Images List Premium Download Classic

Hash Function

Hash Function-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Computation of historical data
At&t Intellectual Property I, L.p.
January 11, 2018 - N°20180013547

Secure computation of enterprise data in a cloud is provided, by a third party, such that values and data manipulation processes are encrypted through use cryptographic processes that are secure. A method can comprise performing operations including receiving security data representing an attribute included in a log file, generating encoded attribute data as a function of the attribute, a hash ...
System and method for fingerprinting-based conversation threading
Kcura Llc
January 11, 2018 - N°20180011880

Systems, methods, and computer readable media for staging a corpus of electronic communication documents for analysis, such as, for example, via a content analysis platform. The staging may include a staging platform accessing the corpus of electronic communication document. For each electronic communication document within the corpus, the staging platform may generate a fingerprint based upon the output of a ...
Peer-to-peer redundant file server system and methods
Overland Storage, Inc.
January 11, 2018 - N°20180011874

Peer-to-peer redundant file server system and methods include clients that determine a target storage provider to contact for a particular storage transaction based on a pathname provided by the filesystem and a predetermined scheme such as a hash function applied to a portion of the pathname. Servers use the same scheme to determine where to store relevant file information so ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Methods and systems for anchoring hypertext transfer protocol (http) level services in an information centric ...
Idac Holdings, Inc.
January 04, 2018 - N°20180007116

Methods and systems anchor hypertext transfer protocol (http) level communication in an information-centric networking (icn) network. Both content requests and responses to servers within the icn network and to servers located outside the icn network, in an ip network for example, are disclosed. Communication may be between two ip capable only devices at the http level, one connected to an ...
Method and system of using a local hosted cache and cryptographic hash functions to reduce ...
Microsoft Technology Licensing, Llc
January 04, 2018 - N°20180004748

The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a wan to improve latency and reduce overall wan traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a ...
Systems and methods for tracking controlled items
Microsoft Technology Licensing, Llc
January 04, 2018 - N°20180004682

According to the present disclosure, a method for tracking a controlled item can include transforming a genetic code with a cryptographic hash function into a core code. The core code can be associated with a label code and a weight. The weight can be indicative of a produced amount of the strain of the controlled item. An image of a ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for updating a public key
National Chi Nan University
December 28, 2017 - N°20170373847

A method for updating a public key is provided. The method includes: acquiring, by a transmitting-end device, a first hash value calculated based on a first current public key; generating a first update public key and a first update private key; generating an update string such that a hash value of a hash function calculated based at least on the ...
Memory apparatus for applying fault repair based on physical region and virtual region and control ...
Korea University Research And Business Foundation
December 28, 2017 - N°20170371753

Provided are a memory apparatus for applying fault repair based on a physical region and a virtual region and a control method thereof. That is, the fault repair is applied based on the physical region and the virtual region which use an information storage table of a virtual basic region using a hash function, thereby improving efficiency of the fault ...
System and process of protecting client side information in electronic transactions
Korea University Research And Business Foundation
November 30, 2017 - N°20170346801

A system, method and computer program product protects client information used for online transactions by storing transaction details on the client side of a network and avoiding storage on the host side. A hash function may be generated representing a transaction and its details on both the client and server sides. For the transaction to be processed, the hash function ...
Verification mechanism for network service chain paths
Guardtime Ip Holdings Limited
November 30, 2017 - N°20170346752

Data packets passing from a source to a destination in a network according to a service function chain (sfc) are processed by an ordered sequence of at least one service function (sf). For each sf in the sfc in order, a current value of a function, such as a hash function, is recursively computed including, as input values, at least ...
Methods and apparatus for efficient computation of one-way chains in cryptographic applications
Crypto Research, Llc
November 23, 2017 - N°20170337385

Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length s having positions i=1, 2, . . . S each having a corresponding value vi associated therewith, wherein the value vi is given by vi=h (vi+1), for a given hash function or other ...
Authenticating printed paper documents and websites against a blockchain record
Crypto Research, Llc
November 16, 2017 - N°20170329996

A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third ...
Method for establishing, securing and transferring computer readable information using peer-to-peer public and private key ...
Crypto Research, Llc
November 09, 2017 - N°20170324711

Establishing file space requires that the owner links it to a centralized or decentralized peer-to-peer cryptographic block chain protocol. This secures and locks files for subsequent confirmation and transfer. Confirmation and transfer of the file is processed with a cryptographic hash function of crypto currency block chain process. The system and method requires that the transferee obtain the file using ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Methods and apparatus for providing attestation of information using a centralized or distributed ledger
Intel Corporation
November 02, 2017 - N°20170317833

Methods and apparatus for providing authentication of information of a user are described. Upon validation of this information, a first hash function is applied to the user's information to create a hash. A public attest key is generated by combining the hash of the user's information with one or more public keys. An attestation address is generated based on the ...
Techniques for web framework detection
Riskiq, Inc.
October 26, 2017 - N°20170308513

Techniques are disclosed for analyzing documents to detect web components and the web frameworks in the documents. In at least one embodiment, a network analysis system is provided to passively detect web frameworks of documents. The network analysis system can render a document using a document object model to identify objects in the document that are defined as web components. ...
Method and system for implementing lock free shared memory with single writer and multiple readers
Dell Products L.p.
October 26, 2017 - N°20170308466

A method and a system for implementing a lock-free shared memory accessible by a plurality of readers and a single writer are provided herein. The method including: maintaining a memory accessible by the readers and the writer, wherein the memory is a hash table having at least one linked list of buckets, each bucket in the linked list having: a ...
Method for processing an update file of an avionic equipment of an aircraft, a computer ...
Thales
October 26, 2017 - N°20170308371

This method makes it possible to validate an update file of at least one set of computer data of a piece of avionics equipment of an aircraft. The processing method is implemented within a processing system comprising a mobile terminal independent of the aircraft, an update unit integrated into the aircraft, and a database separate from the aircraft and the ...
Providing forward secrecy in a terminating tls connection proxy
Thales
October 19, 2017 - N°20170302700

An infrastructure delivery platform provides a rsa proxy service as an enhancement to the tls/ssl protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that ...
Rewrite detection system and information processing device
Thales
October 19, 2017 - N°20170302693

Provided are a rewrite detection system and an information processing device capable of reducing communication traffic between devices and processing time in each device. A rewrite detecting device generates a random seed and transmits the random seed to an ecu, the ecu calculates a hash value using a predetermined hash function, and transmits the hash value to a rewrite detecting ...
Establishing trust between two devices
Thales
October 19, 2017 - N°20170302666

Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for ...
Key exchange method and key exchange system
Thales
October 19, 2017 - N°20170302445

Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key generation unit 212 of the communication devices ui computes ri and ci, or ci based on a twisted pseudo-random function. A session id generation unit 113 of a key distribution device s generates sid based on a target-collision ...
Loading