Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

89results about How to "Improve deduplication efficiency" patented technology

Data deduplication method and device

The invention provides a data deduplication method and device. The method comprises the following steps: determining a first area, wherein the first area is an area of which the data writing frequency is lower than a preset frequency threshold value, and the area comprises at least one data block; calculating the Hash value of a first data block in the first area; judging whether the Hash value of the first data block is the same with the Hash value in a deduplication mapping table item or not; when the Hash value of the first data block is the same with the Hash value in the deduplication mapping table, obtaining the physical address of a deduplication data block in the deduplication mapping table item; reading data in the deduplication data block; when the data in the deduplication data block is the same with the data in the first data block, changing a mapping relationship between the logic address, which is recorded in the data mapping table item, of the first data block and the physical address of the first data block into a mapping relationship between the logic address of the first data block and the physical address of the deduplication data block; and recovering the first data block. By use of the data deduplication method and device, deduplication frequency can be improved, data writing time delay is lowered, and the working efficiency of a memory system is improved.
Owner:MACROSAN TECH

A repeated data deleting method and device

The invention provides a repeated data deleting method and device. The method comprises the steps of dividing data flow into data blocks of a preset block size; performing fingerprint calculation on each data block and adding calculated fingerprint information to the attributes of data block structures; acquiring a fixed length prefix of the calculated fingerprints and distributing the data blocks into different processing queues according to the fixed length prefix. The working threads in the processing queues perform repetition checking operations in a parallel manner to delete repeated data in the data blocks. The method distributes received data blocks into different processing queues based on a fixed length prefix of fingerprints of data blocks and a single thread is used for processing data blocks in each processing queue; repetition checking is only performed from repetition deletion metadata block sub-lists corresponding to the fixed length prefix of fingerprints, so that the expenses of uniformity locks are avoided; the working threads of the processing queues realize the repetition checking operations in a parallel manner, so that the consumption of system resources in repetition removal computing is reduced and the data repetition deletion efficiency is increased.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Ciphertext image deduplication method used in cloud environment and cloud server

The invention belongs to the technical field of image deduplication and discloses a ciphertext image deduplication method used in the cloud environment and a cloud server. An image in a database is partitioned, characteristic values of image blocks are calculated, and the image blocks and the characteristic values are encrypted with any one rapid symmetrical encryption algorithm; the encrypted image blocks, a sequence matrix of the image blocks and the encrypted characteristic values are uploaded to the cloud server, and ciphertext image deduplication operation is executed by the server; if other authorized users upload the image again, the encrypted image blocks and the encrypted characteristic values are required to be sent to the cloud server, the cloud server performs retrieval operation in an encrypted image library, and storage of the image blocks or deduplication is decided according to the fact that whether the same characteristic values of the image blocks or the characteristic values of the image blocks in a set threshold value range exist. On the basis of conventional image deduplication, safe deduplication of ciphertext images is realized, deduplication of different images is realized, the expected safety purpose is achieved, and besides, the storage efficiency is improved under the condition that the accuracy is guaranteed.
Owner:XIDIAN UNIV

Distributed storage apparatus, and distributed storage de-duplication, writing, deletion and reading methods and systems

The invention discloses a distributed storage apparatus, and distributed storage de-duplication, writing, deletion and reading methods and systems. The methods and the systems are applied to the distributed storage apparatus. The distributed storage de-duplication method comprises the steps of obtaining a target object data fingerprint of a target data object in a unified storage layer, and storing the target object data fingerprint in a corresponding OSD (Object Storage Device); calculating the target object data fingerprint by utilizing a preset algorithm to obtain a target OSD of the target data object; judging whether the target OSD stores a historical data object or not; and if the historical data object is stored, adding 1 to a count of reference counting of the historical data object. The target OSD is found by directly utilizing the target object data fingerprint; a corresponding relationship between the object data fingerprint and the OSD is established, so that whether repeated data exists or not is directly judged; and therefore, the problem of low efficiency caused by performing matching query in a distributed storage network by utilizing a fingerprint library is avoided and the working efficiency of distributed storage de-duplication is improved.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Method and device for obtaining maximum conversion step number of session

The invention discloses a method and device for obtaining the maximum conversion step number of a session. The method comprises the steps that route configuration information of a conversion route chain configured in advance is obtained; route information generated by a browsed webpage during a session process of a user is received; the route information and the route configuration information are matched, the conversion step number matched on each webpage in the session and a previous conversion step number are obtained; according to the conversion step number matched on each webpage and the previous conversion step number, the reaching step number of each webpage in the session is set; the difference value of the matched previous conversion step number and the reaching step number of each webpage is computed, the conversion step number difference value of each webpage in the session is generated; the webpage with the conversion step number difference value of 1 is extracted, and according to the conversion step number corresponding to the webpage with the conversion step number difference value of 1, the maximum conversion step number of the session is obtained. According to the method and device, overmuch performance loss during the process of obtaining the optimized conversion step number by screening processing is lowered, and duplicate removal efficiency is improved.
Owner:BEIJING GRIDSUM TECH CO LTD

Method and device for de-repetition selection of repeated data based on cloud computing

The invention discloses a method for de-repetition selection of repeated data based on cloud computing. The method comprises the steps that at the step S10, when to-be-stored data containing the repeated data is acquired, a load value of a client side and a load value of a server side existing in a storage system at present as well as a current network bandwidth value are acquired; at the step S11, whether the load value of the client side, the load value of the server side and the current network bandwidth value satisfy preset conditions is judged, and the step S12 can be started if the conditions are satisfied; and at the step S12, under a preset de-repetition selection mode, a manner for the de-repetition selection of the repeated data in the to-be-stored data is determined. The load value of the client side, the load value of the server side and the current network bandwidth value greatly influence the selection of the de-repetition manner of the to-be-stored data, so that the three parameters are taken as reference objects, and thus de-repetition efficiency can be increased, and an overall utilization rate of the storage system can be increased. In addition, the invention also discloses a device for the de-repetition selection of the repeated data based on the cloud computing. The device has the same effects.
Owner:INSPUR BEIJING ELECTRONICS INFORMATION IND

Method for judging repeatability of data reported by edge computing node by cloud monitoring center

A method for judging repeatability of data reported by edge computing nodes by a cloud monitoring center belongs to the technical field of network security and comprises the following steps: S1, enabling each edge computing node to be in signal connection with a central cloud platform; the central cloud platform is provided with a monitoring center, and the monitoring center receives report information from the edge computing node; S2, comparing the reported information with recently received data by the monitoring center, and judging the repeatability of the reported information; S3, according to a comparison result in the step S2, if the report information is reported by other edge computing nodes if the report information is repeated, entering the step S4; otherwise, entering the step S5; S4, directly discarding the repeated reported information without disposal; and S5, updating the reported data into the central cloud platform. According to the method, repeated data reported by a plurality of edge computing nodes are filtered, the data computing amount of the cloud platform is greatly reduced while the duplicate removal efficiency is improved, and the resource utilization rate of the central cloud platform is indirectly improved.
Owner:杭州御安数科信息技术有限公司

Repeated data deleting method targeted at backup task

ActiveCN105786651ASolve the query bottleneck problemNarrow down the scope of the duplicate checkRedundant operation error correctionTheoretical computer scienceFingerprint
The invention discloses a repeated data deleting method targeted at a backup task.The method includes the steps that firstly, the backup task is divided; a fingerprint storehouse which completes the whole duplicate checking process on a hard disk is placed into a set B-bucket; then, local caching and global caching are established in the internal storage; elements in the B-bucket are placed into the global caching; all fingerprints of the current backup task are sequentially placed into a fingerprint storehouse C-bucket; the C-bucket is updated after reaching a filled state, and the updated biggest fingerprint and the smallest fingerprint are traversed and recorded; then, the fingerprint storehouse containing the two fingerprints is searched for in the B-bucket, and the local caching is added; after each updated fingerprint is researched and marked in the local caching and the global caching, the unmarked fingerprints are preserved to a fingerprint storehouse N-bucket; the marked fingerprints are all deleted; finally, the N-bucket is replaced after reaching a filled state, the local caching is added, and the global caching is updated.The repeated data deleting method has the advantages that the problem of fingerprint duplicate checking bottleneck is solved, the duplicate checking range is reduced, and duplicate checking efficiency is improved; a high throughput rate is maintained.
Owner:BEIHANG UNIV

Large-data-volume secret key duplication removal method and system based on Bloom filter

The invention discloses a large-data-volume secret key deduplication method based on a Bloom filter. The method comprises the following steps: obtaining data to be subjected to deduplication; initializing a deduplication system; dividing and storing the data; performing Bloom deduplication on the data; performing traversal statistics on positive data; performing accurate duplicate removal on the data; and completing precise duplicate removal of the large-data-volume key data. The invention further provides a large-data-volume secret key duplicate removal system based on the Bloom filter. The accurate duplicate removal of the large-data-volume key data is completed. Compared with the prior art, a divide-and-conquer storage method and an accurate duplicate removal method based on positive data are provided for large-data-volume key duplicate removal, the large-data-volume keys are uniformly guided and stored to different storage units according to hash remainder, it is guaranteed that the duplicate keys are in the same data set, the BitSet space occupation and deduplication operation consumption required by a single Bloom filter are reduced, that is, the space and time efficiency of the Bloom filter during deduplication operation is improved, accurate deduplication of key data is realized based on positive data HashSet set traversal statistics, and the deduplication accuracy and the key quality are improved.
Owner:ZHEJIANG QUANTUM TECH CO LTD

Data security deduplication method based on auto-encoder

The invention discloses a data security deduplication method based on an auto-encoder, relates to the field of information security and artificial intelligence, solves the problem of low efficiency ofan existing data deduplication method based on random message lock encryption, introduces abstract tags in efficiency, quickly screens out a very small subset from a tag library by means of the similarity of the tags, and executes bilinear mapping calculation on the subset, so that the frequency of bilinear mapping calculation is greatly reduced, and the label comparison efficiency is improved. According to the method, a self-encoding technology commonly used in image processing is introduced, the deduplication efficiency is improved by greatly reducing the number of times of label comparison, and the deduplication efficiency is improved by nearly 10 times compared with a data deduplication method based on random message lock encryption. According to the method, the non-monotonic functionis introduced, so that similar labels can be possibly generated even if data with large difference exists, namely, the similar labels can be generated by the similar data but cannot be established inturn, and the difficulty of deducing the data by an attacker according to the labels is further improved.
Owner:CHANGCHUN UNIV OF SCI & TECH

Video content repeated judgment method and device

The invention discloses a video content repetition judgment method and a device. The method comprises the following steps: establishing a picture similarity judgment model comprising a picture comparison value calculation process and a picture similarity judgment process; calculating sample frame comparison value information of each video sample content by utilizing a picture similarity judgment model; generating a video content comparison data set; calculating picture frame comparison value information of the target video content by utilizing a picture similarity judgment model; and finally,comparing the comparison value information of the target frame picture with the comparison value information of the sample frame picture of the video sample content, and judging the repetition condition between the target video content and the video content comparison data set according to a video deduplication strategy. The picture similarity judgment method is quick and high in accuracy, video content duplication elimination is summarized into similarity judgment of different frames of pictures, for massive video content, key information is extracted, duplication elimination workloads are reduced, and the duplication elimination efficiency of the video content is greatly improved.
Owner:XIAMEN MEET YOU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products