ENCRYPTION OUTPUT DATA GENERATION METHOD AND SYSTEM
First Claim
Patent Images
1. A method, comprising:
- receiving, by a computing system, first source data (S1);
first applying, by said computing system, a first hash function to said first source data (S1);
generating as a result of said first applying, by said first hash function, a first hash output (H1);
performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2);
second applying, by said computing system, said first hash function (H1) to said second source data (S2); and
generating as a result of said second applying, by said first hash function, a second hash output (H2).
1 Assignment
0 Petitions
Accused Products
Abstract
A hashing method and system. The method comprises receiving by a computing system first source data. A first hash function is applied to first source data. A first hash output is generated by the first hash function as a result of applying the first hash function to first source data. The computing system performs an operation relating the first source data with at least a portion of the first hash output to generate second source data. The first hash function is applied to the second source data. A second hash output is generated as a result of applying the first hash function to the second source data.
-
Citations
36 Claims
-
1. A method, comprising:
-
receiving, by a computing system, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function (H1) to said second source data (S2); and generating as a result of said second applying, by said first hash function, a second hash output (H2). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing system comprising a processor and a computer readable memory unit coupled to the processor, said memory unit containing instructions that when executed by the processor implement a hashing method, said method comprising:
-
receiving, by a computing system, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function (H1) to said second source data (S2); and generating as a result of said second applying, by said first hash function, a second hash output (H2). - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement a hashing method within a computing system, said method comprising:
-
receiving, by a computing system, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function (H1) to said second source data (S2); and generating as a result of said second applying, by said first hash function, a second hash output (H2). - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A process for integrating computing infrastructure, comprising integrating computer-readable code into a computing system, wherein the computing system comprises a computer usable medium, and wherein the code in combination with the computing system is capable of performing a hashing method comprising:
-
receiving, by a computing system, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function (H1) to said second source data (S2); and generating as a result of said second applying, by said first hash function, a second hash output (H2). - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification