18486704. DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Sudhansu Sekhar Pradhan of Bangalore (IN)

DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18486704 titled 'DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS

Simplified Explanation

The patent application describes an apparatus that can determine if information has been inputted into an object, generate hash values for the object and its child object, compare the generated hash value with a stored hash value, and save the object if the hash values differ.

  • The apparatus includes a processor and memory storing instructions.
  • Instructions cause the processor to determine inputted information in an object with a nested child object.
  • The processor generates hash values for the object and child object based on their contents.
  • It compares the generated hash value with a stored hash value for the object without the inputted information.
  • If the hash values differ, the processor saves the object with the child object.

Potential Applications

This technology could be applied in data security systems, content management systems, and version control systems.

Problems Solved

This technology helps ensure data integrity by detecting changes in objects and their nested child objects.

Benefits

The technology provides a way to verify the integrity of complex data structures and prevent unauthorized modifications.

Potential Commercial Applications

One potential commercial application could be in cloud storage services to ensure the security and integrity of stored data.

Possible Prior Art

One possible prior art could be cryptographic hashing algorithms used for data verification and integrity checks.

Unanswered Questions

How does the apparatus handle large data sets and complex nested structures?

The patent application does not provide details on how the apparatus manages performance and efficiency when dealing with extensive data sets and deeply nested objects.

What are the potential limitations or vulnerabilities of the technology?

The patent application does not address any potential weaknesses or vulnerabilities that could be exploited by malicious actors.


Original Abstract Submitted

According to examples, an apparatus may include a processor and a memory on which is stored instructions that may cause the processor to determine that information has been inputted into an object, the object including a child object nested within the object. The instructions may also cause the processor to generate a child-object hash value based on contents of the child object, generate a hash value for the object based on contents of the object, the contents of the object including the child-object hash value, and determine whether the generated hash value differs from a stored hash value, the stored hash value corresponding to contents of the object without the inputted information. The instructions may also cause the processor to, based on a determination that the generated hash value differs from the stored hash value, save the object including the child object nested within the object.