Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

217 results about "MD5" patented technology

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption. It remains suitable for other non-cryptographic purposes, for example for determining the partition for a particular key in a partitioned database.

System and method for secure storage, transfer and retrieval of content addressable information

An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key for the encryption algorithm. An algorithm is then applied to the encrypted file to produce an IUI for the encrypted file. The encrypted file is safely stored or transferred within a network and is uniquely identifiable by its IUI. The encrypted file is decrypted using the IUI of the plaintext file as the key. The IUI serves as both a key to decrypt the file and also as verification that the integrity of the plaintext file has not been compromised. IUIs for any number of such encrypted files may be assembled into a descriptor file that includes meta data for each file, the IUI of the plaintext file and the IUI of the encrypted file. An algorithm is applied to the descriptor file to produce an IUI for the descriptor file. The plaintext descriptor file is then encrypted using the descriptor file IUI as a key for the encryption algorithm. An algorithm is applied to the encrypted descriptor file to produce an IUI for the encrypted descriptor file. The IUI of the encrypted descriptor file is a location-independent identifier to locate the encrypted descriptor file. A flattened descriptor file includes the IUIs of encrypted data files and the IUI of the encrypted descriptor file. An algorithm is applied to the flattened descriptor file to produce its own IUI.
Owner:EMC CORP

System and method for secure storage, transfer and retrieval of content addressable information

An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key for the encryption algorithm. An algorithm is then applied to the encrypted file to produce an IUI for the encrypted file. The encrypted file is safely stored or transferred within a network and is uniquely identifiable by its IUI. The encrypted file is decrypted using the IUI of the plaintext file as the key. The IUI serves as both a key to decrypt the file and also as verification that the integrity of the plaintext file has not been compromised. IUIs for any number of such encrypted files may be assembled into a descriptor file that includes meta data for each file, the IUI of the plaintext file and the IUI of the encrypted file. An algorithm is applied to the descriptor file to produce an IUI for the descriptor file. The plaintext descriptor file is then encrypted using the descriptor file IUI as a key for the encryption algorithm. An algorithm is applied to the encrypted descriptor file to produce an IUI for the encrypted descriptor file. The IUI of the encrypted descriptor file is a location-independent identifier to locate the encrypted descriptor file. A flattened descriptor file includes the IUIs of encrypted data files and the IUI of the encrypted descriptor file. An algorithm is applied to the flattened descriptor file to produce its own IUI.
Owner:EMC IP HLDG CO LLC

Content addressable information encapsulation, representation, and transfer

Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The assets selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location. The asset identifiers from the retrieved asset list are used to find and retrieve the individual assets from their backup locations. The assets are verified by recomputing the cryptographic hash asset identifier for each asset retrieved and comparing it to the asset identifier from the asset list. The MD5 algorithm is used for the cryptographic hash function. Assets are retrieved using a multicast protocol. A series of importer programs searches for assets to retrieve in progressively more remote locations. Assets are retrieved whole or in segments.
Owner:EMC CORP

System and method for secure storage, transfer and retrieval of content addressable information

An algorithm (such as the MD5 hash function) is applied to a file to produce an intrinsic unique identifier (IUI) for the file (or message digest). The file is encrypted using its IUI as the key for the encryption algorithm. An algorithm is then applied to the encrypted file to produce an IUI for the encrypted file. The encrypted file is safely stored or transferred within a network and is uniquely identifiable by its IUI. The encrypted file is decrypted using the IUI of the plaintext file as the key. The IUI serves as both a key to decrypt the file and also as verification that the integrity of the plaintext file has not been compromised. IUIs for any number of such encrypted files may be assembled into a descriptor file that includes meta data for each file, the IUI of the plaintext file and the IUI of the encrypted file. An algorithm is applied to the descriptor file to produce an IUI for the descriptor file. The plaintext descriptor file is then encrypted using the descriptor file IUI as a key for the encryption algorithm. An algorithm is applied to the encrypted descriptor file to produce an IUI for the encrypted descriptor file. The IUI of the encrypted descriptor file is a location-independent identifier to locate the encrypted descriptor file. A flattened descriptor file includes the IUIs of encrypted data files and the IUI of the encrypted descriptor file. An algorithm is applied to the flattened descriptor file to produce its own IUI.
Owner:EMC CORP +1

Method and system for verification of consistency of backup data of host database and backup database

ActiveCN104021132AImprove the efficiency of consistency check backupGood for security auditSpecial data processing applicationsRedundant operation error correctionMD5Engineering
A method for verification of consistency of backup data of a host database and a backup database comprises the steps of (1) reading the data of the host database and the backup database, and hashing the data in the host database and the backup database one by one by means of the MD5 informative abstract algorithm; (2) comparing the MD5 hashed value of the data in the host database with the MD5 hashed value of the data in the backup database by means of the quick search algorithm, and generating a comparison result LOG file by means of the labeling method; (3) acquiring corresponding service data in the host database according to the comparison result LOG file, and updating the service data to the comparison result LOG file; (4) achieving incremental backup of the backup database and updating of a backup operation LOG sheet of the backup database simultaneously according to the LOG file. According to the method, by conducting MD5 hashing on the host database and the backup database and comparing the two MD5 hashed values by means of the binary quick search algorithm, verification efficiency is improved, and mass backup data consistency verification efficiency is improved.
Owner:ZHENGZHOU IMAN TECH DEV +1

Content addressable information encapsulation, representation, and transfer

Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The assets selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location. The asset identifiers from the retrieved asset list are used to find and retrieve the individual assets from their backup locations. The assets are verified by recomputing the cryptographic hash asset identifier for each asset retrieved and comparing it to the asset identifier from the asset list. The MD5 algorithm is used for the cryptographic hash function. Assets are retrieved using a multicast protocol. A series of importer programs searches for assets to retrieve in progressively more remote locations. Assets are retrieved whole or in segments.
Owner:EMC IP HLDG CO LLC

Method for preventing in-car terminal from being detached

The invention relates to an anti-detachment technology field, in particular to a method for preventing an in-car terminal from being detached. The method includes: 1) stipulating a fixed password between the in-car terminal and a vehicle ECU; 2) generating a random password R by the vehicle ECU, joining the fixed password of the vehicle ECU with the random password R, generating an MD5 encrypted value which is a dynamic password A, sending a heartbeat interactive request to the in-car terminal by the vehicle ECU through a CAN bus, wherein a frame of the heartbeat interactive request contains the random password R; 3) after a CAN transceiver of the in-car terminal receives the heartbeat interactive request of the vehicle ECU, extracting the random password R, joining the fixed password of the in-car terminal with the random password R by the in-car terminal, generating an MD5 encrypted value which is a dynamic password B, and sending the dynamic password B to the vehicle ECU through the CAN transceiver, wherein the dynamic password B is used as a heartbeat frame; 4) after the vehicle ECU receives the heartbeat frame, comparing the dynamic password A with the dynamic password B, and if the dynamic password A coincides with the dynamic password B, determining that the in-car terminal is normal, otherwise determining that the in-car terminal is detached. The method has a characteristic of high safety.
Owner:XIAMEN YAXON NETWORKS CO LTD

Anti-crawler data query method and device as well as client and server

The invention provides an anti-crawler data query method and device as well as a client and a server, relating to the field of internet communication technology. The anti-crawler data query method is applied to the client, and comprises the following steps: communicating with the server to obtain the service time of the server; issuing an encryption string and a timestamp when accessing a server interface each time, and simultaneously marking an operation system and a unique equipment identifier of the client for the server to perform verification, wherein the encryption string is a key, a formatted timestamp and application keywords that are encrypted by using MD5; setting a unique key value of the client to a web page control for an HTML5 end to verify the web page control; and supplying the encryption string and the timestamp to the HTML5 end to ensure that the HTML5 end carries the encryption string and the timestamp to request services from the server to further achieve data query. Thereby, non-login users can query data freely, the phenomenon that a large amount of data is crawled by abnormal users can also be prevented, the pressure of operation and maintenance layers can be reduced, and junk data of interface layers can be reduced.
Owner:九次方大数据信息集团有限公司

Method and system for synchronizing databases of client side and server side during automated testing

The invention discloses a method and a system for synchronizing databases of a client side and a server side during automated testing, and relates to the field of automated testing of application programs. The method comprises the following steps: when an application program is subjected to automated testing on the client side, the client side initiates a database information acquisition request to the server side; the client side acquires and analyzes the database information returned by the server side, splices database version acquired through analysis, database document size and database name form a character string, performs MD5 check on the character string and generates a local MD5 check code; and when the local MD5 check code is equal to an MD5 check value and the value of the database version acquired through analysis is more than the value of the local database version of the client side, the client side downloads the database document on the server side according to the database downloading address. According to the method and the system, the testing efficiency of the automated testing can be improved and the testing cost can be reduced; and the method and the system are very convenient for people to use and suitable for popularization.
Owner:WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products