprises one or more seq-icv segments used to authenticate the sequence number within the ipsec packet..
09/11/14
20140259154

Displaying an icon based upon user input


Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a checksum function of the user input.
09/11/14
20140259142

Systems and methods for detecting undesirable network traffic content


A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
09/11/14
20140259141

Systems and methods for detecting undesirable network traffic content


A method of detecting a content desired to be detected includes receiving electronic data at a first host, determining a checksum value using the received electronic data, sending the checksum value to a processing station, the processing station being a second host that is different from the first host, and receiving a result from the processing station, the result indicating whether the electronic data is associated with a content desired to be detected. A method of detecting a content desired to be detected includes receiving electronic data at a receiving station, and determining whether the received electronic data is associated with a content desired to be detected, wherein the receiving station does not include content detection data for identifying the content desired to be detected..
08/28/14
20140245017

Digital tachograph


A digital tachograph has a security module. A public key, a secure private key, and a signage are stored in the security module.
08/28/14
20140244985

Intelligent context management


Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.
08/21/14
20140237617

Origin and custody of copies from a stored electronic record verified page by page


A method of authenticating a copy of a multi-page document, which includes digitizing a said multi-page document to generate one or more digitized files that together comprise a digitized transcript. A mark that is unique to the preparer of the document, such as a signature, is prepared and digitized.
08/21/14
20140237592

Method and system for detecting data modification within computing device


A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications.
08/07/14
20140223268

Methods and improved dmx512 communication


Disclosed are methods and apparatus for improved backwards compatible dmx communications. In some embodiments,methods and apparatus related to extensions of the dmx protocol enable error detection by enhanced dmx slave devices while maintaining full compatibility with non-enhanced dmx slave devices.
07/24/14
20140208078

Vector checksum instruction


A vector checksum instruction. Elements from a second operand are added together one-by-one to obtain a first result.
07/17/14
20140198801

Mac address synchronization in a fabric switch


One embodiment of the present invention provides a system for facilitating synchronization of mac addresses in a fabric switch. During operation, the system divides a number of media access control (mac) addresses associated with devices coupled to an interface of the switch.
07/03/14
20140189443

Hop-by-hop error detection in a server system


A server system performs error detection on a hop-by-hop basis at multiple compute nodes, thereby facilitating the detection of a compute node experiencing failure. The server system communicates a packet from an originating node (the originating node) to a destination node by separating the packet into multiple flow control digits (flits) and routing the flits using a series of hops over a set of intermediate nodes.
07/03/14
20140188827

Detection and correction of corrupted or dangling data object handles


Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
06/19/14
20140173352

Computing device and checking burned-in files


In a method to check burned-in files, a file is obtained from a storage device and a checksum value of the file is computed. A burning-in check system is integrated into the file, and then the file is burned-in a complex programmable logic device (cpld) chip.
06/19/14
20140172800

Updating a file using differences and file format therefor


A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved.
06/12/14
20140164828

Consistency of data in persistent memory


Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log.
06/12/14
20140164694

Decoupled reliability groups


Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node.
06/12/14
20140164647

Management data input/output (mdio) protocol including checksum mode


A process to manage data between one or more mdio manageable devices situated on the same bus utilizing the mdio protocol. The data management efficiency can be increased through the use of an mdio protocol that includes a checksum mode.
06/05/14
20140153024

Data printing system and data protection method thereof


A data printing system and data protection method thereof are provided. The system includes a data output device and a data printing device.
05/29/14
20140146601

Processors and systems with multiple reference columns in multibit phase-change memory


Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
05/15/14
20140133408

Methods and avoiding collisions due to hidden wireless nodes


Certain aspects of the present disclosure provide techniques and apparatus for starting an extended idle interval in an effort to avoid collisions with transmissions from hidden wireless nodes. One example apparatus generally includes a receiver and a processing system.
05/08/14
20140126418

Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (iaas) on hybrid cloud networks


A layer-3 virtual router connects two or more virtual networks. Virtual networks are overlaid upon physical networks.
05/01/14
20140122981

Data receiving apparatus, data receiving method, and computer-readable recording medium


A data receiving apparatus includes: a header analyzing unit that analyzes a header of a frame and outputs header information; a checksum judging unit that calculates and judges a checksum of the frame; a buffer unit that stores a data portion of the frame; a reading unit that reads connection information corresponding to the header information from a second storage unit; an identifying unit that identifies a write location for the data portion based on the connection information; a data writing unit that reads data from the buffer unit and starts writing the data to the identified write location in a first storage unit before the checksum is judged; and a writing unit that, if the judgment result is “pass,” writes the connection information updated based on the header information to the second storage unit while the data writing unit is writing.. .
05/01/14
20140122892

Insuring integrity of remote procedure calls used in a client and server storage system


A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure specific parameters of an rpc and then encrypting the resulting hash value.
05/01/14
20140122844

Intelligent context management


Intelligent context management for thread switching is achieved by determining that a register bank has not been used by a thread for a predetermined number of dispatches, and responsively disabling the register bank for use by that thread. A counter is incremented each time the thread is dispatched but the register bank goes unused.
04/24/14
20140115258

System and managing a deduplication table


Implementations described and claimed herein provide systems and methods for allocating and managing resources for a deduplication table. In one implementation, an upper limit to an amount of memory allocated to a deduplication table is established.
04/03/14
20140095804

Efficient cache validation and content retrieval in a content delivery network


Some embodiments provide systems and methods for validating cached content based on changes in the content instead of an expiration interval. One method involves caching content and a first checksum in response to a first request for that content.
03/20/14
20140081935

Detection and correction of corrupted or dangling data object handles


Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles.
03/13/14
20140074777

Systems and methods for selective data replication


Systems and methods for performing data replication are disclosed. Determining whether to update replicated data typically involves comparison of readily obtainable attributes of a given source file and its corresponding replicated file.
03/06/14
20140068005

Identification, caching, and distribution of revised files in a content delivery network


A client computer sends a request for a web page to a web site host computer. The host returns an initial web page document that contains a listing of files needed to generate the web page and a revision identifier (revid) for certain files.
03/06/14
20140063931

Multibit phase-change memory with multiple reference columns


Systems and devices in which multi-bit phase change memory is used, including memory systems and memories, as well as methods for operating such systems and devices. According to the present invention, a reference corresponding to a pair of adjacent logical states (e.g., 0 and 1) can be generated by averaging outputs from multiple phase change memory reference cells designated to store said adjacent logical states.
03/06/14
20140063928

Processors and systems with cell-generated-reference in phase-change memory


Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
03/06/14
20140063927

Cell-generated reference in phase change memory


Phase-change memory arrays, subarrays and chips, and systems and devices in which phase change memory is used, in which two reference columns are added on to hold complementary states for each wordline of data. The outputs from the cells in the two reference columns are combined (e.g.
02/27/14
20140056151

Methods and systems for offload processing of encapsulated packets


Methods and systems described herein facilitate offload processing of encapsulated packets. A virtualization manager enables a virtual switch to be associated with a virtual overlay network.
02/13/14
20140047307

Checksum calculation, prediction and validation


A calculation, prediction and validation method can include receiving a portion of a data packet in a data buffer, computing, in a processor, information related to the checksum of the data packet based on the portion of the data packet and processing the data packet in the processor.. .
02/06/14
20140040403

System, method and computer program product for gathering information relating to electronic content utilizing a dns server


A system, method and computer program product are provided. In use, a checksum associated with electronic content is calculated.
02/06/14
20140040337

Device and maintenance filtering on a flow of coded inputs/outputs


A method and a device for maintenance filtering to process a flow of m coded incoming messages esj each with nj inputs/outputs esi,j, a checksum Σsesi,j of signatures sesi,j, and a date dj. Outgoing message esmj is generated from each incoming message with nj inputs/outputs esmi,j, a checksum Σsesmj of signatures sesmi,j, and the date dj.
02/06/14
20140040143

Method and device for controlling distribution and use of digital works


A method and device for controlling distribution and use of a digital work stored together with an attached usage right information on a record carrier. The attached usage right information, which may be unencrypted, is verified by using a hidden information which is changed at every change of the usage right information.
01/30/14
20140032915

Method and validating the integrity of installer files prior to installation


A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file.. .
01/16/14
20140016550

Methods and offloading checksum processing


Aspects of the present disclosure provide methods and apparatus for offloading checksum processing in a user equipment (ue) (e.g., from an application processor to a modem processor). Such offloading may speed up packet processing, increase data rate, and/or free up resources of the application processor for other tasks..
12/26/13
20130343389

High-speed cld-based pipeline architecture


A method of processing network traffic within a computing system, comprises at a first configurable logic device (cld), receiving an ingress network packet from an external network interface, associating the ingress network packet with a timestamp indicating the time of receipt, parsing the ingress network packet to locate a link-layer checksum value and a routing-layer checksum value, determining whether the link-layer and routing-layer checksum values are correct based on the ingress network packet contents, and transmitting the ingress network packet to a second cld via a high-speed interconnection; and at the second cld receiving the ingress network packet, parsing the ingress network packet to locate a source address and a destination address, determining a destination and a route for the ingress network packet based at least in part on the source and destination addresses, and transmitting the ingress network packet to the determined destination via the determined route.. .
12/12/13
20130329028

Image pickup system


An image pickup system is an image pickup system in which an image pickup device arranged at a distal end of an insertion section of an endoscope and a processor can communicate with each other. A group of multiple control parameters to be collectively transmitted and checksum codes related to the parameters are transmitted from the processor to the image pickup device, and the image pickup device reflects the control parameters on a register only when all the received multiple control parameters are normal, on the basis of the checksums..
12/05/13
20130326542

Runtime modification of property names in advanced configuration and power interface (acpi) tables


A system and method are disclosed for efficient runtime modification of device property names in advanced configuration and power interface (acpi) tables. In accordance with one embodiment, a computer system determines whether a device supports a device property, and when the device does not support the device property, a device property name corresponding to the device name is modified in a particular entry of an acpi table, such that a checksum for that entry remains unchanged.
12/05/13
20130326318

Enhanced checksum system


Generating data checksum for a data object including multiple data units comprises, for each data unit, obtaining a corresponding address of the data unit, and rotating the data unit based on said corresponding address of the data unit to generate a rotated data unit. A checksum value for the data object is determined based on said rotated data units..
11/28/13
20130318357

System and secure software update


A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on portable media that includes an executable update program, a checksum for the program that is encrypted with a symmetrical key, an encrypted symmetrical key that is encrypted with a public encryption key and a digital signature prepared with a private signature key.
11/28/13
20130318056

Lightweight integrity protection for web storage-driven content caching


Methods, systems, and computer-readable storage media for providing integrity protection for web storage-driven content caching. Implementations include receiving a web page from a server, the web page being associated with a script library and one or more items that can be stored in web storage of a web browser executed on a client computing device, each of the one or more items being associated with a pre-determined checksum value, and loading the script library, such that a local storage api is overwritten using a wrapper function, the script library being executable to, in response to a request for an item from web storage, perform operations including: determining a generated checksum value based on the item, and verifying an integrity of the item based on the generated checksum value and a pre-determined checksum value associated with the item..
11/14/13
20130305118

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305117

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305116

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305115

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305016

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305015

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130305011

Performing a cyclic redundancy checksum operation responsive to a user-level instruction


In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
11/14/13
20130301827

Authentication of encrypted data blocks


An authentication-encryption unit provides at least one encryption element, where each encryption element encrypts a plain-data block and accordingly generates a cipher-data block. A common checksum is calculated over each cipher-data block.
10/31/13
20130288643

Method and restricting radio access to a system


A first subscriber unit (su) operating in a two-way radio frequency (rf) communications system having at least one fixed terminal, one or more channels, and a plurality of subscriber units, generates a first burst of data for transmission to the at least one fixed terminal. The first su calculates a cyclic redundancy check (crc) or checksum value over (i) at least a first portion of the first burst of data and (ii) at least a portion of a first private data.
10/17/13
20130272429

Color component checksum computation in video coding


checksum computation for video coding is provided that breaks the dependency between the color components of a picture in the prior art. More specifically, rather than computing a single checksum for a picture as in the prior art, a separate checksum is computed for each color component.
10/10/13
20130266152

Synchronizing wireless earphones


Various embodiments are directed to systems and methods involving first and second acoustic speaker devices for synchronizing playback of a common audio playback signal by the first and second acoustic speaker devices. The first acoustic speaker device may transmit wirelessly a first message comprising a first checksum set comprising a plurality of checksums indicating units of the common audio playback signal in a playback queue of the first acoustic speaker device.
10/03/13
20130262964

Device and the reading and storing of data


A method for reading data from an electronic data memory. The data lie as data words in the memory, wherein each data word is available at a unique address.
10/03/13
20130262422

Data deduplication using crc-seed differentiation between data and stubs


Various embodiments for differentiating between data and stubs pointing to a parent copy of deduplicated data are provided. Undeduplicated data is stored with a checksum of an initial value as a first cyclic redundancy check (crc) seed.
10/03/13
20130262421

Checksum and hashing operations resilient to malicious input data


A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (cpus). The hash function uses random secret data so that hash keys for particular data are difficult to predict.


Popular terms: [SEARCH]

Checksum topics: Cyclic Redundancy Check, Redundancy, Communications, Replication, Subscriber, Data Packet, Dependency, Transaction Log, Hash Function, Central Processing Unit, Hash Table, Central Processing Units, Differentiation, Duplication, Data Deduplication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         









1.0547

3209

1 - 1 - 73