Using time to determine a hash extension
First Claim
1. A method for generating a network address, the method comprising:
- a) generating by a computing device an interim hash value based on a combination of at least one cryptographically generated address parameter and a public key, wherein a modifier is included in the at least one cryptographically generated address parameter;
b) modifying the modifier;
c) repeating the operations of generating and modifying until a stop condition, the stop condition including a time limit specified by a time parameter to generate a plurality of interim hash values;
d) terminating the computing when the stop condition is met, the stop condition further comprising a probability below a threshold probability that a more secure hash value will be generated within a remaining time of the time limit;
e) selecting by the computing device a second hash value from the plurality of interim hash values;
f) generating by the computing device a first hash value based on the second hash value; and
g) concatenating a portion of the network address that is not node-selectable and at least a portion of the first hash value to form the network address of the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
An extensible cryptographically generated network address may be generated by forming at least a portion of the network address as a portion of a first hash value. The first hash value may be formed by generating a plurality of hash values by hashing a concatenation of a public key and a modifier using a second hash function until a stop condition. The stop condition may include computing the plurality of hash values for a period of time specified by a time parameter. A second hash value may be selected from the plurality of hash values, and the modifier used to compute that hash value may be stored. A hash indicator may be generated which indicates the selected second hash value. The first hash value may be generated as a hash of a concatenation of at least the public key and the modifier. At least a portion of the node-selectable portion of the network address may include at least a portion of the first hash value.
-
Citations
19 Claims
-
1. A method for generating a network address, the method comprising:
-
a) generating by a computing device an interim hash value based on a combination of at least one cryptographically generated address parameter and a public key, wherein a modifier is included in the at least one cryptographically generated address parameter; b) modifying the modifier; c) repeating the operations of generating and modifying until a stop condition, the stop condition including a time limit specified by a time parameter to generate a plurality of interim hash values; d) terminating the computing when the stop condition is met, the stop condition further comprising a probability below a threshold probability that a more secure hash value will be generated within a remaining time of the time limit; e) selecting by the computing device a second hash value from the plurality of interim hash values; f) generating by the computing device a first hash value based on the second hash value; and g) concatenating a portion of the network address that is not node-selectable and at least a portion of the first hash value to form the network address of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for a computing device to derive a node-selectable portion of a network address from a public key of the computing device, the method comprising:
-
a) computing by a computing device a plurality of hash values using a second hash function until a stop condition, the stop condition including computing the plurality of hash values for a time limit specified by a time parameter, an input for each hash value in the plurality of hash values including a concatenation of a public key and a modifier, wherein the modifier is included in at least one cryptographically generated address parameter and is modified during repeating of computing operations; b) terminating the computing operation when the stop condition is met, the stop condition further comprising a probability below a threshold probability that a more secure hash value will be generated within a remaining time of the time limit; c) selecting by the computing device a second hash value from the plurality of hash values; d) generating by the computing device a hash indicator indicating the selected second hash value; e) computing by the computing device a first hash value using a first hash function, the input to the first hash function including a concatenation of the public key and the modifier; f) setting at least a portion of a node-selectable portion of a network address of the computing device to a portion of the first hash value. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more computer readable storage media having computer executable components being executed by a processor to generate a network address of a computing device, comprising:
-
a) means for generating a plurality of interim hash values using a second hash function until a stop condition, the stop condition including computing the plurality of interim hash values for a time limit specified by a time parameter, each interim hash value having an input including a concatenation of a public key and a modifier, wherein the modifier is included in at least one cryptographically generated address parameter and is modified during repeating of computing operations; b) means for terminating the means for generating the plurality of interim hash values when the stop condition is met, the stop condition further comprising a probability below a threshold probability that a more secure hash value will be generated within a remaining time of the time limit; c) means for selecting a second hash value from the plurality of interim hash values; d) means for generating a hash indicator indicating the selected second hash value; e) means for computing a first hash value, the input to the first hash function including a concatenation of the public key and the modifier; and f) means for generating a network address of the computing device based on at least a portion of the first hash value. - View Dependent Claims (19)
-
Specification