Using Hash Function Patents (Class 707/698)
  • Publication number: 20130290285
    Abstract: In one embodiment, circuitry may generate digests to be combined to produce a hash value. The digests may include at least one digest and at least one other digest generated based at least in part upon at least one CRC value and at least one other CRC value. The circuitry may include cyclical redundancy check (CRC) generator circuitry to generate the at least one CRC value based at least in part upon at least one input string. The CRC generator circuitry also may generate the at least one other CRC value based least in part upon at least one other input string. The at least one other input string resulting at least in part from at least one pseudorandom operation involving, at least in part, the at least one input string. Many modifications, variations, and alternatives are possible without departing from this embodiment.
    Type: Application
    Filed: November 1, 2011
    Publication date: October 31, 2013
    Inventors: Vinodh Gopal, James D. Guilford, Schuyler Eldridge, Gilbert M. Wolrich, Erdinc Ozturk, Wajdi K. Feghali
  • Patent number: 8572055
    Abstract: A method, system and apparatus for efficient storage of small files in a segment-based deduplication scheme by allocating multiple small files to a single data segment is provided. A mechanism for distinguishing between large files (e.g., files that are on the order of the size of a segment or larger) and smaller files, and starting a new segment at the beginning of a large file is also provided. A file attribute-based system for determining an identity of a small file at which to begin a new segment and then allocating subsequent small files to that segment and contiguous segments until a next small file having an appropriate attribute subsequently is encountered to begin a new segment is further provided. In one aspect of the present invention a filename hash is used for file attribute analysis to determine when a new segment should begin.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: October 29, 2013
    Assignee: Symantec Operating Corporation
    Inventors: Weibao Wu, Michael John Zeis
  • Publication number: 20130282679
    Abstract: The present invention refers to a computer-implemented method of anonymizing data of a database (2), wherein the method comprises the following steps: a. exporting at least one data record (10) from the database (2), wherein the data record (10) has a structure and comprises content (100); and b. anonymizing at least part of the content (100) to produce at least one anonymized data record (3); c. wherein the anonymized data record (3) has the same structure than the data record (10) read from the database (2).
    Type: Application
    Filed: May 24, 2012
    Publication date: October 24, 2013
    Inventors: Gerald KHIN, Mathias Prowald
  • Patent number: 8566295
    Abstract: A method for storing electronic data blocks at a storage facility uses a public database and a select database. Hash for each data block is evaluated at the facility to determine whether the data block is already stored at the facility. New data blocks are assigned a new address in the select database when encrypted with a customer key. Otherwise, they are assigned a new address in the public database by default. Duplicate data blocks are assigned a previously established address for the data block in either the public or select database. All addresses are then sent to the customer location for file integrity and only the content of new data blocks need to be sent to the storage facility (i.e. no need for duplicates).
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: October 22, 2013
    Inventor: John E. G. Matze
  • Patent number: 8566606
    Abstract: An apparatus and methods that use trusted platform modules (TPM) to perform integrity measurements of multiple subsystems are disclosed. The state of platform configuration registers (PCRs) after boot up are stored as the base state of the system. In another embodiment, and application that is to be verified requests that its state be extended from the base state of the system. When such a request is received, the state of the system is extended directly from the base state PCR contents and not from the system state. In another embodiment, a virtual PCR is used, where such a virtual PCR uses a larger memory space than a conventional TPM provides for a physical PCR, by use of encrypted storage on external, protected memory.
    Type: Grant
    Filed: April 23, 2007
    Date of Patent: October 22, 2013
    Assignee: InterDigital Technology Corporation
    Inventors: Sasidhar Movva, Richard D. Herschaft, Renuka Racha, Inyhok Cha
  • Publication number: 20130262421
    Abstract: A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (CPUs). The hash function uses random secret data so that hash keys for particular data are difficult to predict. Due to its internal structure, well-chosen random secret data is difficult for an attacker to counter without having access to the direct output of the hash function. At every stage of the block function, there are at least two operations that can be performed in parallel, increasing performance on modern superscalar CPUs. Thus, the resilient hashing system provides a hash table and checksum that can be used in Internet-facing or other vulnerable sources of input data to manage performance in the face of malicious attacks.
    Type: Application
    Filed: November 19, 2012
    Publication date: October 3, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Niels Ferguson, Reid Borsuk, Jeffrey Cooperstein, Matthew Ellis
  • Patent number: 8549303
    Abstract: A method for electronically signing an electronic transcript. The method includes obtaining an image of a court reporter's signature which may be incorporated into an electronic transcript. A hash operation performed on the electronic transcript to generate a representation of the contents of the electronic transcript. The representation of the contents of the electronic transcript is recorded/time stamped by a digital notary service, from which a notary record of the time stamping is obtained from the digital notary service. The notary record is digitally signed, and an electronically signed electronic transcript is formed by bundling the digitally signed notary record with the electronic transcript and with the data identifying the user. In this manner, an electronic transcript with an electronic signature is created. The electronic transcript may be viewed, with the image displayed in the viewer having an image of the court reporter's signature.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: October 1, 2013
    Assignee: West Services, Inc.
    Inventors: Davin Fifield, Kevin Koch
  • Patent number: 8548953
    Abstract: A method and apparatus for removing duplicated data in a file system utilizing the concept of storage tiers. A synthetic namespace is created via file virtualization, and is comprised of one or more file systems. Deduplication is applied at the namespace level and on all of the file systems comprising the synthetic namespace. All files in a file system in a higher storage tier whose contents are identical to at least one other file in the synthetic namespace are moved to a destination file system in a lower storage tier. For each set of duplicated files that are moved from the original servers, a single instance copy of the file is left behind as a mirror copy. Read access to a duplicated file is redirected to its mirror copy. When the first write to a duplicated file is received, the association from the duplicated file stored in the destination server to its mirror copy that is stored in the origin server is discarded.
    Type: Grant
    Filed: November 11, 2008
    Date of Patent: October 1, 2013
    Assignee: F5 Networks, Inc.
    Inventors: Thomas K. Wong, Ron S. Vogel
  • Patent number: 8549022
    Abstract: Surrogate heuristic identification is described, including a memory configured to store data associated with content, and a processor configured to select a portion of the content and the portion is standardized, to identify a characteristic associated with the portion, to use the characteristic to generate a data representation, the data representation being used to provide heuristic data, and to process the heuristic data to generate a fingerprint configured to compare against one or more stored fingerprints.
    Type: Grant
    Filed: July 2, 2007
    Date of Patent: October 1, 2013
    Assignee: Datascout, Inc.
    Inventor: Charles Kaminski, Jr.
  • Publication number: 20130254167
    Abstract: Hashes of metadata of digital photographs on, e.g., a removable camera memory are compared against values in a hash table representing previously stored photographs on an archive computer to ensure that only previously unstored photos are copied onto the archive computer.
    Type: Application
    Filed: May 23, 2013
    Publication date: September 26, 2013
    Applicants: SONY ELECTRONICS INC., SONY CORPORATION
    Inventors: Paul Jin Hwang, Rachel Thuy Nguyen, Guoxuan Zhang, Jianyu Roy Zheng
  • Patent number: 8543551
    Abstract: Example apparatus, methods, and computers participate in collaborative, distributed, data de-duplication. One example method includes initializing a layered parser in a first node in a collaborative distributed data de-duplication (CDDD) topology with a first set of de-duplication control parameters. After transmitting some information to another node in the CDDD topology, the method includes selectively reconfiguring the layered parser in response to feedback acquired from the second node in the CDDD topology. The feedback concerns the data provided by the layered parser.
    Type: Grant
    Filed: July 14, 2011
    Date of Patent: September 24, 2013
    Inventor: Jeffrey Vincent Tofano
  • Patent number: 8543543
    Abstract: Concepts and technologies are described herein for hash-based file comparison. In accordance with the concepts and technologies disclosed herein, a comparison tool is configured to compare hash values in a first hash list associated with a first file to hash values in a second hash list corresponding to a second file. The hash values are computed for functional blocks of the respective files and therefore can be compared to indicate if the functional blocks of the two files match one another. If the hash values match, the functional blocks associated with the respective hash values can be determined to match, while hash values that do not match can indicate that the corresponding functional blocks do not match one another.
    Type: Grant
    Filed: September 13, 2011
    Date of Patent: September 24, 2013
    Assignee: Microsoft Corporation
    Inventors: Michael Ronn Marcelais, Shawn Thomas Sullivan, James Coryell Hilke
  • Publication number: 20130246378
    Abstract: A system, method, and computer program product are provided for outputting a signal based on a partial hash comparison. In use, data is identified. In addition, a partial hash is determined utilizing a portion of the data. Further, the partial hash is compared with a plurality of known partial hashes, and an additional hash is conditionally determined based on the comparison. Still yet, a signal is output based on the comparison.
    Type: Application
    Filed: April 30, 2007
    Publication date: September 19, 2013
    Inventors: Stephen Owen Hearnden, Anthony Vaughan Bartram
  • Patent number: 8538926
    Abstract: Several different embodiments of a massively scalable object storage system are described. The object storage system is particularly useful for storage in a cloud computing installation whereby shared servers provide resources, software, and data to computers and other devices on demand. In several embodiments, the object storage system includes a ring implementation used to associate object storage commands with particular physical servers such that certain guarantees of consistency, availability, and performance can be met. In other embodiments, the object storage system includes a synchronization protocol used to order operations across a distributed system. In a third set of embodiments, the object storage system includes a metadata management system. In a fourth set of embodiments, the object storage system uses a structured information synchronization system. Features from each set of embodiments can be used to improve the performance and scalability of a cloud computing object storage system.
    Type: Grant
    Filed: April 19, 2011
    Date of Patent: September 17, 2013
    Assignee: Rackspace US, Inc.
    Inventors: Michael Barton, Will Reese, John A. Dickinson, Jay B. Payne, Charles B. Thier, Gregory Holt
  • Patent number: 8538937
    Abstract: A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database server residing on a network that stores predetermined data, and a client terminal issuing to the database server a search request for inquiring for desired data while keeping the desired data secret. The database server further comprises: a database storing predetermined data; and a search response message generation unit for receiving through a network the data search request in which data to be searched for is kept secret, searching the database by a predetermined computation based on the search request and a list of the data stored in the database while a data item involved with the search request is kept secret, and generating a response to the search request.
    Type: Grant
    Filed: April 22, 2003
    Date of Patent: September 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Masayuki Numao, Yuji Watanabe
  • Patent number: 8538938
    Abstract: A method for validating outsourced processing of a data stream arriving at a streaming data warehouse of a data service provider includes a proof protocol. A verifier acting on behalf of a data owner of the data stream may interact with a prover acting on behalf of the data service provider. The verifier may calculate a first root hash value of a binary tree during single-pass processing of the original data stream with limited computational effort. A second root hash value may be calculated using the proof protocol between the verifier and the prover. The prover is requested to provide certain queried values before receiving random numbers used to generate subsequent responses dependent on the provided values. The proof protocol may be used to validate the data processing performed by the data service provider.
    Type: Grant
    Filed: December 2, 2010
    Date of Patent: September 17, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Graham Cormode, Ke Yi
  • Patent number: 8527952
    Abstract: A test coverage analysis method and corresponding apparatus are disclosed, wherein, by executing the program under test using one or more test cases, generating one or more heapdump files containing the call stack information of the program under test, and analyzing the call stack information in the one or more heapdump files, the coverage information of the one or more test cases in terms of functions in the program under test is obtained.
    Type: Grant
    Filed: August 25, 2009
    Date of Patent: September 3, 2013
    Assignee: International Business Machines Corporation
    Inventors: Chun Guang Zeng, Zhi Zhang
  • Patent number: 8528081
    Abstract: A memory system includes a storage device storing a plurality of instructions and a central processing unit processing an instruction fetched from the storage device, wherein the central processing unit detects a change in the instruction fetched from the storage device while processing the instruction.
    Type: Grant
    Filed: December 7, 2009
    Date of Patent: September 3, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jimyung Na, Gijin Kang, Jung-Hyun Kim
  • Publication number: 20130226888
    Abstract: Systems and methods including storage systems that employ local file caching processes and that generate state variables to record, for subsequent use, intermediate states of a file hash process. In certain specific examples, there are systems that interrupt a hash process as it processes the data blocks of a file, and stores the current product of the interrupted hash process as a state variable that represents the hash value generated from the data blocks processed prior to the interruption. After interruption, the hash process continues processing the file data blocks. The stored state variables may be organized into a table that associates the state variables with the range of data blocks that were processed to generate the respective state variable. Such exemplary systems can be used with any type of storage system, including filers, database systems or other storage applications.
    Type: Application
    Filed: February 28, 2012
    Publication date: August 29, 2013
    Applicant: NetApp, Inc.
    Inventors: Subin Govind, Ajeet B. Kumar
  • Patent number: 8521705
    Abstract: Mechanisms are provided for accelerated data deduplication. A data stream is received an input interface and maintained in memory. Chunk boundaries are detected and chunk fingerprints are calculated using a deduplication accelerator while a processor maintains a state machine. A deduplication dictionary is accessed using a chunk fingerprint to determine if the associated data chunk has previously been written to persistent memory. If the data chunk has previously been written, reference counts may be updated but the data chunk need not be stored again. Otherwise, datastore suitcases, filemaps, and the deduplication dictionary may be updated to reflect storage of the data chunk. Direct memory access (DMA) addresses are provided to directly transfer a chunk to an output interface as needed.
    Type: Grant
    Filed: December 1, 2011
    Date of Patent: August 27, 2013
    Assignee: Dell Products L.P.
    Inventors: Vinod Jayaraman, Goutham Rao
  • Patent number: 8522201
    Abstract: Methods and apparatus for on-the-fly identification of sub-asset modifications in a data pipeline are described.
    Type: Grant
    Filed: November 9, 2010
    Date of Patent: August 27, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Baback Elmieh, Rachid El Guerrab, Andi Terrence Smithers
  • Publication number: 20130212078
    Abstract: A method for detecting and combating an attack in an industrial control system includes sending a command stream from a protection network of an industrial control system to at least one zone, the command stream comprising at least one command; concatenating the at least one command into at least one sequential command package comprising units or work; passing the at least one sequential command package to a crypto hash generator; generating at least one of unit of work hash codes or sequence hash codes; comparing the generated hash codes against a database of existing valid unit of work hash codes and sequence hash codes; and if a command stream fault is detected, generating an alert and accessing a database comprising emergency procedures.
    Type: Application
    Filed: February 10, 2012
    Publication date: August 15, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: John Wilson
  • Patent number: 8510322
    Abstract: A search environment of an embodiment includes name mining and matching features used in part to identify people-centric queries and provide an enriched search experience, but is not so limited. A method of an embodiment operates to provide an expanded query based in part on a geometric similarity measure, an edit distance measure, a string similarity measure, and a cumulative similarity measure. A search system of an embodiment includes a mined candidate generator component and a name matcher component used in part to identify name queries and provide an expanded query that includes original query terms and one or more valid mined names. Other embodiments are also disclosed.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: August 13, 2013
    Assignee: Microsoft Corporation
    Inventors: Aninda Ray, Dmitriy Meyerzon, Uppinakuduru Raghavendra Udupa
  • Patent number: 8510280
    Abstract: A system, method, and computer-readable medium for dynamic detection and management of data skew in parallel join operations are provided. Rows allocated to processing modules involved in a join operation are redistributed among the processing modules by a hash redistribution of the join attributes. Receipt by a processing module of an excessive number of redistributed rows having a skewed value on the join attribute is detected by a processing module which notifies other processing modules of the skewed value. Processing modules then terminate redistribution of rows having a join attribute value matching the skewed value and either store such rows locally or duplicate the rows. The processing module that has received an excessive number of redistributed rows removes rows having a skewed value of the join attribute from a redistribution spool allocated thereto and duplicates the rows to each of the processing modules.
    Type: Grant
    Filed: June 30, 2009
    Date of Patent: August 13, 2013
    Assignee: Teradata US, Inc.
    Inventors: Yu Xu, Olli Pekka Kostamaa, Xin Zhou
  • Patent number: 8510279
    Abstract: In one aspect, a method includes determining locations in a file that have changed using read signature commands, reading data around a changed file location for each file location that has changed, generating variable-size portions of the data read and sending the variable-size portions of the data to a backup system.
    Type: Grant
    Filed: March 15, 2012
    Date of Patent: August 13, 2013
    Assignee: EMC International Company
    Inventors: Assaf Natanzon, Zvi Gabriel BenHanokh
  • Patent number: 8504480
    Abstract: A method and system for authenticating applications. The system includes a plurality of portable electronic devices, at least one process organizer, at least one module developer, at least one task performer and a workflow server. The process organizer generates an application. The process organizer can request modules from module developers that are incorporated into the application. Alternatively, the process organizer makes an agreement with a task performer to perform tasks to complete the application. The application is transmitted to the workflow server, which includes an online marketplace for displaying and selling the applications. A user purchases the application through the store. A routing module generates a signature and compares the signature to application, module or document metadata and a secret to determine consistency of the data before the application, module or document is routed.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: August 6, 2013
    Assignee: Ricoh Co., Ltd
    Inventor: Kurt W. Piersol
  • Patent number: 8504533
    Abstract: Example apparatus and methods concern de-duplication reference tag reconciliation associated with garbage collection and/or reference health checking. One example method may include accessing data associated with members of a set of references to blocks of data stored by a data de-duplication system. The method may process the first data to manipulate a Bloom filter into a state from which membership in the set of references can be assessed. The method may also include accessing a block identifier identified with a member of the set of blocks of data stored by the data de-duplication system and assessing membership in the set of references for the block identifier by querying the Bloom filter with the block identifier. If the block is not referenced, as determined by querying the Bloom filter, then the method may include performing a block reclamation action on the unreferenced block.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: August 6, 2013
    Inventors: Matthew Dewey, Roderick B. Wideman
  • Patent number: 8495037
    Abstract: A system for efficient isolation of backup versions of data objects affected by malicious software includes one or more processors and a memory coupled to the processors. The memory comprises program instructions executable by the processors to implement a backup manager configured to receive an indication that a data object is infected by malicious software. In response to the indication, the backup manager is configured to identify a particular backup version of the data object to be excluded from a data set to be used for a restore operation.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: July 23, 2013
    Assignee: Symantec Operating Corporation
    Inventor: Guido Westenberg
  • Patent number: 8495038
    Abstract: According to certain embodiments, a characteristic function representing data is received. A first hash code calculated from the characteristic function is received. The characteristic function is transformed to an arithmetic function. A second hash code is calculated from the arithmetic function. If the first hash code equals the second hash code, the data is designated as valid; otherwise, the data is designated as invalid.
    Type: Grant
    Filed: August 17, 2010
    Date of Patent: July 23, 2013
    Assignee: Fujitsu Limited
    Inventors: Stergios Stergiou, Jawahar Jain
  • Patent number: 8495028
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for removing redundant data from a storage system. In one example, a data delineation process delineates data targeted for de-duplication into regions using a plurality of markers. The de-duplication system determines which of these regions should be subject to further de-duplication processing by comparing metadata representing the regions to metadata representing regions of a reference data set. The de-duplication system identifies an area of data that incorporates the regions that should be subject to further de-duplication processing and de-duplicates this area with reference to a corresponding area within the reference data set.
    Type: Grant
    Filed: September 8, 2010
    Date of Patent: July 23, 2013
    Assignee: Sepaton, Inc.
    Inventors: Timmie G. Reiter, Carey Jay McMaster, Ronald Ray Trimble, Stefan Merrill King, David Michael Biernacki, Jon Christopher Kennedy
  • Patent number: 8489548
    Abstract: A method for data synchronization (DS) is provided, which includes comparing data fingerprints in databases of two parties in need of DS, determining data that needs to be synchronized, and DS is then performed on the data that needs to be synchronized. A system and two devices for DS are further provided. Therefore, DS is implemented through data fingerprints in the technical solutions, thus avoiding transmitting a mass of data between the two parties in need of DS.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: July 16, 2013
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Rui Wang, Kepeng Li
  • Patent number: 8477050
    Abstract: A system and method for redundant transmission is provided. In one embodiment, an input signal S is encoded as a list of fragments. Each fragment includes an index value and a projection value. The index points to an entry in a dictionary of signal elements. A repetition factor is assigned to each fragment based on its importance. After a fragment is added, a reconstructed signal is generated by decoding the list of fragments. Encoding terminates once the reconstructed signal is sufficiently close to the original signal S.
    Type: Grant
    Filed: September 15, 2011
    Date of Patent: July 2, 2013
    Assignee: Google Inc.
    Inventor: Pascal Massimino
  • Patent number: 8458741
    Abstract: To permit non-TV CE devices to participate in a closed Internet Protocol television (IPTV) program, a non-TV CE device obtains a TV identification upon program registration which it subsequently uses to access content from the IPTV program.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: June 4, 2013
    Assignee: Sony Corporation
    Inventors: True Xiong, Leo Pedlow
  • Publication number: 20130138607
    Abstract: Mechanisms are provided for efficient resynchronization of replicated data. A hash value is generated for a chunk of data replicated from a source node to a target node. The chunk of data may be a file deduplicated and compressed at both a source node and a target node. A current sequence number is determined and a sequence number and hash tuple is maintained for the chunk of data at both the source node and the target node. Sequence numbers are modified whenever the data is modified. Current sequence numbers and sequence number and hash values in the sequence number hash tuples at the source node and the target node may be compared to determine whether data is still synchronized at a later point in time or whether data requires resynchronization.
    Type: Application
    Filed: November 29, 2011
    Publication date: May 30, 2013
    Applicant: DELL Products L.P.
    Inventors: Murali Bashyam, Sreekanth Garigala
  • Publication number: 20130138620
    Abstract: Described are embodiments of an invention for identifying chunk boundaries for optimization of fingerprint-based deduplication in a computing environment. Storage objects that are backed up in a computing environment are often compound storage objects which include many individual storage objects. The computing device of the computing environment breaks the storage objects into chunks of data by determining a hash value on a range of data. The computing device creates an artificial chunk boundary when the end of data of the storage object is reached. When an artificial chunk boundary is created for the end of data of a storage object, the computing device stores a pseudo fingerprint for the artificial chunk boundary. If a hash value matches a fingerprint or a pseudo fingerprint, then the computing device determines that the range of data corresponds to a chunk and the computing system defines the chunk boundaries.
    Type: Application
    Filed: November 28, 2011
    Publication date: May 30, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark L. Yakushev, Mark A. Smith
  • Patent number: 8452880
    Abstract: Embodiments of the present invention include a method and system for verifying intended contents of an electronic message comprising: accessing an electronic message destined for a recipient comprising a link to an intended data source. The method further includes accessing the intended data source and computing a first message digest value associated with the intended data source. Additionally, the method includes sending the electronic message and the first message digest value to the recipient. The recipient side may check the message digest value against a recently generated value and alert the recipient of any digest mismatch that represents a recent change in the intended data source.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: May 28, 2013
    Assignee: Oracle International Corporation
    Inventor: Anuj Jain
  • Patent number: 8452731
    Abstract: In one embodiment of the present invention, a data-backup method includes partitioning a fingerprint namespace among a cluster of backup servers, the fingerprint namespace comprising fingerprints for representing units of data, each backup server of the cluster of backup servers managing units of data having fingerprints corresponding to an assigned partition of the fingerprint namespace. The method further includes receiving backup information from a client computing device for a block of data comprising units of data, the backup information including at least a fingerprint for each of the units of data and client-specific backup information. In addition, the method includes, utilizing the fingerprint for each of the units of data, deduplicating the units of data in parallel at the cluster of backup servers in accordance with the partitioning step, the deduplicating step comprising identifying ones of the units data already stored by the cluster of backup servers.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: May 28, 2013
    Assignee: Quest Software, Inc.
    Inventors: Kenneth Preslan, Matthew T. O'Keefe, Todd Ortberg
  • Patent number: 8452736
    Abstract: A system and method include selecting a file for potential backing up. A metadata signature is calculated on the selected file. The metadata signature of the selected file is compared to a metadata signature of a corresponding file already backed up. The file is only backed up the file if the signatures do not match.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: May 28, 2013
    Assignee: CA, Inc.
    Inventors: Chandra Reddy, Prashant Parikh
  • Patent number: 8448169
    Abstract: Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend functionality of a kernel when loaded. In some embodiments, the first instance of the operating system is managed by a second instance of the operating system (e.g., the first instance of the operating system is a virtual operating system and the second instance is a global operating system). The first and second instances of the operating system share the kernel. Some embodiments are further directed to generating a unique electronic identifier based on properties of the file. The unique electronic identifier uniquely identifies the file. Some embodiments are further directed to providing a copy of the file to the first instance of the operating system, and some time later, receiving a request from the first instances of the operating system to load the copy of the file.
    Type: Grant
    Filed: July 12, 2010
    Date of Patent: May 21, 2013
    Assignee: International Business Machines Corporation
    Inventors: Khalid Filali-Adib, Kevin L. Fought, David W. Sheffield, Nathaniel S. Tomsic, Sungjin Yook
  • Patent number: 8442942
    Abstract: In one embodiment, a method includes accessing data; partitioning the data into sub-blocks; determining whether a first one of the sub-blocks is identical to another one of the sub-blocks or similar to another one of the sub-blocks; if the first one of the sub-blocks is identical to another one of the sub-blocks, applying by the one or more computer systems hash-based deduplication to storage of the first one of the sub-blocks with respect to the other one of the sub-blocks; and, if the first one of the sub-blocks is similar to another one of the sub-blocks, applying by the one or more computer systems sub-block differencing to storage of the first one of the sub-blocks with respect to the other one of the sub-blocks.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: May 14, 2013
    Inventor: Andrew C. Leppard
  • Patent number: 8429205
    Abstract: A reference to auxiliary data is steganographically encoded within a media signal. The auxiliary data is stored in a metadata database that maps the reference encoded in the media signal to its corresponding metadata. Various application programs and devices can access the metadata by extracting the reference from the media signal, and querying the database for metadata corresponding to the reference. The metadata database may be implemented in a network server to make metadata readily available to devices and applications distributed throughout a network. This steganographic link to metadata may be used to retrieve metadata across media management systems. In one configuration, for example, media management systems have metadata servers that maintain metadata for a collection of media signals. The metadata server is responsible for responding to requests for metadata associated with media titles in its collection.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: April 23, 2013
    Assignee: Digimarc Corporation
    Inventor: Geoffrey B. Rhoads
  • Patent number: 8429143
    Abstract: Methods and systems for generating a hashcode for a hash table are provided to improve the hash table performance. A particular method includes receiving an input of a key; applying a hash function to the key to generate an incoming hashcode of the key; encoding a key type into the incoming hashcode to generate a first hashcode; and storing the first hashcode. A particular method includes encoding the key type into at least one bit of a bucket index portion of the incoming hashcode.
    Type: Grant
    Filed: April 25, 2008
    Date of Patent: April 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Timothy Peter Ellison, Nikola Grcevski, David Kevin Siegwart
  • Patent number: 8427664
    Abstract: An electronic file approval management system includes information terminal devices for a creator creating an electronic file and for an approver approving the file. The device for approver includes an electronic information transmitter-receiver storing and retrieving information with the device for creator, an input unit being input an approval result, a first print data converter converting the file into first print data, a first approval information extractor extracting first approval information, and a key creation unit creating an approval key.
    Type: Grant
    Filed: September 25, 2008
    Date of Patent: April 23, 2013
    Assignee: Oki Data Corporation
    Inventor: Osamu Iijima
  • Publication number: 20130097661
    Abstract: A method is provided in one example embodiment that includes identifying a file format identifier associated with a beginning of a file, parsing the file based on the file format identifier until an end of the file is identified, and calculating a hash from the beginning of the file to the end of the file. The method may also include sending the hash to a reputation system and taking a policy action based on the hash's reputation received from the reputation system.
    Type: Application
    Filed: October 18, 2011
    Publication date: April 18, 2013
    Inventors: Denys Lok Hang Ma, Vinay Mahadik, Swapnil Pathak
  • Patent number: 8423689
    Abstract: A communication control device includes a plurality of receive buffers each storing therein received information that corresponds to all or a part of a received message or an argument of a receive function, a hash-value generating unit that generates a hash value from a receive key contained in the received message in accordance with a hash-value generation rule, a storing unit that stores the received information in a selected one of the receive buffers corresponding to the hash value, and an output unit that outputs the received information from one of the receive buffers corresponding to the hash value in response to a transmission request from a receiving unit that performs a receiving operation by determining a matching based on a receive key specified by the receive function.
    Type: Grant
    Filed: February 10, 2009
    Date of Patent: April 16, 2013
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Noboru Tanabe
  • Publication number: 20130086017
    Abstract: A multi-dimensional perfect hash table construction technique is based on which the well-known AC automaton, and can be implemented by very compact perfect hash tables. The technique may place transitions, each from a source state to a destination state, of an automaton into a hash table to generate a perfect hash table by: (a) dividing the transitions into multiple independent sets according to their respective source states; (b) ordering the sets of transitions based on the number of transitions belonging to the set, thereby defining an order of the sets from largest to smallest; and (c) constructing a perfect hash table by, for each of the sets of transitions, in the order from largest to smallest, hashing the transitions of the set into the hashing table to generate a perfect hashing table.
    Type: Application
    Filed: March 1, 2012
    Publication date: April 4, 2013
    Inventors: H. Jonathan Chao, Yang Xu
  • Patent number: 8407193
    Abstract: Data deduplication compression in a streaming storage application, is provided. The disclosed deduplication process provides a deduplication archive that enables storage of the archive to, and extraction from, a streaming storage medium. One implementation involves compressing fully sequential data stored in a data repository to a sequential streaming storage, by: splitting fully sequential data into data blocks; hashing content of each data block and comparing each hash to an in-memory lookup table for a match, the in-memory lookup table storing all hashes that have been encountered during the compression of the fully sequential data; for each data block without a hash match, adding the data block as a new data block for compression of fully sequential data; and encoding duplicate data blocks using the in-memory lookup table into data segments.
    Type: Grant
    Filed: January 27, 2010
    Date of Patent: March 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Daniel F. Gruhl, Jan H. Pieper, Mark A. Smith
  • Patent number: 8401309
    Abstract: A mechanism is provided for security screening image analysis simplification through object pattern identification. Popular consumer electronics and other items are scanned in a control system, which creates an electronic signature for each known object. The system may reduce the signature to a hash value and place each signature for each known object in a “known good” storage set. For example, popular mobile phones, laptop computers, digital cameras, and the like may be scanned for the known good signature database. At the time of scan, such as at an airport, objects in a bag may be rotated to a common axis alignment and transformed to the same signature or hash value to match against the known good signature database. If an item matches, the scanning system marks it as a known safe object.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: March 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Joaquin Madruga, Barry L. Minor, Michael A. Paolini
  • Patent number: 8395996
    Abstract: Techniques that assist in processing of failure detection protocol (FDP) packets. Techniques are provided that assist a CPU of a network device in processing incoming FDP packets. In one embodiment, only a subset of FDP packets received by the network device is forwarded to the CPU for processing, the other FDP packets are dropped and not forwarded to the CPU. In this manner, the amount of processing that a CPU of the network device has to perform for incoming FDP packets is reduced. This enables the network device to support newer FDPs with shorter periodic interval requirements.
    Type: Grant
    Filed: December 10, 2007
    Date of Patent: March 12, 2013
    Assignee: Foundry Networks, LLC
    Inventors: Yuen Wong, Pedman Moobed
  • Patent number: 8396837
    Abstract: When accepting a write request including a data, an apparatus 100A acquires a first hash value based on a first hash function and, meanwhile, acquires a second hash value based on a second hash function. When a storage device 110A has not stored the acquired first hash value and second hash value in correlation with each other, the apparatus correlates the data, the first hash value, the second hash value, and information of referenced times, and then stores the correlated items into the storage device. On the other hand, when the storage device has stored the acquired first hash value and second hash value in correlation with each other, the apparatus changes the information of referenced times stored in correlation with the first hash value and the second hash value so as to add one to the number of times denoted by the information of referenced times.
    Type: Grant
    Filed: October 14, 2009
    Date of Patent: March 12, 2013
    Assignee: NEC Corporation
    Inventor: Masatsugu Matsuura