Images List Premium Download Classic

Hash Function

Hash Function-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method for automatically verifying a target computer file with respect to a reference computer file
Schneider Electric Industries Sas
October 12, 2017 - N°20170295020

A method for verifying a target computer file with respect to a reference computer file, including defining a first area delimiting a portion of a reference file, and a second area delimiting a portion of a target file, the second area exhibiting the same size as the first area and being situated, inside the target file, at the same relative ...
Unified storage system for online image searching and offline image analytics
Baidu Usa Llc
October 12, 2017 - N°20170293617

According to one embodiment, a master storage node receives a search query for searching images from a client, where the master storage node is coupled to a number of worker storage nodes over a storage network. The master storage node performs a hash operation on one or more keywords of the search query using a first predetermined hash function, generating ...
Establishing trust between two devices
Microsoft Technology Licensing, Llc
October 05, 2017 - N°20170289157

Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Single double cuckoo hash
Mellanox Technologies Tlv Ltd.
October 05, 2017 - N°20170286292

In a network element a decision apparatus has a plurality of multi-way hash tables of single size and double size associative entries. A logic pipeline extracts a search key from each of a sequence of received data items. A hash circuit applies first and second hash functions to the search key to generate first and second indices. A lookup circuit ...
Pipelined hash table with reduced collisions
Mellanox Technologies Tlv Ltd.
October 05, 2017 - N°20170286006

Apparatuses and methods for pipelined hashing are described herein. An example apparatus to perform a pipelined hash function may include a first memory to store a first plurality of bucket records, a second memory to store a second plurality of bucket records, and a hash circuit to receive a key and to perform a pipelined hash function using the key ...
Virtual bucket multiple hash tables for efficient memory in-line deduplication application
Samsung Electronics Co., Ltd.
October 05, 2017 - N°20170286005

A method of deduplicating memory in a memory module includes identifying a hash table array including hash tables each corresponding to a hash function, and each including physical buckets, each physical bucket including ways and being configured to store data, identifying a plurality of virtual buckets each including some of the physical buckets, and each sharing at least one of ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems and methods for predicting compressibility of data
Western Digital Technologies, Inc.
October 05, 2017 - N°20170285966

Systems and methods for predicting the compressibility of data in a flash storage device are provided. One such method involves extracting byte intervals from the block of data, each of the byte intervals consisting of a preselected number of bytes, performing a hash function to map the byte intervals into a plurality of bins, the plurality of bins comprising one ...
Method of performing keyed-hash message authentication code (hmac) using multi-party computation without boolean gates
Dyadic Security Ltd.
September 21, 2017 - N°20170272251

The subject matter discloses a method operated on at least two servers for a third-party client, the method comprising receiving by a first server a first result of the first irreversible function applied to a secret key from a first third-party client, receiving by a second server a second result of the second irreversible function applied to the secret key ...
Process and system for establishing a moving target connection for secure communications in client/server ...
Dyadic Security Ltd.
September 21, 2017 - N°20170272242

A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send small pieces of information over a network while only requiring an exchange of public keys ahead of time. The system relies on the size and resilience of the bittorrent distributed hash table and the security ...
A content addressable memory, an index generator, and a registered information update method
Meiji University
September 21, 2017 - N°20170271011

A content addressable memory according to the present invention includes plural index generators, an output unit, and a controller. The plural index generators generates a signature of an input vector using plural hash functions, and to generate index corresponding to the input vector by searching registered information for a registered vector based on the signature. The output unit combines each ...
System and device binding metadata with hardware intrinsic properties
Analog Devices, Inc.
September 21, 2017 - N°20170270288

A system, device, and method for binding metadata, such as information derived from the output of a biometric sensor, to hardware intrinsic properties by obtaining authentication-related metadata and combining it with information pertaining to a root of trust, such as a physical unclonable function. The metadata may be derived from a sensor such as a biometric sensor, the root of ...
Efficient secret-key encrypted secure slice
International Business Machines Corporation
August 31, 2017 - N°20170250965

An encryption module encrypts starting data using a random key to produce encrypted data. A hash module performs a secure hash function on the encrypted data using a secret key to produce a hash value. Processing circuitry masks the random key using the hash value to produce a masked random key, and combines the encrypted data and the masked random ...
Digital signature method and apparatus
Security Innovation Inc.
August 31, 2017 - N°20170250819

A method for signing and subsequently verifying a digital message, including the following steps: generating an irreducible monic polynomial f(x) of degree n in a ring fq[x]; generating an irreducible monic polynomial f(y) of degree n in a ring fq[y]; producing first and second finite fields as fq[x]/(f(x)) and fq[y]/(f(y)), ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Methods for cryptographic delegation and enforcement of dynamic access to stored data
Trustwave Holdings, Inc.
July 20, 2017 - N°20170207910

Methods for cryptographic delegation and enforcement of dynamic access to stored data are disclosed. An example method includes generating for a first modified data block, a new per-block hash value using as a hash function input data contained in the first modified data block or a new per-block hash message authentication code (hmac) using as hash function inputs a new ...
System and method for implementing secure communications for internet of things (iot) devices
Centurylink Intellectual Property Llc
July 13, 2017 - N°20170201504

Novel tools and techniques might provide for implementing secure communications for iot devices. In various embodiments, a gateway or computing device might provide connectivity between or amongst two or more internet of things (“iot”) capable devices, by establishing an iot protocol-based, autonomous machine-to-machine communication channel amongst the two or more iot capable devices. For sensitive and/...
Low memory sampling-based estimation of distinct elements and deduplication
International Business Machines Corporation
July 13, 2017 - N°20170199904

Methods, computing systems and computer program products implement embodiments of the present invention that include partitioning a dataset into a full set of logical data units, and selecting a sample subset of the full set, the sample subset including a random sample of the full set based on a sampling ratio. A set of target hash values are selected from ...
Applying multiple hash functions to generate multiple masked keys in a secure slice implementation
International Business Machines Corporation
July 06, 2017 - N°20170192907

Methods and apparatus for efficiently storing and accessing secure data are disclosed. The method of storing includes encrypting data utilizing an encryption key to produce encrypted data, performing deterministic functions on the encrypted data to produce deterministic function values, masking the encryption key utilizing the deterministic function values to produce masked keys and combining the encrypted data and the masked ...
Ruled-based network traffic interception and distribution scheme
Brocade Communications Systems, Inc.
June 29, 2017 - N°20170187649

Using a hash function, an l2/l3 switch can produce an fid for a data packet. The l2/l3 switch can select, from among potentially several stored vlan flooding tables, a particular vlan flooding table that is associated with a particular vlan on which the data packet is to be carried. The rows of the particular vlan flooding table can ...
Methods of proving validity and determining validity, electronic device, server and computer programs
Telefonaktiebolaget Lm Ericsson (publ)
June 29, 2017 - N°20170187532

There is provided a method of an electronic device for providing a one-time proof of knowledge about a one-time signing key to a server without revealing the one-time signing key. The method comprises computing a hash as a hash function from the one-time signing key, and transmitting, to the server, the computed hash, an identity associated with the electronic device ...
Methods and apparatus for naming video content chunks
Telefonaktiebolaget Lm Ericsson (publ)
June 22, 2017 - N°20170180774

A method for generating a filename for a chunk of streamed video content is disclosed. The method comprises performing a cryptographic hash function on data associated with the chunk of video content (100a) and setting the output hash value of the cryptographic hash function as the chunk filename (100b). A method for recording broadcast video content by a user device ...
Method and device for transmitting software
Robert Bosch Gmbh
June 22, 2017 - N°20170180392

A method for transmitting software in which a checker generates two random numbers. The checker calculates a cryptographic key based on the second random number based on a measured hardware function of the device. The checker encrypts the software into a cryptogram using the key, and transmits the cryptogram to the device. The checker transmits the first random number to ...
Loading