METHODS FOR VERIFYING DATA INTEGRITY
    11.
    发明申请
    METHODS FOR VERIFYING DATA INTEGRITY 审中-公开
    验证数据完整性的方法

    公开(公告)号:US20170070890A1

    公开(公告)日:2017-03-09

    申请号:US15258117

    申请日:2016-09-07

    Abstract: A method for verifying the integrity of data in a message by a data processing device, the message comprising a plurality of packets, the method comprising: receiving, at the device from a first resource, a manifest associated with the message, the manifest comprising a plurality of group check values for the plurality of packets; receiving, at the device, from the first or a different resource, the message; generating a first progression of rolling hashes for the plurality of packets; deriving group check values from the first progression of rolling hashes for groups of the plurality of packets along one or more paths; verifying the integrity of the data in the message based on or in response to a determination that the derived group check values correspond to the plurality of group check values in the manifest.

    Abstract translation: 一种用于由数据处理设备验证消息中的数据的完整性的方法,所述消息包括多个分组,所述方法包括:在所述设备处从所述设备从第一资源接收与所述消息相关联的清单,所述清单包括 多个分组的多个组检查值; 在所述设备处从所述第一或不同资源接收所述消息; 产生用于所述多个分组的滚动哈希的第一进程; 从沿着一个或多个路径的多个分组的组的滚动哈希的第一进程中导出组检查值; 基于或响应于导出的组检查值对应于清单中的多个组检查值的确定来验证消息中的数据的完整性。

    DATA ACCESS AND OWNERSHIP MANAGEMENT
    12.
    发明申请
    DATA ACCESS AND OWNERSHIP MANAGEMENT 审中-公开
    数据访问和所有权管理

    公开(公告)号:US20170054721A1

    公开(公告)日:2017-02-23

    申请号:US14832428

    申请日:2015-08-21

    CPC classification number: H04L63/10 H04L63/0421 H04L67/02 H04L67/10 H04W12/02

    Abstract: In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.

    Abstract translation: 在一个示例中,方法包括由数据处理设备获得与第一用户相关联并对应于远程资源的第一位置的第一秘密数据。 该方法还包括使用第一秘密数据生成可用于获得第一位置的第一统一资源定位符(URL),以及使用第一URL访问第一位置。 该方法还包括响应于数据处理设备从第一用户到第二用户的使用权限的传送而获得与第二用户相关联并对应于远程资源的第二位置的第二秘密数据。 该方法还包括使用第二秘密数据生成可用于获得第二位置的第二URL,以及使用第二URL访问第二位置。 第二个位置无法通过第一个URL访问。 第一个位置无法通过第二个URL访问。

Patent Agency Ranking