Encryption output data generation method and system
First Claim
Patent Images
1. A method, comprising:
- receiving, by a computing system comprising a computer processor, first source data (S1);
first applying, by said computing system, a first hash function to said first source data (S1);
generating as a result of said first applying, by said first hash function, a first hash output (H1);
performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2);
second applying, by said computing system, said first hash function to said second source data (S2); and
generating as a result of said second applying, by said computer processor executing said first hash function, a second hash output (H2), wherein the second hash output (H2) is used to prevent unauthorized access to one or more computing systems including said computing system.
1 Assignment
0 Petitions
Accused Products
Abstract
A hashing method and system. The method comprises receiving by a computing system first source data. A first hash function is applied to first source data. A first hash output is generated by the first hash function as a result of applying the first hash function to first source data. The computing system performs an operation relating the first source data with at least a portion of the first hash output to generate second source data. The first hash function is applied to the second source data. A second hash output is generated as a result of applying the first hash function to the second source data.
14 Citations
28 Claims
-
1. A method, comprising:
-
receiving, by a computing system comprising a computer processor, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function to said second source data (S2); and generating as a result of said second applying, by said computer processor executing said first hash function, a second hash output (H2), wherein the second hash output (H2) is used to prevent unauthorized access to one or more computing systems including said computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing system comprising a processor and a computer readable memory unit coupled to the processor, said memory unit containing instructions that when executed by the processor implement a hashing method, said method comprising:
-
receiving, by a computing system, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function to said second source data (S2); and generating as a result of said second applying, by said first hash function, a second hash output (H2). - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product, comprising a computer readable memory medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement a hashing method within a computing system, said method comprising:
-
receiving, by a computing system, first source data (S1); first applying, by said computing system, a first hash function to said first source data (S1); generating as a result of said first applying, by said first hash function, a first hash output (H1); performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2); second applying, by said computing system, said first hash function to said second source data (S2); and generating as a result of said second applying, by said first hash function, a second hash output (H2). - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
Specification