Follow us on Twitter
twitter icon@FreshPatents


Checksum patents

      

This page is updated frequently with new Checksum-related patent applications.




 Techniques for encoding, decoding and representing high dynamic range images patent thumbnailTechniques for encoding, decoding and representing high dynamic range images
Techniques for high dynamic range image processing are presented. Base layer data, first checksum parameter, and residual ratio data for a high dynamic range (hdr) image are each received.
Dolby Laboratories Licensing Corporation


 Consumer friendly token number allocation patent thumbnailConsumer friendly token number allocation
A consumer-friendly token number allocation method and system. In an embodiment, a token service provider (tsp) computer receives a tokenization request from a token requestor that includes a primary account number (pan) of a cardholder.
Mastercard International Incorporated


 Mac address synchronization in a fabric switch patent thumbnailMac address synchronization in a fabric switch
One embodiment of the present invention provides a system for facilitating synchronization of mac addresses in a fabric switch. During operation, the system divides a number of media access control (mac) addresses associated with devices coupled to an interface of the switch.
Brocade Communications Systems, Inc.


 Maintaing encryption keys to provide encryption on top of data deduplication patent thumbnailMaintaing encryption keys to provide encryption on top of data deduplication
Exemplary methods, apparatuses, and systems generate an encryption key based upon data content of a portion of data to be encrypted by the encryption key. The encryption key is stored as one of a plurality of encryption keys within a subset of storage.
Vmware, Inc.


 Using checksums to reduce the write latency of logging patent thumbnailUsing checksums to reduce the write latency of logging
Techniques for reducing write latency when logging write operations are provided. In one embodiment, a computer system can receive a write operation originating from a storage client, where the write operation is directed to a data object stored on a nonvolatile storage of the computer system.
Vmware, Inc.


 Providing end-to-end checksum within a distributed virtual storage area network module patent thumbnailProviding end-to-end checksum within a distributed virtual storage area network module
Exemplary methods, apparatuses, and systems include a first layer of a virtual storage area network (vsan) module receiving a write request from a data compute node. The write request includes data to be written and the vsan module is distributed across a plurality of computers to provide an aggregate object store using storage attached to each of the plurality of computers.
Vmware, Inc.


 Method and device for feature extraction patent thumbnailMethod and device for feature extraction
Provided are a method and device for feature extraction. The method comprises: acquiring a batch of black sample files and white sample files from an application layer of a smart terminal operating system; parsing each file, acquiring information structure of all functions contained in each file, and computing a checksum for each function; determining whether or not the files contain the functions corresponding to the checksums, thus compiling statistics on the number of occurrences of each function in the black sample files and the white sample files; and, extracting a black sample feature on the basis of functions occurring only in the black sample files and not occurring in the white sample files, or extracting a white sample feature on a similar basis..
Beijing Qihoo Technology Company Limited


 Verifying accurate storage in a data storage system patent thumbnailVerifying accurate storage in a data storage system
A post-encryption checksum is generated for a file to be stored on a remote storage location. It can be generated before sending the encrypted file to the remote storage system.
Microsoft Technology Licensing, Llc


 System and methods for secure firmware validation patent thumbnailSystem and methods for secure firmware validation
An electronic device, such as a dynamic transaction card having an emv chip, that acts as a tpm having a memory, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in emv chip memory.
Capital One Services, Llc.


 Method and system for synchronization of two databases in a lawful interception network by comparing checksum values patent thumbnailMethod and system for synchronization of two databases in a lawful interception network by comparing checksum values
The present invention relates to methods and validity securing arrangement and embodiments thereof for effectively securing validity of a target database in a node in a lawful interception network. Said target database is intended to be identical to a source target database.
Telefonaktiebolaget L M Ericsson (publ)


Imaging systems with real-time digital testing capabilities

An imaging system with real-time digital testing capabilities verifies the functionality of image processing circuitry used to process pixel data signals read out from a pixel array during imaging operations. Image processing circuitry may process a data frame read from an imaging array that includes multiple regions of imaging and non-imaging data.
Semiconductor Components Industries, Llc

Method and system for updating firmware

A method, a non-transitory computer readable medium, and a system are disclosed for updating firmware in a memory of a device. The method including creating a new firmware image for the device; calculating a checksum of the new firmware image; performing a binary comparison of the new firmware image with an existing firmware image on the device; preparing a new differential data image for the binary comparison of the new firmware image to the existing firmware image; and calculating a checksum of the new differential data image for the binary comparison of the new firmware image to the existing firmware image..
Konica Minolta Laboratory U.s.a., Inc.

Efficiency of file synchronization in a linear tape file system

A mechanism is provided for improved file synchronization of a magnetic tape. A destination device determines whether one or more file checksums exist in an extended file attribute associated with an identified file.
International Business Machines Corporation

Decoupled reliability groups

Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node.
Netapp, Inc.

Concurrent error detection in a ternary content-addressable memory (tcam) device

A plurality of data words are written into a tcam; each has binary digits and don't-care digits. Contemporaneously, for each of the words: a first checksum is calculated on the binary digits; and the following are stored in a corresponding portion of a ram: an identifier of the binary digits and the first checksum.
International Business Machines Corporation

Concurrent error detection in a ternary content-addressable memory (tcam) device

A plurality of data words are written into a tcam; each has binary digits and don't-care digits. Contemporaneously, for each of the words: a first checksum is calculated on the binary digits; and the following are stored in a corresponding portion of a ram: an identifier of the binary digits and the first checksum.
International Business Machines Corporation

Smart hashing to reduce server memory usage in a distributed system

Architecture that computes smart-hashes (checksums) in a central server, and in a language agnostic way. The process comprises: decompiling the binaries using language/platform specific tool(s); applying configurable filtering of the decompiled output and only keeping contents that are semantically relevant; generating a hash (checksum) on those filtered semantically relevant content; and, downloading to each of the machines in the data-center a checksum list from a repository.
Microsoft Technology Licensing, Llc

Collecting and aggregating log data with fault tolerance

Systems and methods of collecting and aggregating log data with fault tolerance are disclosed. One embodiment includes, one or more devices that generate log data, the one or more machines each associated with an agent node to collect the log data, wherein, the agent node generates a batch comprising multiple messages from the log data and assigns a tag to the hatch.
Cloudera, Inc.

Data recovery agent and search service for repairing bit rot

A data recovery agent and search service for repairing bit rot are presented herein. The data recovery agent can receive error event notifications representing respective file system errors.
Osnexus Corporation

Coding apparatus and position-finding apparatus and method

A computer-implemented method for determining the position of a lift cabin in a lift shaft with the aid of a coding device, in which method is at least one of a section of the code band and the bearing device is recorded with an optical detection device as a pixel image in which the pixel image is larger than the position marker, the pixel image is processed and a binary code is decoded by means of an algorithm and converted into a position indication, a checksum of the position marker, which is formed by at least one of the binary code and grayscale values of the position marker, is compared to a predetermined value, and one of a barcode and a 2d code calculated from the position indication using an inverse of the algorithm and is compared with at least one recorded row outside of the position marker.. .
Cedes Ag

Updating a file using differences and file format therefor

A method for updating and formatting a local file is described. An update file, having a newer version of the local file, is accessed from a server over a network and a list of new hash values corresponding to data blocks of the update file is retrieved.
Vmware, Inc.

Intelligent mobile application update

In an approach for managing updates of a mobile software application, a computer receives information regarding a mobile computing device and a mobile software application on the mobile computing device, wherein the information regarding the mobile computing device comprises at least one or more of a location of the mobile computing device, a network connection type, a security bit associated with the mobile computing device, and a checksum associated with the at least one mobile software application. The computer determines whether the mobile software application matches a stored mobile software application on a computing device.
International Business Machines Corporation

Intelligent mobile application update

In an approach for managing updates of a mobile software application, a computer receives information regarding a mobile computing device and a mobile software application on the mobile computing device, wherein the information regarding the mobile computing device comprises at least one or more of a location of the mobile computing device, a network connection type, a security bit associated with the mobile computing device, and a checksum associated with the at least one mobile software application. The computer determines whether the mobile software application matches a stored mobile software application on a computing device.
International Business Machines Corporation

Automatically capturing and cropping image of check from video sequence for banking or other computing application

A mobile device with camera automatically captures an image of a check from a video sequence. A computing application assesses quality metrics of a frame of the video and, if acceptable, initiates capture of the check in that frame without user selection.
Lexmark International, Inc.

Automatically capturing and cropping image of check from video sequence for banking or other computing application

A mobile device with camera automatically captures an image of a check from a video sequence. A computing application assesses quality metrics of a frame of the video and, if acceptable, initiates capture of the check in that frame without user selection.
Lexmark International, Inc.

System and method to mitigate malware

Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the script data, compare each checksum of the checksum tree to one or more subtree checksums, and assign one or more classifications to the script data. In one example, the checksum tree is an abstract syntax tree..
Mcafee, Inc.

Embedded system and method thereof

An embedded system may include an embedded device and a host device. The embedded device may provide a packet for a service, and generate a first transmission control protocol (tcp) segment including a piece of the packet and a first header with no checksum value.
Sk Hynix Memory Solutions Inc.

Performing a cyclic redundancy checksum operation responsive to a user-level instruction

In one embodiment, the present invention includes a method for receiving incoming data in a processor and performing a checksum operation on the incoming data in the processor pursuant to a user-level instruction for the checksum operation. For example, a cyclic redundancy checksum may be computed in the processor itself responsive to the user-level instruction.
Intel Corporation

Synchronization for initialization of a remote mirror storage facility

A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local checksum signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote checksum signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature.
International Business Machines Corporation

System on chip power management

An implementation of a system disclosed herein provides an apparatus, comprising a system on chip, wherein the system on chip is configured to receive a sleep command from a host and in response to the sleep command, calculate a primary checksum of a block of data from a low latency memory such as a tightly coupled memory (tcm), copy the primary checksum and the block of data into a volatile storage media, preserve interface variables of the system on chip in the volatile storage media, operate the volatile storage media in a self-refresh mode, and shut down power to other components on the system on chip.. .
Seagate Technology Llc

Sensor interface that provides a long package crc to improve functional safety

A data transmission system comprising an automotive sensor network system (asns) connected to a plurality of source locations via a common bus, wherein the asns is configured to ascertain the source from which the data-frames and first package checksum are received and based on the ascertainment of the source, appropriate decoding methods are used to calculate the asns location data-frame checksums and the asns location package checksums. A higher order redundancy check is done over a series of data-frames to detect errors in the reception caused by temporary high interference that may exist in the transmission path..
Infineon Technologies Ag

Method and identifying and characterizing errant electronic files

A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory.
Intellectual Ventures I Llc

Secret parallel processing device, secret parallel processing method, and program

A secret parallel processing device reducing communication amount includes: a randomization unit that obtains a non-randomized input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly applied on the non-randomized sequence.. .
Nippon Telegraph And Telephone Corporation

Secure computing for virtual environment and interactive experiences

Systems and methods for secure computing and virtual environments are provided herein. An example method includes authenticating a client using social media credentials received from the client, evaluating authenticity of the client based on social network information obtained from a social network using the social media credentials, and securely communicate with the client over web service or web sockets using the social media credentials and a token checksum to facilitate an online endurance game..

Checksum adder

Embodiments relate to a hardware circuit that is operable as a fixed point adder and a checksum adder. An aspect includes a driving of a multifunction compression tree disposed on a circuit path based on a control bit to execute one of first and second schemes of vector input addition and a driving of a multifunction adder disposed on the circuit path based on the control bit to perform the one of the first and second schemes of vector input addition..

Code integrity protection by computing target addresses from checksums

A method of obscuring software code including a plurality of basic blocks, including: calculating, by a processor, a checksum value of the current basic block and a pointer to the end of the current basic block; determining a preceding basic block for the current basic block; inserting the checksum value for the current basic block into the preceding basic block; and inserting instructions into the preceding basic block to determine a pointer to the beginning of the current basic block based upon the checksum value of the current basic block.. .
Nxp B.v.

System and data deduplication utilizing extent id database

An extent map (emap) database may include one or more extent map entries configured to map extent ids to pvbns. Each extent id may be apportioned into a most significant bit (msb) portion, i.e., checksum bits, and a least significant bit (lsb) portion, i.e., duplicate bits.
Netapp, Inc.

Content-based replication of data between storage units

Methods, systems, and computer programs are presented for replicating data across storage systems. One method includes an operation for transferring a snapshot of a volume from an upstream array to a downstream array.
Nimble Storage, Inc.

Data transfer system

A method for transferring data, more particularly, over a low energy connection such as a bluetooth low energy connection, includes dividing a source data into a plurality of data chunks, associating each data chunk with a verification data such as a checksum, transferring the data chunks and verifying that each data chunk was received without error, using the checksum. The method may also include providing a verification data for the source data, transferring it before and after all the data chunks, and verifying that all the data chunks and thus the entire source data was received..

Content-based replication of data in scale out system

Methods, systems, and programs are presented for replicating data across scale-out storage systems. One method includes replicating, from an upstream to a downstream system, a volume snapshot having one or more bins.
Nimble Storage, Inc.

Data integrity enhancement to protect against returning old versions of data

Systems, methods and/or devices are used to enhance data integrity to protect against returning old versions of data. In one aspect, a method includes (1) receiving a write request from a host that specifies write data for a set of logical block addresses, (2) mapping, using a mapping table, the set of logical block addresses to a set of physical addresses, where the mapping table includes a plurality of subsets, and (3) performing operations for each subset of the mapping table that includes at least one entry corresponding to a logical block specified by the set of logical block addresses, including: (a) generating metadata for the subset, the metadata including a version number for the subset, (b) calculating a cyclic redundancy check (crc) checksum for the subset, and (c) storing the version number for the subset and the crc checksum for the subset in a version data structure..
Sandisk Enterprise Ip Llc

Storage device calibration methods and controlling device using the same

A calibration method includes transmitting first data comprising a calibration data and a first checksum to the storage device according to each of a plurality of training parameter sets; recording a plurality of error indicators respectively which are corresponding to the plurality of training parameter sets and from the storage device; and identifying one of the plurality of training parameter sets as a predetermined parameter set according to the plurality of error indicators respectively corresponding to the plurality of training parameter sets; wherein each error indicator indicates whether transmitting the first data according to the corresponded training parameter set is successful.. .
Mediatek Inc.

Confirming physical possession of plastic nfc cards with a mobile digital wallet application

In an example embodiment, an issuer system receives payment card information from a payment processing system, wherein the payment card information is received from a payment card via a user computing device using near field communication. The issuer system generates an unpredictable number for the payment card and communicates the unpredictable number to the payment card via the payment processing system and the user computing device.
Google Inc.

Fast update of data packet checksums

A device includes a processor and a checksum module, wherein the checksum module calculates, for first data, an updated checksum that complies with internet engineering task force request for comments number 1624 using twos-complement arithmetic. The processor replaces the original checksum with the updated checksum to update a data packet..
Dell Products, Lp

Error detection and correction utilizing locally stored parity information

A processing system includes a memory coupled to a processor device. The memory stores data blocks, with each data block having a separate associated checksum value stored along with the data block in the memory.
Advanced Miro Devices, Inc.

Using an rpc framework to facilitate out-of-band data transfers

A system that stores sets of data blocks in extents located in storage devices is described. During operation, a receiving device receives, through an rpc framework, a first call asking to transfer an extent from a sending device to the receiving device.

Taxonomic malware detection and mitigation

In an example, a classification engine compares two binary objects to determine whether they can be classified as belonging to a common family. As an example application, the classification engine may be used to detect malware objects derived from a common ancestor.
Mcafee, Inc

Methods and apparatus to enable runtime checksum verification of block device images

A method for verifying data integrity of a block device is provided. The method includes providing a secure world execution environment configured to monitor changes to data blocks of a block device, within the secure world execution environment, generating a hash for changed data blocks of the block device, and within the secure world execution environment, verifying and generating a cryptographic signature..
Samsung Electronics Co., Ltd.

File system with per-extent checksums

A file system allows a different checksum algorithm to be used for different extents of a file system object independently of other extents of the file system object. The checksum algorithm can be a selectable attribute of an extent or range of extents of a file system object, such that some extents of a file system object can use a first checksum algorithm, while other extents of the file system object can use a second checksum algorithm.
Microsoft Corporation



Checksum topics:
  • Cyclic Redundancy Check
  • Redundancy
  • Communications
  • Replication
  • Subscriber
  • Data Packet
  • Dependency
  • Transaction Log
  • Hash Function
  • Central Processing Unit
  • Hash Table
  • Central Processing Units
  • Differentiation
  • Duplication
  • Data Deduplication


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Checksum for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Checksum with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.0348

    file did exist - 2285

    2 - 1 - 52