scispace - formally typeset
Patent

Verifying authenticity of input using a hashing algorithm

Reads0
Chats0
About
The article was published on 2010-07-30. It has received 6 citations till now. The article focuses on the topics: Dynamic perfect hashing & Hash table.

read more

Citations
More filters
Patent

Efficient shared image deployment

TL;DR: In this article, the results of a first hash operation applied to a plurality of elements of an image of a software installation are compared to the results applied to the plurality of contents of a client, causing the transmission of the elements to the client.
Patent

Cryptographic device and secret key protection method

Ching-Wen Ma
TL;DR: In this article, a cryptographic device and a secret key protection method are provided, where the secret key of the cryptographic device is protected when processing a message and the message is encrypted by a hash calculation circuit.
Patent

Method and system for protecting SWF file

Zhou Zhigang
TL;DR: In this article, a method and system for protecting an SWF file and relating to the technical field of file protection is presented. But the method is limited to SWF files and the file head of the file is not deleted.
Patent

Method and device for verifying data

TL;DR: In this paper, a method and a device for verifying data is described, in which the storage resource occupied by data storage can be reduced under the condition that the data verification can be achieved.
Patent

Dynamic verification of application data using deterministic functions

TL;DR: In this paper, a client can request, from a server, files needed to run a web application at the client (e.g., via a client web browser), along with a file identifier for each of the files.
References
More filters
Patent

Systems and Methods for Secure Transaction Management and Electronic Rights Protection

TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Patent

Collaboration portal (COPO) a scaleable method, system, and apparatus for providing computer-accessible benefits to communities of users

TL;DR: The Collaboration Portal (COPO) as mentioned in this paper is a framework for provisioning computer-accessible benefits for communities of users, and can efficiently and robustly distribute the processing in behalf of those users over a decentralized network of computers.
Patent

Portable devices and methods employing digital watermarking

TL;DR: In this paper, a decoding process extracts the identifier from a media object and possibly additional context information and forwards it to a server, in turn, maps the identifier to an action, such as returning metadata, re-directing the request to one or more other servers, requesting information from another server to identify the media object, etc.
Patent

Parallel file system and method with extensible hashing

TL;DR: In this article, the authors describe a parallel file system in a shared disk environment using scalable directory service method improvements to caching and cache performance developments balance pools for multiple accesses, where a metadata node manages file metadata, and locking techniques reduce the overhead of a token manager which is also used in the file system recovery if a computer participating in the management of shared disks becomes unavailable or failed.
Patent

System and method for secure storage, transfer and retrieval of content addressable information

TL;DR: In this article, the MD5 hash function is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest), and the file is encrypted using its IUI as the key for the encryption algorithm.
Related Papers (5)