System and method enabling parallel processing of hash functions using authentication checkpoint hashes
First Claim
1. A system comprising:
- at least one processor;
at least one display device; and
at least one memory device that stores a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to operate with the at least one display device to;
(a) during a first time period, for a first piece of a code including a plurality of pieces;
(i) hash the first piece of the code and a default seed to obtain a first result hash;
(ii) determine whether the first result hash matches a first authentication checkpoint hash;
(iii) if the first result hash matches the first authentication checkpoint hash, authorize the first piece of the code for execution; and
(iv) if the first result hash does not match the first authentication checkpoint hash, not authorize the first piece of the code for execution;
(b) during a second time period that is initiated before completion of the first time period and that at least partially overlaps the first time period, for a second different piece of the code;
(i) hash the second piece of the code and the first authentication checkpoint hash to obtain a second result hash;
(ii) determine whether the second result hash matches a second authentication checkpoint hash;
(iii) if the second result hash matches the second authentication checkpoint hash, authorize the second piece of the code for execution; and
(iv) if the second result has does not match the second authentication checkpoint hash, not authorize the second piece of the code for execution; and
(c) if each piece of the code is authorized for execution, execute the code and display an image generated by the executed code.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods enabling parallel processing of hash functions are provided. A data string including a plurality of pieces arranged in an order is hashed using a hash function to determine a plurality of authentication checkpoint hashes associated with the pieces. To authenticate the data string, the pieces are grouped into sets, and the authentication checkpoint hash associated with the piece following all other pieces of that set in the order is associated with that set. The system simultaneously performs a separate hash process on each set. That is, the system hashes the pieces of that set using the hash function to determine a result hash, and compares that result hash with the authentication checkpoint hash associated with that set. The initial input to the hash function for the hash process for each set includes one of the pieces and either a default seed or an authentication checkpoint hash.
-
Citations
20 Claims
-
1. A system comprising:
-
at least one processor; at least one display device; and at least one memory device that stores a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to operate with the at least one display device to; (a) during a first time period, for a first piece of a code including a plurality of pieces; (i) hash the first piece of the code and a default seed to obtain a first result hash; (ii) determine whether the first result hash matches a first authentication checkpoint hash; (iii) if the first result hash matches the first authentication checkpoint hash, authorize the first piece of the code for execution; and (iv) if the first result hash does not match the first authentication checkpoint hash, not authorize the first piece of the code for execution; (b) during a second time period that is initiated before completion of the first time period and that at least partially overlaps the first time period, for a second different piece of the code; (i) hash the second piece of the code and the first authentication checkpoint hash to obtain a second result hash; (ii) determine whether the second result hash matches a second authentication checkpoint hash; (iii) if the second result hash matches the second authentication checkpoint hash, authorize the second piece of the code for execution; and (iv) if the second result has does not match the second authentication checkpoint hash, not authorize the second piece of the code for execution; and (c) if each piece of the code is authorized for execution, execute the code and display an image generated by the executed code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
at least one processor; at least one display device; and at least one memory device that stores a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to operate with the at least one display device to; (a) during a first time period, for a designated one of a plurality of pieces of a code, said designated piece of the code preceding each remaining piece of the code in a designated order; (i) hash said designated piece of the code and a default seed to obtain a first result hash; (ii) determine whether the first result hash matches an authentication checkpoint hash associated with said designated piece of the code, said authentication checkpoint hash being one of a plurality of different authentication checkpoint hashes, each of the authentication checkpoint hashes being associated with a different piece of the code; (iii) if the first result hash matches said authentication checkpoint hash associated with said designated piece of the code, authorize said designated piece of the code for execution; and (iv) if the first result hash does not match said authentication checkpoint hash associated with said designated piece of the code, not authorize said designated piece of the code for execution; (b) during a second time period that is initiated before completion of the first time period and that at least partially overlaps the first time period, for each remaining piece of the code; (i) hash said piece of the code and the authentication checkpoint hash associated with the piece of the code immediately preceding said piece of the code in the designated order to obtain a result hash; (ii) determine whether the result hash matches the authentication checkpoint hash associated with said piece of the code; (iii) if the result hash matches the authentication checkpoint hash associated with said piece of the code, authorize said piece of the code for execution; and (iv) if the result hash does not match the authentication checkpoint hash associated with said piece of the code, not authorize said piece of the code for execution; and (c) if each of the pieces of the code are authorized for execution, execute the code and display an image generated by the executed code. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method comprising:
-
(a) during a first time period, for a first piece of a code including a plurality of pieces; (i) causing at least one processor to execute a plurality of instructions to hash the first piece of the code and a default seed to obtain a first result hash; (ii) causing the at least one processor to execute the plurality of instructions to determine whether the first result hash matches a first authentication checkpoint hash; (iii) if the first result hash matches the first authentication checkpoint hash, causing the at least one processor to execute the plurality of instructions to authorize the first piece of the code for execution; and (iv) if the first result hash does not match the first authentication checkpoint hash, causing the at least one processor to execute the plurality of instructions to not authorize the first piece of the code for execution; (b) during a second time period that is initiated before completion of the first time period and that at least partially overlaps the first time period, for a second different piece of the code; (i) causing the at least one processor to execute the plurality of instructions to hash the second piece of the code and the first authentication checkpoint hash to obtain a second result hash; (ii) causing the at least one processor to execute the plurality of instructions to determine whether the second result hash matches a second authentication checkpoint hash; (iii) if the second result hash matches the second authentication checkpoint hash, causing the at least one processor to execute the plurality of instructions to authorize the second piece of the code for execution; and (iv) if the second result has does not match the second authentication checkpoint hash, causing the at least one processor to execute the plurality of instructions to not authorize the second piece of the code for execution; and (c) if each piece of the code is authorized for execution, causing the at least one processor to execute the plurality of instructions to execute the code and operate with at least one display device to display an image generated by the executed code. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
(a) during a first time period, for a designated one of a plurality of pieces of a code, said designated piece of the code preceding each remaining piece of the code in a designated order; (i) causing at least one processor to execute a plurality of instructions to hash said designated piece of the code and a default seed to obtain a first result hash; (ii) causing the at least one processor to execute the plurality of instructions to determine whether the first result hash matches an authentication checkpoint hash associated with said designated piece of the code, said authentication checkpoint hash being one of a plurality of different authentication checkpoint hashes, each of the authentication checkpoint hashes being associated with a different piece of the code; (iii) if the first result hash matches said authentication checkpoint hash associated with said designated piece of the code, causing the at least one processor to execute the plurality of instructions to authorize said designated piece of the code for execution; and (iv) if the first result hash does not match said authentication checkpoint hash associated with said designated piece of the code, causing the at least one processor to execute the plurality of instructions to not authorize said designated piece of the code for execution; (b) during a second time period that is initiated before completion of the first time period and that at least partially overlaps the first time period, for each remaining piece of the code; (i) causing the at least one processor to execute the plurality of instructions to hash said piece of the code and the authentication checkpoint hash associated with the piece of the code immediately preceding said piece of the code in the designated order to obtain a result hash; (ii) causing the at least one processor to execute the plurality of instructions to determine whether the result hash matches the authentication checkpoint hash associated with said piece of the code; (iii) if the result hash matches the authentication checkpoint hash associated with said piece of the code, causing the at least one processor to execute the plurality of instructions to authorize said piece of the code for execution; and (iv) if the result hash does not match the authentication checkpoint hash associated with said piece of the code, causing the at least one processor to execute the plurality of instructions to not authorize said piece of the code for execution; and (c) if each of the pieces of the code are authorized for execution, execute the code and display an image generated by the executed code. - View Dependent Claims (17, 18, 19, 20)
-
Specification