Method for protecting a volatile file using a single hash

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39542109, 3954211, 39518204, 395186, 380 4, G06F 1200

Patent

active

056945698

ABSTRACT:
The disclosed methodology permits an insecure computing system to safely perform high security electronic financial transactions. The present invention permits the hash of a file to be taken on an incremental basis. It permits any part of the file to be changed while allowing a new aggregate hash to be computed based on the revised file portion and the prior total hash. The aggregate hash is readily updatable with each record revision without having to recompute the hash of the entire file in accordance with conventional techniques. These objectives are accomplished using two functions. The first function is an effective one-way hash function "H" for which it is computationally impossible to find two data values that hash to the same result. The second function is a commutative and associative function "F" (and inverse "Finv") and provides a mechanism for combining the aggregate hash and the hash of updated records. Examples of these latter functions include exclusive OR ("XOR") and arithmetic addition. The hash of each file record and the hash of an identification of the record (i.e., a record number or key) are combined using a function ("F") whereby individual records may be extracted using the inverse of that function (Finv). In this fashion, an individual record may be extracted from the aggregate hash and updated. Each record is represented by its identification hashed together with its data content. All such record hashs are added together to provide a highly secure integrity check. This aggregate hash covers the entire database such that the tampering (or rearranging) of any data record is revealed by the use of the record identifier (i.e., record number) in the hash calculation due to its impact on the aggregate hash (e.g., the sum).

REFERENCES:
patent: Re34954 (1995-05-01), Haber et al.
patent: 4290105 (1981-09-01), Cichelli et al.
patent: 4352952 (1982-10-01), Boone et al.
patent: 4588991 (1986-05-01), Atalla
patent: 5182799 (1993-01-01), Tamura et al.
patent: 5199073 (1993-03-01), Scott
patent: 5204966 (1993-04-01), Wittenberg et al.
patent: 5208853 (1993-05-01), Armbruster et al.
patent: 5297208 (1994-03-01), Schlafly et al.
patent: 5319712 (1994-06-01), Finkelstein et al.
patent: 5432852 (1995-07-01), Leighton et al.
patent: 5475826 (1995-12-01), Fischer
patent: 5483598 (1996-01-01), Kaufman et al.
"The Art of Digital Audio", John Watkinson, Chapter 7, pp. 201-247, 1988.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for protecting a volatile file using a single hash does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for protecting a volatile file using a single hash, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for protecting a volatile file using a single hash will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-809393

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.