SYSTEMS, DEVICES, AND METHODS FOR OUTPUTTING ALERTS TO INDICATE THE USE OF A WEAK HASH FUNCTION
First Claim
Patent Images
1. A method of outputting an alert on a mobile device, the method comprising:
- receiving data that identifies at least one first hash function;
identifying a hash digest generated using a second hash function;
determining, using the data received at said receiving, if the second hash function is weak; and
outputting an alert indicating that that the second hash function is weak if it is determined that the second hash function is weak.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
57 Citations
23 Claims
-
1. A method of outputting an alert on a mobile device, the method comprising:
-
receiving data that identifies at least one first hash function; identifying a hash digest generated using a second hash function; determining, using the data received at said receiving, if the second hash function is weak; and outputting an alert indicating that that the second hash function is weak if it is determined that the second hash function is weak. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A mobile device comprising a processor and a memory, wherein the mobile device is programmed to execute a plurality of instructions which, when executed, cause the processor to perform the following:
-
receive data that identifies at least one first hash function; identify a hash digest generated using a second hash function; determine, using the data received, if the second hash function is weak; and output an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
-
-
16. A computer-readable medium on which a plurality of executable instructions is stored, the instructions for performing the following on a mobile device:
-
receiving data that identifies at least one first hash function; identifying a hash digest generated using a second hash function; determining, using the data received, if the second hash function is weak; and outputting an alert indicating that the second hash function is weak if it is determined that the hash function is weak.
-
-
17. A system for outputting an alert on a mobile device, the system comprising:
-
a server comprising a processor and a memory, wherein the server is programmed to execute a plurality of instructions which, when executed, cause the processor of the server to identify at least one first hash function at the server, and transmit data identifying the at least one first hash function to the mobile device, the data for use in determining whether a second hash function used to generate a hash digest identified at the mobile device is weak; and the mobile device, which comprises a processor and a memory, wherein the mobile device is programmed to execute a plurality of instructions which, when executed, cause the processor of the mobile device to receive data from the server that identifies the at least one first hash function, identify a hash digest generated using the second hash function, determine using the data received if the second hash function is weak, and output an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
-
-
18. A method of transmitting data to a mobile device, the method comprising:
-
identifying at least one first hash function at a server; and transmitting data identifying the at least one first hash function to a mobile device, the data for use in determining whether a second hash function used to generate a hash digest identified at the mobile device is weak. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification