Patent
Verifying authenticity of input using a hashing algorithm
Reads0
Chats0
About:
The article was published on 2010-07-30. It has received 6 citations till now. The article focuses on the topics: Dynamic perfect hashing & Hash table.read more
Citations
More filters
Patent
Efficient shared image deployment
TL;DR: In this article, the results of a first hash operation applied to a plurality of elements of an image of a software installation are compared to the results applied to the plurality of contents of a client, causing the transmission of the elements to the client.
Patent
Cryptographic device and secret key protection method
TL;DR: In this article, a cryptographic device and a secret key protection method are provided, where the secret key of the cryptographic device is protected when processing a message and the message is encrypted by a hash calculation circuit.
Patent
Method and system for protecting SWF file
TL;DR: In this article, a method and system for protecting an SWF file and relating to the technical field of file protection is presented. But the method is limited to SWF files and the file head of the file is not deleted.
Patent
Method and device for verifying data
Yu Chuanshuai,Zhang Chengwei +1 more
TL;DR: In this paper, a method and a device for verifying data is described, in which the storage resource occupied by data storage can be reduced under the condition that the data verification can be achieved.
Patent
Dynamic verification of application data using deterministic functions
TL;DR: In this paper, a client can request, from a server, files needed to run a web application at the client (e.g., via a client web browser), along with a file identifier for each of the files.
References
More filters
Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Patent
Collaboration portal (COPO) a scaleable method, system, and apparatus for providing computer-accessible benefits to communities of users
TL;DR: The Collaboration Portal (COPO) as mentioned in this paper is a framework for provisioning computer-accessible benefits for communities of users, and can efficiently and robustly distribute the processing in behalf of those users over a decentralized network of computers.
Patent
Portable devices and methods employing digital watermarking
TL;DR: In this paper, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc.
Patent
Parallel file system and method with extensible hashing
TL;DR: In this article, the authors describe a parallel file system in a shared disk environment using scalable directory service method improvements to caching and cache performance developments balance pools for multiple accesses, where a metadata node manages file metadata, and locking techniques reduce the overhead of a token manager which is also used in the file system recovery if a computer participating in the management of shared disks becomes unavailable or failed.
Patent
System and method for secure storage, transfer and retrieval of content addressable information
TL;DR: In this article, the MD5 hash function is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest), and the file is encrypted using its IUI as the key for the encryption algorithm.
Related Papers (5)
Learning to Hash with Partial Tags: Exploring Correlation between Tags and Hashing Bits for Large Scale Image Retrieval
Qifan Wang,Luo Si,Dan Zhang +2 more