Method, device and electronic equipment for structuring data fingerprint

A data fingerprint and electronic device technology, applied in the information field, can solve problems such as complexity and heavy system workload, and achieve the effect of small amount of calculation

Inactive Publication Date: 2010-11-10
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of realizing the present invention, the inventors found that the existing problems in the prior art are: most of the current methods for constructing unique and reliable data fingerprints based on the target data are relatively complicated, and a large number of calculations are required during construction. too much burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and electronic equipment for structuring data fingerprint
  • Method, device and electronic equipment for structuring data fingerprint
  • Method, device and electronic equipment for structuring data fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] like figure 1 as shown, figure 1 It is a schematic flowchart of a method for constructing a data fingerprint of target data in this embodiment, and the process includes the following steps:

[0030] 101. Perform a hash operation on the target data according to a first hash algorithm to obtain a first digest value of the target data;

[0031] 102. Intercepting a data segment in the target data;

[0032] 103. Perform a hash operation on the data segment according to a second hash algorithm to obtain a second digest value of the data segment;

[0033] 104. Generate a data fingerprint of the target data according to the first digest value and the second digest value.

[0034] The first hash algorithm and the second hash algorithm in the embodiment of the present invention may be the same hash algorithm, or may be different hash algorithms. However, whether the same hash algorithm or different hash algorithms are used, the obtained first digest value and the second diges...

Embodiment 2

[0038] like figure 2 as shown, figure 2 It is a schematic flowchart of a method for constructing a data fingerprint of target data in this embodiment, and the process includes the following steps:

[0039] 201. Perform a hash operation on the target data according to a first hash algorithm to obtain a first digest value of the target data;

[0040] 202. Intercepting a data segment in the target data;

[0041] 203. Determine whether the length of the data segment is at least 128 bytes; if the length of the data segment is at least 128 bytes, then perform step 204; if the length of the data segment is less than 128 bytes, then perform step 202 .

[0042] 204. Perform a hash operation on the data segment according to a second hash algorithm to obtain a second digest value of the data segment;

[0043] 205. Generate a data fingerprint of the target data according to the first digest value and the second digest value.

[0044] In the embodiment of the present invention, afte...

Embodiment 3

[0050] According to the method described in Embodiment 1 or Embodiment 2, here, three independent embodiments are respectively used to illustrate the technical solutions of the embodiments of the present invention.

[0051] like image 3 as shown, image 3 It is a schematic flowchart of the first method for constructing data fingerprints of target data in an embodiment of the present invention, and the process includes the following steps:

[0052] 301. Perform a hash operation on the target data File according to the MD5 (Message-Digest Algorithm 5, data digest algorithm 5) hash algorithm, and obtain the digest value Digest-File of the File;

[0053] 302. Intercepting a data segment File-Seg with a length of 128Byte (1024bit) from the File header;

[0054] 303. Use the MD5 hash algorithm to perform a hash operation on the data segment File-Seg to obtain a digest value Digest-Seg of the File-Seg;

[0055] 304. Concatenate the digest value Digest-File and the digest value Di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, a device and electronic equipment for structuring data fingerprint. The method comprises the steps of: carrying out Hash operation on target data according to a first Hash algorithm, and acquiring the first abstract value of the target data; intercepting a data segment in the target data, carrying out Hash operation on the data segment according to a second Hash algorithm, and acquiring the second abstract value of the data segment; and generating the data fingerprint of the target data according to the first abstract value and the second abstract value. Through the embodiment of the invention, the invention can reduce the operation load on structuring the data fingerprint.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method, device and electronic equipment for constructing data fingerprints. Background technique [0002] Data fingerprint (fingerprint) is a unique fixed-length digital segment generated according to the target data, so the data fingerprint technology should have the unique characteristic of confirming the content of the original target data, that is, the only target data has a unique data fingerprint, once the target data changes , its data fingerprint must change. In actual use, the data fingerprint should be able to fully represent the target data for identity comparison and other operations. For example: the content addressing mode of the content-addressable CAS (Content Addressable Storage) storage system will generate its unique "content address" according to the data fingerprint of the stored data to access the data; in the single-instance (Single-Instance) storag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
Inventor 王雨晨刘利锋杨琴琴
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products