Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Hash data storage method and device

A technology of data storage and storage location, applied in the field of communication, can solve the problems of hash conflict, affect the efficiency of resource use, and cannot effectively reduce hash conflicts, so as to improve the use efficiency and reduce hash conflicts.

Active Publication Date: 2015-02-25
RUIJIE NETWORKS CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are various hash algorithms in the prior art, which can optimize the speed of data search; however, the hash algorithms in the prior art usually have hash conflicts, which cannot effectively reduce hash conflicts, thus affecting the efficiency of resource usage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash data storage method and device
  • Hash data storage method and device
  • Hash data storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] figure 1 It is a flow chart of Embodiment 1 of the hash data storage method of the present invention, such as figure 1 As shown, this embodiment provides a hash data storage method, which may specifically include the following steps:

[0022] Step 101: Use at least two hash algorithms to perform hash processing on the data to be stored respectively, and obtain at least two hash values ​​of the data to be stored.

[0023] In order to effectively reduce hash collisions in this embodiment, multiple hash algorithms are used to store data. This step is to use at least two hash algorithms to perform hash processing on the stored data respectively. The at least two hash algorithms here can specifically adopt various existing hash algorithms, and use at least two hash algorithms to treat the stored data. Perform hash processing to obtain at least two hash values ​​of the data to be stored, where each hash value corresponds to each hash algorithm. That is, one hash value of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hash data storage method and a hash data storage device. The method comprises the following steps of: respectively hashing data to be stored by using at least two hash algorithms, and acquiring at least two hash values of the data to be stored, wherein each hash value corresponds to each hash algorithm; when a certain storage position of the data to be stored is idle, storing the data to be stored in an idle storage position; and when all storage positions of the data to be stored are not idle, iteratively and recursively storing the data to be stored according to the storage conditions of other storage positions of all first stored data in each storage position of the data to be stored. The invention also provides the hash data storage device. By the invention, hash collisions can be effectively reduced, and the using efficiency of resources is improved.

Description

technical field [0001] The invention relates to communication technology, in particular to a hash data storage method and device. Background technique [0002] The hash (Hash) algorithm is usually also called the hash algorithm, and the input of any length is transformed into a fixed-length output through the hash algorithm, and the output is the hash value. This conversion is a compression mapping, that is, the space of the hash value is usually much smaller than the space of the input, and different inputs may hash to the same output, so it is impossible to uniquely determine the input value through the hash value. Hash algorithms can be used in various operations, such as identity verification, destination address matching in the communication field, and other processes. According to the set hash function and conflict handling method, a group of keywords is mapped to a limited address range, and the image of the keyword in the address range is used as the storage locatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
Inventor 陈佳泳
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products