发明名称 System and method enabling parallel processing of hash functions using authentication checkpoint hashes
摘要 Systems and methods enabling parallel processing of hash functions are provided. A data string including a plurality of pieces arranged in an order is hashed using a hash function to determine a plurality of authentication checkpoint hashes associated with the pieces. To authenticate the data string, the pieces are grouped into sets, and the authentication checkpoint hash associated with the piece following all other pieces of that set in the order is associated with that set. The system simultaneously performs a separate hash process on each set. That is, the system hashes the pieces of that set using the hash function to determine a result hash, and compares that result hash with the authentication checkpoint hash associated with that set. The initial input to the hash function for the hash process for each set includes one of the pieces and either a default seed or an authentication checkpoint hash.
申请公布号 US8966278(B2) 申请公布日期 2015.02.24
申请号 US201314140282 申请日期 2013.12.24
申请人 IGT 发明人 Wolf Bryan D.
分类号 G06F21/00;G06F21/51;G06F21/64 主分类号 G06F21/00
代理机构 Neal, Gerber & Eisenberg LLP 代理人 Neal, Gerber & Eisenberg LLP
主权项 1. A system comprising: at least one processor; at least one display device; and at least one memory device that stores a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to operate with the at least one display device to: (a) during a first time period, for a first piece of a code including a plurality of pieces: (i) hash the first piece of the code and a default seed to obtain a first result hash;(ii) determine whether the first result hash matches a first authentication checkpoint hash;(iii) if the first result hash matches the first authentication checkpoint hash, authorize the first piece of the code for execution; and(iv) if the first result hash does not match the first authentication checkpoint hash, not authorize the first piece of the code for execution; (b) during a second time period that is initiated before completion of the first time period and that at least partially overlaps the first time period, for a second different piece of the code: (i) hash the second piece of the code and the first authentication checkpoint hash to obtain a second result hash;(ii) determine whether the second result hash matches a second authentication checkpoint hash;(iii) if the second result hash matches the second authentication checkpoint hash, authorize the second piece of the code for execution; and(iv) if the second result has does not match the second authentication checkpoint hash, not authorize the second piece of the code for execution; and (c) if each piece of the code is authorized for execution, execute the code and display an image generated by the executed code.
地址 Las Vegas NV US