Images List Premium Download Classic

Hash Function

Hash Function-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Maximizing the information content of system logs
International Business Machines Corporation
December 31, 2015 - N°20150379008

In a method for maximizing information content of logs, a log message from an executing software program is received. The log message includes a timestamp, a source code location id, a session id, and a log message text. The timestamp, the source code location id, and the session id of the log message are stored in a lossless buffer. A ...
Hash based de-duplication in a storage system
Infinidat Ltd.
December 24, 2015 - N°20150370835

A method for de-duplication, the method may include receiving a request to store in a storage system a received data entity; obtaining a received data entity signature that is responsive to the received data entity; selecting a selected data structure out of a set of data structures that comprises k data structures; wherein k is a positive integer; wherein for ...
Hash based read and write operations in a storage system
Infinidat Ltd.
December 24, 2015 - N°20150370794

A method for hash-based writing, the method comprises: receiving a received data entity to be stored in a storage system, wherein the received data entity is associated with received data entity metadata; selecting a selected data structure out of a set of data structures that comprises k data structures; wherein k is a positive integer; wherein for each value of ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Methods and apparatus for data processing
Cisco Technology, Inc.
December 17, 2015 - N°20150363328

Data processing methods and apparatus for efficiently storing and retrieving data, e. G., blocks of data, to and from memory. The data processing including, e. G., techniques such as using linked lists and/or tables for tracking duplicate data blocks received for storage, the use of lossless data compression, and de-duplication based on comparing hash values, compressed data block sizes, ...
Flow matching optimization in scaled environments
Cisco Technology, Inc.
December 10, 2015 - N°20150358435

In one embodiment, a method includes identifying at a network device, a number of items for matching at a hash table, the number of items exceeding matching available with ternary content addressable memory (tcam) at the network device, defining at the network device, an optimal cyclic redundancy check (crc) polynomial based on the number of items for matching at the ...
Probabilistic message filtering and grouping
Google Inc.
December 10, 2015 - N°20150358234

Systems and methods for generating and using probabilistic filters are provided. One example method includes obtaining a plurality of beacon identifiers respectively associated with a plurality of beacon devices. The operations include determining a plurality of filter shards for each beacon identifier by applying a plurality of hash functions to each beacon identifier. The operations include providing the plurality of ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method of distributing data and device supporting the same
Samsung Electronics Co., Ltd.
November 19, 2015 - N°20150334008

A method of distributing data includes: determining a core and a queue of a network interface card for processing data transmitted from the device, from among a number of cores in a server; determining a source port of the device for transmitting data to the determined core or the determined queue of the network interface card, by using an inverse-hash ...
Authenticating the identity of initiators of tcp connections
Cloudflare, Inc.
November 19, 2015 - N°20150333912

A transmission control protocol (tcp) receiver receives a syn segment from a tcp initiator that initiates a tcp handshake between the tcp initiator and a tcp server. A first value is extracted from a predefined portion of the syn segment. A second value is computed using an authentication algorithm that includes at least using a cryptographic hash function that takes ...
Method for protecting data
Irdeto Canada Corporation
November 12, 2015 - N°20150324590

In the present disclosure, a hash function is computed over a known image, for example, an address range in a program. The result of the hash function is known to be the same at two distinct points in time, before the program is run, i. E. Signing at build-time, and during the running of the program, i. E. Run time. ...
System and device binding metadata with hardware intrinsic properties
Sypris Electronics, Llc
November 05, 2015 - N°20150318994

A system, device, and method for binding metadata, such as information derived from the output of a biometric sensor, to hardware intrinsic properties by obtaining authentication-related metadata and combining it with information pertaining to a root of trust, such as a physical unclonable function. The metadata may be derived from a sensor such as a biometric sensor, the root of ...
Method and apparatus for marking manufactured items using physical characteristic
Philip Morris Products S.a.
November 05, 2015 - N°20150317644

A method of marking a manufactured item is described, comprising: creating a unique product identifier for a manufactured item; creating one or more encryption keys; generating a secret key using the unique product identifier and the one or more encryption keys; generating a system noise value by performing a hash function on the secret key and the unique product identifier; ...
Image processing apparatus, method of controlling the same, program and storage medium
Square Enix Holdings Co., Ltd.
November 05, 2015 - N°20150317253

An information processing apparatus acquires a command including a load request for data stored beforehand, generates a hash value for the command by applying a hash function for the command, reads out and loads into a loading region, corresponding data in accordance with the load request included in the command. In addition, the apparatus associates and manages the hash value ...
Dynamic power reduction and performance improvement in caches using fast access
Texas Instruments Incorporated
October 29, 2015 - N°20150309930

With the increasing demand for improved processor performance, memory systems have been growing increasingly larger to keep up with this performance demand. Caches, which dictate the performance of memory systems are often the focus of improved performance in memory systems, and the most common techniques used to increase cache performance are increased size and associativity. Unfortunately, these methods yield increased ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Filtering electronic messages
October 15, 2015 - N°20150295869

Technologies are described herein for filtering of electronic messages. A method for filtering messages includes receiving an electronic message for transmission to a recipient, generating a fingerprint for the electronic message, determining if the electronic message is associated with a known cluster of previously transmitted electronic messages, and filtering the electronic message based on the determining. The fingerprint is a ...
System and method for sequential data signatures
October 15, 2015 - N°20150295720

A digital message is signed and, if a request is approved, receives a time stamp. The request is computed as a first function of the message and a current one of a sequence of passwords computed such that each password corresponds to an index unit. Each of the passwords may be computed as a function, such as a hash function, ...
Increasing speed of data compression
October 15, 2015 - N°20150295591

A computer implemented method of performing data compression includes applying, with a computing device, a hash function to a selected part of a character string to calculate a hash value; searching, using the hash value, through entries in a bucket chain having the hash value previously registered in a hash table, and finding a longest matching character string; acquiring, an ...
Neighbor lookup operations in a network node
October 08, 2015 - N°20150288655

A network node maintains a neighbor data structure in the form of a hash table containing multiple buckets for storing mapping entries, with each entry specifying a local address corresponding to a global address. The table is based on a hash function that generates a corresponding hash value for each global address. Each bucket is associated with a unique hash ...
Methods and apparatus for virtual channel flow control associated with a switch fabric
October 08, 2015 - N°20150288626

A system includes a module associated with a first stage of a switch fabric directly coupled to a module associated with a second stage of the switch fabric via a single physical hop having multiple virtual channels. The module associated with the first stage is configured to assign a virtual channel identifier associated with a virtual channel with a data ...
Building and querying hash tables on processors
October 08, 2015 - N°20150286639

A plurality of memory maps may be allocated that represents the hash table on a memory device to store keys and values. The memory maps may comprise at least a primary map and a secondary map. A hash table operation may be performed on the primary map based on a first position computed using a first hash function, and if ...
Method and apparatus for performing device-to-device communication in wireless communication system
Lg Electronics Inc.
October 01, 2015 - N°20150282143

The present invention provides a method and apparatus for performing device-to-device communication in a wireless communication system. The method includes generating identification information of a d2d user equipment that supports the d2d communication as identification information for d2d discovery using a hash function, the identification information for discovery includes information of a first length for indicating a ...
Method and apparatus for efficiently executing hash operations
Intel Corporation
October 01, 2015 - N°20150280917

An apparatus and method are described for executing hash functions on a processor. For example, one embodiment of a processor comprises: a register set including a first storage location and a second storage location in which state variables for a hash function are to be stored; an execution unit to execute the hash function and to initially designate the first ...
Loading