Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2005-08-09
2005-08-09
Morse, Gregory (Department: 2134)
Cryptography
Particular algorithmic function encoding
C380S209000, C380S046000, C380S059000, C380S217000, C713S154000, C713S164000, C713S167000, C713S194000, C713S190000, C370S392000
Reexamination Certificate
active
06928162
ABSTRACT:
A method and system for providing a hash and a complement of the hash for an item in a computer system are disclosed. The method and system include providing a plurality of components from the item. The plurality of components include a first component and a last component. Each of the plurality of components includes a particular number of bits. The method and system also include cascading the plurality of components through at least one XOR to provide a plurality of resultants. The plurality of resultants includes a first resultant and a final resultant. The final resultant includes only the last component. The first resultant includes an XOR of the first component and remaining cascaded components of the plurality of components. The method and system also include applying an invertible hash function and an invertible hash function complement to at least the first resultant to provide the hash. The complement of the hash includes the plurality of resultants except the first resultant. In another aspect, the method and system include applying the invertible hash function and its complement to at least the first component of the plurality of components, before the plurality of components are cascaded through the at least one XOR. In this aspect, the hash includes the first resultant. The complement of the hash includes the plurality of resultants except the first resultant.
REFERENCES:
patent: 5623545 (1997-04-01), Childs et al.
patent: 5757795 (1998-05-01), Schnell
patent: 5802525 (1998-09-01), Rigoutsos
patent: 5852607 (1998-12-01), Chin
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 5978951 (1999-11-01), Lawler et al.
patent: 6014733 (2000-01-01), Bennett
patent: 6047362 (2000-04-01), Zucker
patent: 6185208 (2001-02-01), Liao
patent: 6230231 (2001-05-01), DeLong et al.
patent: 6424650 (2002-07-01), Yang et al.
patent: 6463537 (2002-10-01), Tello
patent: 6654796 (2003-11-01), Slater et al.
patent: 6675163 (2004-01-01), Bass et al.
patent: 822720 (1998-02-01), None
patent: 849713 (1998-06-01), None
patent: 886399 (1998-12-01), None
patent: 905967 (1999-03-01), None
patent: WO9914881 (1999-03-01), None
Debis et al., “Using Self-Organizing Maps to Learn Geometric Hash Functions for Model-Based Objct Recognition”, IEEE Transactions On Neural Networks, vol. 9, No. 3, May 1998.
Bruce Schneier, “Applied Crytpgraphy, Protocols, Algorithms, and Source Code in C”, 1996, John Wiley & Sons, Inc. Second Edition, p. 237.
Craig Hunt, “TCP/IP Network Adminstration”, 1998, O'Reilly & Associates, Inc., Second Edition, p. 13.
Raj Jain, “A Comarison of Hashing Schemes for Address Lookup in Computer Networks”, 1992, IEEE Transactions on Communication, vol. 40, No. 10, p. 1570-1573.
Heddes Marco C.
Jeffries Clark Debs
Patel Piyush Chunilal
International Business Machines - Corporation
Morse Gregory
Sawyer Law Group LLP
Tran Tongoc
LandOfFree
Method and system for manipulating and telescoping a hash... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for manipulating and telescoping a hash..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for manipulating and telescoping a hash... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3475706