18486704. DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS simplified abstract (Microsoft Technology Licensing, LLC)
Contents
- 1 DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does the apparatus handle large data sets and complex nested structures?
- 1.11 What are the potential limitations or vulnerabilities of the technology?
- 1.12 Original Abstract Submitted
DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS
Organization Name
Microsoft Technology Licensing, LLC
Inventor(s)
Sudhansu Sekhar Pradhan of Bangalore (IN)
DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18486704 titled 'DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS
Simplified Explanation
The patent application describes an apparatus that can determine if information has been inputted into an object, generate hash values for the object and its child object, compare the generated hash value with a stored hash value, and save the object if the hash values differ.
- The apparatus includes a processor and memory storing instructions.
- Instructions cause the processor to determine inputted information in an object with a nested child object.
- The processor generates hash values for the object and child object based on their contents.
- It compares the generated hash value with a stored hash value for the object without the inputted information.
- If the hash values differ, the processor saves the object with the child object.
Potential Applications
This technology could be applied in data security systems, content management systems, and version control systems.
Problems Solved
This technology helps ensure data integrity by detecting changes in objects and their nested child objects.
Benefits
The technology provides a way to verify the integrity of complex data structures and prevent unauthorized modifications.
Potential Commercial Applications
One potential commercial application could be in cloud storage services to ensure the security and integrity of stored data.
Possible Prior Art
One possible prior art could be cryptographic hashing algorithms used for data verification and integrity checks.
Unanswered Questions
How does the apparatus handle large data sets and complex nested structures?
The patent application does not provide details on how the apparatus manages performance and efficiency when dealing with extensive data sets and deeply nested objects.
What are the potential limitations or vulnerabilities of the technology?
The patent application does not address any potential weaknesses or vulnerabilities that could be exploited by malicious actors.
Original Abstract Submitted
According to examples, an apparatus may include a processor and a memory on which is stored instructions that may cause the processor to determine that information has been inputted into an object, the object including a child object nested within the object. The instructions may also cause the processor to generate a child-object hash value based on contents of the child object, generate a hash value for the object based on contents of the object, the contents of the object including the child-object hash value, and determine whether the generated hash value differs from a stored hash value, the stored hash value corresponding to contents of the object without the inputted information. The instructions may also cause the processor to, based on a determination that the generated hash value differs from the stored hash value, save the object including the child object nested within the object.