Images List Premium Download Classic

Hash Function

Hash Function-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Methods for cryptographic delegation and enforcement of dynamic access to stored data
Trustwave Holdings, Inc.
July 20, 2017 - N°20170207910

Methods for cryptographic delegation and enforcement of dynamic access to stored data are disclosed. An example method includes generating for a first modified data block, a new per-block hash value using as a hash function input data contained in the first modified data block or a new per-block hash message authentication code (hmac) using as hash function inputs a new ...
System and method for implementing secure communications for internet of things (iot) devices
Centurylink Intellectual Property Llc
July 13, 2017 - N°20170201504

Novel tools and techniques might provide for implementing secure communications for iot devices. In various embodiments, a gateway or computing device might provide connectivity between or amongst two or more internet of things (“iot”) capable devices, by establishing an iot protocol-based, autonomous machine-to-machine communication channel amongst the two or more iot capable devices. For sensitive and/...
Low memory sampling-based estimation of distinct elements and deduplication
International Business Machines Corporation
July 13, 2017 - N°20170199904

Methods, computing systems and computer program products implement embodiments of the present invention that include partitioning a dataset into a full set of logical data units, and selecting a sample subset of the full set, the sample subset including a random sample of the full set based on a sampling ratio. A set of target hash values are selected from ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Ruled-based network traffic interception and distribution scheme
Brocade Communications Systems, Inc.
June 29, 2017 - N°20170187649

Using a hash function, an l2/l3 switch can produce an fid for a data packet. The l2/l3 switch can select, from among potentially several stored vlan flooding tables, a particular vlan flooding table that is associated with a particular vlan on which the data packet is to be carried. The rows of the particular vlan flooding table can ...
Methods of proving validity and determining validity, electronic device, server and computer programs
Telefonaktiebolaget Lm Ericsson (publ)
June 29, 2017 - N°20170187532

There is provided a method of an electronic device for providing a one-time proof of knowledge about a one-time signing key to a server without revealing the one-time signing key. The method comprises computing a hash as a hash function from the one-time signing key, and transmitting, to the server, the computed hash, an identity associated with the electronic device ...
Methods and apparatus for naming video content chunks
Telefonaktiebolaget Lm Ericsson (publ)
June 22, 2017 - N°20170180774

A method for generating a filename for a chunk of streamed video content is disclosed. The method comprises performing a cryptographic hash function on data associated with the chunk of video content (100a) and setting the output hash value of the cryptographic hash function as the chunk filename (100b). A method for recording broadcast video content by a user device ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Providing security in an intelligent electronic device
Electro Industries/gauge Tech
June 22, 2017 - N°20170180137

Apparatuses, systems, and methods for providing security in an intelligent electronic device (ied) are provided. In one aspect of the present disclosure, an ied is provided including at least one processor that receives a communication via a communication interface, the communication including an unencrypted file and a digital signature. The at least one processor decrypts the digital signature to obtain ...
Memory synchronization filter
Arm Limited
June 22, 2017 - N°20170177269

Data synchronization between memories of a data processing system is achieved by transferring the data blocks from a first memory to a second memory, forming a hash list from addresses of data blocks that are written to the second memory or modified in the second memory. The hash list may be to identify a set of data blocks that are ...
Interception of touch pad events for handling in a secure environment
Square, Inc.
June 15, 2017 - N°20170169412

Some examples include sending, to a secure environment, coordinates for certain touch events made to a touchscreen of an electronic device. As one example, an import address table that is accessed by an event loop of the electronic device may be modified. For instance, only those touch events that are performed within the bounds of a user interface area may ...
Enforcing anonymity in the auditing of electronic documents
Yahoo! Inc.
June 15, 2017 - N°20170169251

Methods, systems, and computer-readable media for anonymizing electronic documents. In accordance with one or more embodiments, structurally-similar electronic documents can be identified among a group of electronic documents (e. G., e-mail messages, documents containing html formatting, etc.). A hash function can be specifically tailored to identify the similarly structured documents. The structurally-similar electronic documents can be grouped into a same ...
Method and system for mapping notable entities to their social profiles
Yahoo! Inc.
June 15, 2017 - N°20170169095

Methods, systems, and computer-readable media for mapping entities to social profile data. Social data regarding an entity (e. G., a notable entity, celebrity, movie, famous brand, etc.) is filtered from one or more open knowledge databases to produce filtered social data regarding the entity (or entities). The filtered social data is clustered and classified with respect to the entity according ...
System address map for hashing within a chip and between chips
Arm Limited
June 15, 2017 - N°20170168954

A system and method for accessing on-chip and off-chip memory in an integrated circuit data processing system. The system includes a number of nodes connected by an interconnect and also includes system address map logic in which a node register table is accessed using a hash function of the memory address to be accessed. A node identifier stored in a ...
Implementing synchronization for remote disk mirroring
International Business Machines Corporation
June 15, 2017 - N°20170168732

A method, and system for implementing enhanced fast full synchronization for remote disk minoring in a computer system. A source backup copy is made locally available to a target for remote disk mirroring. Sectors are identified that are different between the source and target. A hash function is used over a block to be compared, with an adaptive number of ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Optimal hash calculation of archive files and their file entries
Sap Se
June 08, 2017 - N°20170161158

The present disclosure involves systems, software, and computer implemented methods for calculating hashes of archive files and their file entries. In one example, a method may include receiving an archive file which includes at least one compressed file, storing the archive file by sending a first copy of the archive file stream to a first processing thread which stores the ...
Consistent hashing
Nec Laboratories America, Inc.
June 08, 2017 - N°20170161109

Computer-implemented methods and a system are provided for distributing tasks between a plurality of processes in a computer network. A method includes distributing, by a load balancer in the computer network, tasks between the plurality of processes. The method further includes maintaining, by the load balancer, a registry for each of the tasks. For a given task, the registry indicates ...
Co-prime hashing
Facebook, Inc.
June 01, 2017 - N°20170154042

A hashing system can use a set of multiple numbers that are co-prime to the size of a hash table to select a probe offset when collisions occur. Selecting a probe offset that is co-prime to the hash table size ensures that each hash table slot is available for any insert operation. Utilizing different co-prime numbers for different keys helps ...
Secure communication between infusion pump and server
Facebook, Inc.
May 25, 2017 - N°20170149567

An infusion pump and server computer have improved network access security. The infusion pump has a network interface circuit to provide communications over a network and a processing circuit that generates infusion pump data for transmission to a remote server computer. The processing circuit generates a header portion of a request message having at least one field, hashes the header ...
Methods, software, and systems for over-the-counter trading
Facebook, Inc.
May 25, 2017 - N°20170148094

Methods, software, and hardware are disclosed for providing verified real time price quotes in an over-the-counter financial market. Systems are described that can comprise methods, software, and/or hardware to provide verified real time price information for securities traded over-the-counter. Verification methods of the invention include identifying suspect source data, wherein the suspect source data includes information about the price ...
Methods and devices for efficient feature matching
Facebook, Inc.
May 25, 2017 - N°20170147620

A method of non-identical feature matching in a search system, the search system having a set of data points. The method includes determining a threshold error and expanding the set to create an expanded set by including all data points as data elements of the expanded set and, for every data point in the set, finding all data elements within ...
Methods, apparatuses and systems directed to enabling network federations through hash-routing and/or summary-routing based ...
Interdigital Patent Holdings, Inc.
May 18, 2017 - N°20170142226

Methods, apparatus, systems, devices, and computer program products directed to enabling federation 200 of multiple independent networks 204a, 204b, 204c, 204d through hash-routing based peering (hrp) and/or summary-routing based peering (srp) are provided. Pursuant to new methodologies and/or technologies provided herein the multiple independent networks self-organize, or otherwise assemble, as a federation of network peers. The network peers 204a, 204...
Large-scale simultaneous digital signature service system based on hash function and method thereof
Markany Inc.
May 18, 2017 - N°20170141924

Disclosed are a system and method of a large-scale simultaneous digital signature service based on a hash function. According to the system and method, the main agent that requires the generation of a digital signature does not itself generate the digital signature, and digital signatures may be simultaneously and stably generated for large-scale data such as multiple electronic documents and ...
Loading