[go: up one dir, main page]

AU2001257519A1 - Methods, systems and computer program for use of a hash-ordered database - Google Patents

Methods, systems and computer program for use of a hash-ordered database

Info

Publication number
AU2001257519A1
AU2001257519A1 AU2001257519A AU5751901A AU2001257519A1 AU 2001257519 A1 AU2001257519 A1 AU 2001257519A1 AU 2001257519 A AU2001257519 A AU 2001257519A AU 5751901 A AU5751901 A AU 5751901A AU 2001257519 A1 AU2001257519 A1 AU 2001257519A1
Authority
AU
Australia
Prior art keywords
hash
systems
methods
computer program
ordered database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001257519A
Inventor
David Blaker
Dan Winkelstein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NetOctave Inc
Original Assignee
NetOctave Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NetOctave Inc filed Critical NetOctave Inc
Publication of AU2001257519A1 publication Critical patent/AU2001257519A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
AU2001257519A 2000-05-11 2001-05-03 Methods, systems and computer program for use of a hash-ordered database Abandoned AU2001257519A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US20346400P 2000-05-11 2000-05-11
US60/203,464 2000-05-11
US09/845,432 US20010042204A1 (en) 2000-05-11 2001-04-30 Hash-ordered databases and methods, systems and computer program products for use of a hash-ordered database
US09/845,432 2001-04-30
PCT/US2001/014333 WO2001086502A2 (en) 2000-05-11 2001-05-03 Methods, systems and computer program for use of a hash-ordered database

Publications (1)

Publication Number Publication Date
AU2001257519A1 true AU2001257519A1 (en) 2001-11-20

Family

ID=26898637

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001257519A Abandoned AU2001257519A1 (en) 2000-05-11 2001-05-03 Methods, systems and computer program for use of a hash-ordered database

Country Status (3)

Country Link
US (1) US20010042204A1 (en)
AU (1) AU2001257519A1 (en)
WO (1) WO2001086502A2 (en)

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10142959A1 (en) * 2001-09-03 2003-04-03 Siemens Ag Method, system and computer for negotiating a security relationship on the application layer
JP2003084668A (en) * 2001-09-12 2003-03-19 Sony Corp Random number generation device, random number generation method and random number generation program
US20040039936A1 (en) * 2002-08-21 2004-02-26 Yi-Sern Lai Apparatus and method for high speed IPSec processing
US7263560B2 (en) * 2002-08-30 2007-08-28 Sun Microsystems, Inc. Decentralized peer-to-peer advertisement
JP4159328B2 (en) * 2002-09-11 2008-10-01 Necインフロンティア株式会社 Network, IPsec setting server device, IPsec processing device, and IPsec setting method used therefor
KR100456599B1 (en) * 2002-11-12 2004-11-09 삼성전자주식회사 Cryptographic apparatus with parallel des structure
US7669234B2 (en) * 2002-12-31 2010-02-23 Broadcom Corporation Data processing hash algorithm and policy management
US7287131B1 (en) * 2003-03-21 2007-10-23 Sun Microsystems, Inc. Method and apparatus for implementing a fully dynamic lock-free hash table
US6988106B2 (en) * 2003-07-09 2006-01-17 Cisco Technology, Inc. Strong and searching a hierarchy of items of particular use with IP security policies and security associations
US7370054B1 (en) * 2003-09-29 2008-05-06 Sun Microsystems, Inc Method and apparatus for indexing a hash table which is organized as a linked list
EP1690365A1 (en) * 2003-10-16 2006-08-16 Matsushita Electric Industrial Co., Ltd. Encrypted communication system and communication device
US7257572B2 (en) * 2004-04-30 2007-08-14 Intel Corporation Function for directing packets
US20050283604A1 (en) * 2004-06-21 2005-12-22 Ipolicy Networks, Inc., A Delaware Corporation Security association configuration in virtual private networks
US8364948B2 (en) * 2004-07-02 2013-01-29 Hewlett-Packard Development Company, L.P. System and method for supporting secured communication by an aliased cluster
KR100735577B1 (en) * 2004-08-12 2007-07-04 삼성전자주식회사 Adaptive Key Search Device and Method in Wireless Network
US7624263B1 (en) * 2004-09-21 2009-11-24 Advanced Micro Devices, Inc. Security association table lookup architecture and method of operation
US7783880B2 (en) * 2004-11-12 2010-08-24 Microsoft Corporation Method and apparatus for secure internet protocol (IPSEC) offloading with integrated host protocol stack management
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
JP4634349B2 (en) * 2006-08-22 2011-02-16 株式会社日立製作所 IPSec processing device, network system, and IPSec processing program
US7895211B2 (en) * 2006-11-03 2011-02-22 International Business Machines Corporation Method and system for reinserting a chain in a hash table
KR101300843B1 (en) * 2006-11-29 2013-08-29 삼성전자주식회사 Method of generating rekey index and rekey index generator using the same
US9059838B2 (en) * 2007-03-30 2015-06-16 Verizon Patent And Licensing Inc. Encryption algorithm with randomized buffer
DE102007018403B4 (en) * 2007-04-17 2009-06-25 Vita-X Ag Computer system and method for storing data
US9244929B2 (en) * 2007-10-31 2016-01-26 Echostar Technologies L.L.C. Automated indexing of electronic files and file folders
US8849866B2 (en) * 2010-02-22 2014-09-30 Infosys Limited Method and computer program product for creating ordered data structure
US8700670B2 (en) * 2010-04-12 2014-04-15 Symantec Corporation Insert optimization for B+ tree data structure scalability
US8539547B2 (en) 2010-08-18 2013-09-17 Certes Networks, Inc. Policy selector representation for fast retrieval
US10031944B1 (en) * 2010-12-31 2018-07-24 EMC IP Holding Company LLC Work file change detection
US10044582B2 (en) 2012-01-28 2018-08-07 A10 Networks, Inc. Generating secure name records
JP5883300B2 (en) * 2012-02-02 2016-03-09 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method, program and system for generating hash code for specifying object
US9912555B2 (en) 2013-03-15 2018-03-06 A10 Networks, Inc. System and method of updating modules for application or content identification
US10049159B2 (en) * 2013-03-15 2018-08-14 Sas Institute Inc. Techniques for data retrieval in a distributed computing environment
US9722918B2 (en) 2013-03-15 2017-08-01 A10 Networks, Inc. System and method for customizing the identification of application or content type
US9838425B2 (en) 2013-04-25 2017-12-05 A10 Networks, Inc. Systems and methods for network access control
US9294503B2 (en) 2013-08-26 2016-03-22 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9906422B2 (en) 2014-05-16 2018-02-27 A10 Networks, Inc. Distributed system to determine a server's health
CN104184744A (en) * 2014-09-11 2014-12-03 东南大学 IPSec security alliance hardware lookup device and method based on IPv6
US9756071B1 (en) 2014-09-16 2017-09-05 A10 Networks, Inc. DNS denial of service attack protection
US9537886B1 (en) 2014-10-23 2017-01-03 A10 Networks, Inc. Flagging security threats in web service requests
US9516065B2 (en) * 2014-12-23 2016-12-06 Freescale Semiconductor, Inc. Secure communication device and method
US9621575B1 (en) 2014-12-29 2017-04-11 A10 Networks, Inc. Context aware threat protection
US9584318B1 (en) 2014-12-30 2017-02-28 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack defense
US9900343B1 (en) 2015-01-05 2018-02-20 A10 Networks, Inc. Distributed denial of service cellular signaling
US9858303B2 (en) * 2015-01-12 2018-01-02 International Business Machines Corporation In-memory latch-free index structure
US9848013B1 (en) 2015-02-05 2017-12-19 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack detection
US10063591B1 (en) 2015-02-14 2018-08-28 A10 Networks, Inc. Implementing and optimizing secure socket layer intercept
US9787581B2 (en) 2015-09-21 2017-10-10 A10 Networks, Inc. Secure data flow open information analytics
US10469594B2 (en) 2015-12-08 2019-11-05 A10 Networks, Inc. Implementation of secure socket layer intercept
US10812348B2 (en) 2016-07-15 2020-10-20 A10 Networks, Inc. Automatic capture of network data for a detected anomaly
US10341118B2 (en) 2016-08-01 2019-07-02 A10 Networks, Inc. SSL gateway with integrated hardware security module
US10229193B2 (en) * 2016-10-03 2019-03-12 Sap Se Collecting event related tweets
US10382562B2 (en) 2016-11-04 2019-08-13 A10 Networks, Inc. Verification of server certificates using hash codes
US10250475B2 (en) 2016-12-08 2019-04-02 A10 Networks, Inc. Measurement of application response delay time
US10397270B2 (en) 2017-01-04 2019-08-27 A10 Networks, Inc. Dynamic session rate limiter
US10187377B2 (en) 2017-02-08 2019-01-22 A10 Networks, Inc. Caching network generated security certificates
US20250111367A1 (en) * 2017-05-23 2025-04-03 Kenneth A. Kopf Systems and methods for facilitating biometric authentication using quantum cryptography and/or blockchain
US11533173B2 (en) * 2020-06-11 2022-12-20 Lognovations Holdings, Llc Systems and methods for compression and encryption of data
CN112699409A (en) * 2020-12-31 2021-04-23 卓尔智联(武汉)研究院有限公司 Data processing method and device and electronic equipment
CN115348046A (en) * 2021-05-13 2022-11-15 华为技术有限公司 Message transmission method and device
EP4469920A4 (en) * 2022-01-24 2025-12-03 Osom Products Inc Linking of digital and physical non-fungible articles
US20240064019A1 (en) * 2022-01-24 2024-02-22 Osom Products, Inc. Digital non-fungible assets in persistent virtual environments linked to real assets

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5287499A (en) * 1989-03-22 1994-02-15 Bell Communications Research, Inc. Methods and apparatus for information storage and retrieval utilizing a method of hashing and different collision avoidance schemes depending upon clustering in the hash table
ATE260486T1 (en) * 1992-07-31 2004-03-15 Ibm FINDING CHARACTERS IN A DATABASE OF CHARACTERS
US5511190A (en) * 1995-01-20 1996-04-23 Tandem Computers, Inc. Hash-based database grouping system and method
US5757915A (en) * 1995-08-25 1998-05-26 Intel Corporation Parameterized hash functions for access control
JP3466054B2 (en) * 1997-04-18 2003-11-10 富士通株式会社 Grouping and aggregation operation processing method

Also Published As

Publication number Publication date
US20010042204A1 (en) 2001-11-15
WO2001086502A3 (en) 2003-01-16
WO2001086502A2 (en) 2001-11-15

Similar Documents

Publication Publication Date Title
AU2001257519A1 (en) Methods, systems and computer program for use of a hash-ordered database
AU2002226886A1 (en) A user definable interface system, method and computer program product
AU2001249342A1 (en) System, method, and article of manufacture for secure transactions utilizing a computer network
AU2001261078A1 (en) Methods and systems for securing computer software
AU2001296605A1 (en) Systems and methods for searching a database
AU2001276544A1 (en) Method, system and computer program for managing views at a computer display
AU2001291179A1 (en) Method, system, and computer program product for interfacing with information sources
AU2002255790A1 (en) Systems and methods for conducting a loyalty program
AU2002315220A1 (en) Systems, methods and computer program products for performing a generalized contingent claim valuation
AU2002349899A1 (en) System and method for managing a procurement process
AU2001286956A1 (en) Software development systems and methods
AU2002306590A1 (en) System, method and computer program product for a b2b procurement portal
AU2002315054A1 (en) Systems and methods for providing a trading interface with advanced features
AU2001290385A1 (en) Database query system and method
AU2001245811A1 (en) Database system and method
AU2001241000A1 (en) System and method for computer searching
AU2002239954A1 (en) System and method of dispensing insurance through a computer network
AU2001289208A1 (en) Method, system and computer program for identifying a compatible individual in a geographic area
AU2002212080A1 (en) Method and computer program for generating files for a database system for a business management user program
AU2001284855A1 (en) Computer system and method of operating a computer system
AU2001287655A1 (en) Method, computer program, and system for carrying out a project
AU2001257225A1 (en) Method, computer program product, and system for determining potential licenseesof a patent portfolio
AU2002230428A1 (en) System, method, and computer program product for providing a multi-user e-mail system
AU2002230508A1 (en) System and method for securing an application for execution on a computer
AU2001276363A1 (en) Method, systems and computer program for reducing hacking susceptibility