Images List Premium Download Classic

Hash Function

Hash Function-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Probabilistic message filtering and grouping
Google Llc
July 12, 2018 - N°20180198714

Systems and methods for generating and using probabilistic filters are provided. One example method includes obtaining a plurality of beacon identifiers respectively associated with a plurality of beacon devices.
Method and system for tree management of trees under multi-version concurrency control
Emc Ip Holding Company Llc
July 05, 2018 - N°20180189342

Method for tree management of trees under multi-version concurrency control is described herein. Method starts by detecting change in a size of a cluster.
Key exchange method, key exchange system, key distribution device, communication device, and program
Nippon Telegraph And Telephone Corporation
June 28, 2018 - N°20180183583

Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key generation unit computes ri and ci based on a twisted pseudo-random function.
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Optimized hopscotch multiple hash tables for efficient memory in-line deduplication application
Samsung Electronics Co., Ltd.
June 28, 2018 - N°20180181495

A method of memory deduplication includes identifying hash tables each corresponding to a hash function, and each including physical buckets, each physical bucket including ways and being configured to store data, identifying virtual buckets each including some physical buckets, and each sharing a physical bucket with another virtual bucket, identifying each of the physical buckets having data stored thereon as ...
Bad page management in storage devices
Western Digital Technologies, Inc.
June 28, 2018 - N°20180181476

The present disclosure generally relates to methods for managing bad pages in storage devices. When a page is bad or faulty, a spare page is used to store the data because the bad or faulty page is unreliable for data storage.
Secure initialization vector generation
Amazon Technologies, Inc.
June 21, 2018 - N°20180176014

A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In some examples, the plaintext and cryptographic key are input into an effectively one-way function, such as a cryptographic hash function, the output of which is usable as an initialization vector.
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Composite security marking
Merck Patent Gmbh
June 21, 2018 - N°20180174158

The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking.
Composite security marking
Merck Patent Gmbh
June 21, 2018 - N°20180174157

The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking.
Reader device for reading a marking comprising a physical unclonable function
Merck Patent Gmbh
June 21, 2018 - N°20180173917

The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a method of reading with a reader device a marking comprising a physical unclonable function, puf, and a corresponding reader device.
Reader device for reading a marking comprising a physical unclonable function
Merck Patent Gmbh
June 21, 2018 - N°20180173916

The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a method of reading with a reader device a marking comprising a physical unclonable function, puf, and a corresponding reader device.
Data search method and device
Mobile Content Management Solutions Limited
June 21, 2018 - N°20180173787

A data search method for computer forensic investigation comprising: inputting at least one pre-determined search term; searching a computer or digital device that is powered on in a forensically sound state for data matching one or more of the pre-determined search terms to identify target data from any of file names; strings; hash values or hash functions; installed programs; mac ...
Method for safeguarding the information security of data transmitted via a data bus and data ...
Continental Teves Ag & Co. Ohg
June 07, 2018 - N°20180159681

A method for saving the information security of data transmitted by a databus, in which the data to be transmitted via the databus from a transmitter (ecus) to at least one receiver (ecur) are divided into data blocks (m0 . .
System architecture and method of processing data therein
May 24, 2018 - N°20180146035

A software architecture encoded on a non-transitory computer readable medium, where the software architecture includes a first protocol, wherein the first protocol is configured to form a plurality of groups, wherein each group of the plurality of groups comprises a set of randomly selected nodes from a network. The software architecture further includes a second protocol, wherein the second protocol ...
Hash Function Patent Pack
Download + patent application PDFs
Hash Function Patent Applications
Download + Hash Function-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Hash Function-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Ip routing search
New H3c Technologies Co., Ltd.
May 24, 2018 - N°20180145911

A multibit trie is created for routing distribution of ip prefixes in each virtual private network (vpn); and each multibit trie is divided into multiple layers. When routing search is performed for an ip address of a vpn, an input key is generated for each layer respectively, the input key of the layer comprises a vpn identifier of the vpn ...
Method, device and system of encoding a digital interactive response action in an analog broadcasting ...
May 24, 2018 - N°20180144750

Disclosed are a method, a device and a system of generation of a modified digital media file based on a encoding of a digital media file with a decodable data such that the decodable data is indistinguishable through a human ear from a primary audio stream. In one embodiment, a method of an audio encoding system includes validating a user ...
Searching using encrypted client and server maintained indices
May 24, 2018 - N°20180144152

A method and apparatus of a device searches encrypted objects stored in a secure virtual storage space is described. In an exemplary embodiment, the device receives a search query that includes a set of tokens and encrypts the set of tokens.
Method for segmenting and indexing features from multidimensional data
Université De Lausanne
May 24, 2018 - N°20180143979

The invention relates to a method for segmenting and indexing features from multidimensional data, said method comprising the steps of inputting (201) a sequence of tuples in a transformation process, first mapping (204) the tuple sequence to a sequence of hash sums with a rolling hash function, grouping (205) the sequence of tuple hash sums into a sequence of overlapping and contiguous sequences ...
Increasing efficiency of an event processing system
Sap Se
May 17, 2018 - N°20180136987

Systems and methods of increasing the efficiency of an event processing system are disclosed. In some example embodiments, a computer-implemented method comprises identifying a first group of computing events from a plurality of computing events in an execution pipeline based on a similarity between the computing events of the first group, and merging the computing events of the first group ...
Verification of server certificates using hash codes
A10 Networks, Inc.
May 10, 2018 - N°20180131521

Described are systems and methods for verifying server security certificates using hash codes. The system may include a client secure socket layer (ssl) node, a service gateway node, and a storage node.
Anonymity authentication method for wireless sensor networks
National Chin-yi University Of Technology
May 03, 2018 - N°20180124600

An anonymity authentication method for wireless sensor networks is provided. A smart card carried by a user is used to provide two-factor verification protection.
Image based method, system and computer program product to authenticate user identity
May 03, 2018 - N°20180124034

An authentication process is disclosed which authenticates a user identity with a password that includes at least one portion based on an image that is saved on the user's local device. The password generated may be based on the user selected image and the process may use the image in calculating a hash function for the password.
Loading