Images List Premium Download Classic

Hash Function

Hash Function-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Interception of touch pad events for handling in a secure environment
Square, Inc.
June 15, 2017 - N°20170169412

Some examples include sending, to a secure environment, coordinates for certain touch events made to a touchscreen of an electronic device. As one example, an import address table that is accessed by an event loop of the electronic device may be modified. For instance, only those touch events that are performed within the bounds of a user interface area may ...
Enforcing anonymity in the auditing of electronic documents
Yahoo! Inc.
June 15, 2017 - N°20170169251

Methods, systems, and computer-readable media for anonymizing electronic documents. In accordance with one or more embodiments, structurally-similar electronic documents can be identified among a group of electronic documents (e. G., e-mail messages, documents containing html formatting, etc.). A hash function can be specifically tailored to identify the similarly structured documents. The structurally-similar electronic documents can be grouped into a same ...
Method and system for mapping notable entities to their social profiles
Yahoo! Inc.
June 15, 2017 - N°20170169095

Methods, systems, and computer-readable media for mapping entities to social profile data. Social data regarding an entity (e. G., a notable entity, celebrity, movie, famous brand, etc.) is filtered from one or more open knowledge databases to produce filtered social data regarding the entity (or entities). The filtered social data is clustered and classified with respect to the entity according ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Implementing synchronization for remote disk mirroring
International Business Machines Corporation
June 15, 2017 - N°20170168732

A method, and system for implementing enhanced fast full synchronization for remote disk minoring in a computer system. A source backup copy is made locally available to a target for remote disk mirroring. Sectors are identified that are different between the source and target. A hash function is used over a block to be compared, with an adaptive number of ...
Hardware assisted fast pseudorandom number generation
The Boeing Company
June 08, 2017 - N°20170163416

A system and method for generating pseudorandom numbers by initializing a counter value for a call-counter, sending a bit-wise form of the counter value from the counter to a mixing function, and mixing the counter value to generate the pseudorandom number. The mixing function may be a xor tree, substitution-permutation, or double-mix feistel. The pseudorandom number generator can operate by ...
Optimal hash calculation of archive files and their file entries
Sap Se
June 08, 2017 - N°20170161158

The present disclosure involves systems, software, and computer implemented methods for calculating hashes of archive files and their file entries. In one example, a method may include receiving an archive file which includes at least one compressed file, storing the archive file by sending a first copy of the archive file stream to a first processing thread which stores the ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Co-prime hashing
Facebook, Inc.
June 01, 2017 - N°20170154042

A hashing system can use a set of multiple numbers that are co-prime to the size of a hash table to select a probe offset when collisions occur. Selecting a probe offset that is co-prime to the hash table size ensures that each hash table slot is available for any insert operation. Utilizing different co-prime numbers for different keys helps ...
Secure communication between infusion pump and server
Facebook, Inc.
May 25, 2017 - N°20170149567

An infusion pump and server computer have improved network access security. The infusion pump has a network interface circuit to provide communications over a network and a processing circuit that generates infusion pump data for transmission to a remote server computer. The processing circuit generates a header portion of a request message having at least one field, hashes the header ...
Methods, software, and systems for over-the-counter trading
Facebook, Inc.
May 25, 2017 - N°20170148094

Methods, software, and hardware are disclosed for providing verified real time price quotes in an over-the-counter financial market. Systems are described that can comprise methods, software, and/or hardware to provide verified real time price information for securities traded over-the-counter. Verification methods of the invention include identifying suspect source data, wherein the suspect source data includes information about the price ...
Methods and devices for efficient feature matching
Facebook, Inc.
May 25, 2017 - N°20170147620

A method of non-identical feature matching in a search system, the search system having a set of data points. The method includes determining a threshold error and expanding the set to create an expanded set by including all data points as data elements of the expanded set and, for every data point in the set, finding all data elements within ...
Methods, apparatuses and systems directed to enabling network federations through hash-routing and/or summary-routing based ...
Interdigital Patent Holdings, Inc.
May 18, 2017 - N°20170142226

Methods, apparatus, systems, devices, and computer program products directed to enabling federation 200 of multiple independent networks 204a, 204b, 204c, 204d through hash-routing based peering (hrp) and/or summary-routing based peering (srp) are provided. Pursuant to new methodologies and/or technologies provided herein the multiple independent networks self-organize, or otherwise assemble, as a federation of network peers. The network peers 204a, 204...
Large-scale simultaneous digital signature service system based on hash function and method thereof
Markany Inc.
May 18, 2017 - N°20170141924

Disclosed are a system and method of a large-scale simultaneous digital signature service based on a hash function. According to the system and method, the main agent that requires the generation of a digital signature does not itself generate the digital signature, and digital signatures may be simultaneously and stably generated for large-scale data such as multiple electronic documents and ...
System and process for verifying digital media content authenticity
Markany Inc.
May 11, 2017 - N°20170134162

A system and process for securing digital media file content for persistence is disclosed. Aspects of the system and process protect content from being altered or embedded with malicious code during distribution through a network. A digital media file is embedded with a hash function. In some embodiments, successive frames may be hashed. A copy of the hash function may ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method of providing a hash value for a piece of data, electronic device and computer ...
Telefonaktiebolaget Lm Ericsson (publ)
May 04, 2017 - N°20170126410

A method of providing a hash value for a piece of data is disclosed, where the hash value provides for a time-stamp for the piece of data upon verification, for limiting a risk of collisions between hash values. The method comprises collecting one or more root time-stamps for a root of a hash tree structure defining a hash function, wherein ...
Dynamic evaluation and adaption of hardware hash function
International Business Machines Corporation
May 04, 2017 - N°20170123759

Creating hash values based on bit values of an input vector. An apparatus includes a first and a second hash table, a first and second hash function generator adapted to configure a respective hash function for a creation of a first and second hash value based on the bit values of the input vector. The hash values are stored in ...
Providing forward secrecy in a terminating tls connection proxy
Akamai Technologies, Inc.
April 20, 2017 - N°20170111334

An infrastructure delivery platform provides a rsa proxy service as an enhancement to the tls/ssl protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that ...
Password-based authentication in server systems
International Business Machines Corporation
April 13, 2017 - N°20170104745

A system of λ≧2 servers is provided. The server system comprises an access control server for communication with user computers via a network and controlling access by the user computers to a resource in dependence on authentication of user passwords associated with respective user ids, and a set of authentication servers for communication with the access control server ...
Data deduplication using a small hash table
International Business Machines Corporation
April 13, 2017 - N°20170103068

Embodiments of the present invention provide methods, systems, and computer program products for data deduplication. In one embodiment, for a data chunk, it is determined whether a hash value of the data chunk generated by a first hash function is present in a hash table. Once a threshold size of the hash table is reached, it is determined whether there ...
Parallel processing of hash functions
Tsx Inc.
April 13, 2017 - N°20170102946

Input data can be split into data components that can each have a length equal to a machine word size of a processor capable of parallel processing. Hash components can be selected to have a length equal to the length of the data components. A bitwise hashing function can be performed, in which each data component is hashed with a ...
Distributed stream-based database triggers
Amazon Technologies, Inc.
March 30, 2017 - N°20170093755

Information describing changes to a collection of items maintained by a database may be stored in a log file. The information in the log file may be converted into a stream of records describing the changes. The records may be directed to a computing node selected for performing a trigger function in response to the change, based on applying a ...
Method of providing a hash value for a piece of data, electronic device and computer ...
Telefonaktiebolaget Lm Ericsson (publ)
March 30, 2017 - N°20170093579

There is provided a method of providing a hash value for a piece of data, where the hash value provides for a time-stamp for the piece of data upon verification. The method comprises deriving one-time signing keys of signer's one-time signing key hash chain by a one-way function of a secret key of the signer and a function of an ...
Loading